Obama presses ‘reset’ button for war on terror

Photo Credit: Flickr/White House

Photo Credit: Flickr/White House

In his national security speech on 23 May, President Obama may have focused on the specific issues of the Guantanamo detention centre and drone strikes, but he also used the speech to set out a new approach to national security and counter-terrorism that his administration has been working towards for the past four years.

This speech could mark the point at which the US government begins to shift away from a counter-terrorism approach that has become excessive and unsustainable, towards one that enables resources to be redirected towards more salient national-security issues. Obama noted that the United States could not remain at war forever and needed an exit strategy; the threat from terrorism was now from ‘lethal, yet less capable, al-Qaeda affiliates, threats to diplomatic facilities and businesses abroad, homegrown extremists’.

Read the rest of this entry »

A new path for drug law enforcement

Navy and Coast Guard personnel come alongside USS Nicholas to transfer contraband.

Navy and Coast Guard personnel come alongside USS Nicholas to transfer contraband. Photo Credit: Flickr/US Navy.

By Virginia Comolli, Research Associate for Transnational Threats

New approaches to combat the illegal drugs trade that focus on reducing the harm caused by drug markets are being debated, and have in some places been implemented, but changing the existing prohibition and enforcement ‘culture’ is proving difficult.

‘Zero tolerance’ approaches to combating the trade and use of illegal drugs, such as mandatory minimum sentences and automatic penalties, have often failed to reduce the violence associated with illicit trade. They have in some cases also led to human-rights abuses by police forces, putting them at odds with their intended role of protecting the communities they serve.

The merits of different approaches to drug law enforcement were discussed at a day-long seminar hosted by the IISS on 21 March. Part of a larger project by the International Drug Policy Consortium (IDPC), with the International Security Research Department at Chatham House and the IISS,  the seminar was aimed at law enforcement professionals and discussed global and local drug policing efforts to evaluate how police forces can help reduce the consequential harms of the drug trade.

Read the rest of this entry »

Yongbyon restart: North Korea’s new threat

Siegfried Hecker examining lathes from Yongbyon machine shop Phot W Keith Luse via Stanford University

By Mark Fitzpatrick, Director, Non-Proliferation and Disarmament Programme

Among Pyongyang’s recent inflated threats, the announced intention to ‘readjust and restart’ its nuclear facilities is the most worrisome.

If implemented, North Korea will be producing both kinds of fissile material that can create nuclear explosions: plutonium and highly enriched uranium.

The handful of nuclear weapons – from four to 10 – that North Korea presumably already possesses are based on plutonium that was produced at the small 5MW reactor at Yongbyon prior to mid-2007.

Whether it also has uranium weapons is unknown.

Why North Korea abandoned the plutonium programme and instead prioritised uranium enrichment has been a mystery.

Read the rest of this entry »

Managing risks in cyber warfare

Navy Cyber Defense Operations Command, Watchfloor
By Dr William Choong, Shangri-La Dialogue Senior Fellow for Asia-Pacific Security

It is a nondescript 12-storey building in Shanghai, but its alleged exploits in cyber hacking into American-based computers has put it at the centre of intensified tensions between China and the United States.

The alleged intrusions by China-based hackers are not entirely new. In past years, the Pentagon and Google have alleged that Chinese hackers had broken into their networks. In 2011, it was alleged that Operation Shady RAT had targeted more than 70 organisations over five years. This included the United Nations, government agencies in the US, Canada, South Korea, Taiwan and Vietnam.

But the mounting evidence of China’s support for the hacking and the growing threat posed to US infrastructure, if proven to be true, would represent an emerging Chinese way of war that is truly worrying.

Read the rest of this entry »

The battle south of Algiers

The In Amenas gas installation in Algeria. Photo: BP

By Virginia Comolli, Research Associate for Transnational Threats

Until it permitted the French air force to fly through its airspace into Mali this weekend, Algeria had been protesting for months that it would not welcome any outside military intervention to quell the rebellion in its southern neighbour. The hostage crisis unfolding in the Algerian desert, following an attack by militants on the In Amenas gas plant, one of the country’s largest, has starkly demonstrated the risks of reprisal.

So one of the most interesting questions is what accounted for Algeria’s change of heart. This is difficult to answer because decision-making in Algiers is famously opaque, and the country often takes an ambiguous stance on regional security issues.

Read the rest of this entry »

UK cyber security under fire

A satellite communications dish outside the UK Government Communications Headquarters (GCHQ) Photo MoD under an Open Government Licence

By Islam Al Tayeb, Research Analyst, IISS-Middle East

The British military could be ‘fatally compromised’ by a major cyber attack because it lacks clear contingency plans and depends on technology with no verifiable back-up systems. This was the principal warning contained within the Defence and Cyber Security Report 2013 published last week in the UK. The report said the armed forces were now completely reliant on IT, but the MPs on the committee said they were uncertain who would be responsible for what in the event of a prolonged cyber attack. ‘The government should set out details of the contingency plans it has in place should such an attack occur,’ they say. ‘If it has none, it should say so – and urgently create some.’

The report called on the government more broadly to act ‘with vigour’ to boost efforts on cyber security. ‘The cyber threat is, like some other emerging threats, one which has the capacity to evolve with almost unimaginable speed and with serious consequences for the nation’s security,’ it insisted. ‘The government needs to put in place – as it has not yet done – mechanisms, people, education, skills, thinking and policies which take into account both the opportunities and the vulnerabilities which cyber presents.’

Read the rest of this entry »

Another small step forward in El Salvador

phoca_thumb_l_foro6 President Funes

By Antonio Sampaio, Research Assistant, Survival and the Armed Conflict Database

Earlier this month, leaders of the violent street gangs of El Salvador, or maras, agreed to create safe havens (or ‘sanctuary cities’) in which they would cease to operate. This plan to stay out of ten designated municipalities, under the supervision of the International Committee of the Red Cross, involves five street gangs, among them the two largest – the Mara Salvatrucha (MS-13) and Barrio 18. Those two groups’ ceasefire in March this year significantly reduced the number of homicides in El Salvador – from 14 to five a day, the authorities say.

Justice and Security Minister Gen David Munguia Payes has welcomed the ‘sanctuary cities’ plan. When the retired army general was appointed to the role a little more than a year ago, there were widespread fears that he would step up the ‘iron fist’ (or mano dura) approach towards criminal gangs. Instead, Munguia Payes appears to have turned into a great supporter of a negotiated truce.

Although there is a large gap between agreeing to cease criminal activity and actually doing so, this month’s announcement is an important landmark for security policies in Central America. El Salvador’s security forces were previously unable to turn the tide of rising gang violence, which in 2010 reached 71 murders per 100,000, putting the country among the world’s most dangerous. But developments this year demonstrate how political negotiation with criminal and other groups can make a difference.

Read the rest of this entry »

The US–GCC Strategic Cooperation Forum: a multilateral approach to counter-terrorism

US Secretary of State Hilary Clinton visited Ridyah, Saudi Arabia for the inaugural meeting of the US–GCC Strategic Cooperation Forum in March 2012 (Photo: US State Dept)

US Secretary of State Hilary Clinton visited Ridyah, Saudi Arabia for the inaugural meeting of the US–GCC Strategic Cooperation Forum in March 2012 (Photo: US State Dept)

By Becca Wasser, Program Officer and Research Analyst, IISS–US and John Drennan, Research Assistant, IISS-US

Throughout 2012, the Gulf Cooperation Council’s (GCC) approach to counter-terrorism and security focused on building operational ties to its strongest international partner, the United States.

The US–GCC Strategic Cooperation Forum (SCF) was launched in March of this year, bringing together the foreign ministers of the GCC states and top US officials. The aim is for both sides to strengthen and better coordinate their security efforts. While the GCC has a long relationship with the US, this high-level forum illustrates the continuing importance of the Gulf region to the US national security agenda.


Read the rest of this entry »

Getting real about cybersecurity

By Nigel Inkster, Director, Transnational Threats and Political Risk

On 12 October 2012, US Defence Secretary Leon Panetta said that cyberattacks could inflict more damage on the US than 9/11. Shortly afterwards, British Foreign Secretary William Hague said the United Kingdom suffers from thousands of cyberattacks – mostly criminal – each day.

Our vulnerability to cyberattacks is increasing as we become dependent on ICT-networked systems for almost all aspects of daily life, and in particular for the smooth operation of global trading and financial systems.

At a conference on cybernorms that I attended last month at the Massachusetts Institute of Technology, a key takeaway was that governments were starting to repatriate the Internet within the confines of national sovereignty. And, at the Budapest Cyber Conference, I found myself chairing a session of non-governmental speakers addressing the reality that cyberspace was becoming militarised.

Read the rest of this entry »

The Huawei hang-up

Huawei's Charles Ding appears before the USHR17 Select Committee on Intelligence

By Randolph Bell, Managing Director, IISS-US

Huawei, the Chinese networking and telecommunications firm, is no stranger to allegations of unsavoury business practices, but last week it received perhaps its most stinging accusation yet. On Monday, the US House of Representatives Permanent Select Committee on Intelligence issued a report on Huawei and ZTE, another Chinese telecommunications company, which concluded that ‘the risks associated with Huawei’s and ZTE’s provision of equipment to US critical infrastructure could undermine core US national security interests’.

Committee Chairman Representative Mike Rogers told CBS 60 Minutes: ‘If I were an American company today … looking at Huawei, I would find another vendor if you care about your intellectual property, if you care about your consumers’ privacy, and you care about the national security of the United States of America.’

This followed other recent criticisms, including from the US House Armed Services Committee, a French senator, and the Australian government, which barred Huawei from bidding on its $38 billon national broadband network. The Canadian government is considering blocking Huawei from working on its telecommunications network.

Do these criticisms represent prudent caution in an era of increasing cyber espionage – much of which emanates from China – or the unfair singling-out of a company without evidence of wrongdoing?

Read the rest of this entry »


Get every new post delivered to your Inbox.

Join 230 other followers