Crying wolf on terrorism for political gain.

The merit of a proposition can be judged by the strength of the argument in support or defense of it. In the case of the proposed changes to the GCSB and TICS Acts, the government’s argument has basically reduced to claims that terrorists will strike if the bills do not pass, perhaps even using weapons of mass destruction. More than an argument in favor of the bills, it is a sign of desperation on the part of a government unwilling to level with the public on its real intent.

To begin with, counter-terrorism is a very small part of what intelligence agencies do. Ninety percent of intelligence collection and analysis, to include its sub-set of electronic espionage and counterespionage, is focused on traditional corporate, diplomatic and military intelligence gathering. That is true for the Five Eyes/Echelon signals intelligence network and even more so for countries that are not on the front lines of the so-called War on Terrorism.

Yet countering “terrorism” has become the buzz word used by politicians to justify the expansion of the security apparatus in all its forms, to include the militarization of police functions and extension of powers of search and surveillance. It is the fig leaf that covers a multitude of sins perpetrated by the state in the name of national security.

This is an important point because as nasty as it is, terrorism is not an existential threat to any established state, much less a consolidated democracy. Viewed objectively, it can be properly seen is a crime of violence most often carried out as an irregular warfare tactic for ideological reasons. In the hands of non-state actors it is a weapon of the militarily weak that cannot be used regularly and systematically against a broad array of targets in the face of state enforced counter-measures. Although impossible to eliminate in its entirety, especially in its small cell or lone wolf application, this type of terrorism (i.e. in John Key’s airport bomb hypothetical) is a type of criminal violence best handled by the police using the intelligence made available by human as well as signals and technical intelligence agencies.

That may or may not involve electronic eavesdropping of a targeted sort. What is not needed to counter terrorism is blanket adoption of draconian security laws that restrict individual and collective freedoms, including the right to privacy. Oppressing the majority out of fear of an extremist few is counter-productive for no other reason than doing so plays into the hands of the aggressor.

In any event New Zealand is not on the front line of the War on Terrorism. Its threat environment is different than that of Australia, the UK and the US. It is more akin to (yet less than) that of Canada, and it is telling that Canada has resisted moves to closely align its domestic intelligence gathering powers with that of its Northern Hemisphere partners. The Canadians well understand the hierarchy of threats confronting them, and in light of that have shied away from the type of legislation currently being proposed in New Zealand.

If anything, the Canadian government knows that closer public alignment with the US and UK on security issues invites greater risk of attack from those engaged in armed conflict with them. It also understands that what irregular threats exist for Canada, they are more likely to be internal and related to domestic policy issues than external in origin or manifestation. New Zealand is similar in both regards.

What this means is that the specter of terrorism raised by John Key is a dark chimera that has little connection to New Zealand’s real threats, but which is used to defend the passing of security legislation that is more appropriate for the threat environment in Pakistan or Yemen than that of the South Pacific.

In recent years cyber espionage has become the predominant form of signals intelligence threat, to include that in New Zealand. The focus of attention of Five Eyes and other signals intelligence agencies is increasingly on fiber optic cables, routers, switches and the computers that use them, as opposed to radio and satellite intercepts (even if the latter remains a priority for Echelon). In pursuit of effective counter-measures, the Echelon partners have developed sophisticated labor-savings software such as PRISM and XKeyscore that filter the first cut on zillions of bytes of electronic data (the so-called meta-data), thereby making it easier for human analysts to target specific communications based upon keywords, phrases and usage patterns.

This mass trawling through personal as well as institutional electronic communications is indeed efficient, and not problematic for countries under non-democratic rule, but poses a problem for liberal democracies where the right to privacy and presumption of innocence go hand-in-hand as the bedrocks of citizenship.

Cyber espionage in New Zealand is mostly but not exclusively perpetrated by foreign state and non-state actors seeking to access sensitive corporate, political and security information. This includes back-door access via personal computers and electronic devices into work computers of targeted sectors. Since New Zealand has the most porous internet security of the Five Eyes partners and because its economic and political decison-making elite is relatively small in comparison, it is considered to be the weak link in the network by adversaries and allies alike.

Be it by groups such as Anonymous or by state agencies such as Chinese military intelligence (and there are many others), it is estimated that New Zealand computer networks are probed dozens of times a year (at least as far as what has been publicly admitted by the government). Thus the interest in increasing the GCSB’s cyber-securty function in order to bolster the defensive aspect of local cyber intelligence (targeted hacking of foreign networks being the offensive side).

The hard fact is that cyber espionage and counter-espionage is the newest and increasingly most pervasive form of spying and is here to stay, so New Zealand has to lift its game in that field of play.

This is the real reason why the Bills have been introduced. The trouble is that they contain a very strong offensive aspect to them, in part owing to the blurred nature of cyber espionage that does not conform easily to the foreign versus domestic dichotomy traditionally used to partition internal from foreign intelligence gathering. Threats now are seen as “glocal” or “intermestic,” and thus offensive cyber intelligence operations are run side-by-side with domestic counter-intelligence (defensive) work. That includes meta data mining on home soil, and the sharing of that data with Echelon partners.

Rather than honestly reveal the true reasons why the amendments to the GCSB and TICS Acts are being proposed, the National government has resorted to the old canard about terrorism. It may be doing so because it is undiplomatic to point out that its second largest trade partner has been accused by New Zealand’s strongest security and intelligence partners of being the source of most cyber attacks on their respective and shared computer networks. It may be doing so because it assumes that most people simply do not care about issues of security and intelligence, and it might be right. But whatever its rationale, its proposals are way over the top given the realities of New Zealand’s position in world affairs and its history as a democratic polity.

There is much more that is wrong with the New Zealand intelligence community–the lack of effective and independent oversight, the political manipulation of intelligence flows, the overly broad definition of national security and threats to it being foremost amongst them. It is therefore not surprising that in the very framing of the debate about the GCSB and TICS Bills, the government has resorted to bluster and fear-mongering rather than outline the real thrust of its changes.

That is a pity. Had it done so it might have been able to reach a compromise on cyber security more appropriate for a small liberal democracy on the periphery of the major conflicts of our times. However, as things stand New Zealand is about to be saddled with a cyber-security apparatus apparatus more similar to that of Singapore than those of Belgium, Norway or Uruguay.

That pretty much says it all about how National views the world.

 

Three perspectives on the spy bills.

Selwyn Manning has done a Q&A with three individuals who have different and at times conflicting views of the GCSB and TICS Bills, although all three are critically opposed to the bills in their present form. One is a strategic analyst, one is an internet entrepeneur and one is an IT lawyer. John Key may dismiss them as uninformed, politically motivated or holding some hidden agenda, but their differing takes on the issue may make for some food for thought for KP readers.

The Q&A can be found here.

Note to John Key: Zaoui was innocent.

Once John Key realized that his efforts to expand state spying powers were not meeting with the usual docile approval on the part of the public, he retreated to his usual habit of spinning alarmist tall tales (The terrorists are here! The terrorists are in Yemen but coming back!) and smearing his detractors. Some time ago it was Jon Stephenson and Nicky Hagar who got the smear treatment over their coverage of NZDF, SIS and GCSB activities in Afghanistan, with Key dismissing them as liars and conspiracy theorists. Now he has threatened the Human Rights Commission because of its opposition to the GCSB and TICS Bills and dismissed the Law Society’s objections as politically motivated.

His comments about the Law Society are revealing, because he has launched a personal attack on Law Society spokesperson Rodney Harrison QC for being part of Ahmed Zaoui’s legal defense team. Here he has outdone himself on the sniveling weasel scale, because he not only makes it appear that Harrison was somehow wrong to help Zaoui defend himself against claims that he was a terrorist, but he smears Zaoui himself in the process.

Let us be very clear: Ahmed Zaoui was never a terrorist, nor did he knowingly associate with terrorists. He was a member of a legitimate Algerian opposition movement in exile who were forced out of their homeland after a military coup that deposed the democratically elected government that they were part of. Because his political activities in exile made host governments in Europe uncomfortable (governments with close ties to the Algerian military regime), he was forced to undergo two politically motivated sham trials in France and Belgium and when that did not stop him from continuing his political work, to involuntarily globe trot in search of security for himself and his family after his residency permits were canceled.

After stints in Burkina Faso and Malaysia, and with the Algerian secret services on his tail, he made his way to New Zealand and requested political asylum. For that he was jailed, held in solitary confinement for nearly a year in a maximum security prison, spent another 14 months in a medium security prison before being granted bail, and in all was forced to undergo five years of legal wrangling before his refugee request was granted (a request that was initially approved by the Refugee Status Appeals Authority in August 2003 but opposed by the SIS). His treatment by the Clark government was abhorrent.

Let us also be clear that the terrorist claims against Zaoui were manufactured by the SIS, sometimes in amateurish fashion (such as the so-called “casing” video that detailed his travels through Southeast Asia before embarking on a plane bound for New Zealand). The director of the SIS at the time, the duplicitous ex-ambassador and self-admitted Francophile Richard Woods, orchestrated a campaign of smears and falsehoods against Zaoui so as to keep in the good graces of the French government, a project that he had begun during his posting to the New Zealand embassy in Paris (as ambassador to France and Algeria) in the mid 1990s. Wanting to look tough on terrorism post 9/11, the Clark government aided and abetted Mr. Wood’s character assassination project, and it is to its everlasting shame that it did so.

In the end, the accusations against Zaoui were thoroughly and systematically discredited by Mr. Harrison and his legal team, and the SIS was forced to rescind the security risk certificate issued against him. In September 2007 he was granted asylum and the following month his wife and four children joined him. He is now a small businessman living with his family in Auckland.

This is why John Key is behaving like a sniveling weasel. In order to garner support for his spying bills he has played on latent anti-Muslim prejudice and fears of terrorism long after the Zaoui case ended to make it appear that Zaoui was guilty of something and that Mr. Harrison was wrong to defend him.

Yet the truth is quite different: Mr. Zaoui was an innocent man wrongly accused for political and diplomatic reasons by the New Zealand authorities of crimes he never committed. Mr Harrison was one of the champions who defended Zaoui against the gross injustice perpetrated against him by the State. Both men displayed integrity and steadfastness of purpose in the face of concerted official duplicity and malice.

If nothing else, Mr. Key’s cynical revision of historical events for scare-mongering purposes, set against the backdrop of SIS dishonesty in the Zaoui case and the GCSB illegal wiretapping of Kim Dotcom, should be added reason why the GCSB and TICS Bills need to be resisted. After all, if this is how the Minister of Intelligence and Security and his agencies operate under current law, what does that say about what they could do with expanded powers?

One thing is certain. Of the three men involved in this story, one cannot be trusted to act with honesty and integrity in the face of adversity. That person is not Ahmed Zaoui or Rodney Harrison, QC.

Better to pause than to rush.

The Parliamentary Select Committee hearings on the Bills to amend the 2003 GCSB Act and 2004 Telecommunications (Interception Capability and Security) Act have begun this week. There is much interest in the hearings not only because of the content of the Bills under consideration, but also because they are open to the public. The cast of characters scheduled to present is as colorful as it is deep: Kim Dotcom, the CTU, the Law Society, Internet NZ and several telecommunications firms are among those representing.

Even so, some of the public discussion surrounding the proposed reforms has been stunningly stupid. In recent weeks the Herald featured two editorials supporting the proposed changes. The first claimed that the changes would help prevent a Boston Bombing scenario (a claim that the Prime Minister has parroted; Winston Peters prefers to use the train station bombing hypothetical). That ignores the fact that US intelligence agencies could not do so even with their massive meta data-mining schemes and a tip from Russian authorities. Nor could they prevent the Fort Hood massacre even though the perpetrator was in regular email contact with an al-Qaeda leader in Yemen prior to the shooting.

Worse yet, the Prime Minister and others such as this editorial writer make it seem as if counter-terrorism is the primary function of intelligence operations. It is not. Traditional inter-state espionage, no matter what the technologies used, remain the major part of intelligence work. The counter-terrorism angle provides a convenient fig leaf for the expansion of intelligence networks and the scope of their authority, but in reality occupies a relatively small amount of intelligence resources and attention. This is particularly true for countries that are not on the front lines of the so-called “war on terrorism.”

The second editorial, by a supposed former intelligence officer, claimed that those who oppose the Bill are scaremongers and uninformed, even though the Law Society, Internet NZ and several other professional groups have registered their opposition on legal as well as technical grounds. The author also asserted that because civil servants drafted the proposed changes, we should accept them in good faith. Yeah right.

I beg to differ. There is clearly a need to “tidy up” the legal framework governing GCSB activities on home soil because under the current Act the role of the GCSB in domestic espionage is murky. But civil libertarians and privacy rights activists have legitimate reason to oppose the GCSB Bill in its present form.

The Bill expands the terms and conditions under which the GCSB can engage in domestic espionage, including reasons that have nothing to do with national security and for agencies unrelated to it. Those responsible for issuing the warrants under which the GCSB would “assist” domestic agencies would be those who currently do so, in a cross-signed fashion in the case of spying on New Zealand citizens and residents. If the targeted entity falls under the foreign intelligence collection mandate of the GCSB (which targets “foreign entities,” in New Zealand, including private firms as well as diplomatic missions), warrantless intercepts can be authorized even if they extend to New Zealanders.

In light of past excesses and mistakes it is evident that leaving warrant issuance to the Prime Minister and a retired judge (the Commissioner for Security Warrants) is pure folly even when done in combination. These are the individuals who were on watch during the Dotcom raid and, in the case of the Prime Minister, claimed ignorance after the fact as to how and why the GCSB became unlawfully involved in it.

The definition of threat to national security under which the GCSB would act is too nebulous and broad to prevent mission creep into common law enforcement and encroachments on individual and group privacy. For example, under the proposed legislation the GCSB could assist the Department of Primary Industries to spy on environmental activists on behalf of fishing, logging or mining interests if their protests were deemed injurious to the economic well-being of the nation, which can be construed as a threat to national security under current definition of the term.

The oversight mechanisms proposed by the Kitteridge Report are a veneer on what currently exists. Even if bolstered by a Deputy and some additional clerical staff and funding, the Inspector General of Intelligence and Security is simply too dependent and too powerless to effectively serve as the overseer of the New Zealand intelligence community. Absent effective independent oversight such as that which could come by making the Inspector General’s office a Department of Parliament responsible to a Parliamentary Committee with powers of compulsion under oath, the room for unaccountable manipulation of intelligence flows and analysis remains great.

The Telecommunications (Interception Capability and Security) BIll that accompanies the GCSB Bill is more draconian than similar legislation under the US Patriot Act. It compels telecommunications companies to provide access to their source and encryption codes (that is, provide warrantless access before the fact to private accounts when no threats are evident). It authorizes GCSB espionage operations without the consent of affected private entities as part of its “information assurance and cyber assurance” function, which is designed to safeguard a broadly defined information infrastructure consisting all forms of telecommunications emissions, systems and networks. In other words, one way or another the GCSB would have the ability to surreptitiously monitor all New Zealand based telecommunications regardless of whether or not they involved clear threats to national security.

Since New Zealand is not a major target of inter-state cyber espionage or in the so-called war on terrorism, that is an overreach. India, Brazil, Italy, Spain, Canada, Germany and many other democracies who arguably are much more at risk for espionage and terrorism do not have such legislation. In most the separation of foreign and domestic espionage is made quite clear in law, with the latter carried out mostly by the Police, national gendarmes or local investigative agencies with help from foreign-focused intelligence agencies only in the most exceptional circumstances (even then, agencies like Interpol exist as the first line of recourse used to facilitate international crime investigations).

What is the problem in requesting voluntary telecommunications company cooperation with national security investigations, particularly when they are clearly focused on clear and present threats? What telecommunications provider would refuse such a request, especially if issued under warrant specifying the reasons? If such a system works for the countries mentioned above, why can it not work here?

The official presumption in the T(ICS) bill that telecommunications firms need to be compelled rather than be allowed to voluntarily cooperate with intelligence agencies on matters of national security says more about the disposition of the government than it does about that of the firms involved.

By expanding the GCSB’s domestic “assistance” role in two capacities (information assurance and cyber security to public and private entities as well as technical assistance to sister agencies), the proposed changes run the risk of deviating it from its main foreign signals intelligence and counter-cyber espionage efforts. It will add a further burden to it’s already stretched staff of analysts, engineers, linguists and cryptographers. Since increased funding and recruitment are circumscribed by the present climate of fiscal austerity, it does not appear likely that resources for the GCSB will be increased commiserate with the increase in its domestic assistance authority.

Interestingly, the GCSB and T(ICS) Bills were proposed soon after issuance of the Kitteridge Report on the GCSB, which was driven by the unlawful electronic monitoring of Kim Dotcom and associates by that agency. Given the level of detail in the Bills, that suggests that they were drafted before Ms. Kitteridge’s findings and recommendations were finalized. This contradicts the government’s claim that the Bills came in response to the findings of that report.

In a world in which threats are increasingly “intermestic” or “glocal” in nature and in which the boundary between national law enforcement and international security is increasingly blurred, there is reason to adjust the legislative apparatus governing the role, scope and functions of the New Zealand intelligence community, including its international commitments. At present the GCSB and sister agencies appear rudderless, unsure of who and what purpose they serve, much less how they should prioritize their essential responsibilities.

This is why a full inquiry into the New Zealand intelligence community is needed before any reforms are made to its legal architecture, especially given that the last review of New Zealand intelligence operations occurred in the 1970s.

The inquiry could well start with exploring what New Zealand’s threat environment consists of now and in the near to medium future, including proximate and distant threats of a physical (environmental and epidemiological), economic, military, diplomatic and criminal nature. It could then turn to outlining the specific meaning of “national security” in light of these threats (with the balance between minimalist and expansive definitions of national security needing to be debated and precisely defined).

It might consider how current policy decisions or orientations can set the stage for the emergence or facilitation of future threats (such as by trying to play off trade and security relations with competing great powers as a form of hedging or strategic balancing act). Having done that, it could proceed to review the way in which the intelligence community operates so as to offer prescriptions for its better tailoring to the threat environment extant and foreseeable.

Much has happened since the last intelligence review, both in terms of the nature of national security threats as well as the technologies they employ and those used to counter them. It is therefore prudent to pause and review how New Zealand intelligence operations are conducted rather than rush to pass legislation that retroactively exculpates past unlawful behavior by the GCSB while expanding the reach of those who authorized it.

 

A short version of this essay appeared in the New Zealand Herald on July 2, 2013 under the title “GCSB bill going too far too fast.”

Withdrawal from Echelon: a realistic watershed moment in intelligence reform or Left political posturing?

In light of the attention brought to matters of intelligence collection and analysis in recent months, it is entirely reasonable for the Greens and Labour to demand a fill inquiry into the organization, role and functions of the New Zealand intelligence community, including its responsibilities and obligations in international intelligence networks such as Echelon/5 Eyes and other less publicized arrangements. As the Kitteridge Report noted with regard to the GCSB and what the Zaoui case demonstrated in the case of the SIS, there were or are serious deficiencies in both agencies. These are as much if not more managerial than operational, but the truth is that a review of the entire intelligence community is overdue in light of the changing realities of intelligence gathering in the 21st century.

That is why the National government’s attempt to pass reforms to the 2003 GCSB Act that extend its domestic powers and scope of authority, coupled with the proposed Telecommunications (Interception Capability and Security) Bill that would, among other things, force telecommunications firms to provide backdoor access to their source and encryption codes, needs to be delayed until such time a proper inquiry into the entire espionage complex is undertaken. Without full understanding of areas of strength and weakness in the system, it is impossible to knowledgeably address the proposed reforms in the way signals intelligence is gathered and used in and by New Zealand, much less how it should be balanced against rights to privacy and institutional accountability.

As part of the calls for the inquiry, some on the Left have proposed that a review of New Zealand’s participation in Echelon be undertaken. Some have gone so far to say that it could become another watershed moment such as that surrounding the 1985 non-nuclear declaration. Presumably the watershed would be occasioned by a withdrawal from Echelon.

As much as I think that a review of New Zealand’s role in Echelon is welcome, especially in light of the Kim Dotcom case and recent revelations about mass scale meta-data mining by the US National Security Agency (and the meta-data mining by the GCSB revealed by the Kitteridge Report), I think that it would be absolute folly to withdraw from Echelon. Changes in the terms and conditions of New Zealand’s participation in Echelon may be warranted, but a full withdrawal from the signals intelligence-sharing community composed of the US, UK, Australia, Canada and NZ seems foolish.

I will not reiterate here the early warning, big picture and deep insight benefits that NZ accrues from being an Echelon partner. What I will note is that it has been a partner in Echelon for more than three decades, and as such shares some of the most guarded secrets, both historical and contemporary, of the Anglophone intelligence community. This includes methods, technologies, locations and sources for signals intelligence collection as well as the content of specific subjects of interest.

The Echelon partners will take a very dim view of these secrets suddenly becoming insecure as a result of a NZ withdrawal from Echelon. No matter what assurances may be given or what phased devolution of responsibilities is proposed, they are bound to fret about classified Echelon information falling into hostile hands as a result of that decision. That will likely prompt a full scope defensive counter-response to minimize the possibility of damaging or sensitive material falling into the “wrong” hands.

That response will far outweigh the diplomatic estrangement caused by the non-nuclear declaration (which ultimately amounted to a freeze on bilateral military-to-military contacts but which did not alter intelligence sharing or diplomatic relations in any significant measure). The negative consequences of withdrawal from Echelon will be felt in the intelligence arena, but will also be felt economically, militarily, and most definitely cyber-electronically, and will not just come from the other 5 Eyes partners.

Under a Labour/Green government that decides to withdraw from Echelon, New Zealand might seek to hedge its bets by establishing intelligence sharing ties with the People’s Republic of China or Russia. The first would complement the economic re-orientation towards the PRC in recent years, whereas the latter would cultivate relations with a long-term and now resurgent Western adversary (which is now in the process of re-deploying submarines to the South Pacific for the first time in over 20 years). Either move would show a clear commitment to diplomatic re-alignment away from traditional partners and towards Eurasia, something that would nicely complement the primary geographic focus of NZ’s trade-oriented foreign policy (we should remember that NZ is in the early stages of negotiations with Russia on a “free” trade agreement).

For both Russia and the PRC, gaining access to Echelon data would be invaluable even if the remaining 4 Eyes are forced to completely overhaul their systems in order to limit the damage caused by a NZ “flip.” In fact, the repercussions from such an act might force NZ to seek the security protection of either great power. One assumes that for this to happen the NZ public will be comfortable with the shift in alignment.

It is less probable that other Western nations such as France or Germany would want to jeopardize their relations with the Echelon community by entering into an alternative signals intelligence-sharing arrangement with NZ. Perhaps rising powers such as India, South Africa or Brazil might want to take advantage of the window of opportunity, but that also seems unlikely.

That is why I believe that the speculation about an inquiry into the intelligence community resulting in a “watershed” NZ withdrawal from Echelon is poorly considered. Escaping international commitments of any sort is fraught in many ways, and in order to do so the benefits of reneging must clearly outweigh the costs. The decision must enjoy broad support and be politically sustainable at home as well as abroad.

In that light, the benefits of a withdrawal from Echelon are uncertain and the downside of withdrawing from such a long-term and highly sensitive international security commitment is too great and too obvious for such talk to be anything but ignorant or Labour/Green posturing in the build up to next year’s elections. If that is the case, it undermines the Labour/Green bid to have a full inquiry into NZ intelligence community reform because there will be little support outside of select party factions for a move to withdraw from Echelon, and any reform initiatives that include that possibility will not be taken seriously.

It would therefore seem best for the Greens (in particular) and Labour to stifle such speculation from within their ranks in order for their calls for a full inquiry into the NZ intelligence community be given due consideration. That still leaves much room for review, but has a better chance of garnering broad-based support than by continuing to entertain thoughts about watershed moments.

The bin-Laden legacy.

Nearing the second anniversary of Osama bin-Laden’s death, it might be wise to pause and reflect on his legacy. The purpose is to give an objective appraisal rather than to engage in emotive debate or prejorative discourse.

Bin-Laden’s major legacy is one of ideological inspiration: he cemented in the minds of some sectors of the global Islamic community the idea that Western encroachments on Muslim societies, particularly that of the US, could be resisted with irregularly deployed armed force. These actions need not be spectacular, such as the 9/11 attacks. They could equally be low-level, localized and home-grown so long as they were persistent and unpredictable. There cumulative effect would increase the anxiety of the targeted (mostly but not exclusively Western) populations while prompting an over-reaction by their respective security authorities that impacted on basic notions of civil liberties, individual freedoms and collective rights. The sum effect would be risk aversion by non-Muslims when it came to imposing non-traditional values and interests on Muslim societies.

With regard to the US, bin-Laden’s broader strategic objective, as former CIA officer and bin-Laden profiler Michael Scheuer has pointed out, was to over-extend the US military in an ongoing global unconventional conflict unconfined to national borders or specific regions, which would result in economic bankruptcy and ensuing political polarization within the US. That in turn would prompt the resurgence of isolationist and pacifist tendencies within the US public that would erode support for foreign policies of intervention in Muslim lands.

Although the strategic concept vis a vis the US has not been fulfilled to its ideal, it seems to have been in some measure successful: the costs of the wars in Afghanistan and Iraq contributed to the fiscal crisis that led to the 2008 recession and ensuing politics of austerity. Iraq was a strategic over-reach (and mistake) by the Bush 43 administration intent of demonstrating its resolve as well as its military might. Increasingly polarized over basic notions of identity and values, the US public has nevertheless become more collectively risk adverse when it comes to engagement in foreign conflicts, something reflected in the tenor of politics within the Washington beltway.

Likewise, the Afghanistan conflict went from being an attack on al-Qaeda and its Taliban protectors to a war of occupation without end under the guise of “nation-building” and “security assistance.” The material costs of both wars have been phenomenal and the human costs, if not counted in the billions, have been equivalent to those of Vietnam and the Korean Conflict. Previously dormant ethno-religious tensions have been awakened in Asia, Europe and North America with ill political and social effect. The politics of toleration, once a hallmark of Western democracy, now competes with xenophobia and religious separatism for electoral favor. Even Australia and New Zealand are not immune from the syndrome.

In terms of the armed conflict itself, there are now two broad fronts involving two very different strategies at play from a “jihadist” point of view. On the one hand, attacks in stable nation-states with minority Muslim populations have devolved into dispersed, decentralized, self-radicalized grassroots small cell operations in which elements of the Muslim diaspora use their local knowledge to conduct symbolic attacks on host societies. Modeled on Che Guervara’s “foco” (wildfire) theory of guerilla warfare as channeled by Carlos Marighella with his “two-prong” strategy of simultaneous urban and rural insurgency, the objective is not just one of symbolic protest but also to prompt a blanket over-reaction by local authorities in which many are targeted for the crimes of a few.

The lock-down in Boston during the one suspect manhunt after the marathon bombings, a clear violation of the fourth amendment to the US BIll of Rights prohibiting unwarranted searches and seizures (ostensibly done in the interest of “public safety”), is a case in point. More generally, the suspension of civil liberties under a variety of anti-terrorist legislation in a number of Western democracies, to include New Zealand, demonstrates just how successful bin-Laden’s strategy has been at eroding the constitutional pillars of these societies.

That is all the more poignant because Islamic terrorism does not constitute an existential threat to any stable society, Western democratic or not. In fact, one can argue that terrorist acts are more acts of desperation in the face of permanent value or cultural change than it is a defense of tradition or promotion of a preferred alternative (think of the attacks of armed Marxist groups in Europe in the 1970s and 1980s). It may be injurious and tragic for those involved, but in the larger scheme of things it is more akin to the last grasp of a drowning person than it is a serious challenge to the socio-econmic and political status quo.

However, in fragile or unstable states where Muslim populations are a majority or a significant minority, the strategic objective is to gain state control waging more conventional wars. The confluence of historical grievances rooted in traditional forms of discrimination superimposed on territorial or resource disputes lends popular support to jihadist attempts to wrest sovereign control away from pro-western regimes in places like Yemen, Mali, Somalia, and increasingly, Nigeria. Likewise, Muslim irredentists with local grievances engage in guerrilla wars in Chechyna, Thailand, Pakistan the Philippines and Kazakstan, among other places.

In a twist of fate, the so-called “Arab Spring” has allowed battle hardened jihadists from places such as Chechnya, Iraq and Afghanistan to exploit the window of opportunity offered by civil war in places like Libya and Syria to promote their Islamic agendas in solidarity with their local brothers. Courageous, ferocious and determined, these forces provide discipline to otherwise rag-tag resistance movements who in the absence of such help are more likely to be defeated than to prevail.

The impact of these internationalists was felt in Libya, where in spite of covert Western military assistance the jihadists gained a significant toe-hold that has yet to be dislodged. Likewise, the resistance in Syria is increasingly led by black flag fighters drawn from throughout the Sunni world. The possibility of these forces eventually securing power in both countries remains very real.

Not all has gone to plan according to bin-Laden’s dream. The use of lethal drones as a favorite anti-terrorist weapon has decimated al-Qaeda leadership ranks. The military and intelligence campaigns against militant Islamicists have prevented the organization of large-scale attacks such as 9/11 because the number of people and logistics involved invite early detection and proactive response. With the exception of Pakistan, which has strategic reasons for playing both sides of the fence in the so-called “war on terrorism,” Muslim states have largely joined the anti-Islamicist campaign (although Sunni Arab support for the fight against the Gaddafi and Assad regimes is clear). Thus the decentralization of jihadist operations was a practical necessity as much as the second part of a long-term plan.

The bottom line is that although the bin-Laden legacy is mixed, it has been indelible: the world is a changed place as a result of his actions, for better or for worse. But the world is also a different place because of the response to his actions, for better or worse. It is the latter that will determine the fundamental impact of the former long after his death.

 

Trust in spies.

A recent TVNZ Colmar Brunton poll showed that 32 percent of those surveyed had little or no trust in New Zealand’s intelligence agencies, 32 percent had much or complete trust in those agencies, and 33 percent were lukewarm either way (with 3 percent undecided). That means that 65 percent of respondents were less than strongly trusting of New Zealand’s spies. This is a remarkable degree of public skepticism of intelligence organizations in a democracy.

The Prime Minister has said that the New Zealand intelligence community has to work hard to regain public trust. He is wrong, or is just being politically polite.

Unlike agencies such as the Land Transport Authority, Police, Fire Service, Health Boards, WINZ and Education, which provide direct goods and services to the public and which depend on public trust in order to operate efficiently (notwithstanding the well-known problems afflicting at least some of these “direct provision” agencies), the intelligence community need not concern itself with expressions of public trust. That is because the service that intelligence agencies provide as ostensibly commonweal organizations (i.e. ones that serve the universal public interest), although for the general good in the last instance (at least theoretically), is not provided directly or even openly. Instead, the intelligence agencies answer to the government of the day as the representative of the public will and provide their collection and analysis skills to the government for the national good as defined by their charter and the government’s interpretation of it.  They do not need the public’s trust in order to operate efficiently because most of what they do is away from the public eye.

Thus, in the first instance, the trust of the government is what matters for the spies. In this the intelligence community has an advantage because politicians elected into government are generally not conversant with intelligence matters and therefore are susceptible to espionage agency “capture:” the information that the spies provide gives the political elite a privileged window on the world, so they are most often reluctant to critically dispute the view.

More importantly, New Zealand’s intelligence sharing partners must have strong levels of trust in its spies. Without that, New Zealand’s access to allied intelligence sharing may suffer because foreign partners will be reluctant to risk placing sensitive information in the hands of untrustworthy people. The saving grace for New Zealand’s spies is that the years of relationship-building with its intelligence partners could allay the latter’s fears of incompetence or unprofessionalism on the part of the former.

On the other hand, even long standing relationships can be damaged by breaches of trust. This could well be the case in the wake of the Dotcom scandal, where the case against the internet magnate is crumbling in light of disclosures of illegal warrantless wiretapping by the GCSB (which makes evidence collected by those wiretaps inadmissible). Between the GCSB’s failures to follow its own basic protocols with regards to eavesdropping requests from sister agencies, coupled with the over the top nature of the raids on Dotcom’s residence (which included the presence of armed FBI agents and the detention of women and children by armed police), it is unlikely that any NZ judge will grant the US extradition request. That means time and resources spent by the US and NZ on pursuing the case against Dotcom will be for naught.  The GCSB failings are bound to be noted by New Zealand’s intelligence partners, who will wonder about the assurances given by the GCSB and Police (and more than likely the SIS) that their course of action would not be subject to legal challenge or public scrutiny.

The bottom line is one of vertical and horizontal accountability. In democracies, governments are held accountable by the electorate (expressed both individually and collectively). That is the vertical dimension of accountability. Under that government, public agencies are accountable to each other via a system of checks and balances. That is the horizontal dimension of democratic accountability, which is used to cultivate the public trust that is key to vertical accountability.

In New Zealand there is very little horizontal accountability between the intelligence community and other parts of government, to include parliament and the judiciary (and perhaps even the executive in specific instances). This makes its agents (to include the GCSB and SIS) even less vertically accountable than in most liberal democracies, where oversight, compliance and accountability mechanisms are much better developed.

As a nation-state New Zealand is also accountable to its diplomatic and security partners. That is another facet of horizontal accountability, writ large. New Zealand’s foreign partners must have trust in its diplomatic, military and espionage agencies in order for their mutual relationships to prosper. So long as they do, domestic trust is of secondary importance. But for that to happen, New Zealand’s intelligence community must be able to deliver on what it promises, which means that it must offer iron-clad guarantees that its activities will not be the subject of contentious public or political debate that can jeopardize ongoing intelligence collection and analysis operations

Thus, on the one hand, the poll results are not as worrisome for the government as may appear at first glance. So long as the New Zealand intelligence community and its component parts have the trust of its allies, then it will suffer no harm as a result of the public loss of faith in it. But should foreign partners come anywhere close to exhibiting the flat bell curve of trust that characterizes the results of the TVNZ survey, then New Zealand could well find itself excluded from at least some of the sensitive intelligence flows that are the ostensible reason for its participation in the Echelon/Five Eyes network, to say nothing of the wider intelligence community of which it is part.

As for the domestic side of the equation: a nation of sheep is led by the sheep dog.  The sheep dog is the government, of which intelligence agencies are part. The shepherd is the institutional system of checks and balances that govern intelligence gathering and analysis, to which the government of the moment is subject. Absent such effective oversight, compliance and accountability mechanisms, sheep are always at the mercy of an unrestrained and unaccountable dog.

 

Blog Link: Issue Linkage in foreign policy.

Media coverage of trade negotiations in the Asia-Pacific have largely overlooked the strategic perspectives underpinning different countries’ approaches to the subject. In this analytic brief I outline some of the issues involved, to include potential problems when different strategic outlooks are juxtaposed.

Blog Link: Australian-Indian Strategic Cooperation in the 21st Century.

Australia and India are emerging great powers that are the core of the Indo-Pacific strategic architecture, yet they do not have as strong bilateral ties as history, culture, politics, common threats and interests would suggest. In this collaborative essay with an Indian journalist, we explore some of the issues involved in their incipient strategic relationship, along with the prospects for closer ties in the near future.

Drones in our future.

Although I have no technical expertise in the field of unmanned aerial vehicles (UAVs), I have discussed in various fora the military, intelligence, domestic security and political implications of their use now and in the future. The hard fact is that, bad press notwithstanding, UAVs (aka “drones”) are here to stay and will dominate the air space in the years to come. Already the US air force is training more drone pilots than fighter and bomber pilots combined. Ninety percent of what drones do is non-lethal: reconnaissance; surveillance; search and rescue; maritime patrol; signal, thermal, optic and other forms of technical intelligence gathering; geological exploration and terrain mapping–the applications of these types of platform are many and will continue to grow in the years ahead.

The utility of drones is due to a simple calculation: the three “Ds.” They do jobs that are dangerous and/or dirty, and they do them dispassionately. To this can be added the fact that their operational costs of drones are less than those of manned aircraft and they do not expose pilots to the physical risks of flying. That combination guarantees that policy-makers will look to UAVs as the future of military and law enforcement aviation even if manned aircraft remain the bulk of commercial and private aviation for the foreseeable future.

Lethal drones such as the infamous Predators are constantly being refined so that their acceptable Circular Error Probable (CEP)–the chances that a missile fired from the UAV will fall within 100 feet of the target crosshair center–is now greatly increased. Since they loiter at 15,000 feet for up to 36 hours, US drone pilots (who work in 12 hour shifts and who must have experience flying manned aircraft prior to their assignment as drone pilots) spend hours and days watching a potential target before pulling the trigger. The protocols governing the kill shot are quite tight (for example, no shots at family compounds or while the targeted individual(s) is or are in the vicinity of innocents), which contrary to popular opinion has greatly reduced the collateral damage occasioned by drone strikes when compared to the early days of their use.

In fact, manned aircraft continue to cause the bulk of unintended civilian deaths in Central Asia, which most often is the fault of faulty or misleading tactical intelligence on the ground (the use of misinformation by local informants acting for their own purposes has been a major contributor to the unintended civilian deaths caused by air strikes). As a remedy, special forces teams are increasingly being used to track, spot and verify legitimate targets in conflict zones (to include Pakistan, Yemen and Somalia as well as Afghanistan).

Although there have been many protestations about the use of lethal drones (so far the US is the only country to use them in anger), it is interesting to note that Pakistan has never attempted to intercept US drones operating in Pakistani air space even though the latter are slow, not particularly maneuverable and relatively easy to spot by electronic means (the recent downing by Israeli forces of an Iranian drone operated by Hezbollah demonstrates the case).  This is not to say that drone incursions into the sovereign air space of foreign countries are always or even generally  acceptable. What the different responses suggest is that the Pakistanis may not be aggrieved by US drone operations as they claim to be.

To be sure, the US military has tighter protocols governing lethal drones than does the para-military arm of the CIA. That has led to disagreements within the US security apparatus about who should be in control of lethal drones and under what circumstances are they to be used. The president currently has to authorize the CIA strikes, which are mostly directed at suspected jihadis operating in failed states. The military has a bit more latitude in targeting militants or insurgents in Afghanistan and the tribal areas of Pakistan, although all lethal strikes must be authorized by the chain of command. As of yet, that debate about unifying the command and control of lethal drones is unresolved and both the US military and the CIA continue to deploy armed and unarmed drones in foreign theaters using their own set of criteria (which if largely overlapped are not identical).

That is what brings me to the major point of this post: the fact that the legal apparatus governing the employment of drones in the international as well as the domestic arenas is very underdeveloped when compared with the technologies themselves. Already 60 countries employ drones, and domestic security agencies in a host of countries have explored their usage. The US uses them for border control and Coast Guard purposes, and true to form, some police department in Texas is reported to have expressed interest in a lethal version that could also dispense non-lethal crowd control justice from above.

Yet in no case are the legal protocols governing the use of drones in domestic arenas as well developed as are those used by the US military when engaged in foreign conflicts. This is worrying because the potential for abuse is great. UAV technology has outpaced the legislative framing of their fair use not only in undemocratic states but in liberal democracies as well.

New Zealand is not different in this regard. The Army and Navy are exploring drone technologies, as are other non-military government agencies. The Department of Conservation already has deployed a drone for geothermal and geographic research. The police are interested in UAV platforms as a substitute or complement to helicopters and terrestrial patrol vehicles. It is only a matter of time before drones are a regular presence in New Zealand skies, and the Civil Aviation Authority is already being tasked with drafting technical regulations governing their operations.

Even so, the legal structure governing the why, when, how and by who of UAV use in NZ is virtually nonexistent. Parliament appears disinterested in the subject and the agencies who would have the most use for drones have not been particularly proactive in drafting guidelines for their use. It is time that they did.

One reason is because the future of drones is not only in their greater use but in their increasingly varied configurations, to include miniaturization based on developments in nano technology. Consider this gem:

Sent to me by a friend borrowing from an unnamed source, the following blurb came with the photo.

“Is this a mosquito? No. It’s an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled and is equipped with a camera and a microphone. It can land on you, and it may have the potential to take a DNA sample or leave RFID tracking nanotechnology on your skin. It can fly through an open window, or it can attach to your clothing until you take it in your home. Given their propensity to request macro-sized drones for surveillance, one is left with little doubt that police and military may look into these gadgets next.”

UPDATE: The source for the photo is this: http://www.snopes.com/photos/technology/insectdrone.asp

In light of the implications of developments in UAV technology and the growth in their employment, it seems appropriate that New Zealand confront the legal aspects of said use. New Zealand could, for example, be the first country to prohibit the use of lethal drones either in foreign conflicts or for domestic security (no other country has of yet discounted the use of drones for lethal purposes). Likewise, because there are no regional or international protocols governing their use, New Zealand could try to introduce resolutions in international and regional bodies that would lead to the regulation of UAVs on a broader level. At present the field of UAV operations is basically uncharted, much less regulated, so the opportunity now exists to try to match advances in UAV technology and deployment with advances in the legal architectures governing them.

Since New Zealand has in the past shown initiative and boldness in enacting policy with both domestic and international import, the field of UAV regulation might be another way in with it can demonstrate its fore-sightedness when it comes to areas of universal concern.