Homeland Security Watch

News and analysis of critical issues in homeland security

February 27, 2012

A discussion on cybersecurity legislation

Filed under: Cybersecurity — by Arnold Bogis on February 27, 2012

Last week, the George Washington University’s Homeland Security Policy Institute (HSPI) held a “Conversation on Cybersecurity Legislation with Mike McConnell, Michael Chertoff, and Senior Congressional Staff.” Video of the event, along with background materials, can be found here: http://www.gwumc.edu/hspi/events/cyberPRF413.cfm

On one hand, the sausage-making portion of the discussion with congressional staff was interesting, if not too enlightening to one uninitiated in the dark legislative arts. On the other, former DHS Secretary Chertoff and former DNI McConnell seemed to echo some of Phil’s framing of the cyber issue in his last post.

Obviously, these two men fall into Phil’s descriptive pot “Those that may make money on increased attention to cybersecurity are in favor of the current proposal.” In fact, both gentlemen agreed that the current legislation is a start, but that more is required.  To be fair, both also have extensive knowledge of the threats and vulnerabilities involved in the cyber domain.

More interesting, to me at least, was their description of the issue of regulation vs. collaboration that serves to reinforce Phil’s frame.  To paraphrase Chertoff: “how can you expect a company that is worth $10 million to voluntarily spend $1 million on cyber security, despite the fact that the cascading vulnerabilities could cost the nation $10 billion?” While McConnell discussed the military’s initial aversion to Goldwater-Nichols reforms, now credited with producing a superior fighting force that not only collaborates because they have to, but because of the specific design of the system such cooperation is something they now want to accomplish.

Phil characterized it in his last post:

While the efficacy of the new bill is debatable, it is clear the current approach — depending almost entirely on voluntary collaboration — has not worked. The weakest links in the cybersecurity system are the least willing to show up, talk turkey, and truly collaborate in sharing information and changing behavior. What do you do when “pretty please”, earnest presentations on self-interest, and peer pressure do not work? What do you do when neglect by one “house” on the block endangers the safety of the entire block (or city)?

Sanctions are needed. But no matter how tough, sanctions will not be sufficient. Whatever sack of sanctions are available, unless the sanctions are used to craft collaboration (rather than mere compliance) cybersecurity will not be enhanced.  The threat of regulatory sanctions may encourage collaboration, but a rigid regulatory approach alone will only achieve minimal compliance, which in cyberspace will always lag behind new threats and vulnerabilities.

If you are interested in cybersecurity, I would highly recommend going back and re-reading Phil’s piece with his intriguing suggestion that cybersecurity lessons can be derived from the model of the Coast Guard: http://www.hlswatch.com/2012/02/24/creating-a-cyber-coast-guard/

Then watch the HSPI event, which may shed some light on the competing legislative priorities and processes that may, hopefully, someday result in a bill: http://www.gwumc.edu/hspi/events/cyberPRF413.cfm

Update:

One new item from today and one a few days old (h/t to Bill Cumming) on the cyber front.

The Washington Post reports on the tussle between the White House and NSA over the access and monitoring for threats/privacy rights divide:

The National Security Agency has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks but has been rebuffed by the White House, largely because of privacy concerns, according to administration officials and internal documents.

The most contentious issue was a legislative proposal last year that would have required hundreds of companies that provide critical services such as electricity generation to allow their Internet traffic be continuously scanned using computer threat data provided by the spy agency. The companies would have been expected to turn over evidence of potential cyberattacks to the government.

NSA officials portrayed these measures as unobtrusive ways to protect the nation’s vital infrastructure from what they say are increasingly dire threats of devastating cyberattacks.

But the White House and Justice Department argued that the proposal would permit unprecedented government monitoring of routine civilian Internet activity, according to documents and officials familiar with the debate. They spoke on the condition of anonymity to describe administration deliberations; internal documents reviewed by The Washington Post backed these descriptions.

A few days ago, the Government Security News website reported on remarks by former NSA and CIA Director Michael Hayden that covered topics not usually associated with cyber issues: mitigation, response, and recovery:

So, when Hayden says the U.S. may be spending too much time thinking about cyber vulnerabilities and not enough time thinking about the actual consequences of a successful cyber attack, it probably makes sense to pay attention.

“We may be at the point of diminishing returns by trying to buy down vulnerability,” the general observed. Instead, he added, maybe it’s time to place more emphasis on coping with the consequences of a successful attack, and trying to develop networks that can “self-heal” or “self-limit” the damages inflicted upon them.

“I cannot stop them at the perimeter,” Hayden acknowledged, “so, how do I deal with the fact that they are on the inside.”

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 24, 2012

Creating a Cyber Coast Guard

Filed under: Congress and HLS,Cybersecurity,Private Sector — by Philip J. Palin on February 24, 2012

It is not yet clear if the Cybersecurity Act of 2012 will be taken up by the whole Senate — as previously announced — or disappear into committee review while under sustained attack by those opposed.

Senator John McCain, one of those opposed, has promised a competing piece of legislation:

The fundamental difference in our alternative approach is that we aim to enter into a cooperative relationship with the entire private sector through information sharing, rather than an adversarial one with prescriptive regulations. Our bill, which will be introduced when we return from the Presidents’ Day recess, will provide a common-sense path forward to improve our nation’s cybersecurity defenses.

Last Friday I outlined the perceived — in my judgment, real — tension between collaboration and compliance that any approach to effective cybersecurity will require. The real debate is over how to resolve this tension: with more dependence on voluntary cooperation or the threat of regulation. (To be clear, the proposal unveiled on February 14 by Senators Lieberman, Collins, and others does not create new regulations per se, but it does initiate a public-private process that would eventually create a regulatory regime.)

Some private sector organizations have welcomed the opportunity to frame-up the process, others are ready to do what they can to stop any movement to regulation. So far the private sector line-up on each side seems mostly to reflect revenue streams. Those that may make money on increased attention to cybersecurity are in favor of the current proposal, those that see cybersecurity mostly as a cost are opposed. (The cost-benefit discussion is, so far, not very sophisticated on either side.)

While the efficacy of the new bill is debatable, it is clear the current approach — depending almost entirely on voluntary collaboration — has not worked. The weakest links in the cybersecurity system are the least willing to show up, talk turkey, and truly collaborate in sharing information and changing behavior. What do you do when “pretty please”, earnest presentations on self-interest, and peer pressure do not work? What do you do when neglect by one “house” on the block endangers the safety of the entire block (or city)?

Sanctions are needed. But no matter how tough, sanctions will not be sufficient. Whatever sack of sanctions are available, unless the sanctions are used to craft collaboration (rather than mere compliance) cybersecurity will not be enhanced.  The threat of regulatory sanctions may encourage collaboration, but a rigid regulatory approach alone will only achieve minimal compliance, which in cyberspace will always lag behind new threats and vulnerabilities.

Whichever of the current sides win, execution will be key. The current legislation addresses execution primarily under Title III through a DHS National Center for Cybersecurity and Communications. The new entity would combine several existing offices, and would be directed by a Presidential appointee confirmed by the Senate. Here are the director’s duties enumerated in the current legislation:

(1) manage Federal efforts to secure, protect, and ensure the resiliency of the Federal information infrastructure, national information infrastructure, and national security and emergency preparedness communications infrastructure of the United States, working cooperatively with appropriate government agencies and the private sector;

(2) support private sector efforts to secure, protect, and ensure the resiliency of the national information infrastructure;

(3) prioritize the efforts of the Center to address the most significant risks and incidents that have caused or are likely to cause damage to the Federal information infrastructure, the national information infrastructure, and national security and emergency preparedness communications infrastructure of the United States;

(4) ensure, in coordination with the privacy officer designated under subsection (j), the Privacy Officer appointed under section 222, and the Director of the Office of Civil Rights and Civil Liberties appointed under section 705, that the activities of the Center comply with all policies, regulations, and laws protecting the privacy and civil liberties of United States persons; and

(5) perform such other duties as the Secretary may require relating to the security and resiliency of the Federal information infrastructure, national information infrastructure, and the national security and emergency preparedness communications infrastructure of the United States.

Title III continues for another 28 pages. Included under Authorities and Responsibilities of the Center, “serve as the focal point for, and foster collaboration between, the Federal Government, State and local governments, and private entities on matters relating to the security of the national information infrastructure.”

On page 114 of the proposed legislation a supervisor training program for the Center is set out. The current language suggests Senator Akaka and his staff have persisted in pushing his perennial concerns. It’s all good. It could be better.

The currently proposed training program  is mostly internally focused. I suggest language be added to focus on mission achievement. Consider for a moment a supervisor training curriculum focused on just one of the duties listed above, ” support private sector efforts to secure, protect, and ensure the resiliency of the national information infrastructure”

What is the nature of the private sector?

What are the private sector’s current efforts related to cyberspace?

What does “secure”, “protect”, and “ensure the resiliency” of cyberspace mean?

What is the national information infrastructure?

What does it mean to “support” the private sector? Why this verb rather than another?

That would be an interesting — valuable — curriculum.   Develop similar curricula around each of the statutory goals, include private sector participants in the curriculum… and a whole new approach to private-public collaboration might be cultivated.

This curriculum should  include a heavy dose of culture, a culture of private-public collaboration.  If the Center becomes a cyber-SEC none of us will be any safer.   Cybersecurity cannot focus on accountability after-the-fact.  The focus must be on cultivating a culture of prevention and resilience, not compliance.

For this purpose, I propose the Akaka Academy for Cybersecurity give close attention to the way the Coast Guard cultivates a collaborative relationship with owners and operators of marine vessels. Just for a taste of what I mean, consider the implications of the following written instruction from a Coast Guard flag officer… and this is not atypical, this approach is entirely consistent with  standard Coast Guard practice.

The Coast Guard’s objective is to administer vessel inspection laws and regulations so as to promote safe, well equipped vessels that are suitable for their intended service. It is not the Coast Guard’s intent to place unnecessary economic and operational burdens upon the marine industry. In determining inspection requirements and procedures, inspection personnel must recognize and give due consideration to the following factors:

  • Delays to vessels, which can be costly, need to be balanced against the risks imposed by continued operation of the vessel, with safety of life, property, and the environment always the predominant factor over economics;
  • Certain types of construction, equipment, and/or repairs are more economically advantageous to the vessel operator and can provide the same measure of safety;
  • Some repairs can be safely delayed and can be more economically accomplished at a different place and time;
  • The overall safety of a vessel and its operating conditions, such as route, hours of operations, and type of operation, should be considered in determining inspection requirements;
  • Vessels are sometimes subject to operational requirements of organizations and agencies other than the Coast Guard; and
  • A balance must be maintained between the requirements of safety and practical operation. Arbitrary decisions or actions that contribute little to the vessel’s safety and tend to discourage the construction or operation of vessels must be avoided.

I know of no better example of effective private-public collaboration than that of the U.S. Coast Guard with the industry it helps regulate, serve, and sometimes save.  It is a cultural model well-suited to the cyber domain.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 23, 2012

Jeh Johnson on the belligerent citizen

Filed under: Legal Issues,Radicalization,Terrorist Threats & Attacks — by Philip J. Palin on February 23, 2012

The DOD General Counsel spoke at Yale on Wednesday evening.   According to CNN:

The targeted killing of those suspected of engaging in terrorist activities against the United States, including American citizens, is justified and legal, according to the Defense Department’s chief lawyer.

Pentagon general counsel Jeh Johnson is the first government lawyer to officially weigh in on the legal justification for killing a U.S. citizen since American born Yemeni cleric Anwar al-Awlaki was killed by a CIA missile fired from an unmanned aerial vehicle last September.

In comments Wednesday night during a speech at Yale University, Johnson made no mention by name of al-Awlaki or the classified CIA drone program.

“Belligerents who also happen to be U.S. citizens do not enjoy immunity where non-citizen belligerents are valid military objectives,” Johnson said.

Benjamin Wittes at the Lawfare blog provides a transcript of Mr. Johnson’s prepared remarks.

 

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

Seeing Syria

Filed under: International HLS,Radicalization,Terrorist Threats & Attacks — by Philip J. Palin on February 23, 2012

Screenshot of inteview with a reporter in Homs who has since been killed

Today both the New York Times and USA Today give above-the-fold attention to Syria:

Ghastly Images Flow From Shattered Syrian City (New York Times)

Activists ensure that the world sees Syria’s bloodbath (USA Today)

Each newspaper is also running related stories.

This week, for the first time, I perceive American media is beginning to give the situation in Syria the attention it deserves.  If and how this might influence American public opinion and policy is yet to be seen.

Beginning last May I have made regular references to Syria in this blog.  At first I was restrained.  This is a homeland security blog, after all. Since September I have been less and less restrained.  For the last few weeks I have been preachy and insistent.  Some have complained.

Last week Arnold Bogis asked the obvious question, “What would you have the U.S. do?” (See last two comments in the linked chain for his question and my answer.) A short version of my answer:  We should at least pay attention.  We dare not fail-to-notice the murder of thousands.

Finally our media has begun to notice.  As a result, I will again adopt a more restrained approach to referencing Syria at HLSWatch.

Arnold did not follow-up on my answer, but he could have — quite fairly — asked again, “But what would you have us do?”

I do not have an adequate response.  Some self-righteous bluster would, probably, make me feel better.   But that would help no one else, certainly not those being bombarded in Homs.

It is helpful that more will now see what is happening.  I hope wiser, perhaps braver men and women will find an effective way to really help.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 22, 2012

Disloyal

Filed under: Budgets and Spending,State and Local HLS — by Mark Chubb on February 22, 2012

I’ll make this post a short one. (I’d rather be in Christchurch, where today they marked the first anniversary of the devastating February 22 aftershock that claimed 185 lives.) The attention drawn by last week’s post, if not here at least on my personal website, has created quite a stir, at least where I work.

It seems any effort to critically evaluate our current situation is viewed as disloyalty. Tonight, representatives of organized labor appeared in public to make it very clear they do not like being called out for their affiliations. They like even less having their methods of operation, if not motives, called into question.

Homeland security does not need cheerleaders or band leaders or nannies. It needs people willing to ask difficult questions even when the answers prove troubling.

I am convinced that the systems we rely on to maintain secure communities are crumbling. Choices that once seemed easy are now almost impossible even for intelligent men and women of goodwill. Rather than discussing whether we repair a bridge before the next catastrophe, we are forced to invest in the response capability to handle its collapse. Instead of investing in quality public education, we argue about mandatory prison sentences for repeat offenders and lowering the age at which we impose capital punishment.

In many ways, this is the byproduct of a self-fulfilling prophecy that began taking shape when we started to question the very premise of public service in the late 1970s. Today, we have what we should have feared most: Civil servants paralyzed by ambivalence not apathy. When forced to choose between their welfare and that of others, the choice for many is altogether too simple, especially after years of being told to keep their opinions to themselves.

They may not want to make decisions, but they certainly have opinions. Often many different ones about the same subject. And they are all too happy expound them with militant fervor to anyone who will listen and many who would care not to.

Never mind their opinions conflict with one another or with fundamental laws of nature or the universe. But watch out if you dare to disagree with what they have to say!

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 21, 2012

Who are the Mujahideen e-Khalq?

Filed under: International HLS — by Christopher Bellavita on February 21, 2012

What do Tom Ridge, Andrew Card, Howard Dean, Alan Dershowitz, Louis J. Freeh, Rudolph Giuliani, Porter Goss, Michael B. Mukasey, Edward Rendell, and Hugh Shelton have in common?

In January 2012, they were among 21 senior US leaders who signed a letter to Secretary Clinton asking the State Department to rule that the Mujahideen e-Khalq (also known as MEK)

is not a terrorist organization and there is no rational factual or legal basis to maintain it on the FTO [Foreign Terrorist Organization list] —where it was placed in 1997 as a political accommodation to the regime in Iran, NOT because it ever engaged in any terrorist activity or had an intent to do so against the US.

A friend brought my attention to the Mujahideen e-Khalq’s situation, to a place in Iraq called Camp Ashraf where they are being held, and to another location in Iraq called Camp Liberty where they are supposed to be moved.

I had never heard of MEK or their plight. But I do know my friend is not prone to hyperbole.  He chooses his words and his political positions carefully.  I paid attention when he wrote me:

For more than a year, I [had some responsibilities associated with] this group [MEK]; a potential tragedy unfolding at the hands of the US.

So, what’s the story? Who are the Mujahideen e-Khalq, and is there any reason why the homeland security community should care about them?

——————–

Global Security describes the MEK this way:

Mujahedeen-e-Khalq (MEK) is the largest and most militant group opposed to the Islamic Republic of Iran. Also known as the People’s Mujahedeen Organization of Iran, MEK is led by husband and wife Massoud and Maryam Rajavi. MEK was added to the U.S. State Department’s list of foreign terrorist groups in 1997.

MEK was founded in the 1960s by a group of college-educated Iranian leftists opposed to the country’s pro-Western ruler, Shah Mohammad Reza Pahlavi. Although the group took part in the 1979 Islamic revolution that replaced the shah with a Shiite Islamist regime, MEK’s ideology, a blend of Marxism and Islamism, put it at odds with the post-revolutionary government. In 1981, the group was driven from its bases on the Iran-Iraq border and resettled in Paris, where it began supporting Iraq in its eight-year war against Khomeini’s Iran. In 1986, MEK moved its headquarters to Iraq where it received its primary support to attack the regime in Iran. During the 2003 Iraq war, U.S. forces cracked down on MEK’s bases in Iraq, and in June 2003 French authorities raided an MEK compound outside Paris and arrested 160 people, including Maryam Rajavi.

Several years ago, the Council on Foreign Relations wrote this about MEK:

During the Iraq war, U.S. forces cracked down on the MEK. About 3,400 people were disarmed at Camp Ashraf, surrendering two thousand tanks, armored personnel carriers, and heavy artillery pieces, according to the 2006 report. Those living at Camp Ashraf are designated as “protected persons” under Article 27 of the Fourth Geneva Convention which prevents extradition or forced repatriation to Iran as long as the United States maintains a presence in Iraq. [emphasis added] The Unites States has no plans to charge and prosecute people living in this camp. The “protected persons” designation applies solely to those living at Camp Ashraf, not other members of the group, nor does it affect the MEK’s listing on the State Department terrorist list.

——————–

Not everyone is buying the idea that the MEK are the oppressed and forgotten little guys.  Last August, Christina Wilkie of the Huffington Post, wrote a detailed description of MEK and the lobbying effort of its supporters under the less-than-flattering headline: “Former U.S. Officials Make Millions Advocating For Terrorist Organization.”

One minor part of the article describes how former Pennsylvania Governor Ed Rendell considered declining an invitation to speak at an MEK conference because “I don’t know hardly anything about this subject …[and] I don’t think I’m qualified to come.” He eventually decided to participate in the conference attended by other national leaders.  The outcome?

“It’s been a great learning experience for me,” he told the crowd [at the conference]. “As a result of what I’ve learned [from the MEK supporters], on Monday I will send a letter to President Obama and to Secretary Clinton telling them [first], that the United States is morally bound to do everything we can to ensure the safety of the residents of Camp Ashraf. And two, if Director Freeh and General Shelton and General Conway and Governor Dean and the rest of these great panelists say that MEK is a force for good and the best hope we have for a third option in Iran, then, good Lord, take them off the terrorist list! Take them off the terrorist list!”

As Rendell’s applause died down, he added that he had never heard of Camp Ashraf until the group invited him to speak.

A few days after Christina Wilkie’s article appeared, Allen Gerson criticized her analysis.

What is an organization deemed by the US State Department to be dedicated to terrorism… supposed to do when it believes the charge is spurious? Clearly, the consequences of such a determination are enormous …. So naturally, such an organization will try to do whatever it can to exercise its legitimate rights to correct the record, refute erroneous charges and seek de-listing.

This burden to act is especially acute if an organization placed on the FTO list happens to have thousands of its members situated in a foreign country where they stand to be forcibly removed to a truly terrorist regime where the fate of those “repatriated” will likely be death by firing squad or the hangman’s noose. And, where the US State Department FTO listing is manipulated as justification for random acts of violence against members of that particular organization coupled with continued threats of forced deportation, the compulsion to use all legitimate means to remove the unwarranted terrorist label is overwhelming.

This is precisely the situation the Mujahedin-e Khalq (MEK) finds itself in today. The surprise is that it would be vilified for its efforts in a recent article in the Huffington Post by Christina Wilkie

Mr Gersen is described as “the Chairman of AG International Law in Washington D.C. He is presently involved with other attorneys in representing the PMOI/MEK in its efforts to be removed from the State Department List of Foreign Terrorist Organizations.”

It would be odious to describe this as a “she said, he said” argument, particulary with lives at stake.  How is one to decide what to think about this issue?

——————–

In January of this year, former Pennsylvania governor and DHS Secretary Tom Ridge, published an impassioned plea in favor of the MEK: (Although I have to say the writing style was very different from the way Governor Ridge sounded in his 2009 memoir, The Test of Our Times.)

The Obama administration should support the democratic aspirations of the people of Iran and their most effective opposition movement, the Mujahedin-e-Khalq (MEK).

Regrettably, and without justification, the State Department continues to maintain that MEK … on its list of “Foreign Terrorist Organizations” even though it meets none of the criteria.

Secretary Ridge then reviews the history of the MEK’s designation as a Foreign Terrorist Organization since 1997, concluding

The unjust designation was maintained by subsequent administrations in an effort to persuade Iran to abandon their nuclear program.

Sadly, we now see the results of that failed policy: Iran is no closer to moderation, having recently plotted to assassinate, in full view of the world, the Saudi ambassador on U.S. soil; The IAEA [International Atomic Energy Agency] warns that Iran’s nuclear ambitions are actually closer to fulfillment, and the failure to de-list MEK, absent any legal or factual basis, continues to stymie prospects for democratic change in Iran.

This folly has given Iran and its proxies a license to kill thousands of MEK members, including a massacre on April 8 of last year that killed or wounded hundreds of unarmed members of the MEK living in Camp Ashraf, Iraq—each and every one of whom was given written guarantees of protection by the U.S. government.

Now that U.S. troops have left Iraq, Iran is determined to extend its influence in the region and has justified its brutality by categorizing them as “terrorists.”

Whatever way Tehran’s propagandists characterize MEK’s political prospects, culture, or history, it is clear to me that the defenseless Iranian dissidents at Camp Ashraf are committed to non-violent regime change and a democratic, nuclear-free Iranian future.

[On the other hand, on February 9, 2012, NBC News reported

Deadly attacks on Iranian nuclear scientists are being carried out by an Iranian dissident group that is financed, trained and armed by Israel’s secret service, U.S. officials tell NBC News, confirming charges leveled by Iran’s leaders.

The report claims the Iranian dissident group is the Mujahideen e-Khalq -- aka MEK]

Back to Governor Ridge’s essay:

Courts throughout the United Kingdom, the European Union and the United States have concluded that there is no legal justification [to] maintain MEK on the foreign terrorist list.

Every one of the residents of Camp Ashraf was interviewed by the FBI and by U.S. military services and there has never been a scintilla of evidence anyone in that camp was motivated by, interested in, or capable of conducting acts of terrorism against this country. Remember, they surrendered all means of self-defense in exchange for America’s promise to provide their safety and security.

[For more on this part of the issue, see the December 2011 talk Brigadier General David Phillips gave in February in support of MEK.  My friend said :

BG Phillips is no goober or anyone’s fool.  General Petreaus ... hand-picked him to be on his staff as part of the “Surge” campaign in Iraq and then called him back again to be on his staff in Afghanistan.]

Back to Governor Ridge’s essay:

Some 100 members of Congress, in a bipartisan initiative, have called for MEK to be de-listed. The unfounded MEK designation only serves as a license to kill for both the Iraqi forces and the kangaroo courts in Iran, who regularly arrest, torture, and kill people on the basis of MEK affiliation.

It shames the State Department designation process that has wrongly maintained the blacklist for misguided political reasons. Consider this: the MEK is on the list — the Taliban is not….

As an emboldened Iran moves ever-closer to nuclear breakout, MEK’s unfounded designation is a lynchpin in the critical test of wills between Iran and the West — a test the Obama administration can ill afford to fail….

Unshackling the MEK from an unjust blacklist and living up to U.S. guarantees to protect the Iranian opposition at Camp Ashraf will send the mullahs’ terrorist regime in Tehran exactly the message it needs to hear: The mullahs do not run foreign policy in the United States and America keeps its promises.

——————–
The former leaders of the Department of Homeland Security, the Federal Burea of Investigation, The Joint Chiefs of Staff, the Central Intelligence Agency — among others — say a great injustice is being done to the Mujahideen e-Khalq.

In this issue I know nothing about I have to either decide these public servants are willing to rent their voices to a cause they do not believe in exchange for 20,000 dollar speaking fees, or they are correct about what is happening to the Mujahideen e-Khalq.

That is not a difficult decision for me to make.

——————–
I ask my friend whether he thinks this is a homeland security issue:

I think it does boil down to a HLS issue. They are most certainly a group of individuals that but for the FTO moniker, would already have been placed or accepted by countries anywhere around the world, i.e. the threat of harm for returning to their home Iran is so great they cannot be forced to go back. So presumably, the US is afraid to remove them from the FTO list or accept any of them b/c they pose a threat to our security.

Mix in the current situation with the Iranian regime and it really is a mess.

——————–
Add presidential politics to this.

Edward Luce predicts in Sunday’s Financial Times that during tomorrow’s Republican presidential candidates debate, there will be a commercial “calling on Mr. Obama to remove the MEK – the Mujahideen e-Khalq, the armed Iranian opposition group – from the US list of foreign terrorist organizations.”

 

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 20, 2012

George Washington: A few words, Sir!

Filed under: General Homeland Security — by Philip J. Palin on February 20, 2012

Today we recognize President Washington’s birth (February 22 is his actual birthday). Following are a few quotes of our first president loosely relevant to homeland security.

Few people know the predicament we are in, on a thousand accounts; fewer still will believe, if any disaster happens to these lines, from what cause it flows.

We are apt to run from one extreme into another. To anticipate & prevent disasterous contingencies would be the part of wisdom & patriotism.

Of all the animosities which have existed among mankind, those which are caused by difference of sentiments in religion appear to be the most inveterate and distressing, and ought most to be deprecated.

Happy, thrice happy shall they be pronounced hereafter, who have contributed any thing, who have performed the meanest office in erecting this stupendous fabrick of Freedom and Empire on the broad basis of Independency; who have assisted in protecting the rights of humane nature and establishing an Asylum for the poor and oppressed of all nations and religions.

Avoid the necessity of those overgrown military establishments, which, under any form of government, are inauspicious to liberty, and which are to be regarded as particularly hostile to Republican Liberty.

When one side only of a story is heard and often repeated, the human mind becomes impressed with it insensibly.

It may be laid down, as a primary position, and the basis of our system, that every citizen who enjoys the protection of a free government, owes not only a proportion of his property, but even of his personal services to the defence of it.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 18, 2012

Syria on Saturday

Filed under: International HLS,Radicalization,Strategy,Terrorist Threats & Attacks — by Philip J. Palin on February 18, 2012

Earlier today several thousand residents of Damascus participated in a funeral procession as an act of defiance aimed at the Assad regime. As of 0600 (Eastern) there are several breaking news stories of mourners being killed. According to the Associated Press:

Syrian troops have fired on mourners taking part in a massive funeral procession in the capital… Several people were wounded by gunfire in the Damascus neighborhood of Mazzeh. Tear gas was also fired on the Saturday procession mourning three people killed by security forces following protests in the area a day earlier. An eyewitness who spoke on condition of anonymity for fear of reprisals said the procession numbered around 15,000.

Thursday the United Nations General Assembly voted to condemn human rights violations by Syrian authorities. The resolution was passed with 137 nations in favor, 12 against, and 17 abstentions.

According to a UN statement:

The Assembly called on Syria to abide by its obligations under international law, and demanded that the Government, in line with the 2 November 2011 Action Plan of the League of Arab States, and its decisions of 22 January and 12 February 2012, without delay, stop all violence and protect its people, release all those detained during the unrest, withdraw all armed forces from cities and towns, guarantee peaceful demonstrations and allow unhindered access for Arab League monitors and international media.

The language of the resolution closely mirrored that of a text vetoed by China and the Russian Federation in the Security Council two weeks earlier…

By other terms of the text adopted today, the Assembly expressed its full support for the Arab League’s decision to facilitate a Syrian-led political transition to a democratic, pluralistic political system, including through a “serious political dialogue between the [Syrian Government] and the whole spectrum of the Syrian opposition”. Reaffirming its strong commitment to Syria’s sovereignty, independence, unity and territorial integrity, it further reaffirmed that all Member States “should refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any State”.

Perhaps in response to the United Nations action, on Friday Syrian forces seemed to step up their action. According to The Daily Star (Lebanon):

Syrian troops intensively shelled rebel-held neighborhoods in the restive central city of Homs Friday and killed at least five people, activists said… Activist groups said tens of thousands of protesters poured into the streets after Friday prayers from Daraa in the south to Aleppo and Idlib in the north and Deir el-Zour in the east to areas around the capital Damascus. The Local Coordination Committees said security forces opened fire on some protests.

According to the Sydney Morning Herald (Australia), “Syria has become a magnet for foreign fighters, with al-Qaeda aligned jihadists streaming across the border from Iraq and rebel soldiers from the Libyan city of Misrata crossing in from Turkey…”

In testimony on Thursday to the Senate Armed Services Committee, Director of National Intelligence, James Clapper, said, “We believe that Al Qaeda in Iraq is extending its reach into Syria.”

During a British-French summit held in Paris on Friday there was considerable nostalgia for the entente cordiale that contributed so much to toppling Qaddafi. But Prime Minister Cameron and President Sarkozy were also clear on preconditions to any military intervention in Syria. According to The Guardian, “Cameron said the situation in Syria was “appalling” and said the government was “butchering and murdering its own people”. He said that Syria was different to Libya in three ways: in Libya the west had a UN resolution, the Arab League was calling for action, and the opposition represented the whole country, he said.”

From The Telegraph’s report on the Paris summit:

They did not rule out joint military action in Syria but said the current circumstances were not right. “The main obstacles are not to do with such and such country’s attitude at the UN,” Mr Sarkozy said. “The fact is we cannot bring about a revolution without the Syrian people. We cannot bring this about if the Syrian opposition does not unite and organise to help us help them.”

There is increasing international discussion of a “protected zone” in Northwest Syria to incubate a more unified opposition. Many are pointing to Idlib province immediately adjacent to Turkey. The Free Syrian Army has had more freedom of movement in Idlib than in most other venues.

But Turkey — essential to the survival of any such enclave — has made it clear it prefers what it calls a “Mediterranean corridor.” According to the Sabah newspaper (Turkey):

Foreign Affairs Minister Davutolu has already relayed his concerns to U.S. Secretary of State Hillary Clinton. Ankara is in favor of a humanitarian aid corridor being established via the Mediterranean and suggests that instead of designating a route through Turkey, the British base in Cyprus be used for this purpose.

In this morning’s edition of Hurriyet (Turkey) Illan Tanir writes,

One of the biggest obstacles preventing the international community from giving a decisive outside push to overthrow Bashar al-Assad is its inability to see a viable, unified alternative for the post-Assad period… The U.S. in particular has played a significant role in attempting to unify the Syrian opposition, by conditioning their recognition of the SNC as the legitimate government of Syria on providing more assurances towards minority groups. The U.S. has been engaged in facilitating talks to unify the Syrian opposition since before the SNC’s formation, and it was the main organizer of the talks between the SNC and KNC last month. The U.S. appears to be the only power with interest in pulling this off in a non-sectarian manner, as especially Qatar and Saudi Arabia, in one way or another, have interests in supporting Sunni Islamist groups.

On February 24 Tunisia will host a meeting of the “Friends of Syria”. Much will depend on how effective these friends are in convincing the various Syrian enemies of Assad to be friends with each other.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 17, 2012

Cybersecurity Act: Collaboration v. Compliance?

Filed under: Congress and HLS,Cybersecurity,Private Sector — by Philip J. Palin on February 17, 2012

On Valentine’s Day the Senate Homeland Security and Governmental Affairs Committee released a proposed Cybersecurity Act of 2012.  The Committee’s Chairman, Joseph Lieberman (I-CT) and ranking member, Susan Collin’s (R-ME) are co-sponsors.

The roll-out has been impressive.  Check out the Committee’s website for gobs of additional background.  All-star testimony was taken on Thursday.

My HLSWatch colleague, Jessica Herrera-Flanigan has authored a persuasive piece for Roll Call pushing for quick adoption.  Rapid approval by the Senate is a big part of the legislative strategy.

Every cyber-specialist, like Jessica, I have communicated with supports the legislation.  Those on the Hill who have come out against are – so far – objecting mostly to procedural or cost concerns. (The best political update I could find on Friday morning is from Ellen Nakashima at the Washington Post.)

Yesterday I used a cross-continent flight to read the 205 pages of statutory prose.  Politico called it a “door-stop of a bill.”

Taken at face-value the language could hardly be more benign.

The clear intent is to prevent when possible – and mitigate when prevention is not possible – “the risk of national or regional catastrophic damage within the United States caused by damage or unauthorized access to information infrastructure…”

To achieve this and similar goals the legislation frames and facilitates a rather intricate process of private-public consultations, information exchange, risk analyses, certification, audits, education, research, and exercises.

In a whole host of ways the language implicitly – but quite obviously – acknowledges that cyber security is not possible without extraordinary – just for emphasis: extra-ordinary – cooperation between government and the private sector and between various elements of the private sector.

As a result, the proposed legislation goes to amazing lengths to encourage information exchange on cyber threats, vulnerabilities, and more.  For example, here are three sections of Title VII Information Sharing (page 163):

(d) EXEMPTION FROM PUBLIC DISCLOSURE.—An cybersecurity threat indicator disclosed by a non-Federal entity to a cybersecurity exchange under subsection (a) shall be— (1) exempt from disclosure under section 552(b)(3) of title 5, United States Code, or any comparable State law; and (2) treated as voluntarily shared information under section 552 of title 5, United States Code, or any comparable State law.

(e) EXEMPTION FROM EX PARTE LIMITATIONS.— Any cybersecurity threat indicator disclosed by a non-Federal entity to a cybersecurity exchange under subsection (a) shall not be subject to the rules of any governmental entity or judicial doctrine regarding ex parte communications with a decision making official.

(f) EXEMPTION FROM WAIVER OF PRIVILEGE.—Any cybersecurity threat indicator disclosed by a non-Federal entity to a cybersecurity exchange under subsection (a) may not be construed to be a waiver of any applicable privilege or protection provided under Federal, State, tribal, or territorial law, including any trade secret protection.

Please, please, please let us know when you are in danger, we promise not to hold you accountable. The federal government is made into a worried parent trying to protect a troubled teenager.

No one tells me the cyberthreat is overdone.   Most tell me it is already worse than is generally known. Threats, vulnerabilities, and consequences are expected to grow.

Everyone seems ready to agree – at least behind closed-doors – the legislation is well-intended and designed to tee-up a meaningful process of private-public consultations, not pre-ordain the results of that consultation.  If anything, many cybersecurity mavens find the proposed language entirely too tentative and toothless.

But one Chief Information Officer I talked with calls the bill a “Trojan horse, superficially attractive and deeply dangerous.”  According to this person the legislation is fundamentally flawed because it moves the focus of discussion from collaboration to compliance.  “As soon as compliance is the agenda,” he says, “the lawyers take over. We will hardly ever see a technologist again.  That’s not what we need.  They are going to replace a messy, difficult, but realistic process of collaboration with an orderly and mostly meaningless process of certification and compliance.  Risk management is hard.  Compliance is easy.  In one case you invest in real outcomes, in the other you create a legally defensible illusion.”

When I outlined the CIO’s critique to a self-defined “Hill Rat” (and lawyer) who has been involved in cybersecurity, he responded, “The lawyers are already too involved.  That’s been a problem.  It’s been easy for government relations people to show up.   We need CIOs, CTOs, CFOs, COOs, and CEOs.  One way to read the legislation is as a small but very sharp blade to cut through the veil of lawyers behind which too many of our cyber-assets are obscured.  No one wants to regulate, but we need to get real about the risk.”

As the Congressional staffer continued he went even further, “You know what?  This is really an anti-regulation bill. Unless we do something like this and get much better at the drill than today, a major system is going to be taken down and people will die.  Russian mafia, Iranian Quds, Chinese class project – who knows who?  Then just imagine the rush to regulation.”

Maybe I am overly influenced by two men who were each speaking with evident candor and concern.   But I come away thinking they are probably both right.

The issue is not so much current Congressional intent as longer-term execution.  Whenever legislation is adopted, how can we keep the focus on substantive collaboration?  Next Friday I will offer a suggestion.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 16, 2012

Friend Big Brother? Let Homeland Follow your Tweets?

Filed under: General Homeland Security — by Jessica Herrera-Flanigan on February 16, 2012

This morning the Committee on Homeland Security’s Subcommittee on Counterterrorism and Intelligence will hold a hearing entitled “DHS Monitoring of Social Networking and Media: Enhancing Intelligence Gathering and Ensuring Privacy.”   The hearing comes on the heels of several revelations about the government’s increasing surveillance of such sites as Facebook, Twitter, and blogs (including Homeland Security Watch).

DHS has been engaged in monitoring social media sites since at least 2010 to provide situational awareness and strengthen its common operating picture.   The effort is run through the  Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), and is entitled “Publicly Available Social Media Monitoring and Situational Awareness (Initiative).” Last month, the DHS Privacy Office issued a Privacy Impact Assessment for the initiative, which can be found here.

DHS apparently uses social media monitoring to assist it with responses to major disasters (e.g. Haiti earthquake) and major events (e.g. border security around the 2010 Winter Olympics).  It also uses its Initiative to monitor comments about the agency and the government, including comments that were critical of DHS and the government more broadly.

The FBI also has jumped on the social media monitoring bandwagon, issuing a Request for Information, which has a due date of February 20th for “conducting market research to determine the capabilities of the IT industry to provide a social media application.”  Among the tasks it wants help with are search capabilities, automated filtering, mapping, and the like which would help analysts analyze social media to provide warning and detection capabilities, as well as geospatially locate bad actors.   They would also help analysts predict activities, so as to provide proper response capability.

Other agencies who have dabbled in the social media monitoring space include the Federal Reserve, the Departments of Defense and State, and the Director of National Intelligence.  We can expect other agencies to come forward with an interest in entering this realm (or acknowledging their existing plans).

There are good reasons for government agencies to want to monitor social media.  First of all, it can assist law enforcement and homeland security entities with crisis management, especially in determining where assistance is needed. For example, with D.C.’s earthquake last year,  cell service was sketchy as networks were overwhelmed.  Twitter and Facebook messages on what people were seeing and experiencing thrived.  There is a predictive value in using social media monitoring tools to gather information that analysts can then take to predict future events.   Lastly, in the reputation management space, agencies can, what some privacy groups fear, use monitoring to track what people are saying about them.  Why would an agency want to do so?  Misinformation abounds on the Internet and in social media (I think I read that on a blog somewhere).  Agencies having the capability to counter that misinformation is critical.

Also, an important fact to remember in the social media monitoring space, is that, at least from what has been made public, agencies are monitoring those spaces that are “open” to the public  and others.   How is that different than government officials attending public rallies or events to hear what is being said?  If agencies are crossing into monitoring tweets or Facebook pages that are protected, that raises a different set of legal and Constitutional issues.  But my understanding is that is not the case — the material is open source.

Why its understandable that individuals would be fearful of agencies gathering intelligence on how they exercise their free speech rights, the age of social media has also changed the rules of engagement in some ways.  While we should protect privacy, we should not unnecessarily hamper our government’s ability to look at information that our voyeuristic neighbor could just as easily obtain through a few clicks and searches.

 

 

 

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 15, 2012

Love Is Not Enough

Filed under: Budgets and Spending,State and Local HLS — by Mark Chubb on February 15, 2012

You may have noticed that I have become a bit less regular about posting in my usual Wednesday slot of late. This reflects the combined effect of having too few cogent ideas about what to say and too little spare time to reflect on expanding the list.

The shortage of time arises largely from the demands of my day job as a local fire chief. If you ask the firefighters who work for me, they would probably tell you that the lack of cogent ideas is also closely connected to the job. As they like to tell me, CHAOS stands for Chief Has Arrived On Scene.

I’d like to think I am just as capable of coming up with something insightful and useful to say as I ever was. But that may be less true than I would like to admit.

Lately, the nasty issues swirling around me in my day job have come attached to people with equally nasty attitudes. People in local government are feeling very fearful and stressed about the future of their jobs. Although I would like to reassure them that things will turn out alright, they wouldn’t believe me even if it was true. And it may not be.

The little fire district I work for grew up too quickly. Now a fully-paid, career fire and rescue service employing almost 70 people, it was a volunteer outfit composed of civic-minded citizens for much of its existence. The real change began in the 1980s and 1990s when property values started to climb and development intensified. A municipal incorporation formalized governance of a part of the district, but much of it remains unincorporated even today. As the district took on paid employees, they gradually displaced the volunteers. Union representation of these employees means constant vigilance for evidence of skimming work, which means volunteers will probably never return.

Instead, the represented employees seem most likely to either work themselves out of a job or drive their employer to insolvency. It should be clear enough without much effort or thought that the first option is not terribly likely. The alternative may be on the horizon, but efforts to delay the inevitable reckoning have worked so well so far that few people believe it is actually possible.

A careful examination of how this has come to pass is pretty informative. First, firefighters have been incredibly effective at making themselves look busy, if not useful. An ever decreasing fraction of their work involves fighting or preventing fires. Factors beyond their control or ken have seen to it that this work is less necessary now than ever. Emergency medical calls and a host of other responses have filled the void left by decreasing fire activity, and now occupy 70 to 80 percent of fire service workload. The skills required to perform many of these new roles take hundreds of hours to acquire and maintain even when they are rarely used or tested.

This has made firefighters seem indispensable, which brings me to my second observation. When I was a kid, firefighters were respected, but not really revered. There was rarely a long line of applicants competing for jobs in the fire department. The work was dirty, hard, poorly paid and involved impossibly long hours. (and this remains the case in many other countries.) That changed quickly here starting in the 1970s. Today, firefighters in my community like many others earn salaries far above the median household income. And we work for a reasonably well-off community, so that’s saying something. You don’t have to look hard for evidence of how well-paid our firefighters are. The parking lot tells quite a tale, as my wife’s unemployed city planner friends have remarked on more than one occasion.

Unlike the volunteers they replaced, few of the firefighters in my agency live in the community they protect. A few live more than 100 miles away. The 48-hour work schedule accommodates this, and few demands beyond attending calls, training and performing routine maintenance means such long shifts present few hazards. Despite their unusual work schedules, firefighters in my agency get ample time-off. Our average employee works just a little more than 42 hours per week after vacation, holidays and other time adjustments.

By making themselves available to handle almost anything anyone might think to throw at them, firefighters have managed to do what no other public servants have yet accomplished: While much of the public loathes government, citizens love firefighters and rarely think of them as government employees. In fact, many people have no idea that the people protecting them are paid, much less paid well. Many people seem genuinely surprised when they learn that the firefighters work around the clock.

How could this have escaped their attention? Easily it turns out.

This brings me to my last observation: Firefighters show up. Always.

With all due respect to my friends the police, this is not true even of other emergency services. We have become so accustomed to waiting for service and not getting what we really want when it does arrive that we are genuinely surprised and generally delighted when someone responds at all.

Because firefighters have taken it upon themselves to be indispensable, they almost always look busy. Even when they aren’t particularly effective.

Truth is, we aren’t much more effective at putting out fires than we were right after they replaced the horses with motorized fire engines. Even now, if a fire gets a good enough head-start in any building, we will always play catch-up, which means waiting for the fire to consume enough fuel and get small enough again that we can put it out with the water and personnel available. Sometimes, I think the more overmatched we are, the more overwhelmed we look, the more impressed people are with our performance.

Fires don’t much care whether we have a good attitude or a bad one. When firefighting was all we did, I knew a lot of firefighters you wouldn’t want to take out in public. With the advent of emergency medical service, we have had to emphasize the soft-side. Firefighters these days are experts at displaying empathy. As such, they endear themselves to almost everyone they encounter. In the small number of instances where this does not happen, the other party often comes across worse, so firefighters can get a free pass even when they might not deserve one.

All of this may seem pretty cynical. And it probably is. People may love firefighters, but this economy has meant giving up a lot of other things we love. If firefighters become too expensive, they too shall pass. And their lack of strong connections in the communities they serve will be what decides their fate.

This should concern homeland security professionals if only because they too have come to depend on firefighters’ willingness to take on added jobs. If not firefighters, then to whom shall we turn to protect our communities?

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 14, 2012

The Never-Ending Story of BioScarity Concerns

Filed under: Biosecurity — by Alan Wolfe on February 14, 2012

There have been so many terms developed over the course of the last twenty years to describe the confluence of biotechnology, warfare, and terrorism. It used to be enough to call it “biological defense” against biological warfare agents. Then we had to worry about “bioterrorism,” since we’ve had a total of two actual bioterror cases in the United States over the past 30 years. So then we started talking about “biosecurity” concerns, which seemed pertinent due to the immense chicken and pig processing factories in the United States, where their owners had to worry about losing their livelihood due to a possible invasion of a foreign animal-transmitted virus. Because of all the DHHS and DHS grants, BL-2 and BL-3 laboratories started springing up across the nation, calling for concerns about “biosurety” procedures.  As Professor Barry Kellman observes, we need to be worried about “bioviolence,” don’t we?

So I want to invent a new word, too.

I think we need to be concerned about “BioScarity” tactics, a phenomena seen when uninformed journalists and political pundits deliberately try to scare the public through technical discussions about biological diseases and the possibility that terrorists might “harvest” one to use against the public.

Yes, we have to be concerned that terrorists are sending their minions with Petri dishes into the deepest parts of Africa for the sole purpose of capturing rare and exotic species of disease, because it is just so hard to make an impact on society if you can’t cause a mass extinction event. At least, that’s what I’ve gathered from Huffington Post reporter Lynne Peeples in her article,  “Bioterrorism Funding Withers As Death Germs Thrive in Labs, Nature.”

Wow. What an attention grabber.

It’s hard to consider how the U.S. government has spent (on average) more than five billion dollars each year since 2003 on this specific topic, which is more than the Department of Defense spends on protecting its service members from all military chemical and biological warfare agents (which is currently around $1.5 billion/yr).

And nothing should stop your wandering eyes more than the term “death germs” – it’s as if every one of the thousands of biological organisms being studied out there are just waiting to break out and cause a world-wide contagion. That is, unless you considered how the annual influenza bug kills less than one percent of those infected.

You know, details like that.

Peeples makes her case for the article’s title in one aspect, which is kind of hidden. She believes that state and local public health funds have “plummeted” since 9/11, and since they are the “first line of defense,” this is a Bad Thing.

I suppose that an economic recession, combined with budget decisions by federal and state agencies to reduce the amount of money coming into their coffers, and the more relevant threat of pandemic influenza as compared to the theoretical threat of bioterrorism, has had nothing to do with this trend.

But I digress.

I’m attacking the journalist who unwittingly became the pawns of the bioterror profiteers – those people most interested in ensuring that we, the public, remain terrified of the potential of something that hasn’t happened but twice in the last 30 years. Take this paragraph in the article:

This means a terrorist may need few tools, little training, minimal money and no published blueprint to harvest a superbug and then unleash it in food, water, air or via insect vectors such as fleas or mosquitos. “As a normal person, you can collect anthrax in Texas soil or ebola in Africa by hunting down a monkey,” says Ramon Flick, chief scientific officer at BioProtection Systems Corp., which develops anti-viral vaccines. “It’s so easy to get a potential bioterror agent in your hands.”

Yes, it really is so easy.

That explains all the failed attempts by disgruntled individuals and terrorist splinter groups to develop ricin from castor beans and all of the “white powder” alarms that occur in the thousands all over the world. It’s all because “it’s so easy to get a potential bioterror agent.”

And what would a contemporary article on “death germs” be without referencing the recent attempt by Dutch scientists to examine how avian flu might mutate to a transmissible virus that could impact humans?

She waffles on the issue – it’s just so hard to judge. On the one hand, the public health benefits of understanding how avian flu might mutate are important. On the other hand, George Koblentz of George Mason University notes, “we still shouldn’t be going around making new versions” of deadly viruses without fully considering the possible implications. Modern day life is just so complicated.

I honestly wonder about the quotes attributed to the “biosecurity experts” in this article, whether they are really that naïve to believe that more funding for public health and a global biosurveillance center will somehow allow us to avoid a “biological Chernobyl” caused either by Mother Nature or terrorists.

I don’t believe in any way that there were any intelligence indications of a “second event” after 9/11 that would involve biologics, as D.A. Henderson is quoted to say. If Ellen Gurksy believes that there is an “insidious erosion” of biodefense funding, then I kind of wonder about the continued federal funding for all of the public health and biodefense programs at DHHS, which haven’t decreased since 2003.  I think that if your mindset is like Scott Lillibridge, that we have to be “ready for anything,” then we’ll bankrupt the federal budget for threats that don’t exist yet, while ignoring all of the many other public health hazards that kill tens and hundreds of thousands of Americans every year.

I’ll just end this by noting, you can’t expect medical experts alone to advise us on how the U.S. government should protect the public from the potential threat of emerging infectious diseases and biological terrorism.

They’re really not good at developing realistic proposals that can be integrated into the practices and efforts of the larger homeland security enterprise. Their myopic focus on a singular threat without regard to threat source, funding constraints, regulations and authorities, doesn’t help us move forward.

We need a more objective and less sensationalistic view to address this real concern.

 

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 13, 2012

First blush look at the DHS budget

Filed under: Budgets and Spending,DHS News — by Philip J. Palin on February 13, 2012

An online version of the full 200 plus page President’s budget proposal is available from the White House.  The Department of Homeland Security budget proposal starts on page 117.   The total DHS budget amount is nearly the same as last year.  There are, however, some important internal shifts.

Homeland Security Funding Highlights per White House and OMB (direct quote from budget proposal):

Provides $39.5 billion,a decrease of 0.5 percent or $191 million,below the 2012 enacted level.The Budget continues strong investments in core homeland security functions such as the prevention of terrorist attacks,border security,aviation security, disaster preparedness, and cybersecurity.

Savings are created through cuts in administrative costs and the elimination of duplicative programs.The Budget also supports disaster relief through a cap adjustment, consistent with the Budget Control Act.

Makes $853 million in cuts to administrative categories including travel, overtime,and fleet management,and eliminates duplicative and low-priority programs.

Maintains frontline homeland security operations, supporting 21,186 Customs and Border Protection officers and 21,370 Border Patrol agents to facilitate legitimate travel and the movement of goods while strengthening border security.

Supports the recovery of States and communities that have been devastated by disasters and emergencies with $6.1 billion for FEMA’s Disaster Relief Fund, which includes $5.5 billion in disaster relief cap adjustments pursuant to the designation established in the Budget Control Act.

Strengthens Government cybersecurity by providing $769 million to improve security of Federal civilian information technology networks while enhancing outreach to State and local governments and critical infrastructure sectors.

Promotes innovation and economic growth by providing $650 million to fund important research and development advances in cybersecurity, explosives detection, and chemical/biological response systems.

Eliminates duplicative, stand-alone FEMA grant programs, consolidating them into a new National Preparedness Grant Program to better develop, sustain,and leverage core capabilities across the country while supporting national preparedness and response.

Aligns resources with risk in immigration detention by focusing on criminal aliens, repeat immigration law violators, recent border entrants, immigration fugitives,and other priorities,and expanding resources for electronic monitoring and intensive supervision.

Initiates acquisition of a new polar ice breaker and continues recapitalization of Coast Guard assets, including $658 million to construct the sixth National Security Cutter.

End of quote

–+–

Earlier today, practically simultaneous with the release of the President’s budget,  DHS distributed to many previous grant recipients guidance that will administratively advance the consolidation of FEMA grants referenced above.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

Syria on Monday

Filed under: International HLS,Radicalization,Strategy,Terrorist Threats & Attacks — by Philip J. Palin on February 13, 2012

Earlier today the United Nations High Commissioner for Human Rights made a report to the General Assembly regarding the situation in Syria.  Below is a small bit from the start of the report.  Please access the link for her full comments.

The violent Government crackdown on peaceful protests demanding freedom, dignity and social justice in Syria has continued unabated for eleven months now. While no exact figures can be provided due to our lack of access to the country, credible reports indicate that Syrian security forces killed well above 5,400 people last year, including civilians as well as military personnel who refused to shoot civilians.

Due to extreme difficulties in substantiating the events on the ground, it has become almost impossible for my Office to update the death toll in the past two months. However, we are certain that the number of dead and injured continues to rise every day. Tens of thousands, including children, have been arrested, with more than 18,000 reportedly still arbitrarily held in detention. Thousands more are reported missing. 25,000 people are estimated to have sought refuge in neighbouring and other countries. And more than 70,000 are estimated to have been internally displaced.

While the protests have remained largely peaceful, reports of armed attacks by anti-government fighters against Syrian forces have increased, also with consequences on civilians. According to the Government, some 2000 military and security personnel have been killed.

I am particularly appalled by the ongoing onslaught on Homs. Since 3 February, in further escalation of its assault, the Government has used tanks, mortars, rockets and artillery to pummel the city of Homs. According to credible accounts, the Syrian army has shelled densely populated neighborhoods of Homs in what appears to be an indiscriminate attack on civilian areas. More than 300 people have reportedly been killed in the city since the start of this assault ten days ago. The majority of them were victims of the shelling.

The full report is available from the Office of the High Commissioner for Human Rights.

–+–

Even as Syrian artillery continued to fire into residential areas of Homs and other cities, there was a noticeable lack of enthusiasm for the Arab League’s proposal to deploy UN peacekeepers.   Initial reactions by the United States, United Kingdom and Russia all noted that “peacekeepers” require peace as a precondition.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 12, 2012

Syria on Sunday

Filed under: International HLS,Radicalization,Strategy,Terrorist Threats & Attacks — by Philip J. Palin on February 12, 2012

Emerging from consultations in Cairo on Sunday, the Arab League is calling for a joint Arab-UN peacekeeping mission to end the 11-month conflict in Syria.

In a resolution seen by the BBC but not yet officially released, the Arab League scrapped its observer team, suspended last month, and said it was ending all diplomatic co-operation with Syria.

Damascus “categorically rejected” the resolution, a Syrian envoy said.

The League’s moves come a week after a UN Security Council resolution on Syria was vetoed by Russia and China.

The BBC’s Jeremy Bowen in Cairo says the resolution contains the toughest language on Syria by the Arab League so far and makes it much more likely that the issue will return to the Security Council.

Continue reading the BBC story

UPDATE (1435 Eastern):

An English text of the resolution is available at the Arab League website, but the site is unstable and pages are not fully loading.  I expect this is due to significant demand.  Worth checking later this evening.

MONDAY UPDATE:

The English text has disappeared.  The original Arabic text is available at: http://arableagueonline.org/wps/wcm/connect/dbd065804a2433d984769c526698d42c/7446.pdf?MOD=AJPERES

Following is the best English language summary  I have found of the Arab League resolution:

At the conclusion of its meeting in Cairo, the Council issued Resolution No. 7446 on the “follow-up developments of the situation in Syria,” which  rejected and condemned the continued killings and violence in Syria and the continued retention of the military option, which is contrary to the obligations set forth in the resolutions of the Council of the League of Arab States and the Arab Plan of Action. (Palin note: The reference to the “military option”  is ambiguous and I don’t have the Arabic to confidently clarify.)

The Council of the League of Arab States calls on the United Nations Security Council for a resolution to form an Arab peace-keeping forces jointly with the UN to oversee the implementation of a ceasefire. It was also decided to stop all forms of cooperation with the diplomatic representatives of the Syrian regime in each member state and in international bodies and conferences.

The Ministers of Foreign Affairs agreed to end the monitoring mission of the Arab League, due to problems under the protocol signed between the Syrian government and the Secretariat of the League, and drew the call to the Secretary-General to name a special envoy to pursue the political process proposed in the framework of the Arab initiative.

The Council welcomed the offer of the Tunisian Republic to host the Conference of Friends of Syria to be held on 24.02.2012, and decided to open channels of communication with the Syrian opposition and provide all forms of political and material support to it. The Council also call on the Syrian opposition to unite and engage in serious dialogue to advance its coherence and effectiveness prior to the Tunis conference.

The resolution emphasized the validity of the economic boycott with the Syrian regime, except those directly affecting the Syrian citizens in accordance with the decisions of the Council of the League on this issue.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print

February 11, 2012

Syria on Saturday

Filed under: Radicalization,Strategy,Terrorist Threats & Attacks — by Philip J. Palin on February 11, 2012

Robert Ford, the US Ambassador to Syria has posted to the embassy’s Facebook page satellite photos of Syrian armor and artillery.  The Ambassador claims, “the regime is using it to pound civilian apartment buildings and homes from a distance.”  (The US embassy in Syria has evacuated Damascus.)

According to The Guardian: ”The indiscriminate shelling is killing mostly civilians,” said Fawaz Tello, an Egyptian-based member of the opposition Syrian National Council. ”Assad cannot push his troops into street fighting … so he is content with shelling Homs to bits until civilian losses pressure the Free Syrian Army to withdraw and regime troops can enter these neighbourhoods without taking any serious losses,” Tello added.

Al Jazeera has launched a live blog featuring several videos claiming to show events unfolding inside Syria.

According to The Daily Star (Lebanon), “Shock waves from the Syrian uprising reached new levels in Lebanon Friday as armed clashes rocked the northern city of Tripoli and rattled the country. Gunfire and rocket propelled-grenades were exchanged between the pre-dominantly Alawite Tripoli neighborhood of Jabal Mohsen and mainly Sunni district Bab al-Tabbaneh.”

Monday the United Nations General Assembly will receive a report on the situation in Syria.  This weekend Saudi Arabia is pushing a resolution for General Assembly consideration.  According to the BBC, the draft “ ”fully supports” the Arab League peace plan published last month, which called on Mr Assad to hand over power to his vice-president, and make way for the rapid formation of a national unity government including the opposition. While calling for an end to the violence by all sides, it lays blame primarily on the Syrian authorities, which are strongly condemned for “continued widespread and systematic violations of human rights and fundamental freedoms”.

In a speech at George Washington University (Washington DC) on Thursday, the Turkish Foreign Minister insisted, “Will we wait and see after [last week’s] Russian and Chinese veto [on a U.N. Security Council resolution on Syria]? No, never. As Turkey, we will not simply watch a massacre taking place in our region even if everybody remains silent and indifferent.”

Nihat Ali Özcan explains in the Hurriyet Daily News (Turkey),  “The way to decrease civilian casualties and establish lasting peace is through accelerating regime change. But this does not seem possible without military support “from outside.” Even though there are some desertions from the military at the moment, instigating a disciplined and effective struggle and achieving success in a short time does not seem possible. In that case, who would provide help and how? The U.S. does not want to engage in this. The U.K. and France are not keen. The Arab League seems a little unsure and rocky. It is true that Turkey is in everybody’s mind. So here is the question: How and under what conditions could Turkey intervene in Syria?

“It seems the Turkish government’s position regarding intervention in Syria “has come to a specific maturity” thanks to the hard work of the U.S., U.K. and some Arab countries. Erdoan, Gül, Davutolu and Arnç keep signaling this. Thoughts like “Muslims [Sunni, of course] are being killed” or “the al-Assad regime is cooperating with the PKK” are useful arguments for preparing the Turkish public for an intervention. Despite all those efforts, the Turkish public still does not seem entirely ready for the intervention idea.”

The Syrian situation is principally a matter of US foreign policy.  But the perceived role of the United States vis-a-vis Syria could — almost certainly will — morph into a homeland security issue.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print
« Previous PageNext Page »