Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Any apology for Nazism is unacceptable, Colombia’s president Ivan Duque has insisted, after photos of police academy cadets dressed up in Third Reich uniforms were uploaded online, causing outrage.

“Any apology for Nazism is unacceptable,” Duque stated in a tweet on Friday. The president said he condemned any references to those who were “responsible for the Jewish Holocaust that claimed the lives of more than 6 million people,” adding that “anti-Semitism has no place in the world.”

Duque had earlier made demands for “heads to roll” at an academy that “promotes such criminal practices,” with its director, Lieutenant Colonel Jorge Ferney Bayona Sanchez, already having been sacked.

Colombia’s defense ministry, which oversees the country’s police, also insisted in a statement that that its training programs “don’t envisage in any way an activity such as the one which took place” at the academy.

Read more

Nazi uniforms found inside the house of a man suspected of raping a 12-year-old boy at the Vargem Grande neighbourhood of Rio de Janeiro. © AFP / Rio de Janeiro Civil Police
Brazilian police discover $3.5mn trove of Nazi memorabilia at home of ‘insane psychopath’ suspected of child rape

The images of police cadets in Nazi uniforms caused anger and bewilderment among internet users.

The German and Israeli embassies in the country reacted by issuing a joint statement, in which they expressed “total rejection of any form of apology or demonstration of Nazism.” The US embassy in Bogota also said that it was “shocked and deeply disappointed” by the development.

The controversial images, in which aspiring officers were caught sporting black SS outfits with red swastika armbands and grey Wehrmacht uniforms from the World War II era, weren’t revealed in some bombshell media report, but were actually published on the official Twitter account of the Colombian police this Thursday.

The photos were taken as part of a “cultural exchange” event at the police academy in the city of Tulua, aimed at commemorating Germany and “strengthening the knowledge of our police students.” The cosplay was apparently intended to illustrate the history of German law enforcement, with more cadets pictured wearing more modern versions of the country’s police uniforms in the pictures.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Some voters in Germany’s capital, Berlin, may have to re-cast their ballots after the country’s federal election czar filed an official complaint over irregularities in a parliamentary vote held two months ago.

The election – which saw Berliners decide the makeup of the German parliament, the Bundestag, as well as select city representatives – was marred by irregularities at numerous polling stations, according to the official, Georg Thiel. 

Among the most common problems were ballot shortages and long lines, with waiting times of up to two hours. In some cases, voters were also seen casting their ballots past a 6pm cutoff – the time when all polling stations were supposed to have closed. Thiel, who was tasked with overseeing elections at federal level, saw all of the above as reason enough to raise an objection in the German capital, local media reported on Friday.

Read more

Workers remove a campaign poster showing Armin Laschet, the Christian Democratic Union’s candidate for chancellor, in Bad Segeberg, Germany, September 27, 2021. © Fabian Bimmer / Reuters
Conservative wing of Merkel’s bloc says party leadership must resign after ‘debacle’ in Germany’s general election

Thiel identified six Berlin constituencies where irregularities were allegedly rampant, potentially setting the stage for a re-do election in the city.  

It is now up to a special Bundestag committee to examine Thiel’s complaint and see if the reported violations ran afoul of German law or electoral procedures. For the vote to be repeated, however, at least one of those violations would have to be deemed serious enough to have affected the distribution of seats in the Bundestag.

The September 26 election saw outgoing Chancellor Angela Merkel’s conservatives take a historic beating, with the Social Democrats coming out on top. The Social Democratic Party (SPD) has been engaged in coalition talks with the Greens and the Free Democratic Party ever since, with the trio expected to announce a preliminary deal as early as next week.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

EXPERT PERSPECTIVE — On 16 June, US President Joe Biden and Russian President Vladimir Putin met for just under four hours in Geneva. This was Mr. Biden’s first meeting with Mr. Putin during his presidency and Biden is the fifth US President with whom Putin has held a summit.

Expectations for the summit were characterized as low by both sides in advance and assessed a bit more positively after the conclusion of the meeting. The meeting presented an opportunity for both leaders to present grievances and warnings to the other (and show toughness to their domestic constituencies).  Other than presenting the opportunity to blow off steam, the results of the meeting appear modest:  the agreement to return ambassadors to their posts, to resume bilateral arms control discussions, to conduct discussions on “strategic stability” and to hold unspecified consultations on cyber. In typical fashion, Mr. Putin rejected all of Mr. Biden’s assertions about Russian actions and made counter accusations referencing hostile US actions.

Of the deliverables from the summit, cyber will no doubt turn out to be the most problematic area for follow up. Mr. Biden apparently delivered to Mr. Putin a list of 16 US critical infrastructure sectors that should be considered “off limits” for cyberattacks, e.g., “red lines” not to be crossed without the risk of significant retaliation. For his part, Mr. Putin asserted that it is Russia that is the victim of cyberattacks originating from the territory of the US and it’s NATO partners and also is the victim of  attempts to interfere with Russian elections.  The challenge in cyber discussions going forward will center around three areas:  differing interpretations of the relevance of deterrence theory in today’s cyber environment, attribution, and control.

Mr. Biden’s firm comments to Mr. Putin on recent cyberattacks against the US such as the ransomware attack on Colonial Pipelines (Mr. Biden is said to have asked Mr. Putin how he would react if Russia’s pipelines were hit?) and his provision of a list of “off limits” US infrastructure entities suggests a deep belief in this administration that Russia can be deterred from engaging in future conduct of cyber operations against US targets or “sanctioning” attacks originating from the territory of the Russian Federation by criminal groups.

Unfortunately, it is highly likely that either Mr. Putin nor those who control the levers of Russian cyber operations agree that deterrence theory applies.  Deterrence only works when both sides know the other is capable of – and willing to – cause significant harm to the other.

The Russian side likely believes (and may have amply demonstrated) that the US is disproportionately vulnerable to cyber risk at every level of its economic, societal, and political infrastructure whereas Russia is not.  There is a reason the use of cyber tools has become a central feature of Russian strategic doctrine. They work and seem a legitimate tool that falls short of conventional war. Hybrid warfare using cyber tools, the Russian side would argue, is no different than the economic warfare Russia is experiencing from sanctions imposed by the US its allies.

For full access to the article, sign up to become a Cipher Brief member for just $10/mo.


“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post After Geneva: US – Russia Strategy Moving Forward appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Protests against renewed Covid-19 restrictions turned violent in The Hague. The unrest comes a day after several demonstrators in another Dutch city, Rotterdam, were injured amid police gunfire.

Seven people were arrested after fierce clashes broke out between law enforcement and anti-lockdown demonstrators in The Hague, the seat of the International Court of Justice (ICJ), on Saturday.

A video shared on social media shows protesters lighting firecrackers that sparked multiple fires, causing the skies in the city to glow an eerie red.

In another clip, a group of protesters could be seen knocking down a traffic pole fitted with a surveillance camera.

Dutch police reported that five of its officers were injured in the showdown with rioters. One officer was taken to hospital with a knee injury and concussion. Two others “suffered hearing damage,” while another two suffered injuries to their hands.

Read more

A burned electric scooter is seen after an anti-lockdown protest in Rotterdam, Netherlands, November 19, 2021 © AFP / Jeffrey Groeneweg
Lockdown protest described as ‘orgy of violence’

The chaotic scenes in the Netherlands’ third-largest city unfolded a day after a protest against reimposed Covid-19 restrictions in Rotterdam was marred by violence. Over 50 people were arrested in the city and three were injured after police opened fire in a bid to quell the unrest. Police later claimed that officers were “compelled to shoot at targets” to protect themselves. The three injured protesters remain in hospital, and their condition is unknown.

Protests have swept through a number of Dutch cities after the Netherlands became the first country in Western Europe since summer to go into a partial lockdown last week. Tensions soared further after the government banned New Year’s Eve fireworks displays and the Dutch parliament backed the introduction of the so-called 2G system, which would bar the unvaccinated and those who have not recently recovered from the virus from a long list of public places if introduced.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The longest lunar eclipse in over 500 years will occur in the early hours of November 19, lasting several hours.

The peak of the partial eclipse will take place in the predawn hours on Friday when 97% of the moon will be eclipsed by the Earth’s shadow. The previous longest partial eclipse took place in 2018 and lasted less than two hours, while this will last for several hours.

The eclipse will be visible from all 50 US states, Canada, and Mexico, as well as parts of South America, Polynesia, Australia, and China, according to NASA.

The moon will be at its farthest point from Earth during the eclipse, slowing its orbit and extending the time it takes to move out of the darkest part of the planet’s shadow, known as the umbra, as the moon, Earth, and sun will all be aligned. The Holcomb Observatory has released a video detailing what the eclipse will look like. 

The event will begin shortly after midnight and unlike a solar eclipse, no one will need special eyewear to view the phenomenon.

When the eclipse occurs, the moon will take on a reddish hue, with only a sliver of the actual moon visible. The event will last for several hours, making it the longest of its kind in 580 years, with the next lunar eclipse not occurring until May of 2022.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

A Canadian teenager has been arrested after allegedly stealing $36.5 million in cryptocurrency from a person in the US. The police claim it was the largest such heist involving one victim ever registered in North America.

Police in the city of Hamilton, Ontario, arrested the unidentified perpetrator on Wednesday, after over a year investigating what they have described as the biggest-ever cryptocurrency theft from a single person in either the US or Canada. Local police began a joint investigation with the Federal Bureau of Investigation and the US Secret Service Electronic Crimes Task Force in March 2020, when the theft was reported.

Read more

© AP Photo/Jiri Buller
Europol detains 10 hackers over $100 million cryptocurrency theft from celebrities

The Hamilton Police Service said it had made “multiple” seizures in excess of CA$7 million (US$5.5 million) during the arrest, which came after investigators noticed some of the stolen money had been used to buy an online username considered “rare” in the gaming community, according to a police statement.

The victim was apparently targeted by a cell phone hijack known as SIM swapping. This method involves manipulating cellular network employees to duplicate phone numbers in order to let the scammer intercept the two-factor authorization requests that allow them access to a victim’s account.

This method is considered especially potent because a lot of people use the same password for multiple sites, according to Detective Constable Kenneth Kirkpatrick, of the Hamilton Police’s cybercrimes unit. He added that cyber and cryptocurrency crimes were becoming increasingly common, but noted that the figures involved in this case were “very surprising.”

“It’s a large amount of money in anybody’s opinion,” Kirkpatrick said, adding that the case was currently in the Hamilton court system.

The police haven’t revealed the age or gender of the youth, the username they purchased, or whether they were acting alone.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Planetary alignment on Friday has offered sky-gazers around the globe a chance to witness a spectacular near-total lunar eclipse, the longest since the 1440s.

The fascinating astronomical phenomenon lasted three hours and 28 minutes – the longest in centuries, according to international space agencies. On Thursday and Friday, depending on local time zones, the Earth, Sun and Moon aligned in such a way that 97.4% of our natural satellite’s surface was darkened in shadow.

When the Moon came out of the shroud, it turned bloody or rusty red in sunlight.

The dramatic celestial show was visible in those parts of the globe where the Moon appeared above the horizon during the eclipse.

Sky watchers in North and South America, parts of Eastern Asia and Australia had a chance to witness the phenomenon.

In Russia, the partial eclipse could be seen in Siberia and the Far East. Russian space agency Roscosmos also shared images of the shadowed moon as seen from the International Space Station (ISS).

Adding to the astonishment, the Moon was very low in the sky for much of the eclipse, causing an optical illusion that made it seem larger.

While the full Moon travels through Earth’s shadow roughly two times a year, lunar eclipses are usually far shorter.

The latest event, due to its rare duration, might have affected people not only visually, but also emotionally, astrologers cautioned.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Instagram is looking to channel the anger of its users by introducing a new feature that allows them to report various problems with the app by shaking their phones.

“Have you ever used Instagram and it wasn’t working like it was supposed to? It was just really getting you… really just pissing you off?” Instagram’s head Adam Mosseri asked his followers in a clip uploaded to Twitter on Wednesday.

Well, precisely for infuriating situations like that, the platform has developed a feature it’s calling “rage shake,” he announced.

Shaking your phone will, from now on, cause a special form to pop up on screen, allowing you to instantly report issues such as photos not uploading or audio not playing.

Read more

© Pexels / Cottonbro
The culture in the grip of Instagram influencers can ruin lives and Facebook knows it. It’s time someone took responsibility

The form is also the perfect place to let out “all the emotions and feels you’ve got going on,” Mosseri insisted, assuring Instagrammers that these reports would be promptly dealt with.

Thanks to their feedback, Instagram will be able to optimize its bug-fixing process, he said. The option, which he described as a “hidden gem,” is so far available only in the US, on both iOS and Android.  

The Instagram boss gently shook his own cellphone in the clip to demonstrate the feature in action. However, it’s likely upset users may well end up rage-shaking with a good deal more passion, which could increase the risk of a gadget being damaged, or their owner or even a passerby being struck should the phone fly out of their hand.

Mosseri also didn’t advise the public what to do with their rage over media revelations about alleged shady practices by Instagram and the platform’s owner, Facebook.

Among the trove of papers recently leaked by former Facebook employee Frances Haugen was an internal study from 2020 reporting that Instagram was causing many of its young users, particularly teen girls, to suffer mental health issues and suicidal thoughts. However, the platform kept operating in the same manner despite this finding, with changes being promised only after the study made headlines this September.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

We’re starting a new segment on The Cipher Brief’s Open-Source Collection Podcast and adding to the line-up of curated headlines we bring you from around the world with expert insights on today’s news. 

The Cipher Brief’s Brad Christian talked with former CIA Officer Marc Polymeropoulos this week about what’s next for the US Government when it comes to investigating ‘Havana Syndrome’, making sure Afghan interpreters aren’t left behind and why a White House visit by Jordan’s King Abdullah was a bigger deal than some may realize.  

Cipher Brief Expert Marc Polymeropoulos served 26 years in the CIA before retiring from the Senior Intelligence Service in June 2019.  His positions included field and headquarters operational assignments covering the Middle East, Europe, Eurasia and Counterterrorism. 

Christian: What’s top of mind for you this week in the world of national security?

Polymeropoulos:  Havana Syndrome, CIA’s response to the Afghan withdrawal, and the visit of Jordan’s King Abdullah to D.C. Let’s start with Havana Syndrome.

You saw in the press the last couple of days, the notion that the CIA’s inspector general is conducting a review of CIA’s handling of healthcare, of how officers were coming to them starting in 2016 after these attacks started in Cuba. I think that’s a good thing. It’s a necessary evil. I think a lot of your listeners and readers know that I was affected by this in December of 2017. It caused my retirement in July of 2019. I’ve been very vocal on the need for healthcare for our officers.  We have to think about Havana Syndrome in three bins.

The first, is accountability and that’s good. It’s a necessary evil, but we have to look at how the agency responded to officers because that’s critical. The agency workforce is watching. I think the IG review by the CIA is good as well as a look at what’s happening in the House and Senate oversight committees as well.

The second, is continued healthcare for officers, the officers getting to Walter Reed’s National Intrepid Center of Excellence. CIA Director Bill Burns is doing that, so that’s positive.

And then the last piece is culpability. I think you also saw recently in the press, that a senior intelligence service officer who was integral in the hunt for Osama bin Laden, has been named to the task force. So, a lot of stuff is happening on Havana Syndrome, I think all of it is moving in a positive direction. I applaud Director Burns. This is something that I think is going to be at the top of the news cycle for days, weeks, and months to come.

Christian: Do you feel like now there’s a unified awareness at the entire government level outside of CIA?  Is Congress focused on this? Is the White House focused on this in the ways that you think they need to be?

Polymeropoulos: What a great question. The White House for sure. Congress has been absolutely integral both in the Senate and the House. They’re about to pass the Havana Act, which is going to provide financial relief for officers affected, but in all US government agencies. I will say that the Department of State has been woefully behind and that’s a big concern of mine. I feel for my State colleagues. There are 41 State Department officers who have been affected by this. Secretary of State Blinken has not even met with them while Director Burns has met with nearly all of the CIA victims, so State’s got a long way to go. I think we’ll look to the White House and to Congress to keep the pressure on.

Christian: These are events that are still occurring, even as they’re being investigated. Tell us a little bit about the latest that’s happened on the attack front.

Polymeropoulos: I think you see what the press reports of what can only be considered a kind of slow-rolling mass casualty event in Vienna, Austria. There were numerous State Department and intelligence officers affected at our Embassy there. Again, this is coming out in the press, so it’s important to note that. But these things are still happening and I think that we have to look back to the old counter-terrorism model that CIA employed so effectively of detect, disrupt, and deter attacks by our terrorist adversaries. We have to apply that same type of mindset to this problem set.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Christian: The Afghanistan withdrawal, there’s a lot going on there. We’ve seen reports of US airstrikes supporting Afghan forces in Kandahar. This week, it was reported that just under 50 Afghan troops requested refuge in Pakistan when their border posts near Chitral, which is a Pakistani city, was overrun. The Pakistani government let them in. And we’re seeing now an Afghan strategy focusing on protecting the capital regions and maybe ceding some of those provincial capitals.

Polymeropoulos: I look at this from a narrow optic. As a former CIA officer who was the base chief in Afghanistan between 2011 and 2012, I ran one of our paramilitary bases in eastern Afghanistan along the border with Pakistan. What is unique about life as a CIA officer out in the field, particularly in the bases, was that there were only a few of us. We had a very small number of Americans, yet we had hundreds, if not over 1,000 Afghanistan indigenous personnel, whether they were troops who were fighting with us or whether they were support personnel.  We lived with them. I think this is a little bit different than perhaps big US military’s experience with the Afghan national army.

I trusted my life to these guys. They were armed in front of us all the time. We ate together at the mess hall. We sat around the fire pit together, certainly went on patrols together. So, it’s really personal for me. I remember our Afghan interpreters. I remember our indigenous personnel and I really worry about them. The future, I think is one that certainly is bleak. I don’t support the administration’s decision for a full withdrawal. I don’t understand why we couldn’t have left a residual force, but that policy decision has been made.  I think that the things I’m looking to in the near future are even after the end of August, will the US military still conduct airstrikes in support of Afghan forces?  There is something about betraying those who really made that pact with us. That’s just something as a CIA officer that’s ingrained in us that we don’t want to do that. So, this is something I really worry about. I remember the faces of our interpreters and indigenous personnel every day. These were great heroes. I think a lot of us at CIA wouldn’t be alive today without their heroism.


 The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


Christian: The third issue you raised was interesting, the visit to D.C. by Jordan’s King Abdullah. It didn’t get a lot of press.  But you say it’s a significant story.  Tell us why.

Polymeropoulos: President Biden has had a long-standing relationship with King Abdullah. It’s a sign that Jordan is back. We call Jordan the lily pad for the United States for a lot of reasons. I mean, when you think back to 2006 and Jordan’s integral role in the Anbar Awakening, that’s when we were rallying the tribes in Iraq to fight terrorism. When you think about how the US has access to strategic bases in Jordan and when you think about the Jordanian General Intelligence Directorate as one of the US Government’s most critical counter-terrorism partners. But the fact of the matter is that under the last administration, Jordan was not treated well, so it’s really significant that Abdullah was here. I think this is a really good thing. Don’t forget that CIA Director Bill Burns was ambassador in Amman quite some time ago. I think this is a really positive development, not only for the United States going back to an old strategic partner, but also for Jordan as well, which has been a steadfast ally not only during King Abdullah’s reign, but also of course, under King Hussein before him.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post An Open-Source Brief: former CIA Officer Marc Polymeropoulos appeared first on The Cipher Brief.

find more fun & mates at SoShow now !