Objects, including spacecraft, could pierce through the universe using several black holes as a ‘shortcut’, a new study suggests.

The new theory posited by French physicist Pascal Koiran marks a break from earlier research in the field of black hole studies. Previously, it was thought that a so-called ‘wormhole’ composed of two black holes would be prone to instantly collapse, thus making it impossible for an object to successfully travel all the way from one side and out the other. However, by employing different metrics, the French scientist’s new model has arrived at a very different conclusion: “We show that the particle reaches the wormhole throat for a finite value t′1 of the time marker t′.” In essence, that means an object, for instance, a spacecraft, could pass through this wormhole portal intact and reach some far-away region of the universe, taking far less time than would be needed if traveling conventionally.

Read more

FILE PHOTO: Jeff Bezos addresses the media about the New Shepard. ©REUTERS / Isaiah J. Downing
Amazon’s Bezos predicts only limited number of people will get to remain on Earth

The study in its entirety will see the light of day in the upcoming issue of the Journal of Modern Physics D, though an abstract has been available since early October.

Yet, there are too many ifs as to whether this purely theoretical model has any bearing on the way the universe actually works. For starters, to create such a time-and-space tunnel you would need a regular black hole and a so-called white hole, which is essentially a black hole in reverse. While black holes never let anything out, their ‘twins’ never let anything in. So, according to Albert Einstein’s theory of general relativity and Nathan Rosen’s additions to it, if you were to connect the two, they would make up a bridge across time and space. However, if the laws postulated by another branch of physics, thermodynamics, are anything to go by, such a construct would be highly unstable. Perhaps more importantly, the very existence of white holes has yet to be proven beyond a reasonable doubt. At present, they remain a pure theorization, thus putting any talk of space-and-time portals on rather shaky ground.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Some voters in Germany’s capital, Berlin, may have to re-cast their ballots after the country’s federal election czar filed an official complaint over irregularities in a parliamentary vote held two months ago.

The election – which saw Berliners decide the makeup of the German parliament, the Bundestag, as well as select city representatives – was marred by irregularities at numerous polling stations, according to the official, Georg Thiel. 

Among the most common problems were ballot shortages and long lines, with waiting times of up to two hours. In some cases, voters were also seen casting their ballots past a 6pm cutoff – the time when all polling stations were supposed to have closed. Thiel, who was tasked with overseeing elections at federal level, saw all of the above as reason enough to raise an objection in the German capital, local media reported on Friday.

Read more

Workers remove a campaign poster showing Armin Laschet, the Christian Democratic Union’s candidate for chancellor, in Bad Segeberg, Germany, September 27, 2021. © Fabian Bimmer / Reuters
Conservative wing of Merkel’s bloc says party leadership must resign after ‘debacle’ in Germany’s general election

Thiel identified six Berlin constituencies where irregularities were allegedly rampant, potentially setting the stage for a re-do election in the city.  

It is now up to a special Bundestag committee to examine Thiel’s complaint and see if the reported violations ran afoul of German law or electoral procedures. For the vote to be repeated, however, at least one of those violations would have to be deemed serious enough to have affected the distribution of seats in the Bundestag.

The September 26 election saw outgoing Chancellor Angela Merkel’s conservatives take a historic beating, with the Social Democrats coming out on top. The Social Democratic Party (SPD) has been engaged in coalition talks with the Greens and the Free Democratic Party ever since, with the trio expected to announce a preliminary deal as early as next week.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

A strike of more than 20,000 metal workers in Cadiz, Spain has halted the operations of key manufacturing plants, including Airbus and Alestis, with barricades erected, roads blocked, and vehicles burned.

Cadiz, the capital of the southernmost province of the country, has become one of the main sites of protests over working conditions. The Avenida de Astilleros is currently closed to traffic, with protesters burning vehicles.

Picket lines also blocked access to major shipbuilding and industrial sites of key local companies, such as Airbus, Navantia, Dragados, Alestis, and Acerinox, causing their work to be interrupted. 

Protesters also cut off access to major industrial zones in Puerto Real and Campo de Gibraltar with barricades and bonfires. Rail traffic is also being obstructed, with pipes thrown onto the tracks.

The national police have been deployed to bring the situation under control and to protect the industrial sites. At one point on Tuesday, the strike turned into a full-scale confrontation, with protesters throwing rocks and screws at police, who reacted by firing rubber bullets. One person was arrested. 

The Federation of Metal Entrepreneurs (FEMCA), which represents major employers in the region, reiterated earlier its offer for dialogue with the workers, while stressing that the union’s requests were “unjustified” and “disproportionate.”

The workers say they will continue the strike until FEMCA provides them with an acceptable agreement.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

As information emerges about Islamic State of Khorasan, or ISIS-K – the terrorist group that claimed responsibility for last week’s suicide attack that killed 13 US service members and more than 160 Afghans – there is an increased effort to predict how Afghanistan, under Taliban rule, may emerge once again as a breeding ground for terrorist groups.

A United Nations report released in June estimates that thousands of fighters from the region had already poured into Afghanistan.  Many of them are believed to be affiliated with either the Taliban – still seen as a terrorist organization – or al Qaeda or ISIS-K.

The New York Times reports that ISIS-K was created six years ago by members of the Pakistani branch of the Taliban.  There is a range of thought among experts as to what their ability to successfully carry out a terrorist attack in a Taliban-ruled area means for the terrorist threat moving forward. 

The Cipher Brief spoke with respected terrorism experts Bruce Hoffman, Mitch Silber and Colin Clarke to get their thoughts on the current risk of terrorist attacks against Americans both home and abroad. 

Bruce Hoffman, Terrorism Expert and Professor, Georgetown University

Cipher Brief Expert Bruce Hoffman is a professor at Georgetown University and served as a commissioner on the Independent Commission to Review the FBI’s Post-9/11 Response to Terrorism and Radicalization.  He is also a Scholar-in-Residence for Counterterrorism at CIA.

Mitch Silber, Former Director of Analysis, NYPD

Cipher Brief Expert Mitch Silber served as Director of Intelligence Analysis at the New York City Police Department and served as principal advisor to the Deputy Commissioner of Intelligence on counterterrorism policy and analysis. He is now executive director of the Community Security Initiative.

Colin Clarke, Director of Policy and Research, The Soufan Group

Colin P. Clarke, Ph.D., is the Director of Policy and Research at The Soufan Group. Clarke’s research focuses on domestic and transnational terrorism, international security, and geopolitics. He is also a senior research fellow at The Soufan Center.  

The Cipher Brief: If the United Nations Report issued in June is accurate, and there are thousands of fighters from the region who have poured into Afghanistan – many associated with known terrorist groups – is there any way that the administration can say ‘mission accomplished’ in terms of degrading terrorism’s presence in Afghanistan? 

Hoffman: No. As those numbers from the report released by the United Nations Support and Sanctions Monitoring Team highlight, Afghanistan is again becoming a jihadi magnet and will likely continue to be so into the future. The suicide bomb attacks outside the gates of Kabul International Airport last Thursday underscore the multiplicity of terrorist groups already present in that country.

In addition to ISIS-K, there is the Haqqani Network, al Qaeda and, of course, the Taliban. Terrorism thrives in conditions of chaos and instability which the terrorists hope to spread to other countries and eventually across regions.

Much as Salafi-Jihadi terrorists migrated from existing battlefields in South Asia back to the Middle East, North Africa, and the Caucasus in the 1990s; spread to East and West Africa in the early 2000s; blossomed during the Arab Spring to wage civil wars in Syria, Libya, and the Sahel, in the early twenty-teens; the same phenomenon is unfolding in Afghanistan.

Silber:  Frankly, I don’t think any of the four administrations can make the claim that the policy goal of making Afghanistan inhospitable to serve as a safe haven for Al Qaeda or other similarly oriented jihadist groups has been accomplished.  Certainly, at a number of times during the last twenty years, the threat that jihadist groups, most importantly — Al Qaeda — has presented, in terms of their ability to project a threat to the United States has been diminished, the degradation of the threat was only temporary.

The Cipher Brief: How confident are you that Al Qaeda and ISIS are unable to plan and execute attacks against the U.S. domestically? 

Hoffman:  The credulous Doha negotiations with the Taliban that led to the withdrawal of U.S. military forces from Afghanistan and subsequently to the Taliban’s blitzkrieg across Afghanistan and then to the shambolic evacuation of our diplomats and citizens, has painted a huge target on America’s back. Like sharks in the water, terrorists will smell blood. As my Council on Foreign Relations colleague, Jacob Ware, and I wrote in War on the Rocks, in May, every time terrorism has forced the U.S. to withdraw from a conflict zone where it had committed ground forces, whether in Lebanon in 1984; Somalia in 1993; and Iraq in 2011, it has led to more terrorism worldwide, not less, and thus made the U.S. less safe.

At a time when our country continues to grapple with the COVID pandemic; when climate change is pulverizing the Gulf States with Hurricane Ida and California with worsening wildfires; when the January 6th insurrection at the U.S. Capitol building continues to smolder with incidents such as the bomb threat that paralyzed the area near the Library of Congress and Cannon House Office Building earlier this month; coupled with ongoing cyberattacks and peer competition from China and Russia and concerns over Iran’s nuclear aspirations; our terrorist adversaries may well conclude that the U.S. is sufficiently preoccupied or distracted by any or all of the preceding and therefore conclude that the time to strike the homeland is opportune. It would very unlikely entail a repeat of the catastrophic September 11th 2001 attacks. But a terrorist strike along the lines of the 2019 shootings at Naval Air Station Pensacola; the 2017 suicide bombing of a concert venue in Manchester, England; the coordinated suicide attacks on London transport in 2005; the 2004 Madrid commuter train bombings; or any kind of significant lone wolf incident perpetrated in the name of some existing terrorist movement would likely re-create the widespread fear and anxiety that are terrorism’s stock-in-trade. Twice in the past three years, it should also be noted, members of al-Shabaab – perhaps al Qaeda’s least technologically proficient franchise – have been arrested both in the Philippines and in an undisclosed African country engaging in the same flight training that four of the 9/11 hijackers undertook before their fateful, history-changing coordinated attack.

Silber:  At this very moment, it is unlikely that Al Qaeda or ISIS-K have the infrastructure, resources, recruits and external planning ability to strike the United States based on statements by the IC and senior DoD officials to Congress.  However, without any, or only limited external pressure by the U.S. military as a result of the retreat from Afghanistan, these networks and capabilities can be reconstituted in the coming months and certainly groups like Al Qaeda have never given up their desire to strike the American homeland.

Clarke:  I think it is unlikely that AQ or ISIS will be able to attack the U.S. homeland.  We’ve spent the better part of the past two decades shoring up homeland defense. We’ve got CT tools now that we didn’t have twenty years ago. That said, the picture could look quite different 6, 12, 18 months from now. Both of those organizations are capable of regenerating an external operations planning capability. There is also the worry of inspired attacks.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


The Cipher Brief:  Some analysts have said that morale among terrorist or Islamic extremist groups is extremely high due to the circumstances surrounding the US pullout in Afghanistan, do you agree and if so what does that mean? 

Hoffman:  Yes. Of course. Both Sunni and Shi’a terrorist movements around the globe have applauded the Taliban’s re-conquest of Afghanistan and routing of the U.S. military. For Sunni Salafi-Jihadi terrorists, the events there this past month validate the strategy articulated by Usama bin Laden just before the 2004 U.S. presidential election, when he described the ease with which al-Qaeda had been able to “bled Russia for 10 years, until it went bankrupt and was forced to withdraw in defeat” from Afghanistan in 1989, and predicted that the same fate would eventually befall the U.S. And, Sayed Hassan Nasrallah, the Secretary-General of Hezbollah, a Shi’a terrorist organization, for instance, last week delivered a sermon where he described America’s “historic and humiliating defeat in Afghanistan as representing, “the moral downfall of America.”

Silber:  Jihadi chat rooms and online extremist networks are feeling like they have the wind behind them.  It took twenty years, but before the 20th anniversary of the attacks of 9/11 an Islamic emirate has been re-established in Afghanistan.  Suddenly, what seemed impossible has become possible and Islamist insurgencies all throughout the Middle East and South Asia can take inspiration by the determination of the Taliban in their efforts to overthrow a secular democratic government and replace it with an Islamist one.

Clarke:  I do expect morale to be high among terrorist and especially Islamic extremists given the turn of events we’ve seen in Afghanistan. We’re a week and a half out from the 20-year anniversary of 9/11, and Al Qaeda leaders are returning to Afghanistan (this is being displayed in AQ propaganda). We’ve seen al-Qaeda affiliates all over the globe congratulating the Taliban for their victory. I don’t want to overstate the case here, but I do believe that what has occurred in Afghanistan will be a serious boost for the global jihadist movement right at the same time the U.S. and its allies are shifting from counterterrorism to great power competition. There will be fewer resources and energy to deal with terrorists, right at the time we have major threats metastasizing in Afghanistan, potentially with both a reinvigorated al-Qaeda and a stubbornly resilient ISKP.

Read also Mike Leiter’s Why We’re Much Safer from Terrorism Now, Than We Were After 9/11 in The Cipher Brief 

Read also Why We Need a New National Defense Strategy (for terrorism) exclusively in The Cipher Brief 


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


 

The post The Risk of Terrorism at Home and Abroad appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

When the PRC decides to move on Taiwan, it is unlikely to move in a manner that makes a US decision on intervention clear cut.  Should China decide, initially at least, against a full-scale invasion of that island nation, it could instead opt to try to “win without fighting.” Beijing might do so by using its large, state-controlled fishing fleet to cut smaller Taipei-controlled islands off from Taiwan itself much as the PRC is now massing fishing boats to expand Chinese-controlled seas to press claims on the Japanese Senkakus and Whitsun Reef in Philippine waters. Chinese state-owned fisheries companies – part of the so-called ‘Maritime Militia’ – serve as fronts for PLA intelligence. Using their fleets to operate in a manner somewhere between peace and conflict in the gray zone of contested control around Taiwan would allow Beijing to test whether the US and its allies are willing to help defend the island’s independence without being seen to initiate open conflict.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post Why the China – Russia Relationship Should Worry You – Part Two appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

This piece was first published by RUSI in London.  The views do not represent those of RUSI.

EXPERT PERSPECTIVE –The international community is coming under increasing pressure to recognise the Taliban and to unfreeze Afghan funds held by the IMF or to risk a humanitarian crisis over the winter and a resurgence of international terrorism.

As Afghanistan heads deeper into winter the desperate need is to avoid a humanitarian crisis. The World Food Programme has launched an appeal to feed up to 23 million people and Médecins sans Frontières have followed suit in the healthcare field. Fortunately, the distribution mechanisms are in place inside Afghanistan; what is needed is for the international community to ensure that UN humanitarian programmes are fully funded. This will require Western capitals to get over the shock of their recent defeat. It goes without saying that hunger and health should not be used as instruments of political leverage.

Meanwhile, it is becoming ever more apparent that the Taliban do not have the skills to administer a country which is far more complex than the Afghanistan of 1996 – when they began their previous and disastrous spell in office. They will need international assistance to stabilise the economy, get people back to work and, in time, continue the gradual infrastructure improvements which have been underway since 2002. China will doubtless be willing to assist in some areas but Beijing has already made clear that it is adopting a cautious, gradualist approach. However, there are emerging indications that the Taliban’s intransigent views are beginning to relax; such as their approval of the polio vaccination scheme and their willingness to work with UN humanitarian agencies.

The Taliban will also need outside help in defeating the threat from the Islamic State’s Khorasan Province (ISK). Already the Taliban are finding it difficult to counter similar asymmetric tactics which they used so successfully against Western forces. This is likely one of the subjects which CIA Director William Burns discussed with the Taliban during his visit on 24 August and where there is a mutual interest.

What can the international community (not just the West) realistically expect from the Taliban, following the militant group’s stunning victory? Maximalist demands will inevitably get short shrift.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


First, the Taliban should form a more inclusive government. According to multiple sources, the Taliban were intending to form such an administration had Ashraf Ghani not fled the country on 15 August. I am sceptical that this was ever their intention but former president Hamid Karzai and former reconciliation chief Abdullah Abdullah may have remained in Kabul on this understanding and Fatima Gailani, a former negotiator, insists this was the Taliban’s intention.

An inclusive government would need to include women and non-Taliban representatives from the Hazara, Uzbek and Tajik communities. It need not comprise the failed politicians and bloodstained warlords of the past, least of all Gulbuddin Hekmatyar and Abdul Rashid Dostum. It is surely time for a new generation of more technocratic Afghans to become involved in government. Some may be persuaded to return from abroad but they will need assurances for their safety.

Second, the international community should insist on female education at all levels be restored and for women to play a fuller role in society. The Taliban will baulk at this but they only need to look at Pakistan where women play an important role in an avowedly Islamic, if not Islamist, society.

Third, all neighbouring countries, as well as the wider world, want Afghanistan to commit to removing all terrorist bases and terrorists from its soil; not just ISK and Al-Qa’ida but also the Eastern Turkistan Islamic Movement, the Pakistani Taliban (TTP), anti-Iranian and anti-Indian groups, and Central Asian militant movements including the Islamic Movement of Uzbekistan.

Fourth, the Taliban should commit to allow people to join their families in exile if they wish and also cease the continuing search for and punishment of those Afghans who served the Afghan government and Western allies since 2001.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


In an ideal world there would also be a fifth request: to remove Haqqani network members from the Taliban administration. However, that pass was sold when the US negotiator Zalmay Khalilzad engaged with the Haqqanis in Doha – another result of that calamitous dialogue. Furthermore, the current reality is that the Haqqanis control both Kabul and its airport and Sirajuddin Haqqani holds the key position of interior minister.

Instead, the Haqqanis need to be persuaded to prevent Al-Qa’ida regrouping in Afghanistan. Sirajuddin’s father was close to Osama bin Laden and the group retains its Al-Qa’ida connections. Pakistan is already using the Haqqanis to bring the TTP to the negotiating table. It remains to be seen how successful this will be. It is doubtful that the Haqqanis would be willing to take military action against a group from a similar area in the tribal borderlands. However, the Haqqanis could be useful as intermediaries, if not as enforcers.

Meanwhile, the wider Taliban, usually referred to as the ‘Kandaharis’, are increasingly exasperated by the entryist Haqqanis. Although they have worked together, there was never much love lost between the two. The Kandaharis have always distrusted the Haqqanis’ proximity to the Pakistani military. Since the Taliban takeover of Afghanistan, Mullah Abdul-Ghani Baradar, whose willingness to negotiate with the Kabul government in 2008 and 2010 earned him eight years in a Pakistani prison, has been sidelined. There will doubtless be a reckoning

A lasting regret of the US’s careless withdrawal is that Washington did not conclude a broader settlement for Afghanistan involving China, Iran, Russia, India and the Central Asian Republics. From now on it is essential to include all the neighbours in the discussion of recognition and the conditions required. But first the Afghans must be helped to survive the winter.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post What Stands Between the Taliban and Recognition appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

We’re starting a new segment on The Cipher Brief’s Open-Source Collection Podcast and adding to the line-up of curated headlines we bring you from around the world with expert insights on today’s news. 

The Cipher Brief’s Brad Christian talked with former CIA Officer Marc Polymeropoulos this week about what’s next for the US Government when it comes to investigating ‘Havana Syndrome’, making sure Afghan interpreters aren’t left behind and why a White House visit by Jordan’s King Abdullah was a bigger deal than some may realize.  

Cipher Brief Expert Marc Polymeropoulos served 26 years in the CIA before retiring from the Senior Intelligence Service in June 2019.  His positions included field and headquarters operational assignments covering the Middle East, Europe, Eurasia and Counterterrorism. 

Christian: What’s top of mind for you this week in the world of national security?

Polymeropoulos:  Havana Syndrome, CIA’s response to the Afghan withdrawal, and the visit of Jordan’s King Abdullah to D.C. Let’s start with Havana Syndrome.

You saw in the press the last couple of days, the notion that the CIA’s inspector general is conducting a review of CIA’s handling of healthcare, of how officers were coming to them starting in 2016 after these attacks started in Cuba. I think that’s a good thing. It’s a necessary evil. I think a lot of your listeners and readers know that I was affected by this in December of 2017. It caused my retirement in July of 2019. I’ve been very vocal on the need for healthcare for our officers.  We have to think about Havana Syndrome in three bins.

The first, is accountability and that’s good. It’s a necessary evil, but we have to look at how the agency responded to officers because that’s critical. The agency workforce is watching. I think the IG review by the CIA is good as well as a look at what’s happening in the House and Senate oversight committees as well.

The second, is continued healthcare for officers, the officers getting to Walter Reed’s National Intrepid Center of Excellence. CIA Director Bill Burns is doing that, so that’s positive.

And then the last piece is culpability. I think you also saw recently in the press, that a senior intelligence service officer who was integral in the hunt for Osama bin Laden, has been named to the task force. So, a lot of stuff is happening on Havana Syndrome, I think all of it is moving in a positive direction. I applaud Director Burns. This is something that I think is going to be at the top of the news cycle for days, weeks, and months to come.

Christian: Do you feel like now there’s a unified awareness at the entire government level outside of CIA?  Is Congress focused on this? Is the White House focused on this in the ways that you think they need to be?

Polymeropoulos: What a great question. The White House for sure. Congress has been absolutely integral both in the Senate and the House. They’re about to pass the Havana Act, which is going to provide financial relief for officers affected, but in all US government agencies. I will say that the Department of State has been woefully behind and that’s a big concern of mine. I feel for my State colleagues. There are 41 State Department officers who have been affected by this. Secretary of State Blinken has not even met with them while Director Burns has met with nearly all of the CIA victims, so State’s got a long way to go. I think we’ll look to the White House and to Congress to keep the pressure on.

Christian: These are events that are still occurring, even as they’re being investigated. Tell us a little bit about the latest that’s happened on the attack front.

Polymeropoulos: I think you see what the press reports of what can only be considered a kind of slow-rolling mass casualty event in Vienna, Austria. There were numerous State Department and intelligence officers affected at our Embassy there. Again, this is coming out in the press, so it’s important to note that. But these things are still happening and I think that we have to look back to the old counter-terrorism model that CIA employed so effectively of detect, disrupt, and deter attacks by our terrorist adversaries. We have to apply that same type of mindset to this problem set.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Christian: The Afghanistan withdrawal, there’s a lot going on there. We’ve seen reports of US airstrikes supporting Afghan forces in Kandahar. This week, it was reported that just under 50 Afghan troops requested refuge in Pakistan when their border posts near Chitral, which is a Pakistani city, was overrun. The Pakistani government let them in. And we’re seeing now an Afghan strategy focusing on protecting the capital regions and maybe ceding some of those provincial capitals.

Polymeropoulos: I look at this from a narrow optic. As a former CIA officer who was the base chief in Afghanistan between 2011 and 2012, I ran one of our paramilitary bases in eastern Afghanistan along the border with Pakistan. What is unique about life as a CIA officer out in the field, particularly in the bases, was that there were only a few of us. We had a very small number of Americans, yet we had hundreds, if not over 1,000 Afghanistan indigenous personnel, whether they were troops who were fighting with us or whether they were support personnel.  We lived with them. I think this is a little bit different than perhaps big US military’s experience with the Afghan national army.

I trusted my life to these guys. They were armed in front of us all the time. We ate together at the mess hall. We sat around the fire pit together, certainly went on patrols together. So, it’s really personal for me. I remember our Afghan interpreters. I remember our indigenous personnel and I really worry about them. The future, I think is one that certainly is bleak. I don’t support the administration’s decision for a full withdrawal. I don’t understand why we couldn’t have left a residual force, but that policy decision has been made.  I think that the things I’m looking to in the near future are even after the end of August, will the US military still conduct airstrikes in support of Afghan forces?  There is something about betraying those who really made that pact with us. That’s just something as a CIA officer that’s ingrained in us that we don’t want to do that. So, this is something I really worry about. I remember the faces of our interpreters and indigenous personnel every day. These were great heroes. I think a lot of us at CIA wouldn’t be alive today without their heroism.


 The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


Christian: The third issue you raised was interesting, the visit to D.C. by Jordan’s King Abdullah. It didn’t get a lot of press.  But you say it’s a significant story.  Tell us why.

Polymeropoulos: President Biden has had a long-standing relationship with King Abdullah. It’s a sign that Jordan is back. We call Jordan the lily pad for the United States for a lot of reasons. I mean, when you think back to 2006 and Jordan’s integral role in the Anbar Awakening, that’s when we were rallying the tribes in Iraq to fight terrorism. When you think about how the US has access to strategic bases in Jordan and when you think about the Jordanian General Intelligence Directorate as one of the US Government’s most critical counter-terrorism partners. But the fact of the matter is that under the last administration, Jordan was not treated well, so it’s really significant that Abdullah was here. I think this is a really good thing. Don’t forget that CIA Director Bill Burns was ambassador in Amman quite some time ago. I think this is a really positive development, not only for the United States going back to an old strategic partner, but also for Jordan as well, which has been a steadfast ally not only during King Abdullah’s reign, but also of course, under King Hussein before him.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post An Open-Source Brief: former CIA Officer Marc Polymeropoulos appeared first on The Cipher Brief.

find more fun & mates at SoShow now !