Taiwan’s president unveiled the country’s combat wing of advanced US-made F-16 fighters in a ceremony on Thursday, showing its new Air Force capabilities against mainland China.

The event, held at an air base in the southern Taiwanese city of Chiayi, saw the island commission the first combat wing of F-16 fighters, developed with US support.

The F-16 upgrades, costing T$110 billion (USD$3.95 billion), have been jointly completed by American manufacturer Lockheed Martin Corp and Taiwan’s Aerospace Industrial Development Corp.

Taiwan’s leader, Tsai Ing-wen, touted the new F-16s as ensuring that the island’s defenses would be “even stronger” in the face of increased tensions with China.

In October, Beijing sent a record 150 warplanes into Taiwan’s air defense identification zone (ADIZ) in four straight days of incursions. Over the past year, China’s Air Force has increased military activity in and around Taiwan’s ADIZ, according to Taipei. 

Despite Taipei claiming it does not want to provoke a confrontation with China, the island’s president pledged that it will “do whatever it takes to defend itself.”

China has rejected claims that it is provoking conflict in Taiwan, which it sees as an integral part of its country, accusing America of “inflating” the island separatist movement, firmly stating that “Taiwan independence” is a dead end and Beijing will “take all steps” to ensure the island remains under its control. In recent years, China has become increasingly assertive about reuniting its wealthy island neighbor with the mainland.

The successful F-16 development process has been seen by Taiwan as the latest visible sign of the military partnership between Washington, DC and Taipei. Back in 2019, America approved an $8 billion sale of F-16s to Taiwan, which would bring the total number of jets in the island’s fleet to 200.

Read more

US President Joe Biden speaks in Woodstock, New Hampshire, November 16, 2021.
Biden reveals US Taiwan policy after call with Xi

During the event, the Taiwanese president praised America for remaining steadfast in its cooperation with the island despite opposition from China. “As long as we adhere to the values of democracy and freedom, there will be more like-minded countries standing on the same front with us,” Tsai said alongside US diplomat Sandra Oudkirk.

In 2019, after the US and Taiwan agreed to upgrade the F-16 fighter jets, then-Foreign Ministry spokesperson Geng Shuang threatened to sanction American firms unless the deal was halted. Beijing opposed the military partnership between Taipei and Washington, DC, arguing that the sale violated international law, harmed relations between the countries, and breached the One China policy, which America recognizes.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

EXPERT OPINION — More than 200 U.S. officers have been hunted around the globe and targeted by an adversary using a mysterious weapon that causes permanent brain injury. It’s time to get serious about fighting back.

The Authors:

Paul Kolbe served for 25 years in the CIA’s Directorate of Operations. He is currently Director of the Intelligence Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Marc Polymeropoulos worked for the CIA for 26 years. He is author of “Clarity in Crisis: Leadership Lessons from the CIA.

John Sipher worked for the CIA’s clandestine service for 28 years. He is now a nonresident senior fellow at the Atlantic Council and a co-founder of Spycraft Entertainment.

Prior to 9/11, al Qaida declared war on the United States, bombed the USS Cole, and blew up U.S. embassies in Nairobi and Dar es Salam. Despite heavy casualties, America viewed successive al Qaida terrorist attacks as somehow unique, not representative of a larger threat or state of war. We went about our business and failed to take hard action against al Qaida despite clear warning. Our failure to respond forcefully led to 9/11 and the two decades of war that followed.

Fast forward to today.  Since 2016, more than 200 U.S. officials have reportedly suffered from a mysterious series of symptoms which have caused long-lasting, debilitating injuries. Suffering from searing headaches, vertigo, vision impairment, and nausea, many victims have been formally diagnosed with traumatic brain injuries (TBI) at the Walter Reed National Military Medical Center and other leading hospitals. Family members and young children have suffered as well. Some medical tests can now confirm the markers of brain injury, similar to those suffered by victims of concussive injuries in Iraq and Afghanistan.

These injuries began with a cluster of reports from Cuba in 2016 and have become commonly referred to as Havana Syndrome. Moscow, Vienna, Belgrade, and Hanoi are among more than a dozen cities where U.S. officials reportedly have been attacked and injured. In residences, on the street, in vehicles, and even at secure U.S. facilities, U.S. officers are being hunted. Stunningly, even a close aide to CIA Director Bill Burns was reportedly attacked on a trip to India just this past August.

The CIA, after a period of confusion, delay, and even denial at times, now appears to take these threats very seriously. CIA Director Burns and Deputy Director David Cohen have publicly stated that U.S. officials are being “attacked.” They have improved health care for CIA officers who are hurt. And an agency task force is hard at work trying to obtain additional intelligence on those responsible. We credit Director Burns for his solid leadership.

The cause of these injuries? The National Academy of Sciences has pointed to Directed Energy Weapons – devices which emit microwave pulses which can inflict pain and damage tissue. The United States, Russia, China, and others have all developed Directed Energy Weapons to destroy equipment, counter drones, and control crowds. This is not science fiction.

Directed energy weapons would account for the highly directional and locational nature of these incidents. When victims can “move off the x,” the signature sounds, sensations, and pain that goes with the attacks often stop, though damage has already occurred. The amount of exposure seems to affect the degree of injury. Other technologies could be at play and are being investigated, but microwaves appear to be the most likely vector. Russia has used them before, flooding the U.S. Embassy in Moscow with microwave radiation for decades.

Regardless of form, the weapons being used in these attacks are nothing less than weapons of terror, designed to cause injury to non-combatants. Who would use such a weapon to attack U.S. intelligence officers, diplomats, and military personnel, and to what conceivable end?


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


CIA Deputy Director Cohen stated at a recent intelligence summit, that the U.S. was closer to identifying the culprit, and Politico has reported that members of the Senate Intelligence Committee are increasingly convinced that Russia or another hostile adversary is behind the attack, although reportedly, no smoking gun has been found.

As former CIA operations officers with extensive experience dealing with both counterterrorism and counterintelligence issues, we have few doubts about who will be named as the culprit. For at least a decade, Russia has conducted itself as in a state of conflict with the West in general and the United States in particular. Russia has launched cyberattacks impacting critical infrastructure and supply chains, assassinated opponents with nuclear poisons and chemical weapons, gunned down people in the streets using criminal proxies, sabotaged a Czech ammunition depot, and mounted a violent coup attempt in Montenegro. It has also bombarded the U.S. embassy in Moscow with microwave radiation and used carcinogenic “spy dust” without regard to health effects. The attacks on U.S. officials would fit this pattern of behavior.

We recognize that it is important to let the intelligence community do its job and its findings must inform policy action. Congress and the administration must work together to formulate a range of possible responses and it is not too early to begin. As Senator Collins and others have stated, these attacks are “an act of war,” and as such, preparation for a future attribution call by the national security establishment is in order. So how could the U.S. respond?

Let’s start with what doesn’t work – sanctions. Sanctions feel good and satisfy an action imperative but they are feckless. Sanctions have not stopped Russia from killing dissidents, halted the Nordstream II pipeline, compelled a pull back from occupied territories, reduced support for tyrants, or hindered oil and gas production. Sanctions have simply forced Russia to develop more creative money laundering and sanction circumvention mechanisms.

So, what would work? For starters, we must understand that the Putin regime considers itself in a state of conflict with the U.S., short of war, but nonetheless deadly real. We are dealing with a state sponsor of terror which conducts operations across the globe to weaken the U.S. abroad, divide it from its allies, and sow discord at home. Our policy must be calibrated to win this conflict, without sparking a shooting war, but at risk of one.

Russia understands reciprocity and strength. When four Russian diplomats were kidnapped by extremists in Beirut in 1985, and one of them was killed, Russia reportedly responded by kidnapping and gruesomely killing a relative of the group’s leader. The surviving diplomats were released immediately. The story may be apocryphal, but it does illustrate the Russian approach. Tempting as it may be for America to retaliate tit for tat, we need not mirror Russia’s actions. Instead, we should play to our greater economic, diplomatic, and military advantages.

We offer five elements to frame a response: enlist U.S. allies, expand forward deterrence, limit the adversary’s reach, choke off money, and bring those accountable to justice.

NATO: With proof of the attacks on U.S. officials, we should activate NATO’s Article Five collective defense clause. The only other time this was enacted was after 9/11. As justification, in addition to the Havana Syndrome attacks, (which also caused Canadian casualties), we would include GRU and FSB assassination operations across Europe, deadly sabotage in the Czech Republic, a coup attempt in Montenegro, persistent cyberattacks, and a litany of other actions that can only be described as irregular warfare directed against NATO members.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Forward Presence: A crystal clear signal that we understand the nature of Russian hybrid warfare and are responding would be to enhance our deployed military presence in Poland, the Baltic States, and in the Black Sea region. These units would pose no offensive threat to Russia but would be a clear signal that the U.S. is prepared to counter any Russian shenanigans. We should also significantly ramp up our lethal aid and training to the Ukraine, where the nature of Russian aggression is well known. Weakness in Eastern Europe is an invitation to conflict.

Travel and Presence: We should drastically limit Russian business and tourist travel which is being used as cover for FSB and GRU operations. We would reduce Russian diplomatic presence in each capital to the bare minimum – handfuls not hundreds. American and European counterintelligence experts believe there are more Russian intelligence officers operating from embassies than during the Cold War. Limiting the size of Russia’s espionage infrastructure will complicate the planning and execution of all of its intelligence operations.

Finance: A key tool in counterterrorism operations is the ability to target sources of finance which constitute material support to terrorism. In this case, we would apply that principle to the Russian government, state enterprises, and individuals who provide cover, tools, and sources of funding to Russia’s campaign to undermine the West with violence, terror, and media manipulation. Russia’s dirty money has been used to undermine the west and poison our politics. We should limit the easy access of shady money to western banks.

Criminal Cases: We need bring war crime cases to the International Court of Justice (ICJ) in the Hague. Following a decade of conflict in the Balkans, the ICJ brought to justice 161 indicted Serbian, Croatian, and Bosnian war criminals. This was an astounding success – a manhunt which included American and European law enforcement and intelligence services. Just as in Nuremberg after World War II, these actions to hold war criminals accountable drew a line in the sand.

This is a start.  Successive Democratic and Republican administrations have pursued Russia policies which represent the triumph of hope over experience. We have treated the symptoms of malign Russian actions rather than the underlying pathology. It is now time to finally acknowledge that we are in a long-term hybrid conflict and forget the fantasy of changing Putin’s behavior. Only a new regime in the Kremlin would hold the hope of bringing about a change in actions. Eventually, the Putin regime will wither or collapse, but until it does, we and our allies must do a better job of defending ourselves.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post Havana and the Global Hunt for U.S. Officers appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Israel has allegedly launched two missiles targeting an area south of the Syrian capital, Damascus, Syria’s state media reported, noting that one of the projectiles was intercepted. There are no reports of damage.

The reported attack took place shortly after midnight on Wednesday local time, according to Syria’s SANA news agency. The projectiles came from the direction of the Israeli-occupied Golan Heights, the outlet noted. The strike targeted an “empty building” south of the capital and resulted in no losses, according to the report.

Read more

Historic town of the Crusader city of Tartus, Tartous, built on the antique citadel, Syria, Middle East, West Asia. © Global Look Press / imagebroker / Egmont Strigl
Syria accuses Israel of missile strikes near Russian base

Israel routinely makes incursions into Syria under the pretext of taking out alleged Iranian outposts there. The Israel Defense Forces (IDF) typically refrain from commenting on the raids, in line with its long-standing policy on military operations conducted outside its borders. Just over a week ago, two Syrian soldiers were injured in reported Israeli missile strikes on the cities of Tartus and Homs, near Russia’s naval base. The bombing also reportedly inflicted material losses. 

Damascus has repeatedly condemned Israeli attacks against its territory as violations of its sovereignty. Russia, Iran, and Turkey have also denounced the Israeli airstrikes in Syria as a breach of international law.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The International Criminal Court has halted an investigation into alleged rights abuses carried out by Philippines authorities as part of a harsh crackdown on the drug trade, saying it is reviewing a deferral request from Manila.

The ICC’s chief prosecutor Karim Khan said the probe was suspended after the Philippines government filed a request to defer the case earlier this month, according to court documents cited by Reuters on Friday. 

“The prosecution has temporarily suspended its investigative activities while it assesses the scope and effect of the deferral request,” he wrote, adding that the court is seeking more information from the government in Manila.

Based in The Hague, the ICC allows states to ask for postponements if they conduct their own investigations into the charges in question. President Rodrigo Duterte’s administration filed its deferral request on November 10, while the country’s Justice Ministry announced its own investigation into the alleged abuses late last month.

Read more

Relatives of drug war victims hold photographs of their slain loved ones with placards calling for justice (FILE PHOTO) © REUTERS/Eloisa Lopez
Philippines announces probe into thousands of killings during Duterte’s war on drugs as initial review suggests abuses took place

The court initially opened the probe in September over allegations that Philippines police had carried out thousands of extrajudicial executions and used other brutal tactics against suspected drug dealers, and that Duterte gave implicit backing to those actions. Activists have accused authorities of killing innocent people, including children, though the police insist they only use violence in self-defense.

While Duterte has declined to cooperate with the ICC probe, saying it has no authority on the island nation, and even pulled the Philippines out of the international body in 2019, the court has jurisdiction to investigate alleged violations committed by the country while it was still a member.

The president’s chief legal counsel, Salvador Panelo, confirmed the deferral request in brief comments to Reuters, saying “There is no inconsistency with the request for suspension of action,” though he did not elaborate.

Since its founding some 20 years ago, the ICC has successfully convicted just five people of war crimes or crimes against humanity – all leaders of armed movements in Africa, including in Mali, Uganda and the Democratic Republic of the Congo.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

NEW YORK, Nov 19 (IPS) – A week has gone by since COP 26 with 197 Parties ended in the Scottish city of Glasgow on extended time last Saturday. Climate change which covers wide array of issues affecting all living beings engaged the people around the world for COP 26 in a way never experienced since COP1 was held in Berlin in 1995.

Read the full story, “Glossing Over in Glasgow – Some Thoughts on COP26”, on globalissues.org

find more fun & mates at SoShow now !

Austria will introduce a full lockdown that could last for three weeks on Monday in an attempt to tackle a new wave of Covid-19 infections. The government has also ordered the entire population to get vaccinated from February 1.

On Friday, conservative Chancellor Alexander Schallenberg told a news conference that a complete lockdown of the nation would begin on Monday and last for an initial 10 days.

Read more

French President Emmanuel Macron (FILE PHOTO) © REUTERS/Sarah Meyssonnier
Macron discloses whether lockdown for unvaccinated will be necessary in France

He stated that the restrictions could be extended if infection rates did not start to fall, but he insisted the lockdown would not exceed 20 days.

The measures concern the entire Austrian population. The government has already imposed a partial lockdown on the unvaccinated in an effort to reduce hospitalization rates amid a surge in Covid-19 cases.

When the full lockdown ends, restrictions will remain in place for the unvaccinated.

Schallenberg’s announcement came after a meeting of nine state governors, two of whom had already vowed to introduce full lockdowns in their regions on Monday, in the western province of Tyrol.

The chancellor also announced that vaccinations would be mandatory from February 1. “We haven’t been able to convince enough people to vaccinate. For too long, I and others have assumed that you can convince people to get vaccinated,” he added, giving his rationale for the mandate.

Schallenberg said he lamented the political forces, radical opposition, and fake news fighting against vaccination.

Austria has one of the lowest vaccination rates in western Europe, with only 65% inoculated against the deadly virus according to data from Johns Hopkins university.

Infection rates are almost among the highest on the continent. The seven-day incidence rate stands at 971.5 per 100,000 people.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

EXPERT PERSPECTIVE — On 16 June, US President Joe Biden and Russian President Vladimir Putin met for just under four hours in Geneva. This was Mr. Biden’s first meeting with Mr. Putin during his presidency and Biden is the fifth US President with whom Putin has held a summit.

Expectations for the summit were characterized as low by both sides in advance and assessed a bit more positively after the conclusion of the meeting. The meeting presented an opportunity for both leaders to present grievances and warnings to the other (and show toughness to their domestic constituencies).  Other than presenting the opportunity to blow off steam, the results of the meeting appear modest:  the agreement to return ambassadors to their posts, to resume bilateral arms control discussions, to conduct discussions on “strategic stability” and to hold unspecified consultations on cyber. In typical fashion, Mr. Putin rejected all of Mr. Biden’s assertions about Russian actions and made counter accusations referencing hostile US actions.

Of the deliverables from the summit, cyber will no doubt turn out to be the most problematic area for follow up. Mr. Biden apparently delivered to Mr. Putin a list of 16 US critical infrastructure sectors that should be considered “off limits” for cyberattacks, e.g., “red lines” not to be crossed without the risk of significant retaliation. For his part, Mr. Putin asserted that it is Russia that is the victim of cyberattacks originating from the territory of the US and it’s NATO partners and also is the victim of  attempts to interfere with Russian elections.  The challenge in cyber discussions going forward will center around three areas:  differing interpretations of the relevance of deterrence theory in today’s cyber environment, attribution, and control.

Mr. Biden’s firm comments to Mr. Putin on recent cyberattacks against the US such as the ransomware attack on Colonial Pipelines (Mr. Biden is said to have asked Mr. Putin how he would react if Russia’s pipelines were hit?) and his provision of a list of “off limits” US infrastructure entities suggests a deep belief in this administration that Russia can be deterred from engaging in future conduct of cyber operations against US targets or “sanctioning” attacks originating from the territory of the Russian Federation by criminal groups.

Unfortunately, it is highly likely that either Mr. Putin nor those who control the levers of Russian cyber operations agree that deterrence theory applies.  Deterrence only works when both sides know the other is capable of – and willing to – cause significant harm to the other.

The Russian side likely believes (and may have amply demonstrated) that the US is disproportionately vulnerable to cyber risk at every level of its economic, societal, and political infrastructure whereas Russia is not.  There is a reason the use of cyber tools has become a central feature of Russian strategic doctrine. They work and seem a legitimate tool that falls short of conventional war. Hybrid warfare using cyber tools, the Russian side would argue, is no different than the economic warfare Russia is experiencing from sanctions imposed by the US its allies.

For full access to the article, sign up to become a Cipher Brief member for just $10/mo.


“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post After Geneva: US – Russia Strategy Moving Forward appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

France’s best-known book of words, Le Petit Robert dictionary, has caused a stir by including the non-binary personal pronoun as an alternative to the existing masculine and feminine terms.

While the annual update of the Petit Robert dictionary is often a topic of considerable debate in French media, the latest edition has caused quite the backlash, with some, including a cabinet member, accusing it of pandering to wokeism.

The word “iel,” a neologism combining the French words for he and she (“il” and “elle“), is described as the personal pronoun for a person of any gender. “Personal pronoun subject to the third person singular and plural, used to evoke a person of any gender. The use of the pronominal in inclusive communication,” the dictionary’s entry reads. 

Read more

(FILE PHOTO) © REUTERS/Costas Baltas
France turns to Ancient Greece for war on woke

Striking out at the latest inclusion, François Jolivet, an MP in President Emmanuel Macron’s LREM party took his protest to the Académie Française, the official guardians of the French language.  

Describing the move as “wokeism,” Jolivet said in a letter to the Académie that the word “iel” had no place in the French language and claimed it would be a precursor to the rise of ‘woke’ ideology, which undermines the values of the Gallic nation.

Outspoken Education Minister Jean-Michel Blanquer also chimed in. “Inclusive writing is not the future of the French language,” he tweeted, sharing Jolivet’s letter. “Just as our schoolchildren are consolidating their basic skills, they don’t need to have this as a reference,” he added.

The head of Gaullist party Debout La France, Nicolas Dupont-Aignan, further criticized Petit Robert’s “woke” addition. “Let’s defend our language against these ridiculous fanatics of deconstruction and let’s boycott the collaborators who give into them,” he tweeted.  

Le Petit Robert has responded to the “lively debate” by claiming that the pronoun has been used increasingly in society in recent months and they chose to reflect this by adding it to their latest update. The publication also said that some have welcomed the addition.

France’s offensive against wokeism, which has been described by some as an Anglo-Saxon import, recently saw Blanquer vow to increase the teaching of ancient Greek and Latin languages. The education minister claims that the classical vernaculars respond to a demand for logos (language as a tool for reason), in a world where “a lack of reason is spreading like wildfire.” 

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

The planned introduction of chemical castration for serial rapists in Pakistan has been dropped due to objections from experts in Islamic law, who said such punishment would be counter to Sharia.

The controversial clause in a bill amending criminal law in Pakistan was dropped before the National Assembly voted on it on Wednesday, a parliament official said on Friday. If it were passed, it would have been unconstitutional, Parliamentary Secretary for Law and Justice Maleeka Bokhari explained. The basic law of the country requires all its laws to be in line with the Sharia and the Koran.

Bokhari said the decision to drop the clause was taken due to objections from the Council of Islamic Ideology, a constitutional body that advises the government of Pakistan on the intricacies of Islamic law.

Read more

© publicdomainpictures.net
Outrage as teen’s rapist spared jail time

The bill amends Pakistan’s Penal Code and Criminal Procedure Code to streamline investigations and prosecutions of sexual crimes as part of wider anti-rape reform. Some conservative lawmakers vocally argued against the castration clause as the piece of legislation was moving towards approval. Senator Mushtaq Ahmed from the Islamist Jamaat-i-Islami party argued that rapists should be hanged publicly, while castration was never mentioned in Sharia.

A separate bill also approved by the parliament on Wednesday introduces a system of special regional investigators for rape allegations to be appointed by the prime minister, as well as new protections for victims, and punishments for officials who fail to investigate their complaints properly. Among other things, it makes evidence that a victim is “generally of immoral character” inadmissible in court.

The reform is necessary because currently deterrence of sexual crimes in Pakistan is undermined by “poor investigation, archaic procedures and rules of evidence and delay in the trial,” the bill said.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !