A Roadmap for AI in the Intelligence Community

(Editor’s Note: This article was first published by our friends at Just Security and is the fourth in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.  This article considers a new IC approach to risk management.)

OPINION — I have written previously that the Intelligence Community (IC) must rapidly advance its artificial intelligence (AI) capabilities to keep pace with our nation’s adversaries and continue to provide policymakers with accurate, timely, and exquisite insights. The good news is that there is strong bipartisan support for doing so. The not-so-good news is that the IC is not well-postured to move quickly and take the risks required to continue to outpace China and other strategic competitors over the next decade.

In addition to the practical budget and acquisition hurdles facing the IC, there is a strong cultural resistance to taking risks when not absolutely necessary. This is understandable given the life-and-death nature of intelligence work and the U.S. government’s imperative to wisely execute national security funds and activities. However, some risks related to innovative and cutting-edge technologies like AI are in fact necessary, and the risk of inaction – the costs of not pursuing AI capabilities – is greater than the risk of action.

The Need for a Risk Framework

For each incredible new invention, there are hundreds of brilliant ideas that have failed. To entrepreneurs and innovators, “failure” is not a bad word. Rather, failed ideas are often critical steps in the learning process that ultimately lead to a successful product; without those prior failed attempts, that final product might never be created. As former President of India A.P.J. Abdul Kalam once said, “FAIL” should really stand for “First Attempt In Learning.”

The U.S. government, however, is not Silicon Valley; it does not consider failure a useful part of any process, especially when it comes to national security activities and taxpayer dollars. Indeed, no one in the U.S. government wants to incur additional costs or delay or lose taxpayer dollars. But there is rarely a distinction made within the government between big failures, which may have a lasting, devastating, and even life-threatening impact, and small failures, which may be mere stumbling blocks with acceptable levels of impact that result in helpful course corrections.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


As a subcommittee report of the House Permanent Select Committee on Intelligence (HPSCI) notes “[p]rogram failures are often met with harsh penalties and very public rebukes from Congress which often fails to appreciate that not all failures are the same. Especially with cutting-edge research in technologies … early failures are a near certainty …. In fact, failing fast and adapting quickly is a critical part of innovation.” There is a vital difference between an innovative project that fails and a failure to innovate. The former teaches us something we did not know before, while the latter is a national security risk.

Faced with congressional hearings, inspector general reports, performance evaluation downgrades, negative reputational effects, and even personal liability, IC officers are understandably risk-averse and prefer not to introduce any new risk. That is, of course, neither realistic nor the standard the IC meets today. The IC is constantly managing a multitude of operational risks – that its officers, sources, or methods will be exposed, that it will miss (or misinterpret) indications of an attack, or that it will otherwise fail to produce the intelligence policymakers need at the right time and place. Yet in the face of such serious risks, the IC proactively and aggressively pursues its mission. It recognizes that it must find effective ways to understand, mitigate, and make decisions around risk, and therefore it takes action to make sure potential ramifications are clear, appropriate, and accepted before any failure occurs. In short, the IC has long known that its operations cannot be paralyzed by a zero-risk tolerance that is neither desirable nor attainable. This recognition must also be applied to the ways in which the IC acquires, develops, and uses new technology.

This is particularly important in the context of AI. While AI has made amazing progress in recent years, the underlying technology, the algorithms and their application, are still evolving and the resulting capabilities, by design, will continue to learn and adapt. AI holds enormous promise to transform a variety of IC missions and tasks, but how and when these changes may occur is difficult to forecast and AI’s constant innovation will introduce uncertainty and mistakes. There will be unexpected breakthroughs, as well as failures in areas that initially seemed promising.

The IC must rethink its willingness to take risks in a field where change and failure is embraced as part of the key to future success. The IC must experiment and iterate its progress over time and shift from a culture that punishes even reasonable risk to one that embraces, mitigates, and owns it. This can only be done with a systematic, repeatable, and consistent approach to making risk-conscious decisions.

Today there is no cross-IC mechanism for thinking about risk, let alone for taking it. When considering new activities or approaches, each IC element manages risk through its own lens and mechanisms, if at all. Several individual IC elements have created internal risk assessment frameworks to help officers understand the risks of both action and inaction, and to navigate the decisions they are empowered to make depending upon the circumstances. These frameworks increase confidence that if an activity goes wrong, supervisors all the way up the chain will provide backing as long as the risk was reasonable, well-considered and understood, and the right leaders approved it. And while risk assessments are often not precise instruments of measurement – they reflect the quality of the data, the varied expertise of those conducting the assessments, and the subjective interpretation of the results – regularized and systematic risk assessments are nevertheless a key part of effective risk management and facilitate decision-making at all levels.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Creating these individual frameworks is commendable and leading-edge for government agencies, but more must be done holistically across the IC. Irregular and inconsistent risk assessments among IC elements will not provide the comfort and certainty needed to drive an IC-wide cultural shift to taking risk. At the same time, the unique nature of the IC, comprised of 18 different elements, each with similar and overlapping, but not identical, missions, roles, authorities, threats and vulnerabilities, does not lend itself to a one-size-fits-all approach.

For this reason, the IC needs a flexible but common strategic framework for considering risk that can apply across the community, with each element having the ability to tailor that framework to its own mission space. Such an approach is not unlike how the community is managed in many areas today – with overarching IC-wide policy that is locally interpreted and implemented to fit the specific needs of each IC element. When it comes to risk, creating an umbrella IC-wide framework will significantly improve the workforce’s ability to understand acceptable risks and tradeoffs, produce comprehensible and comparable risk determinations across the IC, and provide policymakers the ability to anticipate and mitigate failure and unintended escalation.

Critical Elements of a Risk Framework

A common IC AI risk framework should inform and help prioritize decisions from acquisition or development, to deployment, to performance in a consistent way across the IC. To start, the IC should create common AI risk management principles, like its existing principles of transparency and AI ethics, that include clear and consistent definitions, thresholds, and standards. These principles should drive a repeatable risk assessment process that each IC element can tailor to its individual needs, and should promote policy, governance, and technological approaches that are aligned to risk management.

The successful implementation of this risk framework requires a multi-disciplinary approach involving leaders from across the organization, experts from all relevant functional areas, and managers who can ensure vigilance in implementation. A whole-of-activity methodology that includes technologists, collectors, analysts, innovators, security officers, acquisition officers, lawyers and more, is critical to ensuring a full 360-degree understanding of the opportunities, issues, risks, and potential consequences associated with a particular action, and to enabling the best-informed decision.

Given the many players involved, each IC element must strengthen internal processes to manage the potential disconnects that can lead to unintended risks and to create a culture that instills in every officer a responsibility to proactively consider risk at each stage of the activity. Internal governance should include an interdisciplinary Risk Management Council (RMC) made up of senior leaders from across the organization. The RMC should establish clear and consistent thresholds for when a risk assessment is required, recommended, or not needed given that resource constraints likely will not allow all of the broad and diverse AI activities within organizations to be assessed. These thresholds should be consistent with the IC risk management principles so that as IC elements work together on projects across the community, officers have similar understandings and expectations.

The risk framework itself should provide a common taxonomy and process to:

  • Understand and identify potential failures, including the source, timeline, and range of effects.
  • Analyze failures and risks by identifying internal vulnerabilities or predisposing conditions that could increase the likelihood of adverse impact.
  • Evaluate the likelihood of failure, taking into consideration risks and vulnerabilities.
  • Assess the severity of the potential impact, to include potential harm to organizational operations, assets, individuals, other organizations, or the nation.
  • Consider whether the ultimate risk may be sufficiently mitigated or whether it should be transferred, avoided, or accepted.

AI-related risks may include, among other things, technology failure, biased data, adversarial attacks, supply chain compromises, human error, cost overruns, legal compliance challenges, or oversight issues.

An initial risk level is determined by considering the likelihood of a failure against the severity of the potential impact. For example, is there is a low, moderate, or high likelihood of supply chain compromise? Would such a compromise affect only one discrete system or are there system-wide implications? These calculations will result in an initial risk level. Then potential mitigation measures, such as additional policies, training, or security measures, are applied to lower the initial risk level to an adjusted risk level. For example, physically or logically segmenting an organization’s systems so that a compromise only touches one system would significantly decrease the risk level associated with that particular technology. The higher the likelihood of supply chain compromise, the lower the severity of its impact must be to offset the risk, and vice versa. Organizations should apply the Swiss Cheese Model of more than one preventative or mitigative action for a more effective layered defense. Organizations then must consider the adjusted risk level in relation to their tolerance for risk; how much risk (and potential consequence) is acceptable in pursuit of value? This requires defining the IC’s risk tolerance levels, within which IC elements may again define their own levels based upon their unique missions.

Understanding and considering the risk of action is an important step forward for the IC, but it is not the last step. Sometimes overlooked in risk assessment practices is the consideration of the risk of inaction. To fully evaluate potential options, decision-makers must consider whether the overall risk of doing something is outweighed by the risks of not doing it. If the IC does not pursue particular AI capabilities, what is the opportunity cost of that inaction? Any final determination about whether to take action must consider whether declining to act would cause greater risk of significant harm. While the answer will not always be yes, in the case of AI and emerging technology, it is a very realistic possibility.

And, finally, a risk framework only works if people know about it. Broad communication – about the existence of the framework, how to apply it, and expectations for doing so – is vital. We cannot hold people accountable for appropriately managing risk if we do not clearly and consistently communicate and help people use the structure and mechanisms for doing so.

Buy-in To Enhance Confidence

An IC-wide AI risk framework will help IC officers understand risks and determine when and how to take advantage of innovative emerging technologies like AI, increasing comfort with uncertainty and risk-taking in the pursuit of new capabilities. Such a risk framework will have even greater impact if it is accepted – explicitly or implicitly – by the IC’s congressional overseers. The final article in this series will delve more deeply into needed changes to further improve the crucial relationship between the IC and its congressional overseers. It will also provide a link to a full report that provides more detail on each aspect of the series, including a draft IC AI Risk Framework.

Although Congress is not formally bound by such a framework, given the significant accountability measures that often flow from these overseers, a meeting of the minds between the IC and its congressional overseers is critical. Indeed, these overseers should have awareness of and an informal ability to provide feedback into the framework as it is being developed. This level of transparency and partnership would lead to at least two important benefits: first, increased confidence in the framework by all; and second, better insight into IC decision-making for IC overseers.

Ultimately, such a mutual understanding would encourage exactly what the IC needs to truly take advantage of next-generation technology like AI: a culture of experimentation, innovation, and creativity that sees reasonable risk and failure as necessary steps to game-changing outcomes.

Read also AI and the IC: The Tangled Web of Budget and Acquisition

Read also Artificial Intelligence in the IC: Culture is Critical

Read also AI and the IC: The Challenges Ahead

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post A Roadmap for AI in the IC appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Extinction Rebellion has targeted Colombian diplomatic missions across several EU countries, including France and Italy, demanding that the nation address deforestation, coal mining, and indigenous peoples’ rights.

The hard-line climate activist group staged simultaneous protests outside several of Colombia’s diplomatic missions on Tuesday, calling on Bogota to protect biodiversity and stop deforestation. It also urged the country’s government to take action against the El Descanso open-pit coal mine, which is said to be threatening the Yukpa indigenous people.

The French branch of the activist group targeted the Colombian Embassy in Paris, vandalizing its entrance. Footage from the scene shows activists dousing the mission’s entrance in black paint, while plastering placards over its walls.

XR members then chanted slogans, lighting flares that emitted thick pink and black smoke. At least one activist was seen bathing in fake blood.

Another protest held outside Colombia’s consulate in Milan, Italy, saw that mission vandalized too. The building’s entrance was covered in fake blood, with a pile of a black substance, which looked like charcoal or coal, left by its doors.

Demonstrations also took place outside Colombia’s missions in Germany’s capital, Berlin, as well as in Madrid, Spain. Those protests appeared to be more civil, with activists rallying outside of the missions without vandalizing them.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Truckers and other motorists have been trapped in a four-mile-long traffic jam on the outskirts of the Dutch city of Rotterdam amid a protest against the government’s Covid measures.

According to local media, as many as 200 activists blocked the gates of a major port in the city’s harbor on Thursday. For several hours, they prevented any vehicles from driving in and out of the cargo hub, which, in turn, led to massive traffic congestion on the highway leading to the port. Police engaged in negotiations with the protesters, who eventually relented and left the site later in the evening.

The group behind the protest action is reportedly Dockers United, who are staunchly opposed to government Covid policies. The organization’s biggest concern is that authorities could soon make it mandatory for employees to have a vaccination or recovery certificate to enter the workplace, which, as the group argues, would be tantamount to excluding people from society on an “unconstitutional basis.” They are also generally unhappy with the curbs introduced by the Dutch government, with ‘Don’t normalize what’s not normal’ being a translation of one of their slogans.

Read more

Riot police officers face protesters in the Hague on November 12, 2021, as the PM announced new Covid-19 restrictions © Jeroen Jumelet / ANP / AFP
WATCH: Protesters, police clash after new Covid restrictions announced in the Netherlands

In fact, the Dutch government did announce earlier this month that it was working on introducing a ‘corona pass’ for the workplace, though it isn’t clear yet when this measure will be rolled out and how strict it will be.

Meanwhile, on Friday the EU country logged its highest-ever number of new Covid cases within 24 hours, with that figure reaching 23,591. Medics say they are working at capacity.

Amid the spike, the Dutch prime minister imposed a partial lockdown last Saturday, which requires bars, restaurants, cafes and supermarkets to close at 8pm, while shops selling non-essential goods are to shut by 6pm. Public gatherings are banned altogether.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

EXPERT PERSPECTIVE — On 16 June, US President Joe Biden and Russian President Vladimir Putin met for just under four hours in Geneva. This was Mr. Biden’s first meeting with Mr. Putin during his presidency and Biden is the fifth US President with whom Putin has held a summit.

Expectations for the summit were characterized as low by both sides in advance and assessed a bit more positively after the conclusion of the meeting. The meeting presented an opportunity for both leaders to present grievances and warnings to the other (and show toughness to their domestic constituencies).  Other than presenting the opportunity to blow off steam, the results of the meeting appear modest:  the agreement to return ambassadors to their posts, to resume bilateral arms control discussions, to conduct discussions on “strategic stability” and to hold unspecified consultations on cyber. In typical fashion, Mr. Putin rejected all of Mr. Biden’s assertions about Russian actions and made counter accusations referencing hostile US actions.

Of the deliverables from the summit, cyber will no doubt turn out to be the most problematic area for follow up. Mr. Biden apparently delivered to Mr. Putin a list of 16 US critical infrastructure sectors that should be considered “off limits” for cyberattacks, e.g., “red lines” not to be crossed without the risk of significant retaliation. For his part, Mr. Putin asserted that it is Russia that is the victim of cyberattacks originating from the territory of the US and it’s NATO partners and also is the victim of  attempts to interfere with Russian elections.  The challenge in cyber discussions going forward will center around three areas:  differing interpretations of the relevance of deterrence theory in today’s cyber environment, attribution, and control.

Mr. Biden’s firm comments to Mr. Putin on recent cyberattacks against the US such as the ransomware attack on Colonial Pipelines (Mr. Biden is said to have asked Mr. Putin how he would react if Russia’s pipelines were hit?) and his provision of a list of “off limits” US infrastructure entities suggests a deep belief in this administration that Russia can be deterred from engaging in future conduct of cyber operations against US targets or “sanctioning” attacks originating from the territory of the Russian Federation by criminal groups.

Unfortunately, it is highly likely that either Mr. Putin nor those who control the levers of Russian cyber operations agree that deterrence theory applies.  Deterrence only works when both sides know the other is capable of – and willing to – cause significant harm to the other.

The Russian side likely believes (and may have amply demonstrated) that the US is disproportionately vulnerable to cyber risk at every level of its economic, societal, and political infrastructure whereas Russia is not.  There is a reason the use of cyber tools has become a central feature of Russian strategic doctrine. They work and seem a legitimate tool that falls short of conventional war. Hybrid warfare using cyber tools, the Russian side would argue, is no different than the economic warfare Russia is experiencing from sanctions imposed by the US its allies.

For full access to the article, sign up to become a Cipher Brief member for just $10/mo.


“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post After Geneva: US – Russia Strategy Moving Forward appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

An Australian TV show has come up with a set of “tips and tricks” on how to bar unvaccinated loved ones from the Christmas table, and what to do if you can’t get rid of them.

Dealing with relatives who didn’t get their Covid-19 jabs is the “new dilemma” for Australians this Christmas, according to the hosts of the Sunrise morning show on the country’s Seven Network.

The program stopped short of saying that the unvaccinated shouldn’t be invited to parties at all, but dedicated a whole segment to advice for those looking to avoid “awkward encounters” during the upcoming holiday season.

Its “top tips” included being upfront and having “a peaceful and respectful” conversation about the relative’s vaccination status long before the gathering. But if that doesn’t work, you can always blame the government and its health advice.

Another way to stay clear of anti-vaxxers would be holding your Christmas celebrations at a venue outside your home and referring to the health rules there.

If those without jabs are still coming, one can stage the party outdoors to minimize the risk, the journalists suggested.

But apparently there won’t be too many awkward encounters: more than 84% of Australians aged over 16 have been fully vaccinated, government data show.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

American billionaire Bill Gates has claimed Covid-19 deaths and infections may drop below seasonal flu levels next year as more people get vaccinated and treatment improves, unless we encounter a new, more deadly variant.

Speaking on Thursday in a virtual interview at the Bloomberg New Economy Forum in Singapore, founder of Microsoft stated that vaccines, natural immunity and emerging oral treatments mean that “the death rate and the disease rate ought to be coming down pretty dramatically.”  

The tech mogul, who has been particularly vocal during the pandemic, said issues around vaccine-production capacity are likely to be replaced by distribution challenges and even waning demand.

“The vaccines are very good news, and the supply constraints will be largely solved as we get out in the middle of next year, and so we’ll be limited by the logistics and the demand,” he noted. 

He also told his audience that it remains to be seen how much demand there is for Covid-19 shots in places like Sub-Saharan Africa. 

Calling for more work to eradicate flu, Gates claimed Covid-19 rates and deaths would possibly fall below those of flu by the middle of next year, unless more deadly coronavirus variants emerge. 

The Bill and Melinda Gates Foundation has involved itself in the development of vaccines and virus surveillance, calling for a global response to the Covid-19 pandemic. The foundation has invested hundreds of millions dollars in the development and distribution of potentially lifesaving shots. 

According to the World Health Organization, influenza kills up to 650,000 people each year. At least five million people have died from Covid-19 since the pandemic began in late 2019.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Scientists in Sweden claim that a single protein in the blood could predict the onset of Type 2 diabetes nearly 20 years in advance. The breakthrough potentially affects hundreds of millions of people worldwide.

Diabetes is the world’s ninth-leading cause of death, and affects nearly half a billion people worldwide, according to the World Health Organisation (WHO). The vast majority of diabetes patients suffer from Type 2 diabetes, a condition that can lead to blindness, kidney failure, heart attacks, strokes, and lower limb amputation. Cases of diabetes quadrupled worldwide between 1980 and 2014, with unhealthy diets and lack of exercise blamed for the rise.

Read more

© Getty Images / Peter Dazeley
NHS setting up fat camps for children

However, researchers at Lund University in Malmo, Sweden claim that elevated levels of a certain protein – follistatin – in the blood can predict the onset of Type 2 diabetes regardless of a person’s age, weight, diet or activity level. In a study published last week, the scientists wrote that high levels of follistatin can predict the condition up to 19 years before symptoms appear.

To discover the link between follistatin and diabetes, the researchers tracked 5,300 people from Sweden, Italy, and the UK for between four and 19 years. Follistatin helps break down body fat, while simultaneously leading to an increase in fat in the liver. This buildup can cause fatty liver disease and Type 2 diabetes.

“This study shows that follistatin has the potential to become an important biomarker to predict future Type 2 diabetes, and it also brings us one step closer to the understanding of the mechanisms behind the disease,” Dr. Yang De Marinis, associate professor at Lund University and lead author of the study, told a university newsletter. De Marinis added that the next step for her team would be to help develop an AI-based diagnostic tool that could analyze a patient’s blood sample and use their follistatin levels – and other biomarkers – to calculate their “risk score” for Type 2 diabetes.

As follistatin levels rise in response to food intake and activity levels, the same advice for prevention of diabetes still applies. “Balanced meals, eat[ing] healthy and regular exercise are important to decrease the risk of developing Type 2 diabetes,” De Marinis told StudyFinds.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

When the PRC decides to move on Taiwan, it is unlikely to move in a manner that makes a US decision on intervention clear cut.  Should China decide, initially at least, against a full-scale invasion of that island nation, it could instead opt to try to “win without fighting.” Beijing might do so by using its large, state-controlled fishing fleet to cut smaller Taipei-controlled islands off from Taiwan itself much as the PRC is now massing fishing boats to expand Chinese-controlled seas to press claims on the Japanese Senkakus and Whitsun Reef in Philippine waters. Chinese state-owned fisheries companies – part of the so-called ‘Maritime Militia’ – serve as fronts for PLA intelligence. Using their fleets to operate in a manner somewhere between peace and conflict in the gray zone of contested control around Taiwan would allow Beijing to test whether the US and its allies are willing to help defend the island’s independence without being seen to initiate open conflict.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” – Sept. 2018, Studies in Intelligence, Vol. 62 No.

Access all of The Cipher Brief’s national-security focused expert insight by becoming a  Cipher Brief Level I Member .  

 

 

The post Why the China – Russia Relationship Should Worry You – Part Two appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

An adviser to the EU’s top court has claimed that citizens’ information in Germany is being illegally harvested, after telecom companies challenged bulk data collection.

The German data retention law was criticized on Thursday by an adviser to the Court of Justice of the European Union (CJEU), who stated that general and indiscriminate retention of traffic and location data is only allowed in exceptional cases, such as a threat to national security.

According to the adviser, bulk collection of data generates a ‘serious risk’ of leaks or improper access. It also entails a ‘serious interference’ with citizens’ fundamental rights to privacy and the protection of personal data.

Read more

(FILE PHOTO) © REUTERS/Russell Cheyne
Google won’t pay for spying on UK iPhone users

This comes after two companies, SpaceNet and Telekom Deutschland, challenged the obligation to store their customers’ telecommunications traffic data in 2016. The Administrative Court of Cologne ruled that the two companies were not obliged to retain data because such an obligation violated Union law. Germany then appealed to the Federal Administrative Court, who asked the CJEU about the compatibility of the data retention obligation.

The CJEU has often stated that indiscriminate mass surveillance does not fit within the general principles of EU law. Over a year ago it saw a similar case involving legal challenges around national bulk data collection under UK and French law. The court then ruled that only limited data collection and temporary retention were allowed. France seeks to bypass the CJEU on data retention and has asked the country’s highest administrative court (the Council of State) not to follow the EU ruling. France is waiting for the conclusion of the procedure launched by the Council of State before “assessing to what extent” national law should be changed. 

Despite recent EU court attempts to curb surveillance powers, leaked papers from June 2021 show that the national governments of the Netherlands, France, Spain, Luxembourg, Slovakia, and Estonia are pushing for a new pan-EU data retention law. They claim that data retention is essential for safeguarding public security and ensuring effective criminal investigations.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The Philippine government has accused the Chinese Coast Guard of unleashing water cannon on two supply ships in a disputed stretch of the South China Sea, claiming its boats were blocked and forced to turn around.

Manila’s Department of Foreign Affairs detailed the encounter in a statement on Wednesday, alleging that a pair of supply boats en route to the Ayungin Shoal – also known as the Second Thomas Shoal – were stopped by three Chinese vessels and “water cannoned” before they could reach their destination.

“Fortunately, no one was hurt; but our boats had to abort their resupply mission,” Foreign Affairs Secretary Teodoro Locsin said, adding that the department had conveyed its “outrage, condemnation and protest of the incident” to Beijing’s envoy to the Philippines, Huang Xilian.

The acts of the Chinese Coast Guard vessels are illegal. China has no law enforcement rights in and around these areas. They must take heed and back off.

Though both China and the Philippines claim territorial rights to the Ayungin Shoal, The Hague’s Permanent Court of Arbitration ruled in the latter country’s favor in 2016. And despite Chinese objections, the Philippines has occupied the area for much longer, after its military purposely grounded a naval vessel on the shoal in 1999.  

READ MORE: Manila backs controversial AUKUS security pact as move to fix ‘imbalance’ of power in Southeast Asia

Manila was also quick to note that the supply ships are “covered by the Philippines-United States Mutual Defense Treaty,” a pact inked with Washington in 1951 that calls for a US military response to any attack on the country, including “island territories under its jurisdiction in the Pacific Ocean, its armed forces, public vessels or aircraft.” 

Beijing so far has not commented on the alleged run-in.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !