Posts Tagged ‘Security’

Media Links: The Sydney Hostage Crisis.

datePosted on 17:09, December 16th, 2014 by Pablo

Amid the flurry of media interviews I did as a result of the Sydney hostage crisis, this one may not have received the attention other outlets have received.

The RNZ interview is here. The TVNZ interview is here.

Repost: The torture-terror doctrine.

datePosted on 11:07, December 10th, 2014 by Pablo

Release of the US Senate Intelligence Committee’s report on the CIA “enhanced interrogation” program has once again brought to the fore arguments about the ethics and efficiency of torture when used as part of interrogations. The ethical question reduces to a lesser evil versus greater good argument: as a lesser but necessary evil torture is used to prevent a greater evil in defense of the public good. Hence, torturing someone who knows where a bomb with a fifteen minute timer is planted in a shopping mall is both necessary and good because it will save countless lives.  Torture of someone who is believed to have rigged a car bomb outside a Kabul hotel is seen as unfortunate but just if lives are saved.  The issue is one of tactical urgency, and the value is in the tactical intelligence obtained under duress: the location of the bomb.

However, even if torture might work in some instances in extracting real-time tactical intelligence that saves lives, it is of little use in obtaining strategic intelligence on longer-term of broader based events.  Given the cellular nature of irregular warfare operations, torturing someone to get information, for example, about Osama bin-Laden’s whereabouts is simply time and resource wasting. Instead, what is required is a long-term piece by piece build up of plausible scenarios based on the corroborated evidence provided by multiple sources. Torture simply cannot provide that. And as it turned out, it was old fashioned human intelligence “gumshoe” work that revealed bin-Laden’s hideout.

As for efficiency, the record on torture as an interrogation tool is poor. Hardened zealots would rather than die than betray their comrades. Innocents and weak-willed individuals will say anything to get the punishment to stop, which means wasting time and resources (and risking exposure) tracking down spurious leads.

So why did the US resort to torture after 9/l11? I have written a fair bit about this in the past but have a hunch that its use was much more about punishment than it was about obtaining information.

I have not written much about the subject here on KP. The one essay that addressed it centrally can be found here.  However, in 2005 I published an essay that explored the symmetry between torture and terror in post 9/11 US security doctrine as part of my late “Word from Afar” series in an on-line media outlet .  Although if written today I would make some modifications to the argument and the conclusions, the thrust would remain pretty much the same. Hence I have re-published it below:

“The Symmetry between Torture and Terror.”

(First published April 21, 2005 in Scoop.co.nz)

Revelations about torture of political prisoners held in US prisons in Afghanistan, Guantanamo Bay, Cuba, Iraq and the lower fifty have sparked debate about what is permissible in grey area, irregular conflicts such as the fight against Islamicist terrorism. Brutalisation of terrorist suspects and sympathisers is allowed by a raft of post 9-11 legislation that also authorises their indefinite detention without charge and the practice of “extraordinary rendition” (whereby those suspected of involvement in terrorist activities are refouled to the country of charge or origin, to be detained, interrogated and juridically administered under local conditions).

President Bush explicitly stated in the days immediately following the 9/11 attacks that the US would stop at nothing to locate, bring to justice or eliminate those who organized, sponsored, supported or in any way collaborated in the planning of those events, as well as previous assaults on US interests around the globe. He was roundly applauded at the time by the shell-shocked US public, and it was in that environment that the legal framework for handling terrorist suspects, along with the Patriot Act and Department of Homeland Security, were born.

Subsequent divisions over the use of torture in US detention centres have surfaced along the intersection of practical versus ethical considerations. Torture is considered to be a forced necessity imposed by the ungentlemanly nature of the opponent, or is seen as a moral indictment of the US approach to the “war on terror” that descends into the barbarism that it purports to fight. The subtext of the ethical debate swings both ways. Zealotry and unilateralism in the Bush administration are seen as evidence of both moral elevation or moral decay. Faith in the moral virtue of the current US leadership prevailed among its voting public in the November 2004 national elections (by 52 to 47 percent), something not that dissimilar from the vote totals received by Richard Nixon at the time of his re-election in 1972. Then and now it is comforting for the voting majority to know that the United States Government is legally justified in authorising acts that violate international conventions on the rules of engagement. For Nixon, legal justification of the secret extension of the Vietnam War into Cambodia was grounded on such a means-ends rationale, and so it is with today’s US approach to the war against Islamicist irregulars and jihadis.

Politicians, jurists and pundits are left with the unhappy task of morally justifying inhumane acts committed against suspected enemies or ideological criminals. Myriad others have reason to wax indignant about the perversity of such arguments. Yet, beyond the pressing ethical dilemmas posed by the use of torture against suspects, there are very organic reasons for doing so. These reduce to a question of symmetry in war and the reciprocal utility of torture as a weapon.

Military planners prefer their wars to be symmetrical. Symmetrical wars are those in which opponents are arrayed along a roughly comparable range of force, with similar weapons and tactics. Although contested, the political objectives of symmetrical wars, as well as the strategic rationales used in their pursuit, are grounded in shared understandings of the limited utlity of war. Generally comparable military capabilities and comon expectations of combat and post-conflict behaviour define the physical boundaries of the armed engagement. That leads to the adoption of norms governing the behavior of belligerents, resulting in, among other things, the Hague Convention on Laws of Warfare and the Geneva Convention regarding treatment of prisoners of war. It is adherence to a general set of conventions regarding the conduct of combat operations within bounded levels of force that determines the difference between so-called “conventional” and “unconventional” or “regular” and “irregular” conflicts.

The use of force is conditioned in conventional or regular wars by its relative symmetry, which serves to reduce chaos (and the reach of combat) by providing rules of the game that serve as the ethical and legal foundation for the formulation of military policy and application of armed force in pursuit of political objectives. Incremental qualitative gains and relative quantitative advantages in weapons and troops constitute the physical parameters of war. Within those lines elements of comparative resource base, collective will and technological innovation determine military victory. Adherence to ethical guidelines for wartime conduct is expected of all belligerents.

Asymmetrical wars are those in which the military capabilities of opponents, defined as weapons systems, logistical infrastructure, troop numbers and other indexes of armed might, vary markedly. One side dwarfs the other, militarily speaking. Of itself, that is not what makes such wars unconventional. What does is the combination of ideology, interest and tactics used. If the ideological motivation of opponents is diametrically opposed (say, a choice between submission to secular infidels or defeat by medieval heathens), where the weaker actor is fighting for its national, cultural, religious or ethnic survival whiles the stronger actor is not, then the strategic rationales used by military adversaries will differ considerably. This brings in issues of pure and situational ethics, and the tactics used in pursuit of them.

Guerrilla wars are the highest expression of asymmetric wars. They are fought unconventionally by highly motivated volunteer irregular troops against conventional militaries (often those of nation-states or foreign occupiers, and in many cases paid professionals). In these types of war the distinction between combatant and non-combatant, symbolic versus military targets, and offensive versus defensive operations is deliberately blurred and often reversed by the weaker party (of which there is often more than one, which requires tactical, if not strategic coordination between them–an obvious Achilles Heel). For the weaker party contestation of territory is of secondary importance. What matters is cultivation of popular support and weakening of the opponent’s determination to continue to fight in pursuit of its political interests in a given geographic area. The Iraq conflict is a microcosmic distillation of that fact.

Conventional military planners prefer that force asymmetries be in their favour, understood as superior military technology, training, organization and tactics brought to bear within a given continuum of force on an enemy that agrees to play by the “rules.” For the irregular warrior, the object of the exercise is to use time, tenacity and psychological impact as instruments to wear down the will of the militarily superior opponent. Symbolic acts figure very highly in the guerrilla strategist’s tactical priorities, and terrorism against so-called “soft” civilian targets is central among them because it is designed to produce paralysing fear and a desire to acquiesce among the enemy’s support base. This extends the conflict outside the purely military realm into the area of social cohesion.

The firebombing of Dresden and atomic bombing of Hiroshima and Nagasaki were designed to do more than kill the thousands that they did. The bombings were designed to demoralise the German and Japanese human reserve and erode civilian support for continuing the war. So it is with suicide bombers in vehicles or on foot, even if they operate in wars that are undeclared. The difference is that in one instance a warring nation-state utilises terror by extending the non-military reach of conflict via conventional military means, whereas in the other case a non-state actor uses non-conventional methods to do the same thing.

Against an agile and elusive opponent who refuses to fight in conventional symmetry, a militarily superior actor is muscle-bound. Naval fleets, strategic airpower, armoured divisions and thousands of troops are of little use against terrorists operating in dispersed, decentralized fashion in and among civilian populations. If used, they are overkill when confronted by the networked cells that are the organizational latticework of transantionalised terrorism. Sometimes overwhelming force is simply too much force given the character of the opponent and the contextual circumstance in which she is engaged. Should the irregular, unconventional actor refuse to be drawn out into conventional symmetry, the only option for a stronger conventional actor is to engage on her terms. This is the realm of Special Operations and Low Intensity Conflict (SOLIC), which in US practice has evolved new features in the form of CIA para-military squads and contract interrogators not beholden to the rules of engagement governing military intelligence and police.

This is what lies behind the US resort to torture. Along with the deployment of special forces teams and CIA squads in areas in which Islamicists congregate, the US is attempting to get down to the level of its Islamicist opponents in order to bring symmetry to the conflict. The operative belief is that if Islamicists want to play “dirty” by terrorising civilians world-wide, then the US government will demonstrate that it can bring to bear all of its power and resources on those terms. It does so by using the legal, military, administrative and political assets of a superpower to expand the range of allowable state and para-state violence while justifying and institutionalising extra-judicial treatment of terrorist suspects. Legal vetting of the wording of a variety of coercive interrogation techniques that require cabinet-level authorisation is emblematic of the US approach in that regard.

That the US releases many suspected terrorists without charge is beside the point. The objective is symbolic and systematic, or phrased differently, to terrorise in return. Those subjected to the new standard of detention and interrogations who gain release will inform others. They will detail the cruelty as well as the seemingly endless bureaucratic procedures required to seek redress, and they will expound upon their fear. What will be impressive about their stories is the banality of the reciprocal evil practiced in pursuit of “freedom,” and the sense of hopelessness and despair they felt while in its embrace. That condition of atomised infantilisation, whereby the subject is physically isolated, punished and scared while being powerless and utterly dependent on the whim of the captor, is a state of terror.

Torture of Muslims in US detention centres may inflame passions amongst Islamicist hard -liners (defined as those who will commit bodies to the conflict given sufficient provocation). Their mobilisation is justified as an acceptable variant on the honey trap theme, whereby an attractant (or provocation) prompts passive al-Qaeda cells to attempt further terrorist attacks. At that point they can be identified and hunted down, although some will wreak damage before doing so. In the scheme of things, that is held to be an acceptable cost of victory.

More importantly, public dissemination of the torture-terror doctrine will serve to dampen the passion of other would-be jihadis, and deter many who thought to join the Islamicist cause. The point is to demonstrate to the unconventional enemy and its supporters that the superpower, as well as other states, can well fight irregularly and systematically as well, if not better. After all, the most common–and effective–type of terrorism in history is state terror, not that practiced by today’s Islamicists.

This explains the why of using torture-terror as a combat weapon against terrorism. What it does not address is the issue of objective. If the objective of using torture on terrorist suspects is to extract valuable strategic and tactical intelligence from otherwise uncooperative subjects, the results have been poor. Sorting out the wheat from the chaff amid the hundreds of desperate stories told under duress by US detainees has been a difficult process, with relatively little valuable intelligence garnered from it. Thus, as a information gathering technique torture has not been a panacea for the US intelligence community, and given media exposure has become a public relations liability for the US–at least in the West. However, an alternative objective might better explain the rationale as well as the pragmatic criteria upon which to choose it.

If the objective is to wear down the will of jihadis to persist in their global armed challenge while at the same time removing their recruitment base, the systematic use of legally-sanctioned torture-terror by the US may bear fruit. In the measure that it achieves symmetry, it raises the costs of the engagement to the jihadists. In the measure that it turns the tables and weakens the will of the Islamicist irregulars to continue to fight, it will prevail over the long term. In the measure that it prevails it re-establishes the relationship between the West and “the Rest,” especially the Muslim world. In doing so it reconfigures the geopolitical landscape of the Middle East and elsewhere by extending the cultural boundaries of Western influence to the necessity of recognizing the need for symmetry in war. That, it seems, is the political syllogism underpinning the torture-terror doctrine.

Media Link: The Slater/SIS/PM’s Office OIA debacle.

datePosted on 10:30, November 25th, 2014 by Pablo

Sometimes one has to speak bluntly but honestly about unethical behaviour within the NZ intelligence community. The revelations about the way in which an OIA request from a notorious right wing blogger was handled by the then Director of Security and Intelligence and the office of the Prime Minister in 2011 affords one such opportunity to do so.

Short of taking monetary or personal favours, this is official malfeasance of the first order and is corrosive of the professional integrity of the intelligence community. Shame on all involved.

Getting real about the NZDF mission in Iraq.

datePosted on 14:25, November 13th, 2014 by Pablo

When John Key insists that any New Zealand military contribution to the anti-Islamic State coalition will be “behind the wire” in non-combat training roles, he is following a script written by the senior partners in that coalition–the US, UK, Australia, Canada and Germany. The governments of all of these liberal democracies have sworn off ground combat troops while simultaneously sending air power and significant numbers of ground-based military “advisors” to attack the Islamic State forces directly from the air and help train the Iraqi Army to fight rather than run from the Islamicists on the ground. The US already has a brigade’s (3000 troops) worth of advisors in Iraq and has asked Australia to up its contribution from the 200 Special Forces already deployed there.  The UK, Canada, Germany, France and other European states are contributing special operators as well, but always in a ”training” rather than combat role.

There are reasons to believe that the definition of the mission as “non-combat” is specious at best and a deliberate misrepresentation at worst. Here is why.

Consider this: The Prime Minister has said that he might send the SAS to help guard the bases in which conventional NZDF advisors will help train the Iraqi Army. That is akin to using a Lamborghini  to haul rubbish to the local tip.

SAS personnel are highly skilled, extremely well trained and acutely specialised in operating in hostile theatres and behind enemy lines. They are a precious military resource that takes a long time to develop into hardened professional soldiers. It costs much more to produce an SAS trooper than it does the average infantry soldier, airman or naval rating. Standing them on guard duty squanders their talents, especially when conventional NZDF personnel are quite capable of standing sentry duty while deployed (as they did in Afghanistan during the decade-long deployment to the Provincial Reconstruction Team located in Bamiyan Province).

The last time the SAS was in a publicly acknowledge training role they were serving as mentors to the Afghan Crisis Response Unit, the elite counter-terrorism squad in that country. In their capacity as “mentors” the SAS wound up leading the CRU into several battles and lost two troopers as a result. Even in the face of those deaths the National government insisted that the SAS was not engaged in combat, so perhaps it has a different understanding of kinetic environments than do most people–most importantly those who have felt the impact of hot lead during “non combat” operations.

Military deployments of any sort require time and preparation, a process that takes months. Even rapid response units like the SAS need time to get ready to deploy, and to do so they need to pre-position assets on the way and in the theater to which they are going. Yet given the circumstances, the fight against the Islamic State is an immediate concern, one that the US and other coalition partners say needs a response in a few weeks, not months.

It is not credible to assert that sending a few military planners over to Iraq twelve days ago will allow them to assess within a few weeks what the NZDF contribution should be—unless that has already been decided and it is the logistics of the deployment that are being worked out. Yet the Prime Minister says that he will wait until their return to decide what the NZDF role will be. That seems to be stretching the truth.

Beyond the possibility that Mr. Key is unaware of the role of different military units and the preparations required to deploy them abroad, the fiction of a non-combat ground role for all coalition partners is made evident by where they are going. Two thirds of Iraq and all of Syria are active conflict zones. This includes most of the North and Western provinces of Iraq well as the outskirts of Baghdad. The Islamic State continues to mount offensive operations throughout the North and West of Iraq, and controls Mosul, Kirkuk (including its oil fields) and Ramadi (the capital of Anbar Province).  Islamic State forces are laying siege to Fallujah, the scene of the most intense battle between US forces and Sunni militias during the Iraq occupation.  Although they have been slowed by coalition air strikes and suffered a few tactical defeats, the larger picture is that at present the Islamic State has momentum and is nowhere close to retreat in the areas that it controls.

That means that any coalition ground forces sent to train the Iraqi military will be based in active conflict zones and become primary targets wherever they are located. Knowing this, coalition military commanders operate with the expectation of being attacked. Coalition personnel are and will be armed at all times and confined to base or will have their freedom of movement greatly restricted while in theatre. They will travel in armed convoys or by air when moving between locations. Leave will be minimal.

These are the operational rules governing troop deployments in active war zones.

The only way to ease the combat conditions in which New Zealand troops will operate is to prepare and launch counter-offensives against the Islamic State that forces it to retreat from territory it now occupies or has infiltrated. That is a big task and not a short-term affair. Since the Iraqi Army has shown appalling lack of discipline and courage in the face of the Islamic State offensive, it is wishful to think that sending in a few thousand advisors and giving it a few weeks training is going to turn the tide. Instead, the up skilling of the Iraqi Army will be a protracted effort and will require coalition military leadership under fire. Even that does not guarantee that Iraqi troops will be willing to fight.

The reason that the Western liberal democracies are holding to the fiction of non-combat roles is that their respective electorates are weary of war and generally opposed to more of it. This is, after all, a fight amongst Sunni Arabs first and foremost, and then Sunni versus Shiia in the second instance. Although the weakness of Assad’s Alawite regime in Syria gave them their strategic opportunity, the Islamic State’s primary targets are the pro-Western Sunni Arab oligarchies. Its second target is Persian Iran and its Shiia co-religionists and proxies in the Arab world (including the Assad regime). The West (and Israel) are convenient foils for its ambitions, as the Western media plays up the atrocities perpetrated against Europeans and North Americans and the involvement of Western extremists in committing them. This allows the Islamic State to draw the West into the fight, thereby making the conflict more inter-religious and civilisational than it really is.

Although primordial in nature and capable of spawning small cell and lone-wolf attacks in the West, the Islamic State is a regional rather than global threat. It cannot project sustained force and control territory outside of Sunni-inhabited terrain in Syria and Iraq, and will have trouble defeating established professional militaries such as those of Egypt, Jordan or Turkey should it try to push further afield. It has not been able to make significant advances in Shiia and Kurdish-controlled territory. Yet media coverage and the rush of Western governments to emphasize the threat of Islamic State-inspired home grown jihadis and returning foreign fighters have exaggerated its impact.

Even so, New Zealand has principled and pragmatic reasons to get involved in the anti-Islamic State fight. The anti-Islamic State coalition includes all of New Zealand’s Middle Eastern trade partners as well as its closest security and diplomatic allies. The responsibility to protect vulnerable populations such as the Iraqi Hazaris is a matter of international principle. New Zealand will soon sit on the UN Security Council. In light of these realities it can do nothing other than join the conflict even if it is not directly threatened by the Islamic State.

Now that New Zealand has committed to participate in the military coalition against the Islamic State, it is best for the government to be forthright about the true nature of the mission and the real threats involved. Anything less is an insult to both the intelligence of the pubic as well as the valor of those in uniform who are about to join the fight on its behalf.

Temporary, discriminatory and an admission of failure

datePosted on 12:16, October 30th, 2014 by Pablo

The PM says that the legislation his government proposes to pass under urgency allowing for the confiscation of passports of NZ citizens in order to combat the threat of returning foreign fighters will be “tightly focused” on those traveling to the Middle East in order to join jihadist groups. That phrase “tightly focused” is code for “Muslim Internationalists” as opposed to, say, Christian or non-religious fighters joining in foreign conflicts in the Middle East or elsewhere.  So if Kiwis of Croatian descent were to return to their homeland to fight Serbs they would be free to do so and then return without risk of having their passports confiscated. The same goes for Christian Nigerians who wish to return home to fight Boko Haram as members of community self-defence organisations.  And of course Jewish Kiwis already do so by traveling to join the Israeli Defense Forces.

To say the least, this law is by its nature discriminatory and temporary unless the government proposes to make it illegal for anyone to go and fight for any cause anywhere. And that clearly is not what it has in mind.

More tellingly, passing such “tightly focused” legislation under urgency is an admission of failure.

On the one hand, it tacitly is telling us that criminal law, including all of the anti-terrorist legislation passed in the last ten years, is inadequate to deal with this particular type of suspected criminal enterprise (or better said, intended criminal enterprise). On the other hand it implicitly recognises that the combined resources of the GCSB, SIS, Immigration, Customs, NZDF, Police and other security agencies, as well as those of NZ’s main security partners, are unable to monitor the activities of the dozen or so Kiwis who may have jihadist pretensions, this despite the fact that New Zealand is an isolated and relatively small archipelago with no land borders and limited access or egress by air or sea, with a very small Muslim community from which potential jihadists are drawn.

Reading between the lines of the PM’s statement, it seems that the extension of antiterrorism laws, powers of search, surveillance, seizure and domestic intelligence collection over the last decade, much less the existence of a vast array of criminal law statutes as currently exit on the books, have had no impact on the ability of the NZ security community to detect, deter and/or monitor a small group of  young men interested in fighting abroad. Hence the need for more “tightly focused” laws that if nothing else violate the presumption of innocence and freedom of movement that presumably are basic rights in liberal democracies.

That makes me wonder two things: what good do the expanded security powers awarded the state during the last decade serve if they cannot fulfil the basic functions of detection, deterrence and monitoring? And what does that say about the competence of the agencies whose powers have been expanded given New Zealand’s geopolitical location?

The answers are simple: none and a lot.

Beware the sucker ploy.

datePosted on 09:04, October 24th, 2014 by Pablo

A few years back I wrote about the strategic utility of terrorism. One thing I did not mention in that post was the use of a tried and true guerrilla tactic as part of the terrorist arsenal: the sucker ploy.

In guerrilla warfare the sucker ploy is a tactic whereby the weaker irregular forces stage an incident in order to provoke an over-reaction from their stronger adversaries. Examples include killing a local official so as to have the security forces engage in mass repression of the people in the locality in which he worked. Another is firing at enemy aircraft or armour from inside villages in order to have them retaliate indiscriminately against the entire village. The objective is to alienate and erode support for the enemy by the victims.

For the last five years or so, the international jihadist movement spearheaded by al-Qaeda and now the Islamic State have evolved their tactics to suit the strategic environment they are confronted with. No longer able to carry out large scale attacks such as 9/11 or the Bali, London and Madrid bombings, would-be jihadists have been encouraged to engage in self-radicalised “lone wolf” or small-cell attacks within their respective countries using their familiarity with the local terrain and knowledge of local customs and symbology. These are low level, highly independent and autonomous operations, as was seen in the Boston Marathon bombings last year.

Attacks of this nature are tactically opportune but strategically insignificant. They do not present an existential challenge to any established state. By themselves they are tragic but politically inconsequential.

The motives and desired impact of the perpetrators may differ from those of the Islamicist leadership. Perpetrators may wish to strike a blow and sow localised fear while achieving martyrdom. The Islamicist leadership desires a strategic victory. The only way that it can do so is to use these types of attacks as a sucker ploy.

If governments respond to lone wolf and small cell low level terrorism with blanket increases in mass surveillance, national threat levels, expansion of security and anti-terrorism laws and restrictions on freedoms of association, movement and speech by groups associated with the perpetrators by virtue of religion, ethnicity or the like, then the strategic objectives of the Islamicist leadership are being served. That is because such measures target innocents, not only on an indiscriminate mass scale but often because of who they are rather than anything they have done. That further alienates and marginalises previously passive but increasingly disaffected sectors of society, thereby delegitimising governmental authority while breeding new recruits to the cause.

The temptation for democratic governments responding to such attacks to engage in large scale security tightening is overwhelming, which is of course what the Islamicists are banking on. The public needs reassurance, security agencies see opportunity and conservative politicians want their pound of flesh. Few opposition politicians want to appear soft on the threat of terrorism,  much less by opposing moves to “tighten” security in the wake of lethal attacks in the West motivated by Islam. But that urge, even if given carte blanche by the media-fed hysteria of the moment, needs to be tempered with a broader perspective and deeper analysis of what is at play.

Of course security measures need to be in place in order to thwart such low-level attacks. In Ottawa they clearly were not. But this is no excuse to engage in a knee-jerk over-reaction that results in the type of divisive measures that serve the purposes of the Islamicists more than the population at large. To do so is to fall into the trap set by the Islamicst leadership when they ordered the shift in tactics towards decentralised low level operations conducted by “home-grown” jihadis.

A couple of points worth mentioning: The Canadian threat environment and exposure to Islamic terrorism is different and greater than that of New Zealand and has been for some time. IS had directly threatened Canada before the attacks because Canada has actively joined the conflict by sending ground attack aircraft and special forces troops to the fray.

The perpetrators responsible for this week’s crimes were not returning from the killing fields of Syria or Iraq. They were native born Quebecois, evidencing mental halt issues, with prior criminal records who were known to the Canadian authorities. They were recent converts to Islam, one of whom had been placed on a so-called “watch list” and had his passport revoked because of his overt Islamicist sympathies. The other, a recovering drug addict, was waiting for a passport application to be processed, was living in a half way house, and was frustrated by the delays in securing the passport.  Unable to leave Canada, both turned their murderous gaze inwards.

This should serve as a lesson on several levels. But the foremost one is simple: beware the sucker ploy.

Media Link: The revolution will not be televised.

datePosted on 15:01, October 23rd, 2014 by Pablo

I had the opportunity to do a long interview with Olivier Jutel, host of the Dunedin Radio One show “The revolution will not be televised.” It is a rare occasion when one gets to converse at length about a variety of subjects on radio or television, so this was a nice opportunity to air my views on a number of issues, to include the conflict with the Islamic state, New Zealand’s potential role in it, fear mongering as a political strategy, the impact of social media on political behaviour, etc.

The podcast can be found here.

Lying, clueless or incompetent.

datePosted on 15:45, October 15th, 2014 by Pablo

A meeting of the unformed military leaders of 22 countries involved in the anti-Islamic State coalition gathered today at Andrews Airforce Base outside of Washington DC. The participants included the 5 Eyes partners, Denmark, Germany, France, Italy and Spain, seven Arab states, other NATO countries and Turkey. New Zealand was represented by the Chief of the Defense Forces Lt. General Timothy Keating.

John Key says that this is just a regular annual meeting of military heads. I think not.

First, regular annual meetings of uniformed defense leaders are highly symbolic affairs with much protocol, pomp and circumstance. When hosted by the US they are held at the Pentagon, which has a ceremonial entrance (the East steps) and E-Ring conference rooms for such events (the E Ring is the outer ring of the Pentagon where the Secretary, Joint Chiefs and military service leaders have their offices). The meetings are generally regional in nature as befits the concerns of the chiefs involved. I know this because I was involved in organising such meetings for Latin American defense chiefs in the early 1990s and know that the protocols are the same today.

Working meetings of US-allied military leaders are subject specific and sometimes inter-regional in nature. They are held on military bases with minimal ceremony. They generally address the specifics of carrying out assigned roles and missions within a policy framework established by the political leadership of the countries in question. They usually do not include Defense Ministers, presidents or prime ministers because they are about implementation not authorisation.

The meeting at  Andrews Air Force Base has four interesting features:

1) President Obama addressed the coalition military chiefs. That is highly unusual because it means he is expending political capital and his reputation on the event. He cannot walk away empty-handed because he will suffer a loss of face and credibility and home and abroad, so something substantive has to come out of the meeting;

2) That mainly involves Turkey. Turkey has not committed to the fight against IS until it has two demands met: the removal of the Assad regime by the coalition and acceptance of Turkish attacks on Kurdish (PKK) forces on the Syrian-Turkish border (in a two birds with one stone approach). The other coalition partners do not want to accept these demands, at least until IS is defeated, so the stage is set for some serious wrangling over Turkish involvement in the coalition. Without Turkey fully on-board, it is quite possible that the coalition will unravel and a reduced number of countries will have to go it alone without close regional support (which could be a disaster);

3) The presence of Bahrain, Egypt, Jordan, Kuwait, Qatar, Saudi Arabia and the UAE is important. The meeting may signal the first time that they agree to commit military forces and fight together in the Middle East against a common enemy. Their presence gives the coalition credibility in the Muslim world;

4) New Zealand is represented at the meeting, yet is the only country that publicly maintains that it has not yet decided to contribute  troops.

This is where the PM’s remarks are odd.

If New Zealand was still negotiating its participation it would have sent a contingent led by a senior diplomat, not a military officer. The negotiations over participation would not take place at Andrews Air Force Base or the Pentagon but at the State Department or White House.

The Islamic State is not  only about to gain control of the Syrian Kurdish border town of Kobali, but have advanced on the outskirts of Baghdad. It controls Mosul, Kirkuk and Ramadi. It is a clear and present danger to the territorial integrity of Iraq. To avoid the partition of Iraq action against it must be taken immediately. Yet Prime Minister Key says that he would like to defer a decision until sometime before the APEC meetings next month. That simply is too late to wait to make a decision given the circumstances.

It turns out that Mr. Key did not know that President Obama attended and addressed the meeting. He says that General Keating will report back on what was discussed, which Mr. Key says will cover a wide range of topics. But the Pentagon has stated that the meeting is solely focused on hashing out a military strategy with which to defeat the Islamic State.

It beggars belief that Mr. Key did not know that Obama was going to be at the meeting, or that he thinks it is one of the regular shmooze fests that pass as senior leadership meetings. So one of three things is possible:

Either he knows full well what the meeting is about and is deliberately lying to the NZ public about NZ’s role in the coalition; he is clueless about the nature of the meeting but does not care; or he is simply incompetent and unsuited to be Minister of National Security.

Take your pick.

 

Some years ago I ran afoul of the 5th Labour government because I speculated in public that some of our diplomatic personnel and embassies might double up as intelligence collectors. This was in reference to the Zaoui case and the role played by then SIS Director Richard Woods, who had been ambassador to France and Algeria at the time Zaoui went into exile in France from Algeria. Woods claimed that he had never heard of Zaoui until the latter arrived seeking refuge in New Zealand, and that he had never been to Algeria during his entire time as ambassador to that country. I found that a bit hard to believe on both counts and wondered aloud if, to maximise efficiencies given small budgets and manpower, Woods and others worked a bit beyond their official credentials.

The fact that embassies serve as intelligence collection points is not surprising or controversial. After all, it is not all about diplomatic receptions and garden parties. Nor should it have been entirely surprising that the possibility existed that some NZ diplomats held “official cover” as intelligence agents. That is, they were credentialed to a specific diplomatic post, held diplomatic passports and immunity based on those credentials, but were tasked to do more than what their credentials specified (for example, a trade or diplomatic attache working as a liaison with dissident or opposition groups or serving as a handler for a foreign official leaking official secrets). Rather than scandalous, this is a common albeit unmentioned aspect of human intelligence gathering and my assumption was and is that NZ is no different in that regard.

Prime Minister Helen Clark erupted with fury at my comments, saying that I was unworthy of my (then) academic job. I received a scathing letter from the then State Services Commissioner saying that I put New Zealand diplomats in danger. Most interestingly, I received a phone call at home from someone who claimed to be with the then External Assessments Bureau (now National Assessments Bureau) repeating the claim that I was putting lives in danger and suggesting that I should desist from further speculation along those lines (although he never refuted my speculation when I asked him if I was wrong).

Given that background, it was not surprising but a wee bit heartening to read that the Snowden leaks show that NZ embassies are used by the Five Eyes network as tactical signals intelligence collection points. That is, the embassies contain dedicated GCSB units that engage in signals gathering using focused means. This is different and more localised targeting than the type of signals collection done by 5 eyes stations such as Waihopai.

There is much more to come, but for a good brief and link to the original article on this particular subject, have a wander over to No Right Turn.

Double Trouble.

datePosted on 13:03, September 15th, 2014 by Pablo

Glenn Greenwald’s arrival in NZ has reignited controversy over who, exactly, the GCSB spies on, how it does so, and for whom it does so. Tonight he will outline what he has gleaned from the Snowden leaks, and I have no doubts that what is revealed will be of serious consequence. The impact will be twofold.

So far, most attention has focused on the domestic side of the equation, in the form of claims that the GCSB, in concert with its 5 Eyes partners, conducts mass surveillance of New Zealand citizens and residents. The way it does so is to tap into the broadband infrastructure in order to extract so-called “metadata,” that is, the key identifiers of cyber messages such as time, sender, internet addresses and geographic locations of those communicating, etc. This information is stored and later subject to data mining from technologies like X Keyscore, which searches for keywords and phrases that can justify opening the metadata in order to reveal the contents of the messages identified by the data-mining technologies.

In simple terms, it is like going to people’s postboxes and recording all of the identifying features of their mail without opening the mail itself unless key identifiers allow the government to do so.

The government maintains that a) it does not collect metadata on New Zealanders and NZ permanent residents; and b) that collecting metadata is not equivalent to mass surveillance in any event since the contents of the messages from which metadata is extracted are not accessed unless there are reasons of national security to do so, and this occurs only in a handful of instances.

The reality is that because of a gentleman’s agreement between the 5 Eyes partners, metadata of the citizens of one partner state is accessed and collected by one or more of the other partners and only sent to the originating state if data-mining indicates that there is reason to open the contents of specific metadata “packages” concerning citizens or residents of that state. In this way the originating state government can claim that it is not engaged in mass surveillance of its own citizens or residents.

That may be parsing the meaning of “mass surveillance” beyond useful construction, but it does allow the government to deny that it conducts such mass surveillance on technical grounds–i.e., metadata is not the same as a private communication because it has no content.

The problem with such specious reasoning is that it violates two foundational tenets of liberal democracy: the right to privacy and the presumption of innocence. If it is considered an untoward invasion of privacy for the government or others to systematically rifle through and record the identifying features of correspondence in people’s mail boxes, then it is equally a violation of  citizen’s rights to privacy for the government to electronically collect and store their cyber metadata.

Moreover, the mass collection and sharing of metadata by 5 Eyes intelligence agencies violates the presumption of innocence that citizens of democracies are supposedly entitled to. That is because the metadata is collected without cause. The government does not have a specific reason, suspicion or motive for collecting metadata, it just does so because it can under the aegis of “national security.” It then subjects this metadata to data-mining in order to find cause to conduct more intrusive searches of the contents.  It is, in effect, trawling through everyone’s cyber communications in order identify and presumably counter the nefarious behaviour or plans of some individuals, groups or agencies.

This strikes at the heart of democracy. Yet the remedy is fairly simple. Under legal challenge the government can be forced to show cause for the collection of metadata of its citizens and residents. If it cannot, then the courts can deem such collection to be illegal in all but the most exceptional circumstances. With that judgement–and I very much doubt that any High Court would find it reasonable or permissible to engage in mass metadata collection without cause–intelligence agencies are put on notice and henceforth proceed with metadata collection and sharing at their peril.

In contrast to the attention directed at the issue of mass surveillance, there is a far more damaging side to Greenwald’s revelations. That is the issue of the GCSB and 5 Eyes espionage on other countries and international agencies such as the UN or non-governmental organisations as well as foreign corporations, financial institutions, regulatory bodies and the like. Such external espionage is part of traditional inter-state intelligence gathering, which includes economic, military and political-diplomatic information about targeted entities.

Judging from what has already been revealed by the Snowden leaks with regard to the external espionage activities of the other 5 Eyes partners, it is very likely that Greenwald will reveal that NZ, through the GCSB in concert with 5 Eyes, spies on friendly or allied states as well as hostile state and non-state actors such as North Korea and al-Qaeda. This may include trade or diplomatic partners. It could well include economic or commercial espionage.

The impact of such revelations will outweigh the repercussions of the domestic surveillance aspects of the Snowden leaks. With the nature and extent of NZ’s espionage made public, its reputation as an independent and autonomous “honest  broker” in international affairs will be shattered. Its pursuit of a UN Security Council seat could well go up in smoke. But above all, the response of the states that have been and are targeted by the GCSB will be negative and perhaps injurious to NZ’s national interests. The response can come in a variety of ways, and can be very damaging. It can be economic, diplomatic or military in nature. It could involve targeting of Kiwis living in in the states being spied on, or it could involve bans or boycotts of NZ exports. The range of retaliatory measures is broad.

Unlike the other 5 Eyes partners, NZ has no strategic leverage on the states that it spies on. It is not big, powerful or endowed with strategic export commodities that are essential for other countries’ growth. Yet it is utterly trade dependent. Because of that, it is far more vulnerable to retaliation than its larger counterparts, especially if it turns out that NZ spies on its trade partners.  Imagine what will happen if it is revealed that NZ and the other 5 Eyes partners spy on TPPA  members in order to secure advantage and coordinate their negotiating strategies (keeping in mind that Australia, Canada and the US are all TPPA parties). What if if NZ spies on China, its biggest trade partner, at the behest of the US, with whom China has an increasingly tense strategic rivalry? What if it spies on Japan, Malaysia, Chile, Iran, India, Russia or the UAE? What if it spies on the Pacific Islands Forum and other regional organisations? What if it spies on Huawei or some other foreign corporations? Again, the possible range of retaliatory options is only surpassed by the probability that they will be applied once NZ’s espionage activities are made public.

In light of this it behooves the government to make contingency plans for the inevitable fallout/backlash that is coming our way. I say “our” rather than “their” because the response of the aggrieved parties will likely have, be it directly or as a trickle-down effect, a negative impact on most all Kiwis rather than just this government.  But so far the government has indicated that it has no contingency plans in place and in fact has adopted a wait and see approach to what Greenwald will reveal.

If so, it will be too late to mitigate the negative external impact of his revelations. And if so, that is a sign of gross incompetence or negligence on the part of the PM and his cabinet because they have known for a long time what Snowden took with him regarding NZ (since the NSA shared the results of its forensic audit of the purloined NSA material once Snowden disappeared). It therefore had plenty of time to develop a plan of action whether or not Greenwald showed up to be part of Kim Dotcom’s “Moment of Truth” event.

All of which means that, if Greenwald delivers on his promises, New Zealand is in for a very rough ride over the next few months. That, much more so than Dotcom’s quest for revenge against John Key, is why tonight’s event could well be a signal moment in NZ history.

123... 111213Next