Defense and Security

Intelligence

  • Global
    U.S. Intelligence in a Transforming World
    Play
    CIA Director John O. Brennan joins CBS News' Charlie Rose to discuss the agency's global mission and approach to emerging and persistent threats.
  • Intelligence
    Raising the Cost to Chinese Hackers
    The Director of National Intelligence released his annual threat assessment last week, and cyberattacks top the list. There were at least three headlines in Clapper’s written and oral statements. First, while a "cyber armageddon"—a destructive attack that debilitates wide swathes of U.S. infrastructure—might be possible, it is very unlikely. Instead, the risk is from an "ongoing series of low-to-moderate level cyber attacks," which will "impose cumulative costs on U.S. economic competitiveness and national security." Second, China may get most of the press coverage, but Russia is a serious challenge. In fact, Clapper admitted that the "Russian cyber threat is more severe than we’ve previously assessed." Third, Clapper accused Iran of hacking the Sands Casino and warned that the next wave of attacks could change or manipulate information, impairing decision making by government officials, corporate executives, or investors. As several other U.S. government officials have done over the last several months, Clapper also claimed that attribution has become easier. Hackers can no longer assume that their attacks will be undetected and they can no longer expect that when attacks are unmasked, their identities will remain anonymous. With enough time and resources, attacks can be attributed. This, however, has not created deterrence. Breaking into networks remains easy, the gains of the attacks high, and the relatively long delays between attack and attribution create a permissive environment. This seems to be especially true in the case of China. Clapper notes that Chinese cyber espionage continues despite "detailed" private cybersecurity reports attributing attack on U.S. companies and government agencies, "scathing" public denouncements, and "stern" U.S. government demarches. Clapper does suggest one way of limiting attacks. Because Chinese hackers use relatively simple tools and techniques, improving defenses would force them to develop more sophisticated, expensive, and time consuming methods. The costs of economic espionage would go up. Coincidentally, I was at a conference last week in Washington focused on this exact question: how do you raise the cost to Chinese hackers? There was a great deal of skepticism that the United States would be able to get China to accept a norm against the cyber-enabled theft of intellectual property, trade secrets, or business strategies. Other states do not believe the United States actually adheres to the norm, and many friends of the United States actively engage in cyber-enabled economic espionage. One participant, for example, noted an uptick in attacks on U.S. companies coming from South Korea. There was also little sense that big technology companies would be interested in pursuing trade or other sanctions against the Chinese firms that are thought to be benefiting from the theft. Smaller firms might have the stomach for a fight, but the larger firms, with sizable investments in the market, are already overexposed to retaliation from the Chinese government. Things are already bad, with foreign technology being removed from government procurement lists and a draft counterterrorism law that would require firms to hand over encryption keys and install backdoors, and they fear that it will only get worse. Instead of raising the costs by engaging in active defense where small groups of U.S. hackers with highly detailed intelligence disrupt attacks in China before they hit U.S. networks, the one idea that generated any enthusiasm was to lower the value of the information Chinese hackers stole through deception. Here the model is the Farewell Dossier. In 1981, French intelligence obtained the services of Col. Vladimir I. Vetrov, "Farewell," who photographed and supplied 4,000 documents on KGB efforts to obtain scientific and technical secrets. President Mitterrand offered the information to President Reagan, and the CIA discovered that the Soviets had already stolen radar, computer, machine tool, and semiconductor technology. In an effort to conduct its own version of economic warfare on Moscow and poison the collection efforts, the CIA fed fake information to Soviet agents that would later fail. (Fans of The Americans will recognize this plot line. Elizabeth and Phillip send stolen plans of propellers that cause a submarine to sink.) A strategy of poisoning the well would require cooperation from industry. Companies would have to help design fake but attractive data and maintain it on their networks (and make sure it was not used by mistake internally). This might be too high a bar for many companies, but even a failed cyber Farewell Dossier, or just the suggestion that companies are adopting such a strategy, could raise costs for Chinese hackers. Once there was a doubt about the veracity and usefulness of data, all information taken would be subject to much higher levels of scrutiny which may force a slow down in collection. Hackers might become more cautious, afraid of supplying faulty goods to their customers and superiors. Last year’s worldwide threat assessment contained no reference to making hacking more difficult for China but we shouldn’t read too much into one section of this year’s assessment. The United States will continue being detailed, scathing, and stern with China on cyber industrial espionage, and one U.S. government official at the meeting insisted that he was "not convinced that the boat had sailed on norms." But Clapper’s brief mention of defensive measures may signal a small tilt away from developing a norm toward inflicting cost.
  • United States
    James Clapper on Global Intelligence Challenges
    Play
    Director of National Intelligence James R. Clapper Jr. joins Frances Fragos Townsend, executive vice president at MacAndrews & Forbes Holdings Inc., to discuss the state of the intelligence community and current challenges and successes experienced across the enterprise.
  • United States
    James Clapper on Global Intelligence Challenges
    Play
    Director of National Intelligence, James R. Clapper Jr., joins Frances Fragos Townsend, executive vice president at MacAndrews & Forbes Holdings Inc., to discuss the state of the intelligence community, and current challenges and successes experienced across the enterprise.
  • Intelligence
    You Might Have Missed: Drone Exports, Somalia, and JFK’s “Ordinary Mortals”
    Department of Defense Press Briefing by Rear Adm. Kirby in the Pentagon Briefing Room, U.S. Department of Defense, February 18, 2015. Rear Adm. Kirby: These are actually proscriptions in place that we will follow and we will expect anybody that receives these systems to follow…It’s in our best interest to be able to have this kind of control, supervision, and scrutiny over the potential delivery of these systems because it’s a ubiquitous, now, capability. Not every nation has the same sophistication at it as we do, but this is a technology that’s not going away. So, it suits our interests, and I think it should suit the American people’s interests to know that we’re going to be involved, from soup to nuts, on how these systems are eventually transferred. (3PA: Kirby’s comments were in reference to a policy released by the State Department this week, which is the topic of my new column on ForeignPolicy.com.) Askold Krushelnycky, “ Ukrainian Forces Recover Downed Russian Drone,” The Intercept, February 17, 2015. A Russian drone was shot down over the weekend during heavy fighting against separatist forces near the government-held port city of Mariupol in southeastern Ukraine, according to Ukrainian forces.The drone was quickly identified as a Russian-designed and manufactured drone designated E08 by its manufacturer, the Enics company, whose logo and name appear in Cyrillic on its fuselage… Members of Ukraine’s 37th Mechanized Battalion, who brought down the drone, saw it crash into the Azov Sea, fringing the conflict zone. (3PA: In a recent Brookings Institution report on policies to preserve Ukrainian independence and prevent Rusian aggression, the authors noted that Ukrainian military officers claimed they have “no capabilities to jam or down Russian UAVs.” Of course, they do; drones are easy to shoot down.) Aisha Ahmad, “The Security Bazaar, Business Interests and Islamist Power in Civil War Somalia,” International Security, 39(3), Winter 2014/15, pp. 89-117. Since the collapse of its government in 1991, Somalia has suffered more than two decades of civil war along clan lines. For fiffteen years, these fierce tribal divisions were the main fault line of conflict. In 2006, however, a new Islamist movement emerged in the capital city of Mogadishu and quickly ousted the heavily entrenched clan warlords. Within the short span of six months, these newcomers accomplished what more than a dozen internationally sponsored peace processes could not: they centralized political control over the majority of the Somali countryside…(p. 90) The estimation results indicate that the price of security was significant in driving the Somali business community’s support for the Islamists over the warlords, and that both clan and Islamic identity may be overstated…(p. 105) This research suggests, however, that both ethnic and Islamic identity politics may actually be overstated in the existing literature, and that more work needs to focus on the pragmatic cost calculations of the business elite. By modeling civil war as a market for the provision of security, this article offers a practical, economic explanation for why Islamists may prove more competitive than groups defined by narrower identities. I argue that because certain Islamist groups have the ability to sell security to prospective buyers across ethnic or tribal divisions, they are able to charge the business elite lower rates than protection rackets that rely on a more limited ethnic or tribal base. By courting the valuable support of the business class, Islamists are thus able to monopolize the market for providing security. (pp. 114-115) Robert L. Grenier, 88 Days to Kandahar: A CIA Diary (New York, NY: Simon & Schuster, 2015) pp. 413-414. In the midst of these maneuvers, for years the United States could not induce Pakistan to invade and occupy the militant safehaven in North Waziristan, which provided a base for groups whose primary targets were in Afghanistan. The Pakistanis lived in fear that to do so might drive those groups to join forces with others primarily focused on Pakistan, with potentially disastrous consequences to themselves. They had their own challenges, and were not about to take risks to defend foreigners, who—the Pakistanis reasoned—could take care of themselves. Over time, the efforts of Pakistan’s ISI [intelligence agency] to maintain links and to try to manipulate all these groups in defense of its own interests looked progressively to U.S. observers more and more like active Pakistani collusion with those who were killing Americans. In response, the employment of armed drones in the Pakistani Tribal Areas, which had once largely been limited to pinpoint strikes against foreign militants with operational ties to al-Qa’ida, was expanded, if press accounts and those of organizations dedicated to the subject are to be believed, to include attacks against groups of armed men apparently engaged in cross-border insurgency. Out of frustration with Pakistan’s unwillingness or inability to police its own territory, what once had been primarily a counterterrorism tool became a broad-based counterinsurgency tool. As the number of cross-border attacks increased, so did the number of drone strikes. The fact that such “signature strikes” were aimed at local, as opposed to foreign militants, and had a much greater propensity to generate collateral casualties among non-combatants, had the effect of greatly increasingly public outrage in Pakistan, and encouraging yet more militancy. (3PA: I first pointed this out six years ago, and am glad to see a senior CIA official responsible for overseeing these strikes acknowledge this now.) Arthur Schlesinger, A Thousand Days: John F. Kennedy in the White House (New York, NY: Houghton Mifflin Harcour, 2002) p. 258. “If someone comes in to tell me this or that about the minimum wage bill,” [President] Kennedy said to me later, “I have no hesitation in overruling them. But you always assume that the military and intelligence people have some secret skill not available to ordinary mortals.”
  • Intelligence
    How U.S. Officials and Congress Have Defended Drone Strikes in Light of the Torture Report
    Press Briefing by the Press Secretary Josh Earnest, White House, December 11, 2014. Q: And finally, has the President ever sought a formal assessment from the intelligence community about whether the drone program is a net asset, either because of our moral authority, or in terms of creating more enemies than it takes off the battlefield? MR. EARNEST:  Well, I’m not aware of any intelligence assessment like this.  You can certainly check with the office of the Director of National Intelligence to see if they’re aware of anything like this that they could talk to you about. CIA Director John O. Brennan Holds a News Conference On the CIA’s Former Detention and Interrogation Program, Central Intelligence Agency, December 11, 2014. QUESTION:  Your agency is involved in overseeing the drone program in which we know, from the government’s own statements, you know, that there have been some civilians, innocent civilians, killed alongside terrorists. I’m wondering if you feel that there’s enough control over those programs and that we’re not going to be here in a few years with another director having to answer these same questions about the loss of trust from the public, from policymakers. BRENNAN: I’m not going to talk about any type of operational activity that this agency is involved in currently. I’m just not going to do it. I will tell you, though, that during my tenure at the White House, as the president’s assistant for counterterrorism, that the use of these unmanned aerial vehicles that you refer to as drones in the counterterrorism effort has done tremendous work to keep this country safe. The ability to use these platforms and advanced technologies, it has advanced the counterterrorism mission and the U.S. military has done some wonderful things with these platforms. And in terms of precision of effort, accuracy and making sure that this country, this country’s military does everything possible to minimize to the great extent possible the loss of life of noncombatants, I think there’s a lot for this country and this White House and the military to be proud of. Interview with Maine Senator Angus King, CNN’s “The Situation Room,” December 11, 2014. BLITZER: As a member of the Intelligence Committee, the CIA. And so without revealing any classified information, the drone program is obviously very well-known. Do you have a problem, without going into specifics, and I don’t want you to break any of the classification rules, do you as a United States senator, who oversees this program, have problem with it? KING: I believe that the CIA is acting within the law and the intentions right now. That’s as far as I want to go. You’re trying to get me to say something I’m not... BLITZER: No, I don’t want you to break any rules. I don’t want you to violate sources and methods or anything like that. KING: And I’m not ducking the question. I’m just trying to follow the rules. BLITZER: Because, as you know, the critics of President Obama, they say, yes, he didn’t like the torture, he didn’t like the excessive interrogation, but these people, except for one that we know of in Afghanistan, they lived to talk about it, they’re still alive to this very day. When you send out a drone with a Hellfire missile and you go into Pakistan or Afghanistan or Yemen or someplace and you just kill them, in the process, you might kill relatives or family members. They’re not going to be interrogated. They’re just going to die. KING: Again, Wolf, I can’t confirm any information about the program. I’m sorry. Press Briefing by the Press Secretary Josh Earnest, White House, December 10, 2014. Q: You have repeatedly talked about moral authority.  So can you explain how the President believes that it’s un-American to use these techniques but it was okay to ramp up the drone policy and basically thousands of people around the world, innocent civilians were killed.  What’s the moral equivalency there?  How do you have moral authority when innocent civilians are killed by drones? MR. EARNEST:  Well, I think that the difference here, Ed—and this is a stark difference in the way that the United States conducts our policy and the way that terrorists around the world conduct their policy—that there is significant care taken and there are significant checks and balances that are included in the system to ensure that any counterterrorism action that’s taken by the United States of America does not put at risk innocent lives. Q: But they do in the end.  I understand there are safeguards, but in the end, we’ve seen many cases around the world where U.S. drones have killed innocent civilians, despite those safeguards.  So how do you have moral authority? MR. EARNEST:  What I’m saying is that is a stark difference from the tactics that are employed by our enemies, who seek to use car bombs to actually target innocent civilians. Q: Yet you still kill civilians.  No one is defending the terrorists’ tactics, but by your tactics— MR. EARNEST:  But you’re asking about our moral authority, and I think there is a very clear difference…There is a very clear difference between the tactics that are used by terrorists and the counterterrorism tactics that are employed by the United States of America that go to great lengths to protect the lives of innocent civilians.  In fact, many of these terrorists that we’re talking about—and, again, many of these counterterrorism activities that are used against terrorists are targeting terrorists that themselves have targeted local populations—that have targeted fellow Muslims in some situations.  So the efforts that are taken by this administration to limit or to prevent innocent civilian casualties are consistent with our values and are consistent with our broader strategy for protecting the American people. “FBI: Torture Report May Spark Terror Threat,” CNN’s “The Situation Room,” December 9, 2014. SEN JAMES RISCH (R-ID): That’s true. And the more that’s reported and now affirmed by this report, it is going to damage our ability to go to our partners—and some of them are not necessarily allies—but also to allies and say, "Look, you’ve got this information. We’ve got this. Let’s work together on this." They’re going to be very reluctant to do that. A good example of that is the drone program today. You know, they talk about interrogation here. We don’t do that anymore. There’s no interrogation— WOLF BLITZER: There is interrogation, but not through these enhanced interrogation techniques. They question these terrorists. RISCH: They aren’t picking up prisoners anymore. What they do is when they identify a high-value target, the target is droned. There’s no terrorist left to interrogate. BLITZER: They’re not questioned, they just kill them, is that what you said? RISCH: That’s right. That’s what the administration— BLITZER: They don’t question anymore. I want to be specific here. So what you’re saying is President Obama has ruled out torturing prisoners, but he supports just killing them? Is that what you’re saying? RISCH: You’re saying that more directly than I would. Certainly, he has ruled out the torture, as has everybody. There’s nobody thinks that this is—this is a good thing to do. Having said that, when and if we get these people—and that is very, very rarely—they are interrogated. But more importantly, when we do identify these people, instead of trying to get our hands on them, they are subject to our covert drone program that’s out there. BLITZER: Which is targeted assassinations, killing of these suspects? RISCH: I wouldn’t call them assassinations. These are people in the fight against America. It is only people who we are engaged in conflict with, in war with that are identified and listed as possible targets for the drone program. Press Briefing by the Press Secretary Josh Earnest, White House, December 8, 2014. QUESTION: So what’s the difference between (inaudible) interrogation techniques and drones that kill civilians? EARNEST: Well, Nadia, the president gave a pretty detailed speech on this topic about a year and a half or so ago, where he talked about the desire to try to bring more transparency to some of the counterterrorism programs that are implemented by the United States. Despite that commitment to transparency, there are still some limits about what I can say from here, but I can tell you that the president does want to be sure, that as we execute the counterterrorism strategy that he has outlined, that we are mindful of the impact that those strategies have on our ability to win hearts and minds. Brian Bennett, “Dianne Feinstein Leaving Intelligence Job Amid Clash on Tactics Report,” Los Angeles Times, December 7, 2014. Feinstein also defended the CIA against efforts by the Pentagon to eclipse the agency’s covert drone program. She believes the CIA has a better track record than the military and more experience with the strikes. "They have the patience and they wait until the situation is right," Feinstein said. "There are not hot heads" making the decision on when to fire, she said. She has sent committee staff members into the CIA "more than 50 times" to make unannounced visits to watch the operation of the drone program, she said. The number of civilians killed in CIA strikes has declined in the last few years, she said. "Collateral damage is low," Feinstein said, which was one of her goals when she increased oversight of the targeting-killing program after she took control of the committee.
  • Intelligence
    The CIA’s Torture Report Response
    There will be a tremendous number of reactions to the graphic and troubling findings contained in the Senate Select Committee on Intelligence (SSCI) study’s executive study of the CIA’s detention and interrogation program. There will be far fewer reactions to the CIA response to the SSCI, in the form of a June 27, 2013, memo that the CIA released today. According to a forward from Director of Central Intelligence John Brennan, “The CIA’s comments on the Study were the result of a comprehensive and thorough review of the Study’s 20 conclusions and 20 case studies.” However, there is one CIA acknowledgment that should be as disturbing as anything that is contained within the SSCI study itself. Page 24 of the CIA memo addresses the SSCI’s conclusion that the “CIA never conducted its own comprehensive analysis of the effectiveness of the CIA’s enhanced interrogation techniques.” The CIA’s response: We agree with Conclusion 10 in full. It underpins the most important lesson that we have drawn from The Study: CIA needs to develop the structure, expertise, and methodologies required to more objectively and systematically evaluate the effectiveness of our covert actions. We draw this lesson going forward fully aware of how difficult it can be to measure the impact of a particular action or set of actions on an outcome in a real-world setting. Therefore, the CIA admitted that—as late as June 2013—it was simply incapable of evaluating the effectiveness of its covert activities. This apparently made it impossible for CIA officials and those within the Counterterrorism Center (CTC), who were responsible for detaining and interrogating the 119 known detainees, to examine and assess if this detention and interrogation program was working at all. Given that the CIA has acknowledged this so recently, it should cast doubt upon all previous responses from Intelligence Community officials that defended and justified the program. If they had, by the CIA’s own admission, the wrong structure, expertise, and methodologies to evaluate the program, then what was the basis upon which they claimed it was needed and successful? Moreover, this also directly implies that the CIA lacks the ability to adequately evaluate its much larger, more lethal, and more consequential covert program: its role as the lead executive agency for drone strikes in Pakistan, and many of those in Yemen. Based upon the best publicly available information, the CIA has killed an estimated 3,500 people in non-battlefield drone strikes since the program began on November 3, 2002—the rest were killed by the U.S. military. In early 2013, before signing the CIA’s response to SSCI committee—that, again, admitted to the Agency’s inability to evaluate its covert programs—John Brennan gave an extensive interview to Gentleman’s Quarterly. When asked about public criticisms of the CIA’s drone program, Brennan replied sharply: There are a lot of people who talk about these issues very callously, on the outside. Because they’re not a part of it. And it’s easy for people to criticize, to lay blame…Sometimes you need to take these types of kinetic actions, because you’re trying to give these other efforts time and space. Yet, as he would acknowledge in June of that year, analysts on the inside were apparently incapable of evaluating when they would need to take those types of “kinetic actions.” I have spoken with former and current National Counterterrorism Center (NCTC) officials and analysts, who have always been uneasy with having CIA analysts evaluate CIA covert programs. Specifically, they claim that—compared to the NCTC’s own analysis—CIA analysts are more likely to discount claims of collateral damage and the thesis that drone strikes creates blowback in the form of enhancing terrorist recruitment. Naturally, you should not have people with an institutional interest in the outcome of a covert program also serve as the analysts of those programs. As I have pointed out for years, there are many crucial reforms to U.S. targeted killing programs that President Obama must still implement, given that almost every one of the alleged drone reforms he announced in May 2013 never went into effect. (This also should lead Americans to question the value or objectivity of the CIA’s analysis that was provided to Obama before he made that speech.) Finally, since the CIA admits it was unable to evaluate covert programs before June 2013, there should be a comprehensive survey of America’s covert drone program, conducted either by the committees on governmental affairs or intelligence. If the 119 detainees who entered the rendition and interrogation program—26 of whom were wrongly detained—deserve a public accounting, then don’t the 3,500 who have been killed deserve this as well? Or, is the United States simply more comfortable with torturing suspected terrorists than killing thirty times more of them?
  • United States
    What is Iraq Doing With U.S. Missiles and Intelligence?
    As I have highlighted previously, the United States’ recent increased security cooperation with the government of Iraq to confront the Islamic State in Iraq and Syria (ISIS) has been characterized by an astounding lack of clarity. Yesterday, there was another troubling example of contradictory statements about the missions and objectives of U.S. forces in Iraq. Pentagon spokesperson Adm. John Kirby was asked if the United States was supporting airstrikes from Iraq against ISIS in support of the Kurds. Kirby replied unequivocally: “We’re not coordinating air attacks in Iraq. We’re not.” This claim is at odds with prior articulations of U.S. policy in Iraq. During a House Foreign Affairs Committee hearing on July 23, Brett McGurk, deputy assistant secretary for Iraq and Iran, defended the Obama administration’s responsiveness to August 2013 Iraqi requests for U.S. targeting intelligence and precision-guided-capable missiles: “We responded immediately. We set up intelligence fusion chairing centers, we helped them with the Hellfire missiles precision strikes.”  McGurk later added, “The sequence was the helping the Iraqis with their Hellfire strikes, with the information, and the fusion cells we set up.” During a Senate Foreign Relations Committee hearing on the following day, McGurk again emphasized the level of direct assistance that has been provided by the United States: “When this crisis started, the Iraqis had zero Hellfire missiles in their arsenal. We have delivered them, since this crisis began in June, hundreds of Hellfire missiles. And with our new intelligence, with the joint operations center, the Iraqis have deployed those missiles with precision and accuracy. It has made a difference.” The apparent missions, as detailed by the Obama administration’s lead official for Iraq, are that the United States is providing both the firepower and targeting intelligence for Iraqi airstrikes against suspected ISIS militants. There might be some debate about whether this amount of support counts as “coordinating air attacks in Iraq,” or not. However, where the United States provides the weaponry and intelligence, without which an airstrike would not have occurred, then that essential and enabling role makes the United States, in large part, responsible for the outcome.  This does not make them direct U.S. airstrikes, but officials and policymakers should demand that the government of Iraq be held accountable for how it uses U.S.-supplied missiles and intelligence. On the one hand, this provides leverage and influence that the United States can attempt to use to promote more responsible and precise uses of force, a meaningful objective given that some airstrikes conducted by the government of Iraq have been both indiscriminate and against targets of doubtful military utility. On the other hand, this also makes the United States a direct party in yet another Iraqi civil war, which ties America’s credibility to defending a deeply unpopular ruling regime, or a newly-formed government should Prime Minister Nouri al-Maliki step aside. It is uncertain if this will happen, as the Maliki government is already demanding even more aid and security cooperation before any domestic political changes occur. In keeping with the tradition of thankless partners and allies who want ever more U.S. assistance before they implement domestic changes sought by Washington, leverage and influence works both ways.
  • Germany
    Will U.S.-Germany Relations Recover?
    U.S.-Germany relations have plunged to new lows, but the alliance is far greater than the recent controversy over espionage, says expert Karen Donfried.
  • International Organizations
    You Might Have Missed: Ukraine, Rep. Mike Rogers, and Drones
    Jeanne Whalen and Alan Cullison, “Ukraine Battles to Rebuild a Depleted Military,” Wall Street Journal, March 25, 2014. In recent weeks Mr. Yarema has turned to Washington and NATO for help, but with little luck so far. Ukraine’s military lacks much of an air force, and if fighting breaks out he expects that Russia would be able to pound Ukrainian ground troops with impunity. In meetings with U.S. senators and Western diplomats, he says he asked for help establishing a no-fly zone over Ukraine’s 15 nuclear reactors so that his troops could at least count on some zones of safety... (3PA: When a foreign government or opposition group wants low-risk U.S. military involvement, the no-fly zone has become the default request. Revisit my piece in the Atlantic for more on this trend.) “Concluding observations on the fourth report of the United States of America,” UN Human Rights Committee, March 2014. Targeted killings using unmanned aerial vehicles (drones) The Committee is concerned about the State party’s practice of targeted killings in extraterritorial counter-terrorism operations using unmanned aerial vehicles (UAV) also known as ‘drones’, the lack of transparency regarding the criteria for drone strikes, including the legal justification for specific attacks, and the lack of accountability for the loss of life resulting from such attacks. The Committee notes the State party’s position that drone strikes are conducted in the course of its armed conflict with Al- Qaida, the Taliban, and associated forces and in accordance with its inherent right of national self-defense and are governed by international humanitarian law, as well as by the Presidential Policy Guidance that sets out standards for the use of lethal force outside areas of active hostilities. Nevertheless, the Committee remains concerned about the State party’s very broad approach to the definition and the geographical scope of an armed conflict, including the end of hostilities, the unclear interpretation of what constitutes an “imminent threat” and who is a combatant or civilian taking a direct part in hostilities, the unclear position on the nexus that should exist between any particular use of lethal force and any specific theatre of hostilities, as well as the precautionary measures taken to avoid civilian casualties in practice (arts. 2, 6, and 14). The State party should revisit its position regarding legal justifications for the use of deadly force through drone attacks. It should: (a) ensure that any use of armed drones complies fully with its obligations under article 6 of the Covenant, including in particular with respect to the principles of precaution, distinction and proportionality in the context of an armed conflict; (b) subject to operational security, disclose the criteria for drone strikes, including the legal basis for specific attacks, the process of target identification and the circumstances in which drones are used; (c) provide for independent supervision and oversight over the specific implementation of regulations governing the use of drone strikes; (d) in armed conflict situations, take all feasible measures to ensure the protection of civilians in specific drone attacks and to track  5 and assess civilian casualties, as well as all necessary precautionary measures in order to avoid such casualties; (e) conduct independent, impartial, prompt and effective investigations of allegations of violations of the right to life and bring to justice those responsible; (f) provide victims or their families with an effective remedy where there has been a violation, including adequate compensation, and establish accountability mechanisms for victims of allegedly unlawful drone attacks who are not compensated by their home governments... “Death Sentences and Executions 2013,” Amnesty International, 2014. Executions were recorded in 22 countries during 2013, one more than in the previous year. As in 2012, it could not be confirmed if judicial executions took place in Egypt or Syria. The overall number of reported executions worldwide was 778, an increase of almost 15% compared with 2012. As in previous years, this figure does not include the thousands of people executed in China; with the death penalty treated as a state secret the lack of reliable data does not allow Amnesty International to publish credible minimum figures for China...   Rep. Michael Rogers, “A Special Message from Rep. Rogers,” March 27, 2014. What other job on earth could take you from sitting in the CIA Director’s office helping to plan the operation to kill Osama bin Laden one week, to traveling to the far reaches of the tribal areas of Pakistan where few Americans have ever been the next, to meeting with a protester in Ukraine who had his ear cut off standing up to Vladimir Putin’s goons the next?... (3PA: Why would the House Intelligence Committee Chair help to plan the operation that killed Bin Laden? And who oversaw his planning activities? A few more of Rogers’ notable statements include: “I think the Chinese got everything they needed they need out of Snowden. The Russians have now gotten everything they need out of Snowden. And the next I think — chapter in this book is somewhere in the Latin America one of these countries who is antagonistic to the United States, who is an adversary to the United States, using this as a public relations tool.” (CNN, July 7, 2013) “We did this in the 1930s. We turned it off–1929 the Secretary of State, at that time, where we were collecting information to protect America said you know we should do this. This is unseemly. Turned it off. So that led to a whole bunch of misunderstandings that led to World War II that killed millions and millions of people.” (CBS, November 3, 2013) “Everybody agrees that Iran is pursuing a nuclear weapons program.” (Business Week, March 17, 2013) “China is a rational actor…Iran is not a rational actor.” (New York Times, March 3, 2013).)
  • Global
    Risk and Intelligence
    Play
    Jami Miscik and David Omand discuss risk and intelligence.
  • Global
    Risk and Intelligence
    Play
    Jami Miscik and David Omand discuss risk and intelligence.
  • United States
    CIA Director Brennan Denies Hacking Allegations
    Play
    CIA Director John Brennan discusses the current challenges facing the intelligence community in a conversation with Andrea Mitchell of NBC News.
  • Defense and Security
    You Might Have Missed: Cyberattacks, Asia Pivot, and the U.S. Military and Human Rights
    Zachary Fryer-Biggs, “DoD Official: Asia Pivot ‘Can’t Happen’ Due to Budget Processes,” Defense News, March 4, 2014. “Right now, the pivot is being looked at again, because candidly it can’t happen,” Katrina McFarland, assistant secretary of defense for acquisition, told Aviation Week’s Defense Technologies and Requirements conference in Arlington, Va… After this article was posted online, McFarland clarified her statement through a DoD spokeswoman that the pivot will still continue. “This a.m. when I spoke at a conference, I was asked a question about the budget, that will be officially released today, and how it relates to our pivot to Asia. I was reiterating what [Defense Secretary Chuck] Hagel said last week: That the shift in focus to the Asia-Pacific requires us to ‘adapt, innovate, and make difficult (budgetary and acquisition) decisions to ensure that our military remains ready and capable.’ That’s exactly what we’ve done in this budget. The rebalance to Asia can and will continue.” Siobhan Gorman, “Panel Probes Split Over Ukraine by U.S. Spy Agencies,” Wall Street Journal, March 4, 2014. On Friday evening, Mr. Rogers issued a statement from his office, saying it appeared the Russian military "now controls the Crimean peninsula." The next day, Obama administration officials were voicing the same general conclusion. Mr. Rogers said he wouldn’t characterize the issue as an intelligence failure but said some analysts "came to the wrong conclusion." Dion Nissenbaum and Julian E. Barnes, “Standoff With Russia Fuels U.S. Defense Spending,” Wall Street Journal, March 2, 2014. Pentagon officials scoffed at the idea that their spending plan represents a retreat from the world. "There is no retreat from the world," one defense official said. "The sun rises and sets on literally hundreds of countries where American troops are operating or are based." (3PA: There are 195 countries in the world.) “U.S. Strategic Command and U.S. Cyber Command in Review of the Defense Authorization Request for FY2015 and the Future Years Defense Program,” Senate Armed Services Committee, February 27, 2014. SEN. KING: When is a cyberattack an act of war? Any ideas? GEN. ALEXANDER: I think that’s a political decision, a policy-level decision. And I think it comes down to what is the impact of such an attack. In cyberspace, some of the attacks will be not observable and, therefore, not a big attack. It would almost be like a show of force. Think of it as a blockade. So in cyber, you’re going to have the whole spectrum that we have in the physical space now in cyberspace. And I think we’re going to have to learn. But I would submit that, if it destroys government or other networks to a point that it impacts our ability to operate, you’ve crossed that line. Now, that’s a policy decision, not mine. What we would do is recommend where those lines are. I think those things that are less than that, that are blocking communications or doing something, think of that as the old jamming, electronic warfare, now in cyber. Probably less than. But it could get to an act where you want that to stop because of the impact it’s having on your commerce. So those are issues thatwhat we’ll call the norms in cyberspace need to be talked through on the international level. I think that’s one of the things that we’ve pushed. I think the administration is pushing those norms. I think it has to go a lot further. People need to understand it. And it gets back to some of the earlier discussions about do we understand exactly what we’re talking about here by norms in cyberspace. (3PA: It is difficult to understand, after reading the response to Sen. King’s question, when, precisely, a cyberattack would be an act of war.) “The Posture of the U.S. Special Operations Command and U.S. Transportation Command,” House Armed Services Committee, February 27, 2014. ADM. MCRAVEN: We need to be prepared to conduct direct action when those threats have a clear and present danger to the United States or to our interests… (3PA: Note that this is yet another new description for when the U.S. military can conduct direct action—the doctrinal term for operations including targeted killings. As Obama said last May: “We act against terrorists who pose a continuing and imminent threat to the American people, and when there are no other governments capable of effectively addressing the threat.”) “The Posture of the U.S. Northern Command and U.S. Southern Command,” House Armed Services Committee, February 26, 2014. GEN. JOHN KELLY: In 2011, we got 172 metric tons of cocaine before it ever reached shore in Honduras or Latin America. Last year, 2012, because of a lack of assets, 152 tons. That’s 20 tons that get by us20 more tons. This year that just finished, 132 tons. It’s all about ships, ISR and not many ships. Typically today we have on station four ships, one of which is a British oiler. The key point, that can fly a helicopter. That British oiler in six months will get 20 to 30 tons of cocaine that’s flowing into the United States. But it’s almost a scientific equation: less ships, less cocaine off the market. And by the way, when I get it, I get it inand it’s an interagency process, DEA, DOJI mean, it’s just not DOD doing this. In fact, we’re to a large degree in support of the effort. But at the end of the day, we get all of this tonnage. We spend 1.5 percent of the counternarcotics budget; we get, again this year—or last year we got 132 metric tons, zero violence, we get the two to five tons at a time. Once it’s ashore and on its way up through Mexico, it’s virtually in the United States. And no matter how hard our very, very heroic Border Patrol and law enforcement people in the United States work, best case, they’ll get 30 tons in the course of a year, with unbelievable violence, as you well know, done against our country, our citizens. At the end of the day, at the end of the year, year after year, 40,000 Americans die from these drugs. Every year it costs America $26 billion a year to go after these drugs from a law enforcement point of view, costs America $200 billion in primarily health care costs. For a fraction of that, in fact for 1.6 percent of that, I can get the vast majority of drugscocaine, to use an exampleflowing up from Latin America… GEN. KELLY: I would tell you, a lot of people talk about human rights in the world. The U.S. military does human rights. We will not work with someone who violates human rights in Latin America, and I think that goes around the world… GEN. KELLY: And the profits that come out, just the drug profits that come out of the United States, something to the tune of $85 billion a year, of which only 1 billion (dollars) is required to keep the drug flow going; the rest of it is just profit. Their biggest problem, franklyand our interagency, the Department of Treasury, FBI, Department of Justice is getting after thistheir biggest problem is taking $85 billion worth of U.S. currency and laundering it. Graham Warwick, “Rapidly Evolving Threat Drives Pace of EW Development,” Aviation Week & Space Technology, February 17, 2014. Unmanned aerial systems (UAS) are emerging as potential players on the electronic battlefield. “SWaP [size, weight and power] is the first determinant of what goes on a UAS,” says Palombo. “We have done demos with the Marine Corps and General Atomics on a Reaper. With a small multi-spectral payload on a UAS you can get closer to the threat. The standoff requirement is less, so lower power is needed.” The SWaP constraint is fundamental, says Antkowiak. “In highly constrained environments like UAS, persistence is key. The more power you need for the payload, the less time you have on the battlefield,” he says. “The mission can be done on anything if you start with small building blocks. We have done it on UAS as small as the Bat,” Northrop’s medium-altitude tactical unmanned aircraft, Palombo says. “As experience with UAS grows, the mission will morph and networks will become much more important. Then UAS can swarm and defeat anything,” says Freidman, adding they will not always be small. The Navy’s planned Unmanned Carrier-Launched Airborne Surveillance and Strike (Uclass) system will explore how EW interfaces with an intelligence, surveillance and reconnaissance platform to provide a broader view of the battlespace, he says.
  • Intelligence
    You Might Have Missed: U.S.-China Relations, Olympics, and Intelligence Assessments
    Rear Admiral John Kirby, “Department of Defense Press Briefing with Rear Admiral Kirby in the Pentagon Briefing Room,” Department of Defense, February 20, 2014. Q:  I’d like to ask you about this Human Rights Watch report on the drone strike in Yemen from December 12th.  They say that this JSOC [Joint Special Operations Command] operation with the drone targeted a convoy of 11 vehicles and that civilians were killed and injured, including a bride.  How does that reconcile with the president’s guidance that civilians would not be targeted in drone strikes and that drones wouldn’t be authorized to target and kill someone, if there were civilians in the vicinity? REAR ADM. KIRBY:  There’s a lot there, Jen.  So, first of all, we just -- just like you, we just got this Human Rights Watch report, and so we’re working our way through it.  I’m not going to talk about specific operations from the podium.  What I can tell you is that, look, the guidelines are pretty clear about these type of operations and how we conduct them.  If there are allegations or suspicions that civilians were hurt or injured in them, we investigate those thoroughly.  And I can also tell you that nobody takes more care than we do to try to prevent unintended casualties when -- when any military operation is conducted, to include those kinds of missions. The president was very clear back in his May speech about transparency and due care and due process in conducting these missions.  And believe you me, we take that guidance very, very seriously here. Q:  So have you launched an investigation (OFF-MIKE) REAR ADM. KIRBY:  Whenever there are allegations regarding the -- the potential loss of life of civilians, we investigate thoroughly, and that’s about as far as I’m going to go on this. Q:  Right now, you’re saying that today was the first time that you realized that there may have been civilian casualties in this specific... REAR ADM. KIRBY:  I didn’t say that.  I said we just got the Human Rights Watch report, and we’re going through it.  I’m also not talking about any specific operations here or that specific one that was written about.  I would also point you to comments made by the Yemeni government itself with respect to that operation, that they believed very strongly and had reason to believe that -- that there were some pretty bad folks that were killed in that operation. Q:  Yeah, but 11 vehicles in a convoy -- are you saying that there was no suspicion up until now that there were civilians in that convoy? REAR ADM. KIRBY:  That’s not what I said, Jen.  I’m not going to talk about the specific -- specifics of any operation.  So I’m just not going to -- I’m not going to go there with respect to the operation that was written about in the Human Rights Watch report. I’d just reiterate what I said before.  The Yemeni government itself said that -- that very dangerous individuals were targeted in an operation in December.  And I’ll -- and then separately from that, whenever we have reason to believe that we -- that we may have unintentionally hurt or killed civilians, we investigate thoroughly. Q:  Were you aware that the Yemenis paid blood money to the relatives of those who were killed? REAR ADM. KIRBY:  I’m not going to speak to the actions of a foreign government.  Again, we’re working our way through this Human Rights Watch report. (3PA: Note that the Pentagon spokesperson highlights alleged statements made by the Yemeni government that support the U.S. drone strikes, and seconds later says “I’m not going to speak to the actions of a foreign government.” An astonishingly fast contradiction in principles.) Geoff Dyer, “US v China: is this the new cold war?Financial Times, February 20, 2014. One senior Pentagon official insisted to me, “This is not an anti-China battle plan.” But when the Pentagon starts to describe the threats it is facing – long-range, precision-strike missiles that can restrict the movements of its ships, advanced submarines and expertise in cyberwar – it becomes clear that AirSea Battle is primarily about China. The hypothetical threat that the Pentagon planners outline describes accurately the precise ­strategy that China has been developing to restrict US access to the western Pacific. No wonder US military officers sometimes refer to China as “Voldemort” – in the Pentagon’s new battle plan, China is the enemy whose name they dare not speak. Amid the military jargon there lies an idea that – if taken to its logical conclusion – is fraught with peril. In early 2012, the Pentagon released a document called “Joint Operational Access Concept” (known in the building as Joac). In the event of a ­conflict, the paper says, the US should “attack the enemy’s cyber and space” capabilities. At the same time, it should attack the enemy’s anti-access forces “in depth”. The clear implication of this advice is that, if war ever were to break out, the US should plan to launch extensive bombing raids across mainland China. China’s “anti-navy” of missile bases and surveillance equipment is based at facilities spread across the country, including in many built-up areas. The basic idea behind AirSea Battle leads to a fairly uncompromising conclusion that, in the early stages of a conflict with Beijing, the US should destroy dozens of military sites. It is the navy’s version of “shock and awe” for 21st-century Asia. Karen DeYoung, “U.S., allies agree on standards for which opposition groups in Syria will receive aid,” Washington Post, February 20, 2014. The senior administration official discounted reports this week of major changes in the administration’s Syria policy — spurred by recent statements from Secretary of State John F. Kerry and others — as “overstated. You would think we had a formal tasking” to come up with new options, the official said. “That is not the case.” Bruce Horowitz, “Olympic sponsors on edge before Winter Games,” USA Today, February 6, 2014. Major sponsors all have multimillion-dollar campaigns in place, many featuring Olympic athletes. Most also have, at least on paper, ads of compassion and support that could air following any incidents of terrorism. "Any delay in these communications would show you’re not as caring," notes Bernstein. Kathleen M. Vogel, “Expert Knowledge in Intelligence Assessments,” International Security, Vol. 38, No. 3, Winter 2013/14. Within a month of Fouchier’s announcement, a virologist at the University of Wisconsin, Yoshihiro Kawaoka, revealed that members of his laboratory had also created a different kind of mutated, air-transmissible H5N1 virus. Locked in a tight race for credit for their scientific discoveries, Fouchier and Kawaoka announced that they had submitted manuscripts to the journals Nature and Science for publication. Soon, government officials and the media were raising alarms about the wisdom of publishing such experimental methods and results in the open scientific literature. Their concerns sparked a large public controversy about these experiments and whether they should be published at all. As news of Fouchier’s and Kawaoka’s experiments spread, U.S. intelligence analysts began assessing the potential security implications of their pending publication. They wrestled with questions such as: How much of a threat do scientific publications such as these pose for bioterrorism? Could a terrorist, criminal, or state easily replicate these experiments and create mutated viruses for bioweapons use?... In contrast to most commentaries on the H5N1 publication controversy, the focus of this article is not on Fouchier or Kawaoka or on the U.S. policy officials and science advisers involved in the controversy. Instead, it examines how U.S. intelligence analysts, invisible in public accounts of the controversy, sought to assess the potential security threat posed by the publication of the H5N1 experiments. The study yields three important findings. First, U.S. intelligence analysts do not have adequate social and material resources to identify and evaluate the tacit knowledge, or know-how, that underpins dual-use experiments such as those in the H5N1 case. Second, they lack dedicated structures and methods to sort through the politics that characterize the use of technical expertise in such controversial biosecurity issues. Third, they require new types, structures, and assessments of expert knowledge to enable them to make more informed and balanced judgments of biosecurity threats.