Defense and Security

Intelligence

  • Intelligence
    You Might Have Missed: Israeli Drones, Benghazi, and the NSA
    Jim Garamone, “Special Ops Forces in Transition, Pentagon Official Says,” U.S. Department of Defense, February 12, 2014. Network threats present new challenges and require new ways of planning, the assistant secretary told the audience, and cyber operations come to mind first. “As we continue to work our doctrine for response in the cyber realm,” he said, “it is entirely possible that SOF units, or even individuals, would be called upon to act online or offline to address these threats.” (3PA: Note that the NSA is already creating thirteen offensive cyber teams. Overlapping missions and redundancy is quickly defining the U.S. military’s approach to the cyber realm.) Ken Dilanian, “Sen. Levin’s bid to boost drone oversight falters in Congress,” Los Angeles Times, February 12, 2014. Sen. Carl Levin (D-Mich.), who chairs the Armed Services Committee, held a joint classified hearing Thursday with the Senate Intelligence Committee on CIA and military drone strikes against suspected terrorists…But the White House did not allow CIA officials to attend, so military counter-terrorism commanders testified on their own. Levin’s plan ran aground on the Washington shoals of secrecy and turf, according to congressional aides and other U.S. officials, none of whom would be quoted by name discussing classified oversight matters. Tamir Eshel, “IAI Designed its New Drone to be an MTCR Compliant Platform,” Defense Update, February 11, 2014. Israel Aerospace Industries’ (IAI) unveiled today at the Singapore Air Show an enhanced design of its Heron I unmanned aerial vehicle (UAV) called ‘Super heron’. The new drone offers improved payload capacity and optional Heavy Fuel Engine configuration. Its weight/range characteristics position it below the MTCR export control threshold, thus improving its competitive advantage… The drone weighs 1,450 kg (3,197 lbs) and can carry a payload of 450 kg (992 lbs), positioning the platform 50 kg below the MTCR limits imposing export restrictions on guided platforms capable of delivering payloads (a.k.a warheads) of 500kg (1,102 lbs) weight over distances of more than 300km (162 nm). Jeremy Scahill and Glenn Greenwald, “The NSA’s Secret Role in the U.S. Assassination Program,” Intercept, February 10, 2014. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using… In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device… According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike… What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata. (3PA: For earlier reporting of how the NSA supported the first ever drone strike, see James Bamford’s groundbreaking 2006 article in the Atlantic.) Danielle Douglas and Craig Timberg, “Experts warn of coming wave of serious cybercrime,” Washington Post, February 9, 2014. Only 11 percent of businesses have adopted ­industry-standard security measures, said a recent report by Verizon Enterprise Solutions, and outside experts say even these “best practices” fall short of what’s needed to defeat aggressive hackers lured by the prospect of a multimillion-dollar heist. (3PA: On February 12, the White House launched the Cybersecurity Framework that presented voluntary guidelines for industry. During a background briefing on the framework, a senior administration official said: “Voluntary standards are a tradition in the United States because they work.  When industries get together and determine for themselves what standards describe a quality of a product, these standards are much more likely to be adopted quickly and implemented fully.” Clearly 89 percent of firms do not believe this. Also, review the history of voluntary commercial airline security before 9/11.) Howard P. “Buck” McKeon, “Majority Interim Report: Benghazi Investigation Update,” U.S. House Armed Services Committee, February 2014. Immediately after the terrorist attack in Benghazi, Libya on September 11, 2012, the Committee on Armed Services began an ongoing extensive effort to evaluate the response of the Department of Defense (DOD). In addition to assessing how the Department reacted, the committee seeks to determine what preparations the U.S. military had made for the possibility of an attack in Libya, and what arrangements have subsequently been put into place to minimize the possibility of a similar recurrence. The U.S. military’s response to the Benghazi attack was severely degraded because of the location and readiness posture of U.S. forces, and because of lack of clarity about how the terrorist action was unfolding. However, given the uncertainty about the prospective length and scope of the attack, military commanders did not take all possible steps to prepare for a more extended operation. As the result of a specific request from the committee, DOD accounted for the location of each of its AC-130 aircraft in the military’s inventory. DOD reported to the committee that no AC-130s were in the region in the days before the Benghazi attack, including for maintenance, crew rest, or merely transiting through the area. (3PA: There is a great summary of potential military responses on pages 15 to 30.)
  • Intelligence
    You Might Have Missed: Global Threats Hearing, China’s ADZ, Drones in Pakistan
    Hearing on Global Threats to the U.S., U.S. House Intelligence Committee, February 4, 2014. REPRESENTATIVE JAN SCHAKOWSKY (D-IL): Director Clapper, do you have any concrete intelligence of a relationship between Snowden and the Russian government in regard to the stolen documents? DIR. CLAPPER: That’s best discussed in a closed session, as we discussed last night. REP. SCHAKOWSKY: OK. I want to thank you, Director Clapper, for your robust defense of transparency, which has been characterized, actually, as a potential threat to our security or dismissed as politics. And I prefer to call it democracy. I believe that the national debate on domestic surveillance has been valuable, but unfortunately, it was an NSA contract leaker who initiated it and not the government. And the drone program is another example of a significant activity that the public is trying to discuss that has been thwarted by a lack of transparency. This year, both Amnesty International and Human Rights Watch have conducted serious research and raised very legitimate concerns about the consequences of the drone program on (your own?) security, that the government has not responded. Director Clapper, what steps can the intelligence community take to increase transparency into the drone program and foster a responsible national debate? DIR. CLAPPER: Well, we’re speaking of activities that are conducted covertly. So that’s one area where being transparent is one of a number of areas where we’re not going to be able to perhaps be as fully transparent as some might like. John, do you want to add to that? DIR. BRENNAN: When I was at the White House and I was assistant to the president of the counterterrorism, I spoke repeatedly, publicly about the so-called drones, or remotely piloted aircraft that had become an instrument of war. And I spoke about that to the extent that I could. But this is something that I think has been discussed quite broadly. REP. SCHAKOWSKY: Does the intelligence community weigh or consider how signature strikes against unnamed military-age males may increase the terrorist threat because it could generate hatred for Americans, and actually motivate you to join rather than reject terrorist groups? DIR. BRENNAN: From an intelligence community perspective, we’re always evaluating and analyzing developments overseas to include any counterterrorism activity that we might be involved in to see what the impact is. And I think the feeling is that the counterterrorism activities that we have engaged in with our partners -- we the U.S. government broadly, both from an intelligence perspective as well as from a military perspective, have greatly mitigated the threat to U.S. persons both overseas as well as in the homeland. REP. SCHAKOWSKY: And do you believe that the signature strike model, if adopted by other countries that are developing an armed drone program, can be a threat to the United States? DIR. CLAPPER : Well, it could be, but I would have to comment on the -- to the extent that we can talk about this here -- the great care that is exercised by the United States. And so I would hope -- and being very precise about which targets to strike. So I would hope, as other countries acquire similar capabilities, that they follow the model that we have for the care and precision that we exercise. REP. SCHAKOWSKY: One other question. As marked up by this committee, the FY 2014 Intelligence Authorization Bill includes an amendment that I sponsored requiring a written plan for each covert action program to prepare ahead of time for the potential leak of that program. It increases the threat to U.S. sources and methods of the intelligence community if caught flat-footed by a leak. And the reality is that any covert action can potentially be disclosed unexpectedly. Director Brennan, without disclosing classified details, does each covert action program have, or will it have a written plan, then, of action, to deal with leaks of significant activities in that program? DIR. BRENNAN: It’s one of the issues that we take into account whenever there is a covert action program that is approved and implemented. It takes into account what the implications would be in the event of leaks. Unfortunately, there are too many disclosures and leaks about a lot of things that the United States intelligence community is involved in. And so it becomes a normal part of our business to anticipate those… REPRESENTATIVE ADAM SCHIFF (D-CA): Director Brennan, you have spoken frequently about the unmanned air vehicles and program. The president at NDU in May gave one of the more detailed accounts of the criteria that’s used in those otherwise known as drone efforts. You’ve tried to increase transparency in the program. One way that I think would increase transparency and public accountability is if we could publish an annual report that identified how many combatants were killed through the use of unarmed -- or unmanned vehicles and how many noncombatants were killed. That seems to me of very limited value in terms of information to our adversaries, but in terms of public accountability and being able to correct the record at times when there are misleading claims of civilian casualties, it might be beneficial as well. Is that something that you could support? Would that be another effort of transparency that we can make, and would that, in your view, as in mine, be of fairly diminish value to our adversaries? DIR. BRENNAN: I think it would be a recommendation that would have to go to the administration, and then I would be a participant in the interagency process to discuss the advantages and potential disadvantages of it. But it’s certainly a worthwhile recommendation, if you would like to make that. REP. SCHIFF: Can you share any thoughts with us today on any of the costs of that? I mean, if it were done, say, at the end of the year, if we had categories so you could pinpoint any particular incident, is it your sense that the cost in terms of giving our adversaries any useful information would be fairly minimal? DIR. BRENNAN: Congressman, I think this would be something again for you to be able to discuss with the administration, with policymakers, and then what we would need to do is to take a look at it analytically and determine whether or not this is something that the U.S. government feels as though would be worthwhile to do. There is a lot of debate about, you know, what is the basis for those determinations and those numbers, and so it’s something, again, I would defer to the administration on. REP. SCHIFF: Well, thank you, Director. I’ll follow up with you on that. You know, the president in his speech in May also indicated that there is a wide disparity of view regarding those numbers, and I think more transparency and public accountability would be beneficial. Director Clapper, moving to the -- some of the privacy issues that have come up in the last six months, the tech companies are in a pretty impossible situation. They have a business model which includes a lot of international business, which has become increasingly difficult to come by. There’s a settlement recently with the Justice Department that allows some more transparency, which I think will be helpful to them. Can we go beyond that to let them assure their international customers that the number of times they’re asked to divulge information is very limited, compared to the overall number of transactions? And are there other ways that we can help them make the international business case, because it’s very much, I think, in our interest to do so? DIR. CLAPPER: Well, first, Congressman, thanks for citing the agreement that was recently struck with the providers on categories of disclosures that they can -- they can now make and they -- and they already have, which I think shows, A, that it’s part of the administration’s commitment to try to improve that situation. You know, I also think it shows in a -- in the -- (inaudible) -- population out there how infrequently these capabilities are called upon. One of the features of the -- which was in the speech and in the presidential policy directive was to see what we could do extend privacy protections to non-U.S. citizens. Now, this was, I think, unique in the world, so we’re looking at that. And again, just like in our own domestic context, we’ll have to weigh the risk versus gain and how much that impinges on the question of valid foreign intelligence. So we’re working through that, not in a position today to say how that will come out, but clearly, wherever we can enhance transparency to the benefit of the -- of our commercial partners, we certainly will. (3PA: Notice that Brennan does not really give an answer when asked about “signature strikes.”) “Al-Qaida’s Resurgence in Iraq: A Threat to U.S. Interests,” House Foreign Affairs Committee, February 5, 2014. REP. KINGZINGER: I’m obviously not very happy with what’s happening in Iraq, and I’ve been very clear that I thought the withdrawal from Iraq was one of the biggest mistakes, I think, historically that’ll be shown that the United States has made in modern foreign policy. (3PA: Any consequences of the drawdown in Iraq should not be minimized.  But it was certainly the 2003 invasion that was the bigger mistake.) Demetri Sevastopulo, “US says China ‘acting professionally’ in air defence zone,” Financial Times, February 5, 2014. “We haven’t seen a significant change in those interactions since the reported establishment of the defence zone by the Chinese,” Adm Locklear said on Wednesday during a visit to Japan. “The good news is that military forces are acting professionally as we interact in these areas.” Adam Entous, Siobhan Gorman, and Saeed Shah, “U.S. to Curb Pakistan Drone Program,” Wall Street Journal, February 5, 2014. The Obama administration will narrow its controversial drone program in Pakistan to target a short list of high-level terrorists, and aim to end it during the prime minister’s current term, senior U.S. officials have told their Pakistani counterparts. The downsizing of the covert Central Intelligence Agency program reflects Pakistani objections to the strikes and logistical constraints on the spy agency at the end of this year, when U.S. troops are scheduled to pull out of neighboring Afghanistan, according to administration, intelligence and military officials. (3PA: Drone strikes in Pakistan were always primarily for force protection of U.S. troops in Afghanistan. Promising to end drone strikes in 2018, when troops are out of Afghanistan, is meaningless as the mission will no longer be needed. This isn’t a “new approach” and ignores the reality of signature strikes, implying that only people on a “kill list” are targeted with drones.) Michael Hirsh, “John Kerry Now Holds Obama’s Legacy in His Hands,” National Journal, January 30, 2014. "Anything labeled ’nonproliferation’ and ’counterterrorism’ gets the White House’s attention. The notion of Americans as peacemakers does not," says one senior official who works for the administration.
  • Intelligence
    You Might Have Missed: USS Cowpens, French Reapers, and the World Economic Forum
    Samuel J. Locklear III, Commander of U.S. Pacific Command, “Department of Defense Press Briefing by Admiral Locklear in the Pentagon Briefing Room,” U.S. Department of Defense, January 23, 2014. Q:  Admiral, I wonder if you could take us back to that incident between the Cowpens and the Chinese ship, you know -- I don’t know how long ago it was, weeks ago -- tell us exactly what happened there.  You know, how dangerous was that situation?  You know, we likely will be seeing more situations like that as tensions increase in the East China, South China Sea, between China and the U.S., and also Japan. ADM. LOCKLEAR:  Well, the incident was widely reported.  And I think that it was commented on by the leadership here in the Pentagon, as well as by me.  And, in fact, there was a demarche that was sent -- that we sent formally to -- and the demarches are -- those are not -- those are fairly routine globally.  I mean, we want to communicate to someone that we’ve been really concerned about something that has -- that has happened. So in this case, there was an interaction in international waters, in international airspace that we routinely operate in and that the Chinese were conducting what they claim to be carrier operations that they believe have been properly notified.  Those notification procedures were a question.  And the -- I don’t think that the people that were on the Cowpens -- in fact, I’m sure -- were not aware of any notification of that. At any point was the situation dangerous?  I wasn’t on the bridge of the ship, so I can’t tell you how the CO felt about it.  I would probably characterize it as more as unnecessary and probably more unprofessional.  And that -- but we have to understand, I think, as we look at this part of the world, and we look at the growing number of navies that are operating and the growing number of security concerns that are in this region, we have to expect the militaries are going to have to encounter and operate around each other.  And in this case, we have to expect that the U.S. and the Chinese navies are going to interact with each other. So this just highlights to both of us, to both the PLA and to the U.S. military, that we have to do better at being able to communicate with each other in a -- in a way that allows us to not lead to miscalculation that won’t be productive in the security environment… Q:  You say unprofessional.  Do you mean unprofessional on the part of that Chinese skipper?  Or just a general sense of, you know, unprofessionalness on the part of the Chinese navy? ADM. LOCKLEAR:  Well, I don’t know if it’s unprofessional or whether it was lack of experience.  I mean, one of the things that our -- that I told my leadership and my sea captains is that, you know, when we’re operating in this area -- I mean, first, we talked to each other on bridge-to-bridge telephone, right, radio telephones to work this out.  And we speak in English, and other countries don’t.  They speak -- they’re speaking -- or they speak in English, but they’re not speaking in their native language. And so there’s an extra calculation you have to figure into what someone’s trying to tell you when they’re speaking the second or third language that they speak and you’re speaking in your primary language.  And so we have to take this into consideration to make sure that we have -- that we have looked at all aspects of this.   In the end, the U.S. military, my forces in the Pacific AOR, will operate freely in international waters, international airspace.  That’s the bottom line.  We will operate there.  And we’ll operate professionally, and we’ll operate peacefully for the purpose of peace.  And that’s the message to all the militaries that are operating in that region. (3PA: Are there no Mandarin Chinese language speakers on U.S. Navy ships that operate along the coast of China? And, if not, wouldn’t that investment be worth reducing the potential for miscommunication and misperception?) “Who’s on the Magic Mountain?Economist, January 25, 2014. Of the 2,622 hobnobbers invited to this year’s World Economic Forum in Davos, Switzerland, just 15% are women. (3PA: Ironically, one of the Davos sessions on January 22 was “Making Gains on Gender Goals.” The suggested hashtag was #gendergap.) Amy Butler, “Global Hawk, U-2 Duel Resumes in ’15 Budget Fight,” Aviation Week & Space Technology, January 20, 2014. In the Pacific, 55% of Global Hawk’s missions were canceled in fiscal 2013; 96% of the U-2’s missions were achieved. Bill and Melinda Gates, “Three Myths on the World’s Poor,” Wall Street Journal, January 17, 2014. A baby born in 1960 had an 18% chance of dying before her fifth birthday. For a child born today, it is less than 5%. In 2035, it will be 1.6%. Pierre Tran, “French AF Conducts First Reaper Flight,” C4ISR, January 16, 2014. The French Air Force Thursday flew a first flight, lasting 40 minutes, of a US-built Reaper surveillance drone based in Niger, an Air Force spokesman said. (3PA: With France now flying its own surveillance drones, it will no longer need targeting intelligence from the United States as it did since the 2013 intervention in Mali.) Efraim Benmelech and Carola Frydman, “Military CEOs,” National Bureau of Economic Research, January 2014. Whereas in 1980, 59% of the CEOs of large, publicly held corporations had served in the military, today only 6.2% of CEOs of these firms have a military background… When we do find statistically significant effects, our findings suggest that military CEOs pursue more conservative—rather than aggressive—financial and investment policies. Our estimates indicate that military service is associated with a 70% reduction in the likelihood of fraud compared to the unconditional mean. Our analysis shows that chief executives’ service in the military is related to executive decisions and corporate policies and outcomes. More precisely, we find that CEOs who have served in the military tend to have lower investments and R&D; they do not use excessive leverage; and their firms are less likely to be involved in fraud. Moreover, military CEOs seem to perform better in times of industry distress. “Memorandum for the Chairman, Joint Chiefs of Staff: Possible Responses to North Korean Attack on the Republic of Korea,” U.S. Department of Defense, April 16, 1968. 2. CINCPAC OPLAN 27-yr – Defense of Korea – a. CINCPAC has recently submitted CINCPAC OPLAN 27-69, which is a complete revision and update of OPLAN 27-65. JCS review, under MOP 144 procedures, has been expedited and will be concluded on 20 May 1968. b. Very flexible plan – nuclear and/or conventional – with or without CHICOM and/or USSR intervention – defensive, offensive, withdrawal. c. Two phases – hold as far forward as possible – when forces and situation permit conduct offensive actions. d. Forced and Logistics – Force and logistic requirements (up to 12 1/3 US divisions and 40 Tactical Bomber Squadrons) would require disengagement from Southeast Asia, additional force withdrawals from NATO commitments, dissolution of the training base, mobilization, and/or early use of nuclear weapons. 3. As a result of the PUEBLO incident and the deployment of additional aircraft to PACOM to meet the threat of the North Korean air order of battle, CINCPAC was tasked to prepare plans for the neutralization of the North Korean AOB. a. CINCPAC forwarded his OPLAN FRESH STORM, which has been reviewed by the JCS. Approval will be forwarded to CINCPAC on or about 15 May 1968. (1) CINCPAC OPLAN FRESH STORM – Four preemptive options and one retaliatory option – conventional weapons – options differ as to forces and timing – round-the-clock operations until North Korean AOB is neutralized or the operation is terminated. (2) Option ALPHA – US Tactical AIR Option BRAVO – US Tactical Air, ROKAF Option CHARLIE – US Tactical Air, ROKAF, B-52s Option DELTA – US Tactical Air, ROKAF, B-52s Retaliatory – Option ECHO – US Tactical Air, ROKAF, B-52s 4. Nuclear contingency plan against North Korea – subsequent to the PUEBLO incident, CINCPAC forwarded a basic outline for planning of a nuclear contingency plan against North Korea. A CJCS message informed CINCPAC that has planning concept appeared appropriate and to forward his detailed plan for JCS review and approval. This plan he has termed FREEDOM DROP – a. Coordinated nuclear plan using US tactical aircraft and/or HONEST JOHN rockets and SERGEANT missiles. b. Three options varying from several military targets to all significant North Korean offensive and logistic support targets – 70KT maximum yield – flexible selection of options or sequential use of options. c. FREEDOM DROP has been reviewed under  the procedures of MOP 144 and approved as submitted by CINCPAC. Message informing CINCPAC of the approval has been withheld by direction of the Chairman, JCS, for a propitious time of release… (3PA: Read more on the 1968 North Korean capture of the USS Pueblo and subsequent compromise of U.S. intelligence.)
  • Defense and Security
    You Might Have Missed: NSA Reforms, CIA Drone Strikes, and Benghazi
    Presidential Policy Directive/PPD-28: Signals Intelligence Activities,” White House, January 17, 2014. When the United States collects nonpublicly available signals intelligence in bulk, it shall use that data only for the purposes of detecting and countering: (1) espionage and other threats and activities directed by foreign powers or their intelligence services against the United States and its interests; (2) threats to the United States and its interests from terrorism; (3) threats to the United States and its interests from the development, possession, proliferation, or use of weapons of mass destruction; (4) cybersecurity threats; (5) threats to U.S. or allied Armed Forces or other U.S. or allied personnel; and (6) transnational criminal threats, including illicit finance and sanctions evasion related to the other purposes named in this section. (page 4) (3PA: Does anyone really believe that the NSA will only gather nonpublic signals intelligence on behalf of six missions?) Loveday Morris, “Interview with Iraqi Prime Minister Nouri al-Maliki,” Washington Post, January 16, 2014. What support is Iraq receiving from the U.S. and what more would they like to see? To build the Iraqi army and protect Iraqi sovereignty we need heavy weapons, fighter jets, helicopters, air defenses, this is in the long term. But right now, to defeat al-Qaeda, we need medium weapons, and we need intelligence cooperation. We need drones to scan the desert, and right now that’s gradually happening with America. Can you give specific details? Has the U.S. pledged more support? We’ve received only Hellfire missiles, which are being used to fight al-Qaeda. We’ve received one wave and have been promised another. The other weapons we have requested we have not received yet. The surveillance drones we have used them once or twice in the desert. There is intelligence collaboration which is very important for us. What kind of intelligence is shared? It’s tapping al-Qaeda communications, finding their camps and places on the ground, observing their routes over the borders. We work together on that field but we need more cooperation. We have many agreements with other countries to share information, but on the U.S. side we have the Status of Forces Agreement, under that framework we are exchanging more information than with most countries. (3PA: What specific missions are U.S. drones being used to support?) Eric Schmitt, “Congress Restricts Drones Program Shift,” New York Times, January 16, 2014. In an unusual move, Congress is placing restrictions on the Obama administration’s plan to shift responsibility for armed drones more toward the military and away from the C.I.A., congressional and administration officials said Thursday. Lawmakers inserted wording into a classified annex to the $1.1 trillion federal budget approved by Congress this week that would make it more difficult to transfer control over the drone campaign or the authority to carry out strikes. But the measure, first reported on the Washington Post’s website on Wednesday night, is a rare move by Congress to dictate how covert operations like the drone program are carried out. It also reflects the simmering suspicion among many lawmakers on the Intelligence Committees that the military’s Joint Special Operations Command is not up to the task of killing terrorism suspects with Predator or Reaper drones, a notion the Pentagon rejects. (3PA: Last April I called for the Obama administration to transfer CIA drone strikes to the Pentagon, still a needed reform.) Darren Samuelsohn, “Public remains ‘all over the map’ on NSA tactics,” Politico, January 16, 2014. Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) said public opinion is off the mark because Americans are getting a skewed picture of the NSA programs. She slammed press coverage that “has been dramatically one way” against the surveillance activities, though she’s been writing op-eds and speaking out trying to correct the record. “I think there’s enormous misunderstanding out there about what exactly is done,” Feinstein said in an interview. “I think there is a misunderstanding because I think people believe we’re collecting content, that we’re collecting what people say to each other on the phone and that is not correct. It’s very difficult.” (3PA: Sen. Feinstein, during John Brennan’s February 2013 confirmation hearing, said that she was unaware of the United States’ policy of signature strikes. Yet, when it comes to the NSA’s surveillance program, Sen. Feinstein seems to think she is more well-versed than the American public and many other congressmen.) “Cisco Annual Security Report Documents Unprecedented Growth of Advanced Attacks and Malicious Traffic,” Cisco, January 16, 2014. Overall vulnerabilities and threats reached the highest level since initial tracking began in May 2000. As of Oct. 2013, cumulative annual alert totals increased 14 percent year-over-year from 2012. “Review of the Terrorist Attacks on U.S. Facilities in Benghazi, Libya, September 11-12, 2012,” U.S. Senate Select Committee on Intelligence, January 15, 2014. On June 6, 2012, Stevens recommended the creation of teams, made up of locally hired personnel, in Benghazi and Tripoli. The State Department attempted to create a team in Tripoli, but was unable to · difficult to find and clear appropriate personnel. (page 14) On July 9, 2012, Stevens sent a cable to State Department headquarters requesting a minimum of 13 "Temporary Duty" (TDY) U.S. security personnel for Libya, which he said could be made up of DS agents, DoD Site Security Team (SST) personnel, or some combination of the two. These TDY security personnel were needed to meet the requested security posture in Tripoli and Benghazi. The State Department never fulfilled this request and, according to Eric Nordstrom, State Department headquarters never responded to the request with a cable. (page 15) DoD confirmed to the Committee that Ambassador Stevens declined two specific offers from General Carter Ham, then the head of AFRICOM, to sustain the SST in the weeks before the terrorist attacks. (page 20) With respect to the role of DoD and AFRICOM in emergency evacuations and rescue operations in Benghazi, the Committee received conflicting information on the extent of the awareness within DoD of the Benghazi [CIA] Annex. According to U.S. AFRICOM, neither the command nor its Commander were aware of an annex in Benghazi, Libya. However, it is the Committee’s understanding that other DoD personnel were aware of the Benghazi Annex. (page 26) DoD moved aerial assets, teams of Marines, and special operations forces toward Libya as the attacks were ongoing, but in addition to the seven-man reinforcement team from Tripoli, the only additional resources that were able to arrive on scene were unmanned, unarmed aerial surveillance assets. (page 28) The Majority believes that the terrorist attacks against U.S. personnel at the Temporary Mission Facility and the Annex in Benghazi, Libya, on September 11 and 12, 2012, were likely preventable based on the known security shortfalls at the U.S. Mission and the significant strategic (although not tactical) warnings from the Intelligence Community (IC) about the deteriorating security situation in Libya.  (Additional Majority News, page 1) Susan B. Epstein, Alex Tiersky, Marian L. Lawson, “State, Foreign Operations, and Related Programs: FY2014 Budget and Appropriations,” Congressional Research Service, January 3, 2014. (page 10) Craig Whitlock and Craig Timberg, “Border-patrol drones being borrowed by other agencies more often than previously known,” Washington Post, January 14, 2014. Customs and Border Protection, which has the largest U.S. drone fleet of its kind outside the Defense Department, flew nearly 700 such surveillance missions on behalf of other agencies from 2010 to 2012, according to flight logs released recently in response to a Freedom of Information Act lawsuit filed by the Electronic Frontier Foundation, a civil-liberties group…In 2010, for example, Customs and Border Protection conducted 76 drone missions for other agencies. The next year, that number quadrupled, and it remained at nearly the same level in 2012. Although the border agency has acknowledged that it flies drones for other law-enforcement departments, it has revealed little about the number and precise nature of the missions. Customs and Border Protection has a fleet of 10 unarmed Predator B drones. They are virtually identical to an Air Force drone known as the Reaper. Both are manufactured by General Atomics, a major drone producer based in Southern California…The FBI and other federal law enforcement agencies have their own drones, but they are more rudimentary than those operated by Customs and Border Protection. The Defense Department is prohibited from using its drones in the United States for law enforcement.
  • Intelligence
    U.S. Domestic Surveillance
    Successive U.S. administrations have sought to justify controversial domestic surveillance programs amid criticism from Congress and rights activists, explains this Backgrounder.
  • Intelligence
    You Might Have Missed: Snowden, Homeland Security, and Drone Strikes
    Karen Parrish, “Hagel Arrives in Bahrain for Speech at Dialogue,” American Forces Press Service, December 5, 2013. Hagel noted during a press conference yesterday that even as it focuses more attention on the Asia-Pacific, the United States is fully engaged around the world. “Our interests, the United States of America’s interests, are the world’s interests,” he said. “Our interests are not defined by one region or one country or one area.” (3PA: This is a prime example of what is called “projection bias.”) Sean Gardiner, “New York’s New Police Chief Faces Fewer Crimes, More Counterterrorism,” Wall Street Journal, December 5, 2013. When Mr. Kelly handed the NYPD to Mr. Bratton at the start of 1994, the city had just finished a year with 1,946 homicides, or more than five each day. More than 600,000 major crimes were reported in 1993… Through Monday, there have been 307 murders in 2013. The city is also on pace to finish with fewer than 200,000 major crimes—about one-third of what Mr. Bratton faced at the start of his first tenure. “Department of Defense Press Briefing by Secretary Hagel and General Dempsey in Pentagon Briefing Room,” U.S. Department of Defense, December 4, 2013. One of the things that is coming out of the QDR that began to be illuminated by some strategic seminars that we ran about a year ago is that the homeland is no longer a sanctuary. If we’re engaged in a conflict virtually anywhere in the globe, there is likely to be some effect in the homeland. Whether it’s potentially ballistic missiles or cyber, something could potentially affect the homeland in a way that it hasn’t heretofore. So the homeland is actually achieving much greater prominence in our discussions of our future strategy than at any time in my 40 years, as it should. David Zucchino, “Afghans describe relatives’ deaths in recent drone strike,” Los Angeles Times, December 1, 2013. The sunburned 28-year-old farmer looked up and saw a gray, narrow-winged drone circling the village. A few minutes later, he said, it fired a missile that landed with a tremendous thud across a stony ridge line. He recognized the smoking remains of his brother, his brother’s wife and their 18-month-old son. Jan and other villagers say 14 people were killed in the attack; U.S. and Afghan officials place the toll at 11. Stefan Frei, “The Known Unknowns: Empirical Analysis of Publicly Unknown Security Vulnerabilities,” NSS Labs, December 2013. Given the NSA budget of USD $25 million for the purchase of exploits in 2013 and given that the documented price of an exploit ranges from USD $40,000 to USD $250,000, it can be assumed that this will result in at least another 100 to 625 exploits per year – or 86 to 541 known unknowns on any given day, provided the market can satisfy the demand. Anthony Faiola, “Britain targets Guardian newspaper over intelligence leaks related to Edward Snowden,” Washington Post, November 30, 2013. In the summer, a senior official at the British Embassy in Washington called Abramson at the New York Times to request the return of Snowden data — a request Abramson has said she denied. “We were made aware that the NYT might be in possession of a large number of stolen, highly classified documents,” said a British official who declined to be named. “Would it be unreasonable of us to ask for them back?” (3PA: Thankfully, American newspapers don’t allow foreign governments to prevent their investigative reporting.) “Ipsos Poll Conducted for Reuters,” Ipsos, November 26, 2013. Matt Spetalnick, “Americans back Iran deal by 2-to-1 margin: Reuters/Ipsos poll,” Reuters, November 26, 2013. Despite that, 65 percent of those polled agreed that the United States "should not become involved in any military action in the Middle East unless America is directly threatened." Only 21 percent disagreed with the statement. Amada Cordova, Lindsay D. Millard, Lance Menthe, Robert A. Guffey, and Carl Rhodes, “Motion Imagery Processing and Exploitation (MIPE),” RAND Corporation, 2013. This report discusses a set of technology enablers, which we call motion imagery processing and exploitation (MIPE), that can help military intelligence organizations more effectively manage and analyze the deluge of motion imagery in current and future conflicts. We define MIPE as the class of technologies, systems, and capabilities that have these purposes: — to aid in the detection, identification, and tracking of humans, vehicles, and other objects of interest (OOIs) in live and archival video, with or without associated metadata — to aid in the identification of human actions and activities of interest (AOIs) in live and archival video — to aid in the characterization of relationships between and among OOIs and AOIs — to facilitate any subsequent analysis, such as multi-intelligence (multi-INT) fusion, network analysis, and data visualization. To be useful to military intelligence operations, MIPE systems must be evaluated under conditions that mimic real-world application of the system, which may include very large target sets and diverse environments. The desired capabilities may also depend on the type of military operation; for example, evaluations of MIPE system performance in irregular warfare may not be relevant to major combat operations. It is also important to note that performance in one area may be heavily dependent on performance in another. For example, the ability of a system to exploit data may depend on previous processing.
  • Defense and Security
    You Might Have Missed: Nuclear Iran, Drone Markets, and Terrorism
      “Implementation of the NPT Safeguards Agreement and Relevant Provisions of Security Council Resolutions in the Islamic Republic of Iran,” International Atomic Energy Agency, November 14, 2013. Since Iran began enriching uranium at its declared facilities, it has produced at those facilities: 10 356 kg (+653 kg since the Director General’s previous report) of UF6 enriched up to 5% U-235, of which 7154.3 kg (+380.3 kg since the Director General’s previous report) remain in the form of UF6 enriched up to 5% U-235 and the rest has been further processed (as detailed in paragraphs 22,28 and 41 below) Hon. Matthew G. Olsen, “The Homeland Threat Landscape and U.S. Response,” Senate Committee on Homeland Security and Governmental Affairs, November 14, 2013. Despite core al-Qaida’s diminished leadership cadre, remaining members will continue to pose a threat to Western interests in South Asia and will attempt to strike the Homeland should an opportunity arise…Al-Qaida in the Arabian Peninsula (AQAP) remains the affiliate most likely to attempt transnational attacks against the United States… Homegrown Violent Extremists (HVEs) remain the most likely global jihadist threat to the Homeland. While the threat posed by HVEs probably will broaden through at least 2015, the overall level of HVE activity is likely to remain the same: a handful of uncoordinated and unsophisticated plots emanating from a pool of up to a few hundred individuals. Lone actors or insular groups who act autonomously pose the most serious HVE threat. United States of America v. Tarek Mehanna, United States Court of Appeals for the First Circuit, November 13, 2013. Terrorism is the modern-day equivalent of the bubonic plague: it is an existential threat. “Air Force to ‘Add More Rigor’ to Screening of Candidates for Nuclear Commander Jobs,” Washington Post, November 13, 2013. The review will include a Google search, a simple task that hadn’t been done before. “What pops up when you type somebody’s name into Google?” Welsh said. “It might be worth knowing that before you nominate somebody for a key job. Some of this is common sense.” Brian Bennett and Michael A. Memoli, “No Partisan Divide on Obama’s Homeland Security Nominee,” Los Angeles Times, November 13, 2013. As American warplanes dropped bombs on Libya in June 2011, lawmakers accused the Obama administration of usurping Congress and violating the War Powers Resolution. From his office in the Pentagon’s E-Ring, Jeh Johnson, then general counsel at the Defense Department, penned advice to the president: Go to Congress for approval… But Johnson’s dissent may pay off now: It won him some fans among Republicans in Congress, and they haven’t forgotten. “Department of Defense Press Briefing with George Little from the Pentagon,” U.S. Department of Defense, November 12, 2013. George Little: One of the reasons that we in the Department of Defense, the U.S. military, have a very high approval rating with the American people is because we are transparent. Even when it’s bad news, quite frankly, we tend to come forward quickly and own up to it and talk about the measures we’re taking to ensure that the problem doesn’t occur again. Steven Aftergood, “Pentagon Drone Programs Taper Off (and New Military Doctrine),” Secrecy News, November 12, 2013. The Department of Defense budget for research and procurement of unmanned aerial systems (UAS), or drones, is on a distinctly downward slope. The FY 2014 budget request included $2.3 billion for research, development, and procurement of unmanned aerial systems, a decrease of $1.1 billion from the request for the fiscal year 2013. “Annual procurement of UAS has gone from 1,211 in fiscal 2012 to 288 last year to just 54 in the proposed FY14 budget,” according to a recently published congressional hearing volume. Guy Taylor, “U.S. Intelligence Warily Watches for Threats to U.S. National Security Now That 87 Nations Possess Drones,” Washington Times, November 10, 2013. This matters because of the roughly 20,000 drones now in existence, only about 350 are large enough to carry the slate of weapons on the current market.
  • Political Transitions
    You Might Have Missed: FAA UAV Roadmap, Salaries of Congress, and Blackwater
    Despite Challenges, Africans Are Optimistic about the Future,” Pew Research, November 8, 2013. The world’s two leading powers, the U.S. and China, enjoy mostly positive images in Africa. Both nations receive higher favorability ratings in Africa than in the other regions included in the 2013 survey. Across the eight African nations, a median of 73% express a positive opinion of the U.S., while 65% hold this view about China. Globally, the U.S. generally gets higher marks than China on this question. Pew China v US Favorability “Press Release – FAA Releases Unmanned Aircraft Systems Integration Roadmap,” Federal Aviation Administration, November 7, 2013. The Roadmap outlines the FAA’s approach to ensuring that widespread UAS use is safe, from the perspective of accommodation, integration, and evolution.  The FAA’s main goal for integration is to establish requirements that UAS operators will have to meet in order to increase access to airspace over the next five to 10 years. The Roadmap discusses items such as new or revised regulations, policies, procedures, guidance material, training and understanding of systems and operations to support routine UAS operations. The FAA plans to select six UAS test sites to begin work on safely integrating UAS into the airspace.  These congressionally-mandated test sites will conduct critical research into how best to safely integrate UAS systems into the national airspace over the next several years and what certification and navigation requirements will need to be established. (3PA: Read the full UAS Roadmap and the UAS Comprehensive Plan.) Ida A. Brudnick, “Salaries of Members of Congress: Recent Reactions and Historical Tables,” Congressional Research Service, November 4, 2013. Table 1 provides a history of the salaries of Members of Congress since 1789…The salaries shown are the payable salaries, indicating the rate actually paid to Members of Congress. “Rogers: NSA Intelligence Collection Stops Threats,” CBS News Face the Nation, November 3, 2013. We did this in the 1930s. We turned it off--1929 the Secretary of State, at that time, where we were collecting information to protect America said you know we should do this. This is unseemly. Turned it off. So that led to a whole bunch of misunderstandings that led to World War II that killed millions and millions of people. Scott Shane, “No Morsel Too Miniscule for All-Consuming N.S.A.,” New York Times, November 2, 2013. One N.S.A. officer on the Lashkar-e-Taiba beat let slip that some of his eavesdropping turned out to be largely pointless, perhaps because of the agency’s chronic shortage of skilled linguists. He “ran some queries” to read intercepted communications of certain Lashkar-e-Taiba members, he wrote in the wiki, but added: “Most of it is in Arabic or Farsi, so I can’t make much of it.” Nasser Mehsud, “Tribesmen Target U.S. Drone After TTP Chief’s Killing,” Newsweek Pakistan, November 2, 2013. Tribesmen opened fire on a U.S. drone over Pakistan’s tribal belt Saturday where Pakistani Taliban commander Hakimullah Mehsud was killed by a drone strike a day earlier, residents and officials said. (3PA: This is the first well documented exmple of local villagers directly sustained fire at a U.S. drone.) Peter Hamby, “Review: ‘Double Down,’ on the 2012 election, by Mark Halperin and John Heilemann,” November 1, 2013. But there’s still click-bait aplenty: Obama meditating on drone strikes and telling his aides that he’s “really good at killing people… Scott Fitzsimmons, “Wheeled Warriors: Explaining Variations in the Use of Violence by Private Security Companies in Iraq,” Security Studies 22:4, 2013. This article engages one of the most widely discussed but poorly understood aspects of the Iraq War: the use of violence by private security companies. It explains why, despite sharing several important characteristics…the personnel who worked for Blackwater, the chief protector of US State Department employees in Iraq, killed and seriously injured far more people than their counterparts in DynCorp. The article argues that Blackwater’s personnel killed and seriously injured far more people in Iraq than their DynCorp counterparts because Blackwater maintained a relatively bellicose military culture that placed strong emphasis on norms encouraging its security teams to exercise personal initiative, proactive use of force, and an exclusive approach to security, which together motivated its personnel to use violence quite freely against anyone suspected of posing a threat. If the trends established during the Iraq and Afghan Wars continue, then private security companies will see extensive employment in future conflicts. These findings, consequently, have implications that extend beyond the Iraq War and the particular firms under study. Indeed, they indicate that governments and other future clients should analyze the military cultures of the firms vying for their business and use the results as a basis for deciding which firms to hire and, to a great extent, represent them in unstable conflict zones. “Dracunculiasis (guinea-worm disease): Situation and Trends,” World Health Organization. In 1986, 3.5 million new cases were estimated to occur annually. Based on active village-based searches, 892,055 cases were reported to have occurred in 1989. By 2010, as a result of the intensive efforts to eradicate dracunculiasis, the annual incidence was brought down to 1,797 cases, a reduction of more than 99% since 1989…Dracunculiasis is on the verge of eradication. WHO has now certified 187 countries and territories as free of dracunculiasis or as having interrupted transmission or being an area where transmission never occurred. Intelligence Authorization Act for Fiscal Year 2014, U.S. Senate, 2013. Subtitle B—Targeted Lethal Force Oversight SEC. 312. UNCLASSIFIED ANNUAL REPORT ON THE USE OF TARGETED LETHAL FORCE OUTSIDE THE UNITED STATES. (a) REQUIREMENT FOR ANNUAL REPORT.—For each year, the President shall prepare and make public an annual report that sets forth the following: (1) The total number of combatants killed or injured during the preceding year by the use of targeted lethal force outside the United States by remotely piloted aircraft. (2) The total number of noncombatant civilians killed or injured during the preceding year by such use of targeted lethal force outside the United States. (b) TARGETED LETHAL FORCE DEFINED.—In this section, the term ‘‘targeted lethal force’’ means the act of directing lethal force at a particular person or group with the specific intent of killing those persons. (c) EXCEPTION.—A report required by subsection (a) shall not include— (1) any use of targeted lethal force in Afghanistan prior to the end of combat operations by the United States; or (2) any use of targeted lethal force in a foreign country described by a future declaration of war or authorization for the use of military force.  
  • Intelligence
    You Might Have Missed: Drones, al-Shabaab in Somalia, and the NSA.
    Michael R. Gordon and Eric Schmitt, “As Security Deteriorates at Home, Iraqi Leader Arrived in U.S. Seeking Aid,” New York Times, October 31, 2013. Until now, Mr. Maliki was reluctant to openly ask for United States support. A former American official said that in 2012 Mr. Maliki was on the verge of asking the United States to fly reconnaissance drones over Iraq to help pinpoint the growing terrorist threat but backed off at the last moment when the request became public. (3PA: For why the United States should refrain from conducting drone strikes on behalf of Iraq’s embattled leader read here.) Claudette Roulo, “Carter Praises U.S. Soldiers’ ‘Ferocious Ingenuity,” American Forces Press Service, October 29, 2013. The current political squabbles in the nation’s capital are disruptive to the U.S. military, he said. “Having just flown [-in] from Washington … there’s nothing good I can say about it,” [deputy secretary of defense Ashton] Carter said. “It’s inexcusable. It’s leading to real disruption in how we manage our armed forces. Allison Nielsen, “Americans Highly Opposed to Use of Drones for U.S. Police Work,” Sunshine State News, October 28, 2013. According to a new Rasmussen Reports poll, 69 percent of likely U.S. voters favor the use of unmanned drone aircraft to kill al-Qaida and Taliban terrorists overseas while 20 percent oppose the use of drones to kill terrorists overseas. Sixty-four percent believe it’s at least somewhat likely that drone strikes overseas have killed more innocent civilians than the U.S. government is officially reporting, but just 21 percent consider that unlikely. Rajiv Chandrasekaran, “Kony 2013: U.S. Quietly Intensifies Effort to Help African Troops Capture Infamous Warlord,” Washington Post, October 28, 2013. Several senior military commanders voiced skepticism in the early strategy sessions, questioning whether deploying forces to kill or capture Kony met core U.S. national security interests. Civilians in the Pentagon, State Department officials and staffers at the National Security Council, some of whom had worked closely with Invisible Children and Resolve, were far more supportive of a military deployment, viewing it as the quickest, most effective way to resolve the problem. (3PA: This article provided further confirming evidence about the differing civilian-military perceptions about using military force. You will not find many combatant command or joint staff planners who work closely with NGO advocacy groups.) Erik Gartzke, “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth,” International Security, Vol. 38, No. 2, Fall 2013. There is significant fault, however, in the theme of impending cyber apocalypse: it is far from clear that conflict over the internet can actually function as war…This article assesses the salience of the internet for carrying out functions commonly identified with terrestrial political violence. "U.S. Navy Employment Options for Unmanned Surface Vehicles (USVs)," Rand Corporation, 2013. The Current USV Market We identified 63 USVs in the current market. We obtained publicly available data on size, speed, endurance, level of autonomy, payload mass, and power provided to payloads. Where exact values were not available, we estimated based on vehicle and concept descriptions, comparisons with similar vehicles, and rough-order-of-magnitude technology-based assessments. The Current USV Marketplace Focuses on Relatively Few Categories of Applications While current USVs perform a range of missions and functions, the majority of activity in the USV marketplace tends to coalesce around a relatively small set of mission categories. Collectively, the 63 USVs in the current market perform 16 distinct types of missions, listed on the vertical axis of Figure 2.1. As most of these USVs are designed to perform more than one type of application and many are modular (allowing a range of missions through tailored payloads), the set of 63 USVs collectively demonstrates 148 individual missions. Nearly 80 percent of the applications fall into just five categories. The “observation and collection” application category is the most common; this partly reflects the fact that most USVs need to have some ability to observe their environment, enabling a remote operator or algorithm to respond to that environment, enabling a remote operator or algorithm to respond to that environment. The large number of USV applications under the “characterizing the physical environment” category is accounted for by the large number of civilian-sector USVs that perform environmental survey work, while the number of USV applications under the MCM category reflects both a large number of legacy European drones conducting influence sweeping, as well as a few modern systems. (pp. 8-10)    
  • Global
    Global Responses to NSA Surveillance: Three Things to Know
    The latest revelations about NSA surveillance have caused a growing number of states to focus on issues of privacy, governance, and the free flow of digital information, says CFR’s Karen Kornbluh.
  • Political Transitions
    You Might Have Missed: Drones, Syria, and Technology
    Allegation of U.S. Spying on Merkel Puts Obama at Crossroads,” New York Times, October 24, 2013. “This was colossally bad judgment — doing something because you can, instead of asking if you should,” said one career American official with long experience in Europe. A senior administration official declined to say what Mr. Obama knew or did not know about monitoring of Ms. Merkel’s phone, but said the president “doesn’t think we are in the right place.” “Rep. Smith: Armed Drones ‘No Perfect Instrument,’ but Welcomes DoD Shift,” Military Times, October 24, 2013. “Whenever we do a targeted strike…we need to, at least, explain why. We can reveal what we want to reveal,” Smith said bluntly. “We can reveal enough to say, ‘This is why we hit this person, and it was self-defense’.” “The administration—every administration—seems to think it should share nothing,” Smith said. “I think the administration believes…we gave a speech, we explained it…and now leave us alone, we’re going to go back to work,” “Former Defense Secretary Gates Warns Against Lure of Drone Warfare,” Washington Post, October 23, 2013. “Remarkable advances in precision munitions, sensors, information and satellite technology and more can make us overly enamored with the ability of technology to transform the traditional laws and limits of war,” Gates said in a speech to a group of current and former soldiers, according to a copy of his prepared remarks. “A button is pushed in Nevada and seconds later a pickup truck explodes in Kandahar.” Too often, Gates said, U.S. defense experts have come to view war as a “kind of video game or action movie. . . . In reality, war is inevitably tragic, inefficient and uncertain.” “Army Lets Air Out of Battlefield Spyship Project,” Los Angeles Times, October 22, 2013. Near the height of the Afghanistan war, the Pentagon spent $297 million on a seven-story blimp-like aircraft—as long as a football field—that would hover over the war zone for weeks at a time, beaming back crucial intelligence. Last month, the Pentagon quietly decided to sell back the sophisticated spyship to the British company that built it for $301,000 — a fraction of its investment. “Obama’s Uncertain Path Amid Syria Bloodshed,” New York Times, October 22, 2013. Jordanian officials were even offering to allow the C.I.A. to use the country as a base for drone strikes in Syria — offers that the Obama administration repeatedly declined. President Obama had signed a secret order in April—months earlier than previously reported—authorizing a C.I.A. plan to begin arming the Syrian rebels. But the arms had not been shipped, and the collapse of rebel positions in western Syria fueled the atmosphere of crisis that hung over the June meeting. Yet after hours of debate in which top advisers considered a range of options, including military strikes and increased support to the rebels, the meeting ended the way so many attempts to define a Syrian strategy had ended in the past, with the president’s aides deeply divided over how to respond to a civil war that had already claimed 100,000 lives. “Between a Drone and Al-Qaeda,” Human Rights Watch, October 22, 2013. The US Joint Special Operations Command (JSOC) and the Central Intelligence Agency (CIA) are estimated by research groups to have carried out 81 targeted killing operations in Yemen: one in 2002 and the rest since 2009. The strikes by drones, warplanes or cruise missiles by various counts have killed at least 473 combatants and civilians. These attacks, one from 2009 and the rest from 2012-13, killed 82 people, at least 57 of them civilians. At least four of the strikes were carried out by drones, a fifth strike by either drones or warplanes, and a sixth one by cruise missiles releasing cluster munitions, indiscriminate weapons that pose unacceptable dangers to civilians. (3PA: Amnesty International also published a report on the same day. The HRW and AI reports are invaluable, but the policy window in DC for reforming drone strike policies is closed. The Senate and House intelligence committees should invite HRW and AI to brief them on their drone strike investigations.) “USAF Leader: QDR Process Helps DoD See Vulnerabilities,” Defense News, October 19, 2013. Maj. Gen. Steven Kwast: The facts are that it costs more money to put up a CAP [24-hour combat air patrol] than it does to have a squadron of F-16s. It costs more people to man a CAP than it does to man a full squadron. The data link is vulnerable. The machine is vulnerable. The command and control is vulnerable. So we have built into it the one thing you don’t want to build into any military approach, and that is vulnerability. Right now, we’re on a path that you want to be able to see everything, anywhere, all the time. Can we really afford to be able to watch every nook and cranny of the globe 24/7? We can’t even process the information, let alone distill it into decision-quality data. “Technology and Innovation Enablers for Superiority in 2030,” The Defense Science Board, October 2013. In the future, increasingly technically capable and economically strong adversaries are likely to develop counters to some or all of the foundation technologies on which the U.S. has come to rely. The advantages provided by capabilities such as GPS, internet-based network communications, satellite reconnaissance, and stealth aircraft will be diminished, and in many cases, eliminated. To maintain superiority, it will be necessary for the military to develop new capabilities or tactics, techniques, and procedures to continue to be effective…(pg. viii) With more capable adversaries, the unfettered access to their homeland that the U.S. has exploited in its recent wars may no longer be achievable. This concern is the motivation for much of the Department’s interest in anti-access and area denial capability. Existing bomber and missile systems that can penetrate adversary defenses from long range are expensive, limited in fleet size, and may need to be reserved to achieve vital strategic effects…(pg. xv) Bespoke Materials A substantial expansion of research could produce meaningful playoffs in the design and fabrication of custom materials for a variety of Department of Defense applications. Examples include lasting materials that can generate any wavelength, detector array materials and associated optics for sensing from ultraviolent through infrared, structurally embedded radio antennae, high-strength lightweight materials, ultra-efficient solar cells, biocompatible materials, and cost-effective nanostructures for microelectronics, to name a few. Thought-based Machine Control Research is in its infancy on devices and systems for facile human-machine interfaces without physical contact, either exclusively via transmitted thoughts or aided by microelectronic implants. Systems currently exist to control computer curosrs and joysticks via concentrated thought. Portable Compact Fission to Provide Megawatt Power Levels Power availability is an essential enabler for a variety of defense missions. Portable fission reactor concepts are being considered or developed today that are designed to operate with low-enrichment fuel to minimize proliferation concerns. The negative thermal coefficient in this design means that neutron moderation decreases with increasing system temperature, leading to an inherently safe design without potential for thermal runaway or meltdown. (appendix B)
  • Political Transitions
    You Might Have Missed: Japanese Drones, Shutdown, CIA in Syria
    John Hudson, “U.S. Rules Out a New Drone War in Iraq,” Foreign Policy Magazine, October 3, 2013. In 2013 alone, Iraq is averaging 68 car bombings a month. The United Nations reports that 5,740 civilians were killed since January, which is almost two times more deaths than recorded in all of 2010. Despite the staggering numbers, the U.S. isn’t about to open up a new drone war in Iraq. An administration official tells The Cable the use of lethal drones has not been discussed nor is it even under consideration for Iraq. "The administration got us out of Iraq, which is seen as an accomplishment for the administration. So any ramping up of activity back in Iraq would go against that success," Joseph Quinn, an instructor at West Point’s Combating Terrorism Center, told The Cable. "They might also be weary of what in the military we call ‘mission creep.’ It starts with drones, but where does it end?" [Iraqi ambassador to the U.S. Iraq Lukman] Faily, speaking with The Cable today, declined to say if the Iraqis ever made a request for drones in the first place, but he did say they would continue asking for more assistance from the United States.] (3PA: It is a positive sign that President Obama has decided not to authorize drone strikes in Iraq because it would be a terrible idea.) Greg Miller, “CIA Ramping Up Covert Training Program for Moderate Syrian Rebels,” Washington Post, October 2, 2013. The CIA is “ramping up and expanding its effort,” said a U.S. official familiar with operations in Syria, because “it was clear that the opposition was losing, and not only losing tactically but on a more strategic level.” The CIA’s mission, officials said, has been defined by the White House’s desire to seek a political settlement, a scenario that relies on an eventual stalemate among the warring factions rather than a clear victor. As a result, officials said, limits on the agency’s authorities enable it to provide enough support to help ensure that politically moderate, U.S.-supported militias don’t lose but not enough for them to win. Islamist factions have taken advantage, luring fighters away with offers of better pay, equipment and results. A spokesman for the ISIS said the group had added 2,000 Syrian recruits and 1,500 foreign fighters over the past two months. “What happens when some of the people we trained torture a prisoner?” said a former senior U.S. intelligence official familiar with agency operations in the Middle East. Even if the CIA can produce records to defend its training program, “we’re going to face congressional hearings,” the former official said. “There is no win here.” (3PA: This is a predictable outcome. America’s unwillingness to attack Syria is reflected in the level of military force officials and policymakers are willing to employ.) “Defense Ministry Working on Protocol to Shoot Down Encroaching Drones,” Asahi Shimbun, October 2, 2013. The Defense Ministry is planning a new protocol to deal with foreign unmanned aircraft that approach Japan’s airspace, like the Chinese military drone that ventured near the disputed Senkaku Islands last month. The protocol will include provisions for “necessary measures,” or shooting down a drone, if it continues to violate Japan’s airspace and poses a serious and immediate danger to the lives and property of the Japanese public, sources said. Officials will work out measures to deal with drone-specific issues and incorporate them into the “rules of engagement,” which set specific protocols on the use of arms. Michael Peck, “Global Cybersecurity Spending to Reach $94B,” Defense News, October 1, 2013. Global cybersecurity spending will reach $94 billion between 2013 and 2023, according to a new study by market research firm ASDReports. This makes the U.S. the largest market for cybersecurity firms, followed by Europe at $25 billion, Asia-Pacific at $23 billion, the Middle East at $22.8 billion and Latin America at $1.6 billion, according to an ASDReports announcement. Michael D. Shear, “On Day 1, Parks Close, Workers Stay Home and ‘Panda Cam’ Goes Dark,” New York Times, October 1, 2013. Officials informed lawmakers that about 72 percent of the intelligence community’s civilian work force were furloughed. Senator Dianne Feinstein, Democrat of California, angrily denounced the shutdown as “the biggest gift that we could possibly give our enemies.” Charles Clover, “Russia: A Return to Arms,” Financial Times, October 1, 2013. But now Russian arms dealers are prioritising a new client: the Russian state itself. Last year Russia’s defence spending soared 25 per cent and this year Moscow’s expenditure is set to overtake that of the UK and Japan, according to analysis by IHS. That would make Russia the third largest arms buyer in the world, spending $68.8bn in 2013, trailing only China ($131.7bn), and the US, which spends more on defence ($637.8bn) than the next 10 countries combined. As a percentage of economic output, Russia’s defence expenditures are scheduled to rise from 3.2 per cent in 2013 to 3.8 per cent by 2016. This is much higher than in other big emerging markets such as India (2.6 per cent), Turkey (2.3 per cent) and China (1.9 per cent), according to research by Renaissance Capital, the Moscow-based investment bank. Sam Fellman, “How Doing More with Less is Hurting Sailors—and the Navy,” Navy Times, September 30, 2013. “Listen, if we went to war with China today — and you can print this — I think it would take us 10 days to destroy their Navy," said retired Cmdr. Bryan McGrath, a former destroyer commanding officer who has worked as a consultant with Cropsey. Steven Aftergood, “To Fix U.S. Intelligence, Shrink It?” Secrecy News, September 30, 2013. “Something that’s worth considering,” another CIA analyst said, “is completely counterintuitive, which is to make the CT [counterterrorism] community smaller, not larger. I think there are far more people at CIA HQ now than when we defeated the Soviet Union in the Cold War. What the hell?”
  • Americas
    Will Snowden Come Between the U.S. and Latin America?
    Recent revelations about U.S. surveillance activities in Latin America have provoked a range of negative responses from regional leaders, but the practical consequences will be marginal, says expert Christopher Sabatini.
  • Homeland Security
    Has the FISA Court Gone Too Far?
    While the Foreign Intelligence Surveillance Court has granted U.S. agencies broad legal authority to collect sensitive information, it is hardly a "rubber stamp" for government surveillance requests, says CFR’s Matt Waxman.
  • Political Transitions
    You Might Have Missed: Surveillance Programs, Intervention in Syria, and Chinese Foreign Policy
    Alastair Iain Johnston, "How New and Assertive Is China’s New Assertiveness?International Security 37, no. 4 (Spring 2013): 7–48. Why, then, does it matter whether PRC diplomacy as a whole in 2010 can or cannot be characterized as “newly assertive”? It may matter because language can affect internal and public foreign policy debates. There is a long-standing and rich literature on the role of the media in agenda setting. What does agenda setting mean in concrete terms? It means focusing attention on particular narratives, excluding others, and narrowing discourse. In the agenda setting literature, it refers to the power of information entrepreneurs to tell people “what to think about” and “how to think about it.” It can make or take away spaces for alternative descriptive and causal arguments, and thus the space for debates about effective policy. The prevailing description of the problem narrows acceptable options. The conventional description of Chinese diplomacy in 2010 seems to point to a new, but poorly understood, factor in international relations—namely, the speed with which new conventional wisdoms are created, at least within the public sphere, by the interaction of the internet-based traditional media and the blogosphere. One study has found, for instance, that on some U.S. public policy issues, the blogosphere and the traditional media interact in setting the agenda for coverage for each other. Moreover, on issues where this interaction occurs, much of the effect happens within four days. Other research suggests that political bloggers, for the most part, do not engage in original reporting and instead rely heavily on the mainstream media for the reproduction of alleged facts. The media, meanwhile, increasingly refers to blogs as source material. The result is, as one study put it, “a news source cycle, in which news content can be passed back and forth from media to media.” Additional research suggests that the thematic agendas for political campaigns and politicians themselves are increasingly influenced by blogosphere-media interaction. Together, this research suggests that the prevailing framework for characterizing Chinese foreign policy in recent years may be relevant for the further development (and possible narrowing) of the policy discourse among media, think tank, and policy elites. As the agenda-setting literature suggests, this is not a new phenomenon. What is new, however, is the speed with which these narratives are created and spread—a discursive tidal wave, if you will. This gives first movers with strong policy preferences advantages in producing and circulating memes and narratives in the electronic media or in high-profile blogs, or both. This, in turn, further reduces the time and incentives for participants in policy debates to conduct rigorous comparative analysis prior to participation. This is ironic, of course, given the proliferation of easier-to-access data and original information sources on the internet with which to conduct such rigorous comparative analysis. James Kitfield, “A Hollow Military Again?” National Journal, June 12, 2013. “The way President Obama put it to me is, ‘Give me fewer Iraqi Freedoms and more Desert Storms,’ said Adm.  James Winnefeld Jr., vice chairman of the Joint Chiefs, who coordinated the new defense strategic guidance. Senate Appropriations Committee hearing on "Preparing for and Responding to the Enduring Threat,” June 12, 2013. Sen. Mary Landrieu: “I hope that in the classified hearing that more of this can be brought to light. And I most certainly am going to be explaining this to my constituents in an appropriate, balanced way.” (3PA: This quote summed up the congressional oversight process.  Only behind closed doors can controversial surveillance programs be brought to light, and which, constituents must rely upon the judgments of their elected members.) Ruth Marcus, “James Clapper’s ‘least truthful’ answer,” Washington Post, June 13, 2013. Ron Wyden doesn’t want to call the director of national intelligence a liar. The Oregon Democrat is too seasoned a politician for that — and James Clapper’s self-assessment, that he answered in the “least untruthful manner” when the senator asked whether the National Security Agency was collecting data about millions of Americans, speaks for itself. “No, sir . . . not wittingly,” Clapper said, when the answer was clearly — and is now demonstrably — yes. “When I heard his response, I said, ‘I’ve got more follow-up work to do,’ ” Wyden said with studied mildness when we spoke Thursday. Did Clapper lie? “I want to leave it at that,” Wyden demurred. Then he added, pointedly: “You cannot have strong oversight if intelligence officials don’t give you straight answers.” And that is the paradox — the fallacy, even — of congressional oversight in the post-9/11 environment. Brigid Schulte, “Many women in CIA still encounter glass ceiling, agency report says,” Washington Post, June 13, 2013. In many ways, the dearth of women at the top levels of leadership at the CIA is not unlike the dearth of women at the top of any federal agency. Women make up 31 percent of the CIA’s Senior Intelligence Service and 33 percent of the entire federal government’s Senior Executive Service. In public remarks to staff members, CIA Director John O. Brennan said he fully supports the recommendations and has named a senior female officer in the clandestine service to oversee their implementation. Changing the agency culture may take years, Brennan said, but doing so would “ensure all employees have the opportunity to reach their full professional potential” and enable the agency to better meet its mission. “The countries that figure out how to crack this code,” she said, “will be tremendously advantaged in the future.” Read the full report: “Director’s Advisory Group on Women in Leadership.” Statement issued by the White House on behalf of Benjamin Rhodes, deputy national security adviser, New York Times, June 13, 2013. The President has been clear that the use of chemical weapons – or the transfer of chemical weapons to terrorist groups – is a red line for the United States, as there has long been an established norm within the international community against the use of chemical weapons.  Our intelligence community now has a high confidence assessment that chemical weapons have been used on a small scale by the Assad regime in Syria.  The President has said that the use of chemical weapons would change his calculus, and it has. Put simply, the Assad regime should know that its actions have led us to increase the scope and scale of assistance that we provide to the opposition, including direct support to the SMC. These efforts will increase going forward. (3PA: Sending arms to support Syrian rebels will not change the outcome, let alone topple Assad. For more see: “The No-Plan Zone.”) Tom Vanden Brook, “Marines, Army form quick-strike forces in Africa,” USA Today, June 14, 2013. The Marines will base 500 troops at Moron Air Force Base in Spain, about 35 miles southeast of Seville, said Capt. Eric Flanagan, a Marine Corps spokesman. They can be flown on short notice to African crises aboard six Osprey tilt-rotor aircraft. The unit is known as the Special Purpose Marine Air-Ground Task Force for Crisis Response. It will act as a first responder to U.S. embassies in the region on behalf of U.S. Africa Command, Flanagan said. It will be on standby to help evacuate Americans from hot spots and to provide disaster relief and humanitarian missions.