Tuesday, November 15, 2016

General Mike Flynn would prioritise 'partnerships and interoperability'







As of today, Lt. Gen (Rtd) Michael T. Flynn, former director of the Defense Intelligence Agency, is being rumoured for a potential cabinet position under the newly elected Trump Administration.

Once a lifelong Democrat, Flynn became one of the loudest voices on the GOP campaign trail for Donald Trump, levelling heavy criticism at President Obama and the leadership decisions made during his time in office, going as far as to challenge the standing narrative in 2014 that Islamist fundamentalism was on the way out following the death of Osama Bin Laden.

Four years earlier, he had cemented his reputation for shaking things up by writing a thinktank report that came down hard on the U.S. intelligence approach in Afghanistan, recommending “sweeping changes to the way the intelligence community thinks about itself.” The report claimed that after nearly a decade of war in Afghanistan, U.S. forces still demonstrated little understanding of the country in which they were operating.

While Flynn infers that his disruptive opinions on Obama’s strategy was the cause of his exit, others believe that his plans to beef up the DIA into an intelligence agency to rival the CIA ruffled too many feathers, with concerns arising over projected costs and requirements. Whatever the core divide, there seems no doubt that the general had been openly determined to go against the grain.

However, in his last year of office – just weeks before his retirement, I spoke with Flynn at the ISR and C2 Battle Management forum in London, UK, where the spy chief was delivering a highly anticipated brief on the future of defence intelligence and the recent achievements made stateside in front of representatives from NATO and other international partners. In a quiet corridor, as his security team prepared his vehicle to whisk him back to an undisclosed location, I asked him why he had made special time in his schedule to come to London.

He replied that “the importance of partners, partnerships, interoperability, independence – particularly as it relates to intelligence, surveillance and reconnaissance operations, today and in the future – is probably one of the most important lessons that we can take away from the last decade on the planet, especially as we look to future operations that I know we are bound to be in.

 “We’re operating in a C5 environment, and that extra ‘C’ stands for ‘coalition’. We’ve had to change our mind-set to put that factor before ‘command’. Deepening our mutual trust is a big deal. I really believe that our alliances are our force multipliers.”

Consistently, Flynn also expressed an admiration of his country’s intelligence apparatus, while lamenting how it was being employed, saying: “The United States’ strategic advantage is our intelligence system. It is unbelievable. It is unprecedented for any time in history. But it’s only as good as in as far as it’s prioritised. Right now it’s over-stretched.”

As the media speculates on whether Flynn may soon take up the office of defense secretary or national security adviser, it is a safe bet to assume that he will – as ever – do his utmost to ‘change’ the path of the intelligence community and its approach to military operations. And yet, to take him at his word, disruption will not mean division. Indeed, there is evidence in his statement to suggest that he will lead a new drive to bind allies to fresh agreements and ensure the campaigns of tomorrow will be conducted from the same hymn sheet – if not with the same equipment, resources, methods and long-term strategic goals.

Time will tell as to the results of these dramatic political changes we are still absorbing from our screens, but if we are to make one prediction, it is that whatever his role, Flynn – perhaps in contrast to recent perceptions of Donald Trump – will now aim to be seen primarily as a unifier rather than as a disruptor.

The next ISR and C2 Battle Management forum will be taking place next week in Alexandria, Virginia, USA, where decision-makers from the CIA, FBI, NSA will be briefing alongside Generals and Admirals from the ISR departments of all U.S. military services. This will be proceeded in by the Airborne ISR and C2 BM forum in London, UK (March 15-16, 2017), which will host a diverse international panel of senior leaders.

Thursday, November 10, 2016

Technological Challenges in the Service of Counterterrorism.








In order to cope with technological threats effectively, the State, under the leadership of the Counterterrorism Bureau, must be capable of analyzing future technologies and the possibilities they offer to the various terrorist elements.

Technology is making quantum leaps and while in the past only states possessed certain capabilities, today, regrettably, states possessing impressive technological capabilities support terrorism (Iran, North Korea). This is a double-edged sword: on the one hand, some impressive technological developments are used by the civilian sector for various needs in such fields as industry, medicine, academia and so forth. On the other hand, these technologies may be directed against us through terrorist elements. So how do you develop capabilities to cope with the "inventiveness of terrorism"?

To illustrate, I will present an example from a field of activity where a solution has been provided or at least where a substantial effort is under way in an attempt to provide a solution. The sniffing of explosives has always been and still remains a significant element in the various security loops, primarily in aviation security. Security professionals realized long ago that a whole world – a technological world primarily – had succeeded in developing a category of improvised explosives that existing sniffer (trace detector) systems cannot identify, which constitutes a threat to civil aviation. Consequently, a serious effort is under way in an attempt to develop the next generation of sniffers (about which, naturally, I will not elaborate) that would be capable of coping with those improvised explosives.

But what happens in the other fields? A professional, cross-organizational, multidisciplinary forum should be established to study the new technologies (those expected to mature in 5-10 years) and attempt to prepare the necessary solutions for them, so that we do not wake up one day to a reality where murderous terrorist possess technological capabilities adopted from the civilian market and currently threaten all of us.

The three examples outlined below should motivate the establishment of the required system (a statutory, budgeted inter-ministry, cross-organizational committee required to present processes and products on a regular basis).

Home 3D Printers: Some of us are familiar with and have seen the video describing the making of a handgun using a 3D printer. Such a handgun cannot be smuggled into a 'sterile' area as it will have to be X-rayed and such screening will detect the bullet. However, 3D printers may produce locks or sealers of the type used to seal sea freight containers. Such locks can give the impression that the cargo/gate is secure, while in fact it was broken into. In this case, the entire concept of secure containers will collapse.

The Cyber World: The cyber world has already been analyzed and discussed very thoroughly and it is not my intention to address the full breadth of the issue. Nevertheless, the vulnerabilities of all security systems (known as low voltage systems), which translate into such threats as disabling of security systems, freezing of surveillance images, planting of alternative images and so forth, constitute a content world which we should address very thoroughly in order to deny potential attackers such capabilities.

Autonomous Cars: A new trend that currently sweeps across the entire high-tech industry involves the attempt (which has thus far been partially successful) to manufacture a driver-less car that may be driven with no need for a human hand or mind. Have we considered the potential terrorist applications of this technology?

In order to cope with technological threats effectively and consistently, the State, under the leadership of the Counterterrorism Bureau, must be capable of analyzing future technologies and the possibilities they offer to the various terrorist elements. What can and should be the output of the inter-ministry, cross-organizational committee described above? It should operate as a regulator while producing technological developments that would minimize the potential advantages of the new technological capabilities if they ever fell into the hands of terrorism.

In the field of sea freight containers, for example, additional sensors should be installed to indicate whether the container had been broken into and whether the equipment it contains had been tampered with. We do not always have to wait until disaster strikes. Sometimes, through a relatively simple technical analysis, we can anticipate the realization of the threat through existing technologies and provide a simple, inexpensive and practical solution that would remain effective at least until the next threat comes along.

***

Font: Brig. Gen. (res.) Nitzan Nuriel is the former head of Israel's Counterterrorism Bureau.

Russian-Egyptian Cooperation in the War on Terror.








Col. (res.) Dr. Shaul Shay analyzes the strategic relations between Egypt and Russia following the conclusion of the joint naval exercise between the two countries, codenamed "Defenders of Friendship 2016".

Exercise "Defenders of Friendship 2016," a joint Russian-Egyptian counter-terrorist exercise, took place in the territory of the Arab Republic of Egypt in the area between the city of Alexandria and El Alamein, on October 15-26, 2016.

It was the first joint Russia-Egypt anti-terrorism military exercise, based on earlier agreements between Russia and Egypt. In June 2015, Russian and Egyptian navy forces conducted their first-ever joint naval drills in the Mediterranean Sea near Alexandria.

According to Russia's Defense Ministry, exercise "Defenders of Friendship 2016," involved six airfields and 15 helicopters and planes. During the drills, Russia’s Ilyushin-76MD transport planes dropped five combat vehicles BMD-2 and one armored personnel carrier BTR-D and about 300 Russian and Egyptian paratroops parachuted themselves. Russian and Egyptian paratroopers practiced localization and elimination of militant groups in desert conditions. According to the Russian Defense Ministry, a new uniform for hot climate had been developed for servicemen who were participating in military drills with the Egyptian army.

The exercise has been controlled by operation groups of both countries from the joint command center, which had been formed at the El Hammam military base.

The Main Stages of the Exercise

October 18, 2016: The Russian Airborne servicemen have left the al-Umaed military base of the Egyptian Armed Forces in order to hold joint day and night firing with small arms at the Alam al-Hadem range. Through co-firing was used a range of weapons ranging from throwing knives for a stealthy destruction of enemy forces, until anti-tank grenade launchers and assault rifles. Military servicemen of both countries have performed more than 600 firing tasks and engaged more than 800 targets at different distances.

October 19, 2016: About 200 servicemen of the Russian and Egyptian Airborne troops have performed joint landing operation from the altitudes of 2,000, 6,000 and 7,000 feet. Joint landing operation was held with the use of D-10, T-10V, Arbalet, and MS-5 parachute systems from Il-76MD aircraft of the Russian Aerospace Forces as well as from C-130 and CASA ones of the Egyptian Armed Forces on the Tallet landing site.

On the same day, Russian and Egyptian servicemen attended special medical training. The exercise participants practiced providing medical assistance in conditions of modern combined-arms combat in the desert. The paratroopers also got familiarized with methods of extreme medicine used by the Russian medical service.

October 21, 2016: Russian Airborne servicemen familiarized the Egyptian counterparts with capabilities of Russian transport aircraft. They demonstrated different ways of loading combat hardware into Il-76MD transport. Russian military servicemen informed their counterparts how to embark more than 40 types of equipment, including self-propelled guns, howitzers, special vehicles, and heavy wheeled and tracked hardware, for transporting.

October 24, 2016: In the main phase of the Russia-Egypt exercise, Russian Airborne troops and Egyptian Airborne troops practiced locating and eliminating illegal armed formations in conditions of desert and liberating a city.

Egypt – Russia Joint Navy Exercise "Friendship Bridge 2015"

On June 2015, Russia and Egypt conducted the first joint naval exercise, codenamed the "Friendship Bridge 2015."

Russia and Egypt have commenced their joint naval exercise off the Mediterranean Egyptian port of Alexandria, as part of efforts to strengthen the military cooperation between the countries.

The Russian side was represented by the ships of the Black Sea and Baltic Fleets. The Russian vessels in the exercise included the guided missile cruiser Moskva and the catamaran missile corvette Samum, the tanker Ivan Bubnov and landing ship Alexander Shahalin.

Egypt’s ships in the "Friendship Bridge 2015" exercises included the frigates Taba, Dumyat and Sharm El-Sheik, two missile patrol boats, April 25 and June 18 and two F-16 fighters.

The coastal staff of both navies has been located in the "United Control Centre" of the Navy of Egypt. The Moskva cruiser was the exercise flagship, housing the mobile headquarters. Deputy Commander-in-Chief of the Russian Black Sea Fleet Vice Admiral Valery Kulikov and chief of the Egyptian Navy’s combat training department Lt. Gen. Mahmud Mufarrah were in command of the drills.

The eight-day exercise has covered: supply and communications at sea, search operations, as well as all forms of defense at sea and firing exercises. During the exercise, Russian and Egyptian Navy ships performed protection tasks over sea routes against different kinds of threats.

"According to the exercise joint command, crew members of the two countries’ warships drilled maneuvering in column at the exit from the Alexandria naval base, successfully conducted an exercise to repel an attack of a small target, and in accordance with the set parameters and standards conducted a joint air defense drill in the area of operations with the involvement of the F-16 fighters of the Egyptian Air Force," Russian Navy spokesman said. For the Russian crew, it was a good opportunity to practice the drills on the US made modern aircraft.

Summary

The joint "Defenders of Friendship 2016" exercise should be analyzed on the background of three main strategic developments: The Russian "come back" to the Middle East as a dominant player, Egypt as a regional power and the international cooperation in the war against terror.

Russia: In last years, one of the most significant geostrategic developments in the Middle East has been Russia’s increasing political and military involvement. Aside from its deepening military and political involvement in Syria, Russia is improving its relations with Egypt.

As Russia’s military presence in the Eastern Mediterranean grows, it was the first-ever deployment of Russian Airborne Troops stocked with their own weapons and equipment on the African continent and one of the first opportunities for the Russian paratroopers to participate in the joint exercise held in the territories in a desert of  North Africa.

The joint military exercise is significant for Russia’s gradual reemergence as a major player in the Middle East. Egypt is a regional power in the unstable Middle East and strategic cooperation with Egypt is a significant step toward reasserting a regional role that Russia has not enjoyed since 1970.

Egypt: Russia is one of the main non-Arab supporters of El-Sisi’s government and was among the first countries to endorse El-Sisi’s presidential bid in 2014. Cairo has sought to strengthen its ties with Moscow, against the backdrop of strained ties with its long-time ally Washington, since the ouster of Islamist president Mohammed Morsi in July 2013. Egypt, though interested in forming stronger relations with Russia, primarily seek to signal to the international community that its foreign policy is not to be dictated by others.

Diversifying the sources of Egypt’s armaments became a priority among state strategists after the 30 June Revolution. Overreliance on one provider was now seen as shortsighted. Egypt was also keen to ensure its armaments policy responded to international political developments, including the growing influence of China and Russia.

The "Defenders of Friendship-2016" exercise is a significant step in the fast-growing strategic alliance between Egypt and Russia. Egypt and Russia have never been that close since the era of late President Gamal Abdel Nasser, referring to the level of economic and military cooperation.

Cooperation in the war against terror: The Middle East has witnessed an increase in military exercises in recent years, and Egypt is part of this trend. The rise in joint exercises can be explained in light of the increasing intensity of terror threats faced by those countries.

Exercise "Defenders of Friendship-2016," was monitored by representatives of more than 30 countries, among them military observers from 25 countries, as well as ambassadors of CSTO.

Military cooperation and joint exercises are part of the Egyptian foreign policy and strategy, and Egypt has carried out 30 joint military exercises in 2016 with 20 Arab and African countries, as well as European countries including France and Russia.

The Synergies of Palestinian Statehood and Iranian Nuclear Weapons.


Mahmoud Abbas addresses the UN General Assembly (Photo: AP)





To maximize security benefits of their planned analyses and assessments, Israeli strategists must consider the presumptively separate threats of Palestinian statehood and Iranian nuclearization as two intersecting and interactive perils.

"The fox knows many things, but the hedgehog knows one big thing." (Archilochus, Ancient Greek Poet, Fragments)

Always, Israeli strategists treat Palestinian statehood and Iranian nuclearization as altogether separate perils. This is a potentially grave mistake, however, as the two evident threats are actually intersecting or even "force multiplying" in their calculable security implications. A nuclear Iran, however unwitting, could enlarge the regional stability costs to Israel of any Palestinian state. Reciprocally, at least in the plausible future, a Palestinian state could expand certain risks to Israel of an opportunistic nuclear attack from Iran.

We can even be more precise here. The relationship between these two seemingly discrete threats is apt to be expressly synergistic. In essence, therefore, the "whole" of its injurious effect upon Israel could sometimes prove greater than the simple sum of its constituent parts.

Since 2012, the Palestinian Authority has been recognized by the UN as a "Non-member Observer State." Looking ahead, if the Palestinian Authority and Hamas should sometime be able to restore a functional level of cooperation and unity, a fully-sovereign Palestine could emerge. In notably short order, this twenty-third Arab state could rapidly become an optimal platform for expanded war and terrorism against Israel, and also against assorted area allies of the United States.

Always, it follows, Israel and the United States must remain keenly aware of pertinent "force multipliers." Among expected regional consequences, distinctly virulent synergies between Iranian nuclearization and Palestinian statehood could create an authentically existential threat to the Jewish State. Oddly, perhaps, these potentially lethal and multiplying interactive effects remain unhidden, yet are still largely unrecognized.

In their response, Jerusalem and Washington must more systematically consider vital issues of geostrategic context. In the chaotic Middle East, certain core adversarial patterns remain unchanged. Most conspicuously, Israel still endures undiminished international pressures to (1) renounce its "ambiguous" nuclear forces, and (2) join in periodically resuscitated plans for a "Nuclear Weapon Free-Zone."

If Iran and its allies should ever come to believe that Israel had been sufficiently weakened by coordinated "nonproliferation" demands, a previously worked-out strategy of annihilation against Israel could proceed. This lethal strategy could expectedly advance in stages, from terror to mega-terror, and then, in successively added increments, from mega-terror to war and mega-war.

For many reasons, nuclear weapons are still generally regarded across the world as destabilizing. Nonetheless, in the specific case of Israel, the recognizable possession of such weapons could sometimes become all that actually protects civilian populations from various catastrophic aggressions. Maintaining successful nuclear deterrence – whether still ambiguous or newly disclosed – will thus ultimately prove indispensable to Israel's physical survival.

In its authoritative Advisory Opinion of July 8, 1996, the International Court of Justice at The Hague ruled:  “The Court cannot conclude definitively whether the threat or use of nuclear weapons would be lawful or unlawful in an extreme circumstance of self-defense…”  "Where the very survival of a State would be at stake…” continued the ICJ, even the actual use of nuclear weapons could at times be permissible.

Core distinctions must be made. Israel is not Iran. Israel makes no threats of aggressive war or genocide. For the moment, at least, it does not publicly acknowledge its plausibly advanced nuclear capabilities.

The geostrategic truth may sometimes be counterintuitive. Not all nuclear weapon states are created equal. Not all such states are automatically a menace. Some may even offer a genuine benefit to world peace.

On its face, Israel's small size precludes national tolerance of any nuclear attack. This point has even been made openly by a senior Iranian official, who stated ominously: "Israel is a one-bomb state."

From a regional security standpoint, Israel’s nuclear weapons are not the problem.  In the Middle East, the most persistent and resilient source of war and terror remains an Arab/Islamist commitment to "excise the Jewish cancer." Faced with this literally genocidal threat, Israel and its few allies will finally need to understand that the "Peace Process" is just another enemy expedient. To wit, on official Palestinian maps – all of which describe Israel as "Occupied Palestine" – the Jewish State has already been eliminated.

With these exterminatory maps, a cartographic genocide has already been imposed.

What about Iran? With a more openly declared nuclear weapons posture, Israel could more reliably deter a rational Iranian enemy’s unconventional attacks, and also most of its large conventional aggressions. With such a suitably updated posture, Israel, if necessary, could launch appropriately non-nuclear preemptive strikes against Iranian hard targets, and against associated counterforce capabilities.

These assets could otherwise threaten Israel's physical survival with impunity. In the absence of acknowledging its possession of certain survivable and "penetration-capable" nuclear weapons, therefore, Israeli acts of anticipatory self-defense would most likely represent the onset of much wider war. The reason is simple: There would then remain no aptly convincing threat of an Israeli counter-retaliation.

The decision to bring its “bomb" out of the "basement" would not be an easy one for Israel. Nonetheless, the realities of facing not only a nuclear-capable Iran but also other potential nuclear aspirants in the region – in compelling synergies with anti-Israel terrorists – obligate a serious reconsideration of "deliberate ambiguity." As a corollary, Jerusalem would need to clarify that its multiple-level active defenses will always operate in tandem with its decisive nuclear retaliations.

What about "Palestine," the other half of a prospectively corrosive synergy? Soon, it may become apparent that ISIS and certain other related Jihadist fighters plan to move against certain state and sub-state enemies. Already, in fact, ISIS is challenging Hamas control of Gaza and is likely preparing to march westward, across the increasingly vulnerable country of Jordan.

In time, ISIS forces, even after suffering various operational defeats in both Iraq and Syria, could find themselves "at the gates" of the West Bank (Judea/Samaria), territories still widely expected to become Palestine. If, when ISIS actually arrives, a Palestinian state has not yet been created, these forces would effectively occupy the strategic territories for themselves. If a Palestinian state had already been formalized, they could then make quick work of the new sovereignty's fragile army, and subsequently, install themselves as the de facto government of "Palestine."

For Israel, going forward, all of this suggests that meaningful security assessments of both Palestinian statehood and Iranian nuclearization be undertaken with aptly due regard to their predictably complex intersections and consequent synergies.

For Israel, after all, the cumulative impact of these principal threats would almost certainly be tangibly much greater than the mere sum of its identifiable parts.

***

Font: Louis René Beres is Emeritus Professor of International Law at Purdue. He lectures and publishes widely on matters of Israeli security and nuclear strategy.

Persistent Area Surveillance for the City Streets.


Stabilized remote-controlled weapon station 6S21 in Russia (Photo: Bigstock)

Terrorist attacks staged in the municipal domain raise the question of how Israel should cope with civilians evolving into "momentary terrorists" and managing to reach the city streets. Technological solutions for neutralizing those terrorists include Stationary Remotely-Controlled Weapon Station systems.

Terrorist attacks in the municipal domain raise the question of how the state should deal with terrorists who managed to cross all of the countermeasure loops and reach the city streets.

To this day, the doctrine for protecting the civilian domain was based on a binary concept of the living space – a space external to the state, being handled by the military, and the domestic (internal – municipal) space – being handled by the Police and ISA (security service). Subject to this doctrine, ISA has been implementing the countermeasure loop concept, devised to prevent a terrorist from reaching the internal space from the external space. The countermeasure loop concept may be likened to a waterfall, where the terrorist 'drops' from one loop to the next until, eventually, he is apprehended or neutralized.

The countermeasure loop concept is in use to this day, mainly because there is no other alternative. This article asserts that alongside the classic countermeasure mechanism, the state should also implement persistent area surveillance systems and prompt response systems based on the Stationary Remotely-Controlled Weapon Station (SRCWS) configuration within the internal space as well.

The terrorist attacks staged recently in Israel, France, Belgium and elsewhere around the globe have proven that the way in which terrorism is being implemented changed. This change is based on an effort to blur the differences between innocent civilians and terrorists and a transition to low-signature terrorist attacks.

If we were to examine the situation in Israel as an example, we would have realized that the theater consists of an internal space and an external space which contain two population groups that share similar external characteristics, along with the same language and culture. There is a constant transition of individuals from the external space into the internal space for employment, commercial and cultural purposes. Additionally, a certain percentage of family relations exists between the two population groups. The similarity and the connections between the two population groups impose severe difficulties on the counterterrorism efforts.

The counterterrorism concept evolved in an era where terrorist attacks were major operations primarily: large-scale attacks staged at crowded venues, hijacking of passenger aircraft, car bomb attacks, explosive charges detonated on board buses and so forth. The logistic wake of such terrorist attacks normally starts in the external space and only its point extends into the internal space at the final stage of implementation.

Such major attacks leave a substantial logistic 'signature'. In such scenarios, multiple countermeasure loops deployed within the external space have a good chance of catching, quite effectively, attempted attacks before they reach the internal space. If the attack succeeded nevertheless, such a countermeasure layout can generate a sufficient amount of intelligence to point to the perpetrators in retrospect in order to deter any future terrorists.

But what happens when one morning, a civilian decides to become a terrorist, goes to the kitchen, picks up a knife, goes out to the street and stabs a soldier at the nearest bus stop? Or when a sleeper cell made up of apparently innocent civilians receives an order to activate an explosive charge secreted well in advance at a venue where a crowded public festival is under way? Such situations are the 'Achilles' Heel' of the existing counterterrorism concept. As long as they are rare – the situation will remain tolerable, but when they become the mainstream, the counterterrorism concept will not be sufficiently effective.

One of the measures taken by the State of Israel in the context of the counterterrorism concept is an effort intended to make it difficult for terrorists to exit the areas where they live. This is accomplished by border crossing points where age restrictions and thorough background checks may be implemented. Along with the border crossing points, Israel intensified the peripheral defense of the national territory in the air, at sea, on the ground and in the subterranean medium. Paradoxically, imposing more stringent restrictions on the passage from the external space into the internal space led the terrorist organizations to shift the critical mass of their activity into the internal space. Now they employ legitimate civilians more frequently, purchase their materials in the internal space and so forth. This has created a situation where the logistic wake of the attack starts and ends within the internal space, thereby actually 'bypassing' the countermeasure loops and making it much more difficult to prevent terrorist attacks.

Persistent Area Surveillance

Subject to the counterterrorism concept, if a terrorist manages to pass into the internal space nevertheless, he is regarded as a 'Ticking Bomb' – an immediate threat. This is a unique and time-restricted legal mechanism that enables the security forces to employ technological resources, investigative measures and other methods in order to locate and neutralize the terrorist. In other words, the security forces ask the Legislative Branch for an option to revoke individual rights temporarily in order to safeguard our cooperative safety.

As stated previously, this would have worked well if such incidents had been rare. When such terrorist attacks become the mainstream, however, like the recent terrorist attacks staged throughout Israel using knives, small arms or vehicle ramming, the security forces find themselves helpless, and for a good reason. The countermeasure method has become ineffective and no alternatives are available.

The situation described above may be likened to the trend emerging in recent years on the battlefield (the external space): the transition from fixed, visible targets to mobile, rapidly disappearing targets. On the battlefield, the military faces a problem when a terrorist target is only visible for a period of 10 to 30 seconds, after which it simply disappears. In the case of counterterrorism, a similar transition is taking place from the past concept, based on high-signature targets, to low-signature targets.

The military decided to solve this problem by implementing the Stationary Remotely-Controlled Weapon Station (SRCWS) concept, which facilitates the operational concept known in the military jargon as "fire loop closure".

Fire loop closure is a technology-based counterterrorism concept which, in essence, strives to minimize the response interval that starts when a target is identified and ends when it is neutralized.

Whereas the problem stems from the fact that the enemy is only visible for very brief time intervals, in order to successfully implement an effective loop closure concept a persistent area surveillance envelope will be required. An envelope of this type will enable the user to identify the enemy, classify the target and track it continuously. The objective is to keep a given area cell under persistent surveillance while knowing who within that area cell is a friend and who is an enemy as well as the potential risk of each enemy target (hence the classification). In this way, the user may always know, in real time, where all the enemy targets that should be neutralized are located. This information is transferred to SRCWS systems that close the loop on the relevant enemy targets. Once again, the loop closure concept does not make the existing countermeasure concept redundant, but complements it in real time, when the preceding countermeasures have failed.

As in the external space, in the internal space, too, the terrorists evade the countermeasure loops under the cover of everyday civilian routine. This is the reason why the authorities should consider introducing a similar concept based on SRCWS systems and persistent area surveillance to the internal space. Just to clarify: when the countermeasure concept fails, this will normally end with civilians being murdered. Accordingly, the internal security authorities must adopt the same methods applied by the military in order to effectively identify the terrorist, classify him and respond promptly.

Friend or Foe?

In order to identify targets within the internal space, where the differences between civilians and terrorists are completely blurred, the state needs to initiate a preliminary process of defining who's a civilian (which will then indicate who's not), powerful identification resources capable of identifying a specific civilian at any time-location point within the internal space (real time 'Identification Friend-or-Foe') and spatial command and control systems that would enable continuous tracking of the individual within that space. Alongside this envelope, the state needs Stationary Remotely-Controlled Weapon Station (SRCWS) systems that would make it possible to neutralize a terrorist pursuant to his first act of terrorism, be it a gunfire attack, a stabbing attack or a vehicle ramming attack, in order to prevent the killing of additional civilians.

At this point in time, some of these technologies are already up and running in some cities in Israel and around the world. CCTV camera systems with facial recognition algorithms connected to a biometric database of facial features and various types of Smart City systems are already in use. Robots are already executing policing missions on the streets of China and in the USA robots are used for shopping mall and parking lot security – and these are only a few examples.

However, when such technologies are implemented without a structured operational concept backed by relevant legislation, they cannot provide an effective solution to the problem of the failed countermeasure concept. For example, no legislation currently exists that would enable the state, through its security forces, to actively identify each and every civilian within the internal space. Additionally, No legislation currently exists that would enable the state to continuously track civilians using technological measures.

In addition to identification and tracking capabilities, a prompt response capability is required in order to 'close the loop'. The objective is to establish a situation where a terrorist who had stabbed civilians or fired at them will be neutralized immediately following his/her first act of terrorism. For this purpose, we should consider the introduction of prompt response systems capable of engaging the terrorist targets using either lethal or non-lethal measures. The objective of these systems is to neutralize the terrorist, to the maximum extent possible without killing him/her, until law enforcement personnel arrive on the scene. These systems may be fully autonomous, remotely-operated or a combination of both.

It is often said that the cyber defense world knows no boundaries, so organizations and states must cooperate in order to successfully cope with attacks in cyberspace. Well, the recent terrorist attacks in Israel, Europe, the USA, Asia and Africa have shown that the war against terrorism knows no boundaries either. The binary external/internal space concept has failed, and in fact, both spaces have evolved into one. This reality calls for rethinking at the macro level regarding the functions of the ISA, Mossad, IDF and Israel Police and the way the responsibilities should be divided among those organizations. We should consider unifying the various persistent area surveillance systems and establishing a single common system for both spaces – the external space and the internal space. Subject to this notion, fusion of data arriving from both spaces will enable real-time 'cross-fertilization' of the internal security forces, the intelligence agencies and the military.

The implementation of the concept described herein will improve the efficiency of various other activities, even in fields not associated with terrorism, like monitoring illegal aliens, organized crime networks, criminal activities in general and even foreign spies. Persistent area surveillance can do wonders to the day-to-day operations of internal and external security.

A Sample Scenario

Friday at noon. A street surveillance camera spots an unidentified person walking along Rothschild Boulevard in Tel-Aviv. A prompt check of the biometric databases indicates that he is not a registered Israeli citizen. A cross reference check with the IDF databases indicates that he is an inhabitant of Jenin, a known Hamas activist belonging to a cell being monitored by the IDF Intelligence Directorate and regarding which there are concerns of an imminent attack inside Israeli territory. Meanwhile, the persistent area surveillance system tracks the target along Ahad-Ha'Am Street. One possible destination can be the Carmel open-air market.

At the same time, a cross check with new information in the Police database indicates that this person has been loitering in the market area over the past three days. A closer inspection of the video footage from the archives indicates that during those three days, he had photographed all of the entrances and exits to and from the market from different angles, during different times. The same inspection indicates that during those days he had arrived in the area in the same taxi, from Haifa. The license plate number of the taxi is promptly associated with an Israeli citizen, an inhabitant of Haifa, a legitimate taxi driver with no criminal or internal security record. Algorithms being run in the background indicate a fourth-degree family relation between the taxi driver and the suspected Hamas activist. The logistic connection has been established.

The terrorist turns into Jabetz Street on his way to the market. A hyperspectral surveillance camera mounted on a high-flying UAV indicates that he is wearing an explosive vest. A damage assessment predicts an explosion with a 30-meter radius, expected to cause twenty deaths minimum, based on the real-time crowd capacity in the market.

Everyone at the municipal operations center is acutely aware of the fact that all of the countermeasure loops have failed. The system has already issued automatic alerts to police forces in the area, based on their current locations and the force necessary in order to neutralize the terrorist. Additionally, alerts were sent to Red Magen David (paramedic) ambulances whose drivers were ordered to approach the market quietly. Alerts were also sent to the emergency departments of three local medical centers, ordering them to raise their state of readiness in anticipation of a possible emergency. The Haifa police was alerted to promptly arrest the taxi driver. At the same time, the system shuts off the traffic routes leading to the market area by issuing commands to the traffic light system and entering new data into the cellular navigation systems used by civilians through their smartphones. The terrorist is now twenty meters away from the market.

The decision made at the operations center is to neutralize the terrorist quietly, without generating alarms, to avoid a state of panic in the market that would be counterproductive. This objective should be accomplished through the use of a high-precision non-lethal firing system secreted into one of the utility poles at the entrance to the market. The operator of the weapon system at the municipal operations center monitors and tracks the terrorist through the HD surveillance cameras mounted on the UAV and other cameras mounted on utility poles and rooftops in the market area. She sets the system to lock-on mode. The system locks onto the back of the terrorist's neck and fires three miniature darts containing a fast-acting anesthetic at the terrorist.

One of the darts hits the terrorist while two others miss him and hit the floor. The terrorist drops to the ground. Passers-by watching the incident at the entrance to the market have the impression that a person has just experienced a heart attack. A policeman on a motorbike alerted to the area keeps the crowd away from the terrorist. Other policemen close the entrances to the market and proceed to evacuate the civilians in an orderly manner. The persistent area surveillance system indicates there are no consecutive threats in the area. A police explosives specialist reaches the unconscious terrorist and removes the explosive vest. The incident is over.

Response System Complex

The objective of this article is to encourage a current discourse regarding the war against terrorism that is not restricted by legislature elements pertaining to civilian privacy and individual rights. This writer has no intention to disregard or disparage these elements in any way, but wishes to confine the discussion to the techno-operational level.

The concepts outlined in this article are being implemented – in preliminary form – in Israel and elsewhere around the world. A review of the "City without Violence" tender issued by the Israel Ministry of Public Security will reveal a paragraph titled "Response System Complex". The contents refer to "A response system designed to intervene in a violent incident as it develops, during or after the actual incident. Response systems may consist of human operator teams, technological systems or a combination of both, capable of preventive intervention at the initial stages of the incident or during the actual incident."

There is no doubt that terrorism is unrelenting and that it has eliminated the differentiation between the external space and the internal space. It also learns how to bypass the existing countermeasure mechanisms by relying on individual rights legislation, employing legitimate civilians and exploiting the resources available within the internal space of the state in order to minimize the logistic wake or eliminate it altogether, thereby reducing the signature of the terrorist activity.

This reality has demonstrated, possibly more than ever before, the tension between the individual's desire for privacy and his/her need for physical security. On the one hand, it has become more difficult to provide civilians with physical security. On the other hand, in order to provide more effective security, civilians must relinquish their privacy. From a purely technological perspective, persistent area surveillance systems and prompt response systems may be introduced to the internal space. The more difficult battle is expected with regard to the legal and moral aspects that would eventually reshape the effect of technology on the civilians' everyday life."

font:Ami Rojkes Dombe 








Wednesday, November 9, 2016

Trump election puts Iran nuclear deal on shaky ground



Iranian President Hassan Rouhani takes part in a news conference near the United Nations General Assembly in the Manhattan borough of New York, U.S., September 22, 2016.




By Yeganeh Torbati | WASHINGTON

Donald Trump's election as president raises the prospect the United States will pull out of the nuclear pact it signed last year with Iran, alienating Washington from its allies and potentially freeing Iran to act on its ambitions.

Outgoing President Barack Obama's administration touted the deal, a legacy foreign policy achievement, as a way to suspend Tehran's suspected drive to develop atomic weapons. In return Obama, a Democrat, agreed to a lifting of most sanctions.

The deal, harshly opposed by Republicans in Congress, was reached as a political commitment rather than a treaty ratified by lawmakers, making it vulnerable to a new U.S. president, such as Trump, who might disagree with its terms.

A Republican, Trump ran for the White House opposing the deal but contradictory statements made it unclear how he would act. In an upset over Democrat Hillary Clinton, Trump won on Tuesday and will succeed Obama on Jan. 20.

A businessman-turned-politician who has never held public office, Trump called the nuclear pact a "disaster" and "the worst deal ever negotiated" during his campaign and said it could lead to a "nuclear holocaust."

In a speech to the pro-Israel lobby group AIPAC in March, Trump declared that his “Number-One priority” would be to “dismantle the disastrous deal with Iran.”

He said he would have negotiated a better deal, with longer restrictions, but somewhat paradoxically, he criticized remaining U.S. sanctions that prevent American companies from dealing with Iran.

By contrast, he has conceded it would be hard to destroy a deal enshrined in a United Nations resolution. In August 2015, he said he would not “rip up” the nuclear deal, but that he would “police that contract so tough they don’t have a chance.”

Iran denies ever having considered developing atomic weapons. But experts said any U.S. violation of the deal would allow Iran also to pull back from its commitments to curb nuclear development.

Those commitments include reducing the number of its centrifuges by two-thirds, capping its level of uranium enrichment well below the level needed for bomb-grade material, reducing its enriched uranium stockpile from around 10,000 kg to 300 kg for 15 years, and submitting to international inspections to verify its compliance.

'DIVISIVE DEAL'

“Say goodbye to the Iran deal,” said Richard Nephew, a former U.S. negotiator with Iran now at Columbia University.

“There is very little likelihood that it stays, either because of a deliberate decision to tear it up by Trump, or steps that the U.S. takes which prompt an Iranian walk back.”

The spokesman of the Atomic Energy Organization of Iran, Behrouz Kamalvandi, was quoted as saying by Tasnim news agency: "Iran is prepared for any change," adding that Iran would try to stand by the deal.

The nuclear deal was divisive in Iran, with hardliners opposed to better relations with the West arguing that pragmatist President Hassan Rouhani was giving up too much of the country’s nuclear infrastructure for too little relief.

Rouhani said on Wednesday the U.S. election results would have no effect on Tehran's policies, state news agency IRNA quoted him as saying. [nL8N1DA46H]

Some of Washington’s closest Middle East allies have been skeptical of the nuclear deal. Israeli Prime Minister Benjamin Netanyahu has been outright hostile. Gulf leaders say the deal has emboldened Iran's pursuit of regional hegemony in part through support for proxy groups fueling regional conflicts.

Iranian Supreme Leader Ali Khamenei, whose power supersedes that of Rouhani, regularly criticizes the United States and says it should not be trusted, but ultimately assented to the terms of the deal, known by its acronym JCPOA.

KHAMENEI BIG WINNER

“The big winner in the aftermath of a Trump victory is Iran’s Supreme Leader,” said Suzanne Maloney, a foreign policy expert at the Brookings Institution.

“He will have the most cartoonish American enemy, he will exult in the (hopefully brief) crash of the American economy, and he will be able to walk away from Iran’s obligations under the JCPOA while pinning the responsibility on Washington.”

Further complicating any Trump effort to renegotiate the deal is that it is a multilateral agreement involving U.S. allies in Europe as well as fellow world powers Russia and China. European and Asian firms have been returning to Iran and making major investments there, meaning the United States would likely be alone in pulling out of the deal, possibly isolating it from its partners.

On Wednesday, the head of gas, renewables and power for French oil and gas company Total TOTF.PA in Iran said Trump's election would have no impact on investments [nP6N1CW004].

Khamenei has already promised to “set fire” to the nuclear deal if the West violates it. Iran has repeatedly complained it has not received benefits promised. Though European companies have been eager to explore business prospects in Iran, few deals have been enacted in part because European banks have been reluctant to finance deals involving Iran.

“As to whether he can negotiate a ‘better’ deal, it takes two (or seven) sides to agree to begin that process, something I rate as highly unlikely,” said Zachary Goldman, executive director of the Center on Law and Security at New York University and a former U.S. Treasury official.

“And if we walk away from the deal I think we will be in the worst of all worlds - Iran will feel freed from its commitments and we may be blamed for the deal falling apart.”




Monday, November 7, 2016

The Threat of Connected Devices to the Internet






INSS Insight No.867, November 7, 2016
Gabi Siboni , Tal Koren



At least three consecutive waves of complex online attacks were directed at Domain Name System (DNS) servers operated by Dyn, a US internet infrastructure provider. The attack on October 21, 2016 consisted of a Distributed Denial of Service (DDoS) attack, exploited vast numbers of connected devices, and blocked access to thousands of websites, including Netflix, Amazon, Twitter, Airbnb, the New York Times, PayPal, and more. Yet the weakness shown in this attack is not the burden of the private sector alone. The use of armies of connected devices is a challenge for states, because it has the capability to harm the routine performance of governments and, worse still, disrupt performance during emergencies and in wartime. The risk is real, and defending connected devices is an enormous challenge. Although the problem is global, Israeli entities charged with cyber security must fully understand the risk of exposure to such attacks and take action by partnering with international efforts on the issue, and at the same time take steps to enhance relevant defensive mechanisms and their continued performance.


At least three consecutive waves of complex online attacks were directed at Domain Name System (DNS) servers operated by Dyn, a US internet infrastructure provider. The attack on October 21, 2016 consisted of a Distributed Denial of Service (DDoS) attack, and blocked access to thousands of websites, including Netflix, Amazon, Twitter, Airbnb, the New York Times, PayPal, and more. Immediately, suspicions centered on Russia and China as having both the motivation and the ability to plan and execute such an attack. Yet as of this writing, it is not at all clear if the attack was state-motivated. After the attack, it was reported that the Chinese and Russian hacker group known as New World Hackers assumed responsibility and claimed it was a sophisticated attack using botnets at higher-speed traffic than ever know before – 1.2 terabytes per second (Tbps).

The attack exploited vast numbers of connected devices (in an announcement to the media, Dyn stated that some 100,000 devices were involved). These devices, also known as the Internet of Things (IoT), include webcams, alarm systems, baby monitors, internet-based security cameras, DVRs, printers, and routers – all connected to the internet. The attackers managed to plant a software component in these devices that could receive commands from a control server so that the masses of devices all sought out the target in a synchronized manner and paralyzed the attacked servers’ ability to function by flooding it with traffic. The vast majority of these devices lack any kind of significant defenses; access to most of the systems is ensured through default usernames and passwords installed by the manufacturer. In fact, there is no current effective concept to respond to this type of threat.

The threat inherent in the swarm of connected devices is not new. As early as 2013, Symantec reported the existence of a worm called Linux.Darlloz that according to estimates, infected some 50,000 IoT connected devices, such as routers and Set Top Box devices or computers based on Intel’s X86 architecture. The goal was to install software allowing attackers to mine crypto currencies. In 2015, Symantec issued a detailed report about simplifications that make it possible to break into 50 different kinds of smart home devices. In its April 2016 report, the company stated that medical devices (such as insulin pumps, X-ray systems, and CT scanners) are also exposed to attack, as well as smart TV systems and dozens of other devices of all types.

Even though the ability to penetrate these devices and carry out extensive DDoS attacks through them was not surprising, the intensity of the attacks demonstrated the destructive capability of using a large number of synchronized simple devices. The attack broke the record for the largest DDoS attack ever, which occurred in September 2016, targeting the French company OVH, at a scope of 1 Tbps; it used bots (software agents) that exploited the widespread CCTV cameras. In many respects, this is a dangerous escalation and sets a new threshold for a cyber threat that on a few levels so far has no satisfactory response.

The first aspect is connected to the proliferation of these devices. In the US, there are about 25 connected devices per every 100 people, and this is just the beginning of the trend. Gartner Inc. estimates that in 2016 the world will have 6.4 billion connected devices, and that by 2020 that number will approach 21 billion. Such a vast number of devices creates a significant weakness for the web and allows attackers of various sorts to use them for any number of goals. The new twist in the most recent attack was the simplicity with which it was carried out. Millions of devices can serve as the potential means for DDoS cyberattacks whose execution is relatively simple, because the devices create new entrance points to the internet, making the scope of the threat enormous. The threat grows even greater because end devices, such as smartphones and computers, are used to control the connected devices.

The second aspect concerns the weakness of the defense. Most IoT devices lack appropriate means of security, making it easy for attacks to exploit the weaknesses of the systems operating the devices. The majority of manufacturers have yet to adopt a framework of standards and security; they generally use publicly available open code to make it possible for their devices to communicate with other similar devices in the area, and this itself generates severe security soft spots. Important corrective steps have been initiated in the United States, as security companies, manufacturer associations, and even government agencies have begun to cooperate, but these steps are far from constituting a sufficient defensive response.

The third aspect regards the scope and depth of the damage. The attack on Dyn was a clear warning sign: while the offensive capabilities displayed in the attacks did not require anything particularly sophisticated, the impact was significant. The fact that the malicious code was made public prepared the ground for other attacks that will make use of this or similar code, and raises the specter that the writers of the code already possess an improved version. Thus the use of similar methods of attack will presumably be seen again, perhaps even in more powerful versions.

Finally, there is privacy. One of the key problems with connected devices is securing user privacy. Connected devices are constantly collecting information about their users’ parameters, at home and in the office, including the nature of use of equipment and electrical appliances as well as wearable devices, whose use is becoming more widespread. The inherent defensive weaknesses of these devices means that all that information could be available to various attackers intent on subversion.

The weakness shown in the last attack is not the burden of the private sector alone. The use of armies of connected devices is a challenge for the state, because it has the capability to harm the routine performance of governments and, worse still, disrupt performance during emergencies and in wartime. Because the risk is real, defending connected devices is an enormous challenge. In response to the attack on Dyn, the United States government was called on to enact regulation on the security of IoT products. Indeed, this seems precisely where efforts should be focused, with measures similar to the steps taken in the financial sector. Although the problem is global, Israeli entities charged with cyber security must fully understand the risk of exposure to such attacks and take action by partnering with international efforts on the issue, while at the same time taking steps to enhance the relevant defensive mechanisms and their continued performance in order to cope with this type of attack.




Friday, November 4, 2016

Turkey condemned over Kurdish lawmaker arrests, as car bomb kills nine.





DIYARBAKIR, Turkey (Reuters) - Turkish authorities arrested the leaders of the country's main pro-Kurdish opposition party in a terrorism probe on Friday, drawing European and U.N. condemnation of a widening crackdown on dissent under President Tayyip Erdogan.

Selahattin Demirtas and Figen Yuksekdag, co-leaders of the Peoples' Democratic Party (HDP), were jailed pending trial after being held in overnight raids, officials said. Ten other HDP lawmakers were also detained, although some were later released.

The arrest of elected members of parliament's third largest party, and the detention or suspension of more than 110,000 officials since a failed coup in July, may "go beyond what is permissible", the U.N. human rights office said.

Germany and Denmark summoned Turkish diplomats over the Kurdish detentions, while European Parliament President Martin Schulz said the actions "call into question the basis for the sustainable relationship between the EU and Turkey".

"Turkey is a nation of laws, nobody has preferential treatment before the law ... What's been done is within the rule of law," Prime Minister Binali Yildirim told reporters. The HDP lawmakers were arrested after they refused to give testimony in a probe linked to "terrorist propaganda".

"Politics can't be a shield for committing crimes," he said.

Hours after their detentions, a car bomb planted by suspected Kurdish PKK militants killed nine and wounded more than 100 near a police station in the southeastern city of Diyarbakir where some of the lawmakers were being held.

The HDP, which made history last year by becoming the first Kurdish party to win 10 percent of the vote and enter parliament, said the detentions risked triggering civil war.

In a video message on a website close to the PKK, one of the militant group's top commanders, Murat Karayilan, said the group would intensify its three-decade old armed struggle against Turkey and called on Kurds, the country's largest minority, to react.


INTERNATIONAL CONCERN

The arrests of elected lawmakers from the HDP, which won more than five million votes at the last general election, heightened concern among Western allies about the political direction of Turkey, a NATO member and a buffer between Europe and the conflicts in Syria and Iraq.

The government introduced a nationwide state of emergency after the failed July 15 coup which gave it broad powers to round up suspects linked to the putsch. More than 110,000 civil servants, soldiers, police, judges and other officials have been suspended or detained, as have journalists.

The authorities have also used the emergency powers to round up pro-Kurdish opposition activists and politicians, including Diyarbakir's joint mayors, who were detained late last month, and has closed all major Kurdish media outlets.

Erdogan and senior government officials have increasingly discussed reintroducing the death penalty in the wake of the failed coup, and earlier this week journalists from a leading secularist opposition newspaper were detained.

"Very bad news from Turkey. Again. Now HDP members of parliament are being detained," the European Parliament's Turkey rapporteur, Kati Piri, said on Twitter of a country that is seeking membership of the EU.

EU foreign policy chief Federica Mogherini said she was "extremely worried" by the arrests and had called a meeting of EU national envoys in Ankara.

Turkish Foreign Minister Mevlut Cavusoglu accused EU member states of supporting the PKK and dismissed the bloc's criticism as "unacceptable".


SOCIAL MEDIA BLOCKED

Southeastern Turkey has been rocked by political turmoil and violence for more than a year after the collapse of a ceasefire with the PKK, deemed a terrorist organization by the United States and European Union as well as Turkey.

Erdogan and the ruling AK Party accuse the HDP of links to the PKK. The HDP denies direct links and says it is working for a peaceful resolution of the Kurdish conflict.

Access was "throttled" to social media including Twitter, WhatsApp, YouTube and Facebook - making the sites so slow they were effectively impossible to use - and a ban imposed on media coverage of the car bomb. Asked about the measures, Yildirim said access would return to normal "once the danger is removed".

The lira hit a new low against the dollar of 3.14 after the arrests, while the cost of insuring Turkish government debt against default hit its highest in over a month.

"JUDICIAL THEATER"In a statement on Twitter, still accessible in Turkey through virtual private networks (VPN), the HDP called for the international community "to react against the Erdogan regime's coup", while party spokesman Ayhan Bilgen described the detentions as an attempt to provoke a civil war.

"I will not hesitate to be held accountable in front of a fair and impartial judiciary. There is nothing I cannot answer for," Demirtas said in a statement to the prosecutor, which was shared by HDP lawmaker Besime Konca.

"But I refuse to be an actor in this judicial theater just because it was ordered by Erdogan, whose own political past is suspicious," he said.

Police also raided and searched the party's head office in central Ankara. Police cars and armed vehicles had closed the entrances to the street of the HDP headquarters.

A group of protesters chanting slogans tried to reach the party offices, but were stopped by police before they could enter the street, a Reuters witness said.

The HDP is the third-largest party in the 550-seat Turkish parliament, with 59 seats. Parliamentarians in Turkey normally enjoy immunity from prosecution, but the immunity of many lawmakers, including HDP deputies, was lifted earlier this year.

(Reporting by Ece Toksabay, Ayla Jean Yackley, Humeyra Pamuk, Daren Butler, Tuvan Gumrukcu, Gulsen Solaker, Can Sezer, Birsen Altayli, Orhan Coskun, Ercan Gurses, Tulay Karadeniz and David Dolan; Alastair Macdonald in Brussels, Tom Miles in Geneva, Noah Barkin and Andrea Shalal in Berlin; writing by Nick Tattersall; editing by Peter Graff and Giles Elgood)




Tensions Brewing Between India and Pakistan





Nov. 2, 2016 Neither side wants war, but both face pressure to retaliate against attacks.

According to Reuters, at least 19 people have died since Friday in Kashmir as a result of cross-border clashes between India and Pakistan. Details of the clashes remain sketchy amid the usual competing claims of which side opened fire first and the resulting damage. But over the past six weeks, an unmistakable escalation has occurred between Indian and Pakistani forces – largely in the disputed region of Kashmir. Occasional cease-fire violations have occurred since 2003, when both sides walked away from the brink of full-scale war that could have assumed a nuclear dimension.

The difference this time is that clashes stem from India’s unprecedented decision to retaliate for an attack by Pakistan-based Islamist militants by conducting what New Delhi describes as a “surgical strike” inside Pakistani-administered Kashmir. Until mid-September, the understanding following the 1999 Kargil War was that India would refrain from carrying out cross-border raids against militant infrastructure on Pakistani soil for fear of escalating matters to full-scale war. The Sept. 18 attack by Pakistan-based militants on an Indian military base in the Uri border area led India to abandon that understanding.

Eighteen Indian soldiers were killed and over two dozen others were wounded in that particular attack. This sparked massive national outrage and the government of Prime Minister Narendra Modi was pressured to take action. The Bharatiya Janata Party (BJP) government had pledged, even before coming to power, that it would deal with cross-border terrorism. But as often happens, the BJP realized its campaign promises were difficult to deliver once in office.

Despite Modi’s harsh talk on the campaign trail, he tried to establish closer relations with Pakistan. Modi even made a brief surprise visit to the Pakistani city of Lahore as part of an effort to improve bilateral relations. A week later, however, Pakistani-based militants attacked an Indian airbase in January. The 17-hour gun battle at the Pathankot Air Force Station in the province of Punjab left seven military personnel dead and three dozen others injured. At the time, it was important for the Modi government to allay fears that his administration was going to be hawkish on foreign policy. Even so, simply ending the entente was enough at the time to settle the issue. India did not feel compelled to counterattack.

Modi’s government came to power on a mandate that included improving the economy by attracting greater foreign investment in Kashmir as well as the rest of the country. This economic imperative, and the old paradigm that India would not engage in cross-border action without risking a major war, continued to guide the Modi government. The Uri attack, however, was too serious for Modi to overlook, particularly after relying solely on diplomacy to deal with the Pathankot attack. Both domestic political compulsions and the need to shape perceptions on the Pakistani side meant that the Indians had to break with their strategy and engage in the Sept. 29 “surgical strikes.”



An Indian Border Security Force soldier looks through binoculars towards Pakistan during a patrol at the India-Pakistan border southwest of Jammu, on Oct. 3, 2016. AUSEEF MUSTAFA/AFP/Getty Images

The details of what exactly transpired in the operation remain hazy. The Indians say they carried out covert strikes. The Pakistanis deny the strikes ever happened. The Indian desire for secrecy and the Pakistani claim that nothing actually happened are examples of both sides trying to de-escalate the conflict. Their actions have created a need for some kind of tangible response from both sides, but they are also trying to react without escalating tensions to a point that could lead to war.

That said, New Delhi’s previous fears that retaliating against the Pakistanis would lead to a broader war have not materialized. Therefore, even if the first strikes were brief and limited in scope, the Indians will be emboldened to strike again should the need arise, possibly with increased intensity. Conversely, the Pakistanis cannot allow this to become a pattern and must demonstrate the cost of doing so is extremely high. This would explain the heavy exchange of fire along the border.

In Pakistan, civil-military relations have taken a turn for the worse in the wake of the strikes. This has shrunk Pakistani Prime Minister Nawaz Sharif’s room to negotiate with India considerably. The prime minister is under pressure from the military to maintain a hardline against India. Even without this pressure, the Sharif government cannot simply ignore that India is no longer inhibited from retaliating against militant strikes. Now more than ever, the Pakistani government cannot afford to simultaneously be seen as cracking down on militant groups and soft against Indian aggression.

Sharif’s main opponent, cricketer-turned-politician Imran Khan, has accused the prime minister of pursuing weak policies in the face of a hostile India. Khan’s Pakistan Tehrik-e-Insaf party has also threatened protests starting Nov. 2 to force Sharif to step down in the face of corruption charges. Earlier this year, the Panama Papers revealed that the prime minister, along with his family and friends, maintain massive offshore accounts. It is thus even more imperative that Sharif pursue a defiant stance against India.

That said, Pakistan cannot afford to engage in war with India. Sharif may be able to deflect Khan’s pressure, but elections are set for early 2018, and Sharif cannot risk possible defeat in a battle against India before voters head to the polls. The prime minister has been hoping that a visible reduction in chronic power shortages and the mega-project known as the China-Pakistan Economic Corridor can help him get re-elected.

These common constraints that Sharif and Modi face are pushing them to avoid escalation. At the same time, neither can ignore the situation on the ground. War is in neither side’s interest, but underlying forces are driving them towards conflict, and these forces bear close watching.








Wednesday, November 2, 2016

The New UN Secretary-General



António Guterres speaks at the United Nations General Assembly,
New York, October 13, 2016. Photo: Jewel Samad / AFP

INSS Insight No. 866, November 2, 2016
Michal Hatuel-Radoshitzky


On October 13, 2016, the nomination of António Guterres as the new United Nations Secretary-General was approved at the General Assembly by the organization's 193 members. Guterres was the only candidate who gained a sufficient number of votes when in a rare show of unity, all 15 ambassadors from the Security Council voted for him. The fact that during the process Guterres publicly proclaimed himself an activist on humanitarian issues made his victory all the more surprising, as both Russia and China have been particularly resistant to vocal activists in top UN posts. Furthermore, many expected to see the major powers struggle to promote their favored candidate. Israeli Ambassador to the UN Danny Danon stated that hopefully under Guterres's leadership hostilities toward Israel in the UN will cease; the initiative to appoint a special UN Envoy for the Struggle against Global anti-Semitism will be promoted, and the UN will assume responsibility for the return of the bodies of Israel's two fallen soldiers held by Hamas since Operation Protective Edge. While the first goal is less likely to materialize, the latter two issues can potentially generate new attitudes that match Guterres's personal beliefs and promote his aspirations as the world's new top diplomat. 


On October 13, 2016, the nomination of António Guterres as the new United Nations Secretary-General (UN SG) was approved at the General Assembly by the organization's 193 members. Guterres’s five-year term will begin in January 2017, and can be renewed for an additional five years. While the UN SG serves as the organization's top diplomat and chief administrative officer, the UN Charter says very little about the position and the requirements for the individual holding it. In addition, given the inherent limitations of power of the SG in light of the structural dominance of the Security Council in the UN, the role of the UN's top diplomat is ultimately shaped by the person who fills it. 

A former Prime Minister of Portugal (1995-2002), Guterres, 67, was until recently, the United Nations High Commissioner for Refugees (2005-2015). In that capacity, he succeeded in persuading governments of Western nations to accept refugees in the largest refugee crisis since World War II. This has been acclaimed as a considerable achievement, particularly against the backdrop of a nationalist backlash in Europe and the United States. Moreover, Guterres was the only candidate who gained a sufficient number of votes when in a rare show of unity, all 15 ambassadors from the Security Council voted for him. In comparison, the first runner up, Miroslav Lajčák (Slovakia) received six "discourage" votes in a straw poll – two of them from permanent members.  

The announcement of Guterres's nomination by the Security Council came as a surprise to many who expected to see the major powers struggle to promote their favored candidate. Moreover, the current elections saw a surge in both the number of women and the number of Eastern European candidates who applied for the position: seven out of 13 candidates in each category. The statistic stands out given that since the establishment of the UN, no woman and no candidate from Eastern Europe has ever filled the UN SG post. Although neither of the two characteristics automatically affords the UN's top diplomat with better capabilities to perform the task, the extensive global debate stirred around these two issues is interesting on three accounts. First, it reflects the strong underlying public call for diversity. Second, it points to the ability of the global citizenry to shape the elections process – as demonstrated by the influx of candidates with traits the public hoped to see at the UN’s highest echelon. Third, and perhaps most poignantly, it demonstrates the blunt limitations of the same global citizenry to effectively shape the outcome of the process. 

The fact that during the process Guterres publicly proclaimed himself an activist on humanitarian issues made his victory all the more surprising, as both Russia and China have been particularly resistant to vocal activists in top UN posts. This has led some to speculate what concessions he may have offered Russia and China (in the form of high level political posts at UN headquarters) to secure their vote. Indeed, the potential vetoes of the five permanent members in the election process are perceived as bargaining chips in backroom deals pursuant to rivalries and disputes, particularly in Syria and Ukraine. Similarly, a factor that may have contributed to Russia's approval of Guterres is its presidency of the Security Council during October, and the positive effect that such an achievement would have on Russia's image as facilitating the important decision on its watch. It is also possible that the permanent five actively strove to bury their differences so as to protect their shared privilege of nominating the SG, as a Security Council deadlock could potentially open the door to increased involvement of the wider UN membership in the General Assembly.      

A different perspective is that Guterres benefited from a selection process that was unprecedentedly open by UN standards. As opposed to the highly secretive process in the past, when even knowledge of potential candidates was limited, in the current process contenders submitted vision statements that were uploaded to a website created by the Office of the President of the General Assembly for the selection process. Furthermore, candidates answered questions from diplomats and the public at large in the first-ever globally televised and webcast town hall-style debate held in the UN building. To this end more than 1500 questions were submitted online from over 70 countries, and candidates were given the opportunity to answer a selection of the top ten questions; to speak to the media following their sessions, and to participate in discussions organized by civil society groups. The current election process was also the first to be closely followed on social media. 

Overall Guterres's candidacy was well received, as expressed for example in a New York Times editorial that asserted that Guterres "is an excellent choice to replace Ban Ki-moon." Among congratulators were critics of Ban Ki-moon, who fault the incumbent SG for shaping the role as a humble diplomatic servant, as opposed to the more proactive and independent approach practiced by his predecessor Kofi Annan. Other supporters included advocates of the open process who attribute Guterres's election to the reforms in the election process, which they believe enabled him to win points for his humor, charisma, and professional posture. 

Guterres's personal manifesto notes challenges such as extreme inequality and the changing nature of conflict and terrorism. He emphasizes that "there is no peace and sustainable development without respect for human rights," and that the solution for humanitarian problems is "never humanitarian" but rather "always political." He advocates reforming the UN Development System; is minded toward "implementation, implementation, implementation"; and urges continuing the process that is said to have paved the road to his victory, i.e., UN utilization of modern digital platforms to reach out to common citizens. He also hammers out a five-point plan for UN engagement in a "culture of prevention" of crises rather than the current culture of managing them. Notably the fifth point of his plan relates to "fostering inclusion, solidarity and multiethnic, multicultural and multi-religious societies" as the best antidote to racism and anti-Semitism.

Upon Guterres's nomination, Israeli Ambassador to the UN Danny Danon stated that hopefully under Guterres's leadership hostilities toward Israel in the UN will cease; the initiative to appoint a special UN Envoy for the Struggle against Global anti-Semitism will be promoted, and the UN will assume responsibility for the return of the bodies of Israel's two fallen soldiers held by Hamas since Operation Protective Edge (July-August 2014). While the first goal is less likely to materialize, the latter two issues can potentially generate new attitudes that match Guterres's personal beliefs and promote his aspirations as the world's new top diplomat.