Nadya Zafira, an international relations student at Indonesia’s Gadjah Mada University, won a writing competition for her letter to UN chief António Guterres, in which she addressed the inequalities laid bare by the COVID-19 pandemic, and how indigenous communities and youth are marginalized in global conversations on climate crisis.

Read the full story, “First Person: ‘Bridge the gap between indigenous youth and the world’”, on globalissues.org

find more fun & mates at SoShow now !

Any apology for Nazism is unacceptable, Colombia’s president Ivan Duque has insisted, after photos of police academy cadets dressed up in Third Reich uniforms were uploaded online, causing outrage.

“Any apology for Nazism is unacceptable,” Duque stated in a tweet on Friday. The president said he condemned any references to those who were “responsible for the Jewish Holocaust that claimed the lives of more than 6 million people,” adding that “anti-Semitism has no place in the world.”

Duque had earlier made demands for “heads to roll” at an academy that “promotes such criminal practices,” with its director, Lieutenant Colonel Jorge Ferney Bayona Sanchez, already having been sacked.

Colombia’s defense ministry, which oversees the country’s police, also insisted in a statement that that its training programs “don’t envisage in any way an activity such as the one which took place” at the academy.

Read more

Nazi uniforms found inside the house of a man suspected of raping a 12-year-old boy at the Vargem Grande neighbourhood of Rio de Janeiro. © AFP / Rio de Janeiro Civil Police
Brazilian police discover $3.5mn trove of Nazi memorabilia at home of ‘insane psychopath’ suspected of child rape

The images of police cadets in Nazi uniforms caused anger and bewilderment among internet users.

The German and Israeli embassies in the country reacted by issuing a joint statement, in which they expressed “total rejection of any form of apology or demonstration of Nazism.” The US embassy in Bogota also said that it was “shocked and deeply disappointed” by the development.

The controversial images, in which aspiring officers were caught sporting black SS outfits with red swastika armbands and grey Wehrmacht uniforms from the World War II era, weren’t revealed in some bombshell media report, but were actually published on the official Twitter account of the Colombian police this Thursday.

The photos were taken as part of a “cultural exchange” event at the police academy in the city of Tulua, aimed at commemorating Germany and “strengthening the knowledge of our police students.” The cosplay was apparently intended to illustrate the history of German law enforcement, with more cadets pictured wearing more modern versions of the country’s police uniforms in the pictures.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Israel has allegedly launched two missiles targeting an area south of the Syrian capital, Damascus, Syria’s state media reported, noting that one of the projectiles was intercepted. There are no reports of damage.

The reported attack took place shortly after midnight on Wednesday local time, according to Syria’s SANA news agency. The projectiles came from the direction of the Israeli-occupied Golan Heights, the outlet noted. The strike targeted an “empty building” south of the capital and resulted in no losses, according to the report.

Read more

Historic town of the Crusader city of Tartus, Tartous, built on the antique citadel, Syria, Middle East, West Asia. © Global Look Press / imagebroker / Egmont Strigl
Syria accuses Israel of missile strikes near Russian base

Israel routinely makes incursions into Syria under the pretext of taking out alleged Iranian outposts there. The Israel Defense Forces (IDF) typically refrain from commenting on the raids, in line with its long-standing policy on military operations conducted outside its borders. Just over a week ago, two Syrian soldiers were injured in reported Israeli missile strikes on the cities of Tartus and Homs, near Russia’s naval base. The bombing also reportedly inflicted material losses. 

Damascus has repeatedly condemned Israeli attacks against its territory as violations of its sovereignty. Russia, Iran, and Turkey have also denounced the Israeli airstrikes in Syria as a breach of international law.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Corin Stone, Washington College of Law

Corin Stone is a Scholar-in-Residence and Adjunct Professor at the Washington College of Law.  Stone is on leave from the Office of the Director of National Intelligence (ODNI) where, until August 2020, she served as the Deputy Director of National Intelligence for Strategy & Engagement, leading Intelligence Community (IC) initiatives on artificial intelligence, among other key responsibilities. From 2014-2017, Ms. Stone served as the Executive Director of the National Security Agency (NSA).

(Editor’s Note: This article was first published by our friends at Just Security and is the third in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.)

OPINION — As I have written earlier, there is widespread bipartisan support for radically improving the nation’s ability to take advantage of artificial intelligence (AI). For the Intelligence Community (IC), that means using AI to more quickly, easily, and accurately analyze increasing volumes of data to produce critical foreign intelligence that can warn of and help defuse national security threats, among other things. To do that, the IC will have to partner closely with the private sector, where significant AI development occurs. But despite the billions of dollars that may ultimately flow toward this goal, there are basic hurdles the IC still must overcome to successfully transition and integrate AI into the community at speed and scale.

Among the top hurdles are the U.S. government’s slow, inflexible, and complex budget and acquisition processes. The IC’s rigid budget process follows the standard three-year cycle for the government, which means it takes years to incorporate a new program and requires confident forecasting of the future. Once a program overcomes the necessary hurdles to be included in a budget, it must follow a complex sequence of regulations to issue and manage a contract for the actual goods or services needed. These budget and acquisition processes are often considered separately as they are distinct, but I treat them together because they are closely related and inextricably intertwined in terms of the government’s purchasing of technology.

Importantly, these processes were not intended to obstruct progress; they were designed to ensure cautious and responsible spending, and for good reason. Congress, with its power of the purse, and the Office of Management and Budget (OMB), as the executive branch’s chief budget authority, have the solemn duty to ensure wise and careful use of taxpayer dollars. And their roles in this regard are vital to the U.S. government’s ability to function.

Unfortunately, despite the best of intentions, as noted by some in Congress itself, the budget process has become so “cumbersome, frustrating, and ineffective” that it has weakened the power of the purse and Congress’ capacity to govern. And when complicated acquisition processes are layered on top of the budget process, the result is a spider web of confusion and difficulty for anyone trying to navigate them.

The Need for Speed … and Flexibility and Simplicity

As currently constructed, government budget and acquisition processes cause numerous inefficiencies for the purchase of AI capabilities, negatively impacting three critical areas in particular: speed, flexibility, and simplicity. When it comes to speed and flexibility, the following difficulties jump out:

  • The executive branch has a methodical and deliberate three-year budget cycle that calls for defined and steady requirements at the beginning of the cycle. Changing the requirements at any point along the way is difficult and time-consuming.
  • The IC’s budgeting processes require that IC spending fit into a series of discrete sequential steps, represented by budget categories like research, development, procurement, or sustainment. Funds are not quickly or easily spent across these categories.
  • Most appropriations expire at the end of each fiscal year, which means programs must develop early on, and precisely execute, detailed spending plans or lose the unspent funds at the end of one year.
  • Government agencies expend significant time creating detailed Statements of Work (SOWs) that describe contract requirements. Standard contract vehicles do not support evolving requirements, and companies are evaluated over the life of the contract based on strict compliance with the original SOW created years earlier.

These rules make sense in the abstract and result from well-intentioned attempts to buy down the risk of loss or failure and promote accountability and transparency. They require the customer to know with clarity and certainty the solution it seeks in advance of investment and they narrowly limit the customer’s ability to change the plan or hastily implement it. These rules are not unreasonably problematic for the purchase of items like satellites or airplanes, the requirements for which probably should not and will not significantly change over the course of many years.

However, because AI technology is still maturing and the capabilities themselves are always adapting, developing, and adding new functionality, the rules above have become major obstacles to the quick integration of AI across the IC. First, AI requirements defined with specificity years in advance of acquisition – whether in the budget or in a statement of work – are obsolete by the time the technology is delivered. Second, as AI evolves there is often not a clear delineation between research, development, procurement, and sustainment of the technology – it continuously flows back and forth across these categories in very compressed timelines. Third, it is difficult to predict the timing of AI breakthroughs, related new requirements, and funding impacts, so money might not be spent as quickly as expected and could be lost at the end of the fiscal year. Taken together, these processes are inefficient and disruptive, cause confusion and delay, and discourage engagement from small businesses, which have neither the time nor the resources to wait years to complete a contract or to navigate laborious, uncertain processes.


Engage personally with experts on Artificial Intelligence and national security  at The Cipher Brief Threat Conference October 24-26.  If you are an actively working in the national security field, we invite you to apply to attend.  Seats are limited.  


Simply put, modern practices for fielding AI have outpaced the IC’s decades-old approach to budgeting and acquisition. That AI solutions are constantly evolving, learning, and improving both undermines the IC’s ability to prescribe a specific solution and, in fact, incentivizes the IC to allow the solution to evolve with the technology. The lack of flexibility and speed in how the IC manages and spends money and acquires goods and services is a core problem when it comes to fully incorporating AI into the IC’s toolkit.

Even while we introduce more speed and agility into these processes, however, the government must continue to ensure careful, intentional, and appropriate spending of taxpayer dollars. The adoption of an IC risk framework and modest changes to congressional oversight engagements, which I address in upcoming articles, will help regulate these AI activities in the spirit of the original intent of the budget and acquisition rules.

As for the lack of simplicity, the individually complex budget and acquisition rules are together a labyrinth of requirements, regulations, and processes that even long-time professionals have trouble navigating. In addition:

  • There is no quick or simple way for practitioners to keep current with frequent changes in acquisition rules.
  • The IC has a distributed approach that allows each element to use its various acquisition authorities independently rather than cohesively, increasing confusion across agency lines.
  • Despite the many federal acquisition courses aimed at demystifying the process, there is little connection among educational programs, no clear path for IC officers to participate, and no reward for doing so.

The complexity of the budget and acquisition rules compounds the problems with speed and flexibility, and as more flexibility is introduced to support AI integration, it is even more critical that acquisition professionals be knowledgeable and comfortable with the tools and levers they must use to appropriately manage and oversee contracts.

Impactful Solutions: A Target Rich Environment

Many of these problems are not new; indeed, they have been highlighted and studied often over the past few years in an effort to enable the Department of Defense (DOD) and the IC to more quickly and easily take advantage of emerging technology. But to date, DOD has made only modest gains and the IC is even further behind. While there are hundreds of reforms that could ease these difficulties, narrowing and prioritizing proposed solutions will have a more immediate impact. Moreover, significant change is more likely to be broadly embraced if the IC first proves its ability to successfully implement needed reforms on a smaller scale. The following actions by the executive and legislative branches – some tactical and some strategic – would be powerful steps to ease and speed the transition of AI capabilities into the IC.

Statements of Objectives

A small but important first step to deal with the slow and rigid acquisition process is to encourage the use of Statements of Objectives (SOO) instead of SOWs, when appropriate. As mentioned, SOWs set forth defined project activities, deliverables, requirements, and timelines, which are used to measure contractor progress and success. SOWs make sense when the government understands with precision exactly what is needed from the contractor and how it should be achieved.

SOOs, on the other hand, are more appropriate when the strategic outcome and objectives are clear, but the steps to achieve them are less so. They describe “what” without dictating “how,” thereby encouraging and empowering industry to propose innovative solutions. SOOs also create clarity about what is important to the government, leading companies to focus less on aggressively low pricing of specific requirements and more on meeting the ultimate outcomes in creative ways that align with a company’s strengths. This approach requires knowledgeable acquisition officers as part of the government team, as described below, to ensure the contract includes reasonable milestones and decision points to keep the budget within acceptable levels.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


New Authorities for the IC

Two new authorities would help the IC speed and scale its use of AI capabilities: Other Transaction Authority (OTA)  and Commercial Solutions Openings (CSO). Other Transaction Authority allows specific types of transactions to be completed outside of the traditional federal laws and regulations that apply to standard government procurement contracts, providing significantly more speed, flexibility, and accessibility than traditional contracts. While OTA is limited in scope and not a silver bullet for all acquisition problems, OTA has been used to good effect since 1990 by the Defense Advanced Research Projects Activity (DARPA), DOD’s over-the-horizon research and development organization, among others.

CSOs are a simplified and relatively quick solicitation method to award firm fixed price contracts up to $100 million. CSOs can be used to acquire innovative commercial items, technologies, or services that close capability gaps or provide technological advances through an open call for proposals that provide offerors the opportunity to respond with technical solutions of their own choosing to a broadly defined area of government interest. CSOs are considered competitively awarded regardless of how many offerors respond.

Both OTA and CSO authority should be immediately granted to the IC to improve the speed and flexibility with which the IC can acquire and transition AI into the IC.

Unclassified Sandbox

The predictive nature of the IC’s work and the need to forecast outcomes means the IC must be able to acquire AI at the point of need, aligned to the threat. Waiting several years to acquire AI undermines the IC’s ability to fulfill its purpose. But with speed comes added risk that new capabilities might fail. Therefore, the IC should create an isolated unclassified sandbox, not connected to operational systems, in which potential IC customers could test and evaluate new capabilities alongside developers in weeks-to-months, rather than years. Congress should provide the IC with the ability to purchase software quickly for test and evaluation purposes only to buy down the risk that a rapid acquisition would result in total failure. The sandbox process would allow the IC to test products, consider adjustments, and engage with developers early on, increasing the likelihood of success.

Single Appropriation for Software

DOD has a pilot program that funds software as a single budget item – allowing the same money to be used for research, production, operations, and sustainment – to improve and speed software’s unique development cycle. AI, being largely software, is an important beneficiary of this pilot. Despite much of the IC also being part of DOD, IC-specific activities do not fall within this pilot. Extending DOD’s pilot to the IC would not only speed the IC’s acquisition of AI, but it would also increase interoperability and compatibility of IC and DOD projects.

No-Year Funds

Congress should reconsider the annual expiration of funds as a control lever for AI. Congress already routinely provides no-year funding when it makes sense to do so. In the case of AI, no-year funds would allow the evolution of capabilities without arbitrary deadlines, drive more thoughtful spending throughout the lifecycle of the project, and eliminate the additional overhead required to manage the expiration of funds annually. Recognizing the longer-term nature of this proposal, however, the executive branch also must seek shorter-term solutions in the interim.

A less-preferable alternative is to seek two-year funding for AI. Congress has a long history of proposing biennial budgeting for all government activities. Even without a biennial budget, Congress has already provided nearly a quarter of the federal budget with two-year funding. While two-year funding is not a perfect answer in the context of AI, it would at a minimum discourage parties from rushing to outcomes or artificially burning through money at the end of the first fiscal year and would provide additional time to fulfill the contract. This is presumably why DOD recently created a new budget activity under their Research, Development, Test and Evaluation (RDT&E) category, which is typically available for two years, for “software and digital technology pilot programs.”

AI Technology Fund

Congress should establish an IC AI Technology Fund (AITF) to provide kick-starter funds for priority community AI efforts and enable more flexibility to get those projects off the ground. To be successful, the AITF must have no-year funds, appropriated as a single appropriation, without limits on usage throughout the acquisition lifecycle. The AITF’s flexibility and simplicity would incentivize increased engagement by small businesses, better allowing the IC to tap into the diversity of the marketplace, and would support and speed the delivery of priority AI capabilities to IC mission users.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


ICWERX  

To quickly take advantage of private sector AI efforts at scale, the IC must better understand the market and more easily engage directly with the private sector. To do so, the IC should create an ICWERX, modeled after AFWERX, an Air Force innovation organization that drives agile public-private sector collaboration to quickly leverage and develop cutting-edge technology for the Air Force. AFWERX aggressively uses innovative, flexible, and speedy procurement mechanisms like OTA and the Small Business Innovation Research and Small Business Technology Transfer programs (SBIR/STTR) to improve the acquisition process and encourage engagement from small businesses. AFWERX is staffed by acquisition and market research experts who are comfortable using those authorities and understand the market. While the IC’s needs are not identical, an ICWERX could serve as an accessible “front door” for prospective partners and vendors, and enable the IC to more quickly leverage and scale cutting-edge AI.

De-mystify Current Authorities

While there is much complaining about a lack of flexible authorities in the IC (and a real need for legal reform), there is flexibility in existing rules that has not been fully utilized. The IC has not prioritized the development or hiring of people with the necessary government acquisition and contracts expertise, so there are insufficient officers who know how to use the existing authorities and those who do are overworked and undervalued. The IC must redouble its efforts to increase its expertise in, and support the use of, these flexibilities in several ways.

First, the IC should create formal partnerships and increase engagement with existing U.S. government experts. The General Services Administration’s Technology Transformation Services (TTS) and FEDSIM, for example, work across the federal government to build innovative acquisition solutions and help agencies more quickly adopt AI. In addition, DOD’s Joint AI Center has built significant acquisition expertise that the IC must better leverage. The IC also should increase joint duty rotations in this area to better integrate and impart acquisition expertise across the IC.

Second, the IC must prioritize training and education of acquisition professionals. And while deep acquisition expertise is not necessary for everyone, it is important for lawyers, operators, technologists, and innovators to have a reasonable understanding of the acquisition rules, and the role they each play in getting to successful outcomes throughout the process. Collaboration and understanding across these professions and up and down the chain of command will result in more cohesive, speedy, and effective outcomes.

To that end, the Office of the Director of National Intelligence (ODNI) should work with the many existing government acquisition education programs, as well as the National Intelligence University, to develop paths for IC officers to grow their understanding of and ability to navigate and successfully use acquisition rules. The ODNI also should strengthen continuing education requirements and create incentive pay for acquisition professionals.

Third, the IC should prioritize and use direct hire authority to recruit experts in government acquisition, to include a mix of senior term-limited hires and junior permanent employees with room to grow and the opportunity for a long career in the IC. Such a strategy would allow the IC to quickly tackle the current AI acquisition challenges and build a bench of in-house expertise.

Finally, practitioners should have an easily accessible reference book to more quickly discover relevant authorities, understand how to use them, and find community experts. A few years ago, the ODNI led the creation of an IC Acquisition Playbook, which describes common IC acquisition authorities, practices, and usages. The ODNI should further develop and disseminate this Playbook as a quick win for the IC.

Incentivize Behavior

To encourage creative and innovative acquisition practices, as well as interdisciplinary collaboration, the IC must align incentives with desired outcomes and create in acquisition professionals a vested interest in the success of the contract. Acquisition officers today are often brought into projects only in transactional ways, when contracts must be completed or money must be obligated, for example. They are rarely engaged early as part of a project team, so they are not part of developing the solutions and have minimal investment in the project’s success. Reinforcing this, acquisition professionals are evaluated primarily on the amount of money they obligate by the end of the fiscal year, rather than on the success of a project.

Therefore, to start, project teams should be required to engage acquisition officers early and often, both to seek their advice and to ensure they have a good understanding of the project’s goals. In addition, evaluation standards for acquisition officers should incorporate effective engagement and collaboration with stakeholders, consideration of creative alternatives and options, and delivery of mission outcomes. If an officer uses innovative practices that fail, that officer also should be evaluated on what they learned from the experience that may inform future success.

Lastly, the ODNI should reinvigorate and highlight the IC acquisition awards to publicly reward desired behavior, and acquisition professionals should be included in IC mission team awards as a recognition of their impact on the ultimate success of the mission.

Conclusion

Between the government’s rigid budget and acquisition processes and confusion about how to apply them, there is very little ability for the IC to take advantage of a fast-moving field that produces new and updated technology daily. Tackling these issues through the handful of priority actions set forth above will begin to drive the critical shift away from the IC’s traditional, linear processes to the more dynamic approaches the IC needs to speed and transform the way it purchases, integrates, and manages the use of AI.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

 

The post AI and the IC: The Tangled Web of Budget and Acquisition appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

A Canadian teenager has been arrested after allegedly stealing $36.5 million in cryptocurrency from a person in the US. The police claim it was the largest such heist involving one victim ever registered in North America.

Police in the city of Hamilton, Ontario, arrested the unidentified perpetrator on Wednesday, after over a year investigating what they have described as the biggest-ever cryptocurrency theft from a single person in either the US or Canada. Local police began a joint investigation with the Federal Bureau of Investigation and the US Secret Service Electronic Crimes Task Force in March 2020, when the theft was reported.

Read more

© AP Photo/Jiri Buller
Europol detains 10 hackers over $100 million cryptocurrency theft from celebrities

The Hamilton Police Service said it had made “multiple” seizures in excess of CA$7 million (US$5.5 million) during the arrest, which came after investigators noticed some of the stolen money had been used to buy an online username considered “rare” in the gaming community, according to a police statement.

The victim was apparently targeted by a cell phone hijack known as SIM swapping. This method involves manipulating cellular network employees to duplicate phone numbers in order to let the scammer intercept the two-factor authorization requests that allow them access to a victim’s account.

This method is considered especially potent because a lot of people use the same password for multiple sites, according to Detective Constable Kenneth Kirkpatrick, of the Hamilton Police’s cybercrimes unit. He added that cyber and cryptocurrency crimes were becoming increasingly common, but noted that the figures involved in this case were “very surprising.”

“It’s a large amount of money in anybody’s opinion,” Kirkpatrick said, adding that the case was currently in the Hamilton court system.

The police haven’t revealed the age or gender of the youth, the username they purchased, or whether they were acting alone.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

France’s best-known book of words, Le Petit Robert dictionary, has caused a stir by including the non-binary personal pronoun as an alternative to the existing masculine and feminine terms.

While the annual update of the Petit Robert dictionary is often a topic of considerable debate in French media, the latest edition has caused quite the backlash, with some, including a cabinet member, accusing it of pandering to wokeism.

The word “iel,” a neologism combining the French words for he and she (“il” and “elle“), is described as the personal pronoun for a person of any gender. “Personal pronoun subject to the third person singular and plural, used to evoke a person of any gender. The use of the pronominal in inclusive communication,” the dictionary’s entry reads. 

Read more

(FILE PHOTO) © REUTERS/Costas Baltas
France turns to Ancient Greece for war on woke

Striking out at the latest inclusion, François Jolivet, an MP in President Emmanuel Macron’s LREM party took his protest to the Académie Française, the official guardians of the French language.  

Describing the move as “wokeism,” Jolivet said in a letter to the Académie that the word “iel” had no place in the French language and claimed it would be a precursor to the rise of ‘woke’ ideology, which undermines the values of the Gallic nation.

Outspoken Education Minister Jean-Michel Blanquer also chimed in. “Inclusive writing is not the future of the French language,” he tweeted, sharing Jolivet’s letter. “Just as our schoolchildren are consolidating their basic skills, they don’t need to have this as a reference,” he added.

The head of Gaullist party Debout La France, Nicolas Dupont-Aignan, further criticized Petit Robert’s “woke” addition. “Let’s defend our language against these ridiculous fanatics of deconstruction and let’s boycott the collaborators who give into them,” he tweeted.  

Le Petit Robert has responded to the “lively debate” by claiming that the pronoun has been used increasingly in society in recent months and they chose to reflect this by adding it to their latest update. The publication also said that some have welcomed the addition.

France’s offensive against wokeism, which has been described by some as an Anglo-Saxon import, recently saw Blanquer vow to increase the teaching of ancient Greek and Latin languages. The education minister claims that the classical vernaculars respond to a demand for logos (language as a tool for reason), in a world where “a lack of reason is spreading like wildfire.” 

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Any apology for Nazism is unacceptable, Colombia’s president Ivan Duque has insisted, after photos of police academy cadets dressed up in Third Reich uniforms were uploaded online, causing outrage.

“Any apology for Nazism is unacceptable,” Duque stated in a tweet on Friday. The president said he condemned any references to those who were “responsible for the Jewish Holocaust that claimed the lives of more than 6 million people,” adding that “anti-Semitism has no place in the world.”

Duque had earlier made demands for “heads to roll” at an academy that “promotes such criminal practices,” with its director, Lieutenant Colonel Jorge Ferney Bayona Sanchez, already having been sacked.

Colombia’s defense ministry, which oversees the country’s police, also insisted in a statement that that its training programs “don’t envisage in any way an activity such as the one which took place” at the academy.

Read more

Nazi uniforms found inside the house of a man suspected of raping a 12-year-old boy at the Vargem Grande neighbourhood of Rio de Janeiro. © AFP / Rio de Janeiro Civil Police
Brazilian police discover $3.5mn trove of Nazi memorabilia at home of ‘insane psychopath’ suspected of child rape

The images of police cadets in Nazi uniforms caused anger and bewilderment among internet users.

The German and Israeli embassies in the country reacted by issuing a joint statement, in which they expressed “total rejection of any form of apology or demonstration of Nazism.” The US embassy in Bogota also said that it was “shocked and deeply disappointed” by the development.

The controversial images, in which aspiring officers were caught sporting black SS outfits with red swastika armbands and grey Wehrmacht uniforms from the World War II era, weren’t revealed in some bombshell media report, but were actually published on the official Twitter account of the Colombian police this Thursday.

The photos were taken as part of a “cultural exchange” event at the police academy in the city of Tulua, aimed at commemorating Germany and “strengthening the knowledge of our police students.” The cosplay was apparently intended to illustrate the history of German law enforcement, with more cadets pictured wearing more modern versions of the country’s police uniforms in the pictures.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

As information emerges about Islamic State of Khorasan, or ISIS-K – the terrorist group that claimed responsibility for last week’s suicide attack that killed 13 US service members and more than 160 Afghans – there is an increased effort to predict how Afghanistan, under Taliban rule, may emerge once again as a breeding ground for terrorist groups.

A United Nations report released in June estimates that thousands of fighters from the region had already poured into Afghanistan.  Many of them are believed to be affiliated with either the Taliban – still seen as a terrorist organization – or al Qaeda or ISIS-K.

The New York Times reports that ISIS-K was created six years ago by members of the Pakistani branch of the Taliban.  There is a range of thought among experts as to what their ability to successfully carry out a terrorist attack in a Taliban-ruled area means for the terrorist threat moving forward. 

The Cipher Brief spoke with respected terrorism experts Bruce Hoffman, Mitch Silber and Colin Clarke to get their thoughts on the current risk of terrorist attacks against Americans both home and abroad. 

Bruce Hoffman, Terrorism Expert and Professor, Georgetown University

Cipher Brief Expert Bruce Hoffman is a professor at Georgetown University and served as a commissioner on the Independent Commission to Review the FBI’s Post-9/11 Response to Terrorism and Radicalization.  He is also a Scholar-in-Residence for Counterterrorism at CIA.

Mitch Silber, Former Director of Analysis, NYPD

Cipher Brief Expert Mitch Silber served as Director of Intelligence Analysis at the New York City Police Department and served as principal advisor to the Deputy Commissioner of Intelligence on counterterrorism policy and analysis. He is now executive director of the Community Security Initiative.

Colin Clarke, Director of Policy and Research, The Soufan Group

Colin P. Clarke, Ph.D., is the Director of Policy and Research at The Soufan Group. Clarke’s research focuses on domestic and transnational terrorism, international security, and geopolitics. He is also a senior research fellow at The Soufan Center.  

The Cipher Brief: If the United Nations Report issued in June is accurate, and there are thousands of fighters from the region who have poured into Afghanistan – many associated with known terrorist groups – is there any way that the administration can say ‘mission accomplished’ in terms of degrading terrorism’s presence in Afghanistan? 

Hoffman: No. As those numbers from the report released by the United Nations Support and Sanctions Monitoring Team highlight, Afghanistan is again becoming a jihadi magnet and will likely continue to be so into the future. The suicide bomb attacks outside the gates of Kabul International Airport last Thursday underscore the multiplicity of terrorist groups already present in that country.

In addition to ISIS-K, there is the Haqqani Network, al Qaeda and, of course, the Taliban. Terrorism thrives in conditions of chaos and instability which the terrorists hope to spread to other countries and eventually across regions.

Much as Salafi-Jihadi terrorists migrated from existing battlefields in South Asia back to the Middle East, North Africa, and the Caucasus in the 1990s; spread to East and West Africa in the early 2000s; blossomed during the Arab Spring to wage civil wars in Syria, Libya, and the Sahel, in the early twenty-teens; the same phenomenon is unfolding in Afghanistan.

Silber:  Frankly, I don’t think any of the four administrations can make the claim that the policy goal of making Afghanistan inhospitable to serve as a safe haven for Al Qaeda or other similarly oriented jihadist groups has been accomplished.  Certainly, at a number of times during the last twenty years, the threat that jihadist groups, most importantly — Al Qaeda — has presented, in terms of their ability to project a threat to the United States has been diminished, the degradation of the threat was only temporary.

The Cipher Brief: How confident are you that Al Qaeda and ISIS are unable to plan and execute attacks against the U.S. domestically? 

Hoffman:  The credulous Doha negotiations with the Taliban that led to the withdrawal of U.S. military forces from Afghanistan and subsequently to the Taliban’s blitzkrieg across Afghanistan and then to the shambolic evacuation of our diplomats and citizens, has painted a huge target on America’s back. Like sharks in the water, terrorists will smell blood. As my Council on Foreign Relations colleague, Jacob Ware, and I wrote in War on the Rocks, in May, every time terrorism has forced the U.S. to withdraw from a conflict zone where it had committed ground forces, whether in Lebanon in 1984; Somalia in 1993; and Iraq in 2011, it has led to more terrorism worldwide, not less, and thus made the U.S. less safe.

At a time when our country continues to grapple with the COVID pandemic; when climate change is pulverizing the Gulf States with Hurricane Ida and California with worsening wildfires; when the January 6th insurrection at the U.S. Capitol building continues to smolder with incidents such as the bomb threat that paralyzed the area near the Library of Congress and Cannon House Office Building earlier this month; coupled with ongoing cyberattacks and peer competition from China and Russia and concerns over Iran’s nuclear aspirations; our terrorist adversaries may well conclude that the U.S. is sufficiently preoccupied or distracted by any or all of the preceding and therefore conclude that the time to strike the homeland is opportune. It would very unlikely entail a repeat of the catastrophic September 11th 2001 attacks. But a terrorist strike along the lines of the 2019 shootings at Naval Air Station Pensacola; the 2017 suicide bombing of a concert venue in Manchester, England; the coordinated suicide attacks on London transport in 2005; the 2004 Madrid commuter train bombings; or any kind of significant lone wolf incident perpetrated in the name of some existing terrorist movement would likely re-create the widespread fear and anxiety that are terrorism’s stock-in-trade. Twice in the past three years, it should also be noted, members of al-Shabaab – perhaps al Qaeda’s least technologically proficient franchise – have been arrested both in the Philippines and in an undisclosed African country engaging in the same flight training that four of the 9/11 hijackers undertook before their fateful, history-changing coordinated attack.

Silber:  At this very moment, it is unlikely that Al Qaeda or ISIS-K have the infrastructure, resources, recruits and external planning ability to strike the United States based on statements by the IC and senior DoD officials to Congress.  However, without any, or only limited external pressure by the U.S. military as a result of the retreat from Afghanistan, these networks and capabilities can be reconstituted in the coming months and certainly groups like Al Qaeda have never given up their desire to strike the American homeland.

Clarke:  I think it is unlikely that AQ or ISIS will be able to attack the U.S. homeland.  We’ve spent the better part of the past two decades shoring up homeland defense. We’ve got CT tools now that we didn’t have twenty years ago. That said, the picture could look quite different 6, 12, 18 months from now. Both of those organizations are capable of regenerating an external operations planning capability. There is also the worry of inspired attacks.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


The Cipher Brief:  Some analysts have said that morale among terrorist or Islamic extremist groups is extremely high due to the circumstances surrounding the US pullout in Afghanistan, do you agree and if so what does that mean? 

Hoffman:  Yes. Of course. Both Sunni and Shi’a terrorist movements around the globe have applauded the Taliban’s re-conquest of Afghanistan and routing of the U.S. military. For Sunni Salafi-Jihadi terrorists, the events there this past month validate the strategy articulated by Usama bin Laden just before the 2004 U.S. presidential election, when he described the ease with which al-Qaeda had been able to “bled Russia for 10 years, until it went bankrupt and was forced to withdraw in defeat” from Afghanistan in 1989, and predicted that the same fate would eventually befall the U.S. And, Sayed Hassan Nasrallah, the Secretary-General of Hezbollah, a Shi’a terrorist organization, for instance, last week delivered a sermon where he described America’s “historic and humiliating defeat in Afghanistan as representing, “the moral downfall of America.”

Silber:  Jihadi chat rooms and online extremist networks are feeling like they have the wind behind them.  It took twenty years, but before the 20th anniversary of the attacks of 9/11 an Islamic emirate has been re-established in Afghanistan.  Suddenly, what seemed impossible has become possible and Islamist insurgencies all throughout the Middle East and South Asia can take inspiration by the determination of the Taliban in their efforts to overthrow a secular democratic government and replace it with an Islamist one.

Clarke:  I do expect morale to be high among terrorist and especially Islamic extremists given the turn of events we’ve seen in Afghanistan. We’re a week and a half out from the 20-year anniversary of 9/11, and Al Qaeda leaders are returning to Afghanistan (this is being displayed in AQ propaganda). We’ve seen al-Qaeda affiliates all over the globe congratulating the Taliban for their victory. I don’t want to overstate the case here, but I do believe that what has occurred in Afghanistan will be a serious boost for the global jihadist movement right at the same time the U.S. and its allies are shifting from counterterrorism to great power competition. There will be fewer resources and energy to deal with terrorists, right at the time we have major threats metastasizing in Afghanistan, potentially with both a reinvigorated al-Qaeda and a stubbornly resilient ISKP.

Read also Mike Leiter’s Why We’re Much Safer from Terrorism Now, Than We Were After 9/11 in The Cipher Brief 

Read also Why We Need a New National Defense Strategy (for terrorism) exclusively in The Cipher Brief 


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


 

The post The Risk of Terrorism at Home and Abroad appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Criminals convicted of multiple cases of rape could face chemical castration in Pakistan as the country’s parliament supported new legislation aimed at tackling the rise in sexual offenses there.

The amendments to existing legislation, which allow for speedy conviction and harsher punishments for rapists, have been voted in by the MPs on Wednesday.

They introduce the death penalty or a life sentence for gang rape as well as chemical castration for repeat sex offenders, with the consent of the convict.

Chemical castration was described in the bill as a process through which “a person is rendered incapable of performing sexual intercourse for any period of his life, as may be determined by the court through administration of drugs.”

Read more

RT
High court rules Pakistan’s ‘two-finger’ virginity test for rape victims unconstitutional

It’s planned to establish special courts across the country to make sure that verdicts in sexual assault cases are delivered “expeditiously, preferably within four months.” If chemical castration is assigned as a punishment, it “shall be conducted through a notified medical board,” according to the new legislation.

Mushtaq Ahmed, a senator for the religious Jamaat-i-Islami party, had earlier denounced the bill as un-Islamic. Ahmed argued that there was no mention of chemical castration in Sharia law and that rapists are to be hanged in public.

By resorting to drugs to reduce the libido of repeat sex offenders, Pakistan joins South Korea, Poland, the Czech Republic and some US states, where chemical castration has been introduced.

The measure was put on the table a year ago by Pakistani President Arif Alvi in response to a vast public outcry over a spike across the country in cases of rape involving both women and children.

Back then, Amnesty International decried chemical castration as a “cruel, inhumane” treatment, advising Islamabad to instead focus on reforming its “flawed” justice system and to ensure justice for the victim.

Local NGO War Against Rape told Reuters last year that less than 3% of sexual assault or rape prosecutions in Pakistan result in a conviction.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

CIPHER BRIEF EXPERT PERSPECTIVE 

Cipher Brief Expert Tim Willasey-Wilsey served for over 27 years in the British Foreign and Commonwealth Office. He is now Visiting Professor of War Studies at King’s College, London.

Older Americans have Saigon 1975 and the helicopters from the Embassy roof seared into their memories. A previous generation of Britons was haunted by the image of General Percival surrendering vast numbers of troops and equipment in Singapore to the Japanese in 1942. How Kabul falls to the Taliban could have important practical and symbolic significance.

The announcement that the United States is sending 3,000 troops to Kabul alongside 600 British troops to manage the evacuation of their civilians and those Afghans who provided assistance, is a remarkably late response to a rapidly deteriorating situation. Unless carried out in the next 48 hours, it will also be risky. Taliban infiltrators are already inside Kabul and the forces which captured Ghazni and Kandahar on 12th August will be heading towards the capital on their Honda 125cc motorbikes.

The US must have extracted undertakings from the Taliban negotiators in Qatar not to launch their full assault on Kabul until the evacuations are complete, but elements of doubt remain. Previous Taliban assurances have proved worthless, and it is doubtful that individual Taliban commanders would wish to hold back while some of Ashraf Ghani’s ministers, senior army officers, judges and officials are spirited away to a life of exile.

It is hard not to be impressed by the speed and élan of the Taliban’s recent successes; taking 13 of Afghanistan’s 34 regional capitals in almost as many days. It is reminiscent of the extraordinary progress which the Japanese made down the Malaya Peninsula in 1942 with Singapore as the ultimate prize.

The Taliban’s success has not happened by chance. It is clearly the fruit of preparation and planning. Above all, they have learnt from the experience of 1994 to 1996 when they eventually took Kabul but failed to capture the north, thereby allowing space for the Northern Alliance parties to survive and then reassert themselves following the 9/11 terrorist attacks.

This time, the Taliban have focussed first on border posts with neighbouring countries (thereby denying the government vital supply routes and customs revenues) before taking outlying regional capitals and leaving Kabul (which is never easy to capture) until last. Above all, they have concentrated on the north where many rural Afghans are disenchanted with the Kabul government and regional warlords. The north is no longer the solid bastion of anti-Taliban sentiment it was in the 1990s.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


Taliban progress in the north has snuffed out any chance that the old Northern Alliance could be reborn out of the eventual collapse of the Ashraf Ghani government. Whereas in 1996, Ahmed Shah Massoud, its brilliant military leader, was able to abandon Kabul and beat a tactical retreat up the Panjshir Valley, that option barely exists today. Not only is Massoud dead but his former adherents are no longer guerrilla fighters but members of a stratified Afghan army which has struggled to perform without US air support.

The Taliban have also ruthlessly exploited the weak negotiating stance of the United States and its chief negotiator Zalmay Khalilzad. Whereas some of the Taliban team in Doha, such as Mullah Barader, may indeed have been ‘moderates’ there was never any doubt that the Taliban movement wanted to see the total defeat of the Kabul government and the expulsion of Western forces. Pakistan too, may have occasionally considered some form of negotiated deal but ultimately the only sure way of keeping Indian influence out of Afghanistan (it believes) is a Taliban government.

The Afghan army (and in particular its impressive Special Forces) will now be assembling in Kabul and should be able to repel initial attempts to overrun the city. Certainly, Gulbuddin Hekmatyar found it impossible to take Kabul in 1992 and 1993 even with help from Pakistan, which, in frustration, switched support to the newly-created Taliban movement in late 1994.

But from 1992 to 1996 there were frequent deliveries of supplies to Massoud and his Northern Alliance defenders from Russia, Iran, and India. In 2021, the position is very different. Russia has already decided to “back the winner” and believes it has extracted promises from the Taliban not to export Islamism northwards into the Central Asian Republics (CARs). Iran too has channels to the Taliban and will be watching carefully for any return to the Taliban’s persecution of the Shia Hazaras. And India has already made contact with the Taliban in Doha in the hope that the Taliban in power will prevent Kashmiri militant groups from setting up bases there.

The likelihood therefore is that Kabul will fall to the Taliban quite quickly. If the Americans and British do manage to insert their evacuation forces soon, they should be able to complete the operation successfully, although there are likely to be heart-rending scenes at the airport as crowds of refugees are turned away at gunpoint from departing aircraft. Regional powers, particularly Pakistan, will try and persuade the Taliban to hold back from intervening, conscious that a bloodbath in Kabul would be a disastrous start to the Taliban’s second spell in government. Ironically, however, the evacuation would almost certainly lead to the collapse of the Kabul government as senior officials are forced to decide whether to take the last aircraft out or face almost certain torture and death at the hands of the victors. It is doubtful whether any Western countries will choose to retain their embassies in Kabul. For President Biden, the memory of Benghazi will be too raw.

What is certain is that there will be new iconic images to rival those of Saigon and Singapore.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


Read more expert-driven national security insights, perspective and analysis in The Cipher Brief.

The post How Does Kabul End? appeared first on The Cipher Brief.

find more fun & mates at SoShow now !