As information emerges about Islamic State of Khorasan, or ISIS-K – the terrorist group that claimed responsibility for last week’s suicide attack that killed 13 US service members and more than 160 Afghans – there is an increased effort to predict how Afghanistan, under Taliban rule, may emerge once again as a breeding ground for terrorist groups.

A United Nations report released in June estimates that thousands of fighters from the region had already poured into Afghanistan.  Many of them are believed to be affiliated with either the Taliban – still seen as a terrorist organization – or al Qaeda or ISIS-K.

The New York Times reports that ISIS-K was created six years ago by members of the Pakistani branch of the Taliban.  There is a range of thought among experts as to what their ability to successfully carry out a terrorist attack in a Taliban-ruled area means for the terrorist threat moving forward. 

The Cipher Brief spoke with respected terrorism experts Bruce Hoffman, Mitch Silber and Colin Clarke to get their thoughts on the current risk of terrorist attacks against Americans both home and abroad. 

Bruce Hoffman, Terrorism Expert and Professor, Georgetown University

Cipher Brief Expert Bruce Hoffman is a professor at Georgetown University and served as a commissioner on the Independent Commission to Review the FBI’s Post-9/11 Response to Terrorism and Radicalization.  He is also a Scholar-in-Residence for Counterterrorism at CIA.

Mitch Silber, Former Director of Analysis, NYPD

Cipher Brief Expert Mitch Silber served as Director of Intelligence Analysis at the New York City Police Department and served as principal advisor to the Deputy Commissioner of Intelligence on counterterrorism policy and analysis. He is now executive director of the Community Security Initiative.

Colin Clarke, Director of Policy and Research, The Soufan Group

Colin P. Clarke, Ph.D., is the Director of Policy and Research at The Soufan Group. Clarke’s research focuses on domestic and transnational terrorism, international security, and geopolitics. He is also a senior research fellow at The Soufan Center.  

The Cipher Brief: If the United Nations Report issued in June is accurate, and there are thousands of fighters from the region who have poured into Afghanistan – many associated with known terrorist groups – is there any way that the administration can say ‘mission accomplished’ in terms of degrading terrorism’s presence in Afghanistan? 

Hoffman: No. As those numbers from the report released by the United Nations Support and Sanctions Monitoring Team highlight, Afghanistan is again becoming a jihadi magnet and will likely continue to be so into the future. The suicide bomb attacks outside the gates of Kabul International Airport last Thursday underscore the multiplicity of terrorist groups already present in that country.

In addition to ISIS-K, there is the Haqqani Network, al Qaeda and, of course, the Taliban. Terrorism thrives in conditions of chaos and instability which the terrorists hope to spread to other countries and eventually across regions.

Much as Salafi-Jihadi terrorists migrated from existing battlefields in South Asia back to the Middle East, North Africa, and the Caucasus in the 1990s; spread to East and West Africa in the early 2000s; blossomed during the Arab Spring to wage civil wars in Syria, Libya, and the Sahel, in the early twenty-teens; the same phenomenon is unfolding in Afghanistan.

Silber:  Frankly, I don’t think any of the four administrations can make the claim that the policy goal of making Afghanistan inhospitable to serve as a safe haven for Al Qaeda or other similarly oriented jihadist groups has been accomplished.  Certainly, at a number of times during the last twenty years, the threat that jihadist groups, most importantly — Al Qaeda — has presented, in terms of their ability to project a threat to the United States has been diminished, the degradation of the threat was only temporary.

The Cipher Brief: How confident are you that Al Qaeda and ISIS are unable to plan and execute attacks against the U.S. domestically? 

Hoffman:  The credulous Doha negotiations with the Taliban that led to the withdrawal of U.S. military forces from Afghanistan and subsequently to the Taliban’s blitzkrieg across Afghanistan and then to the shambolic evacuation of our diplomats and citizens, has painted a huge target on America’s back. Like sharks in the water, terrorists will smell blood. As my Council on Foreign Relations colleague, Jacob Ware, and I wrote in War on the Rocks, in May, every time terrorism has forced the U.S. to withdraw from a conflict zone where it had committed ground forces, whether in Lebanon in 1984; Somalia in 1993; and Iraq in 2011, it has led to more terrorism worldwide, not less, and thus made the U.S. less safe.

At a time when our country continues to grapple with the COVID pandemic; when climate change is pulverizing the Gulf States with Hurricane Ida and California with worsening wildfires; when the January 6th insurrection at the U.S. Capitol building continues to smolder with incidents such as the bomb threat that paralyzed the area near the Library of Congress and Cannon House Office Building earlier this month; coupled with ongoing cyberattacks and peer competition from China and Russia and concerns over Iran’s nuclear aspirations; our terrorist adversaries may well conclude that the U.S. is sufficiently preoccupied or distracted by any or all of the preceding and therefore conclude that the time to strike the homeland is opportune. It would very unlikely entail a repeat of the catastrophic September 11th 2001 attacks. But a terrorist strike along the lines of the 2019 shootings at Naval Air Station Pensacola; the 2017 suicide bombing of a concert venue in Manchester, England; the coordinated suicide attacks on London transport in 2005; the 2004 Madrid commuter train bombings; or any kind of significant lone wolf incident perpetrated in the name of some existing terrorist movement would likely re-create the widespread fear and anxiety that are terrorism’s stock-in-trade. Twice in the past three years, it should also be noted, members of al-Shabaab – perhaps al Qaeda’s least technologically proficient franchise – have been arrested both in the Philippines and in an undisclosed African country engaging in the same flight training that four of the 9/11 hijackers undertook before their fateful, history-changing coordinated attack.

Silber:  At this very moment, it is unlikely that Al Qaeda or ISIS-K have the infrastructure, resources, recruits and external planning ability to strike the United States based on statements by the IC and senior DoD officials to Congress.  However, without any, or only limited external pressure by the U.S. military as a result of the retreat from Afghanistan, these networks and capabilities can be reconstituted in the coming months and certainly groups like Al Qaeda have never given up their desire to strike the American homeland.

Clarke:  I think it is unlikely that AQ or ISIS will be able to attack the U.S. homeland.  We’ve spent the better part of the past two decades shoring up homeland defense. We’ve got CT tools now that we didn’t have twenty years ago. That said, the picture could look quite different 6, 12, 18 months from now. Both of those organizations are capable of regenerating an external operations planning capability. There is also the worry of inspired attacks.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


The Cipher Brief:  Some analysts have said that morale among terrorist or Islamic extremist groups is extremely high due to the circumstances surrounding the US pullout in Afghanistan, do you agree and if so what does that mean? 

Hoffman:  Yes. Of course. Both Sunni and Shi’a terrorist movements around the globe have applauded the Taliban’s re-conquest of Afghanistan and routing of the U.S. military. For Sunni Salafi-Jihadi terrorists, the events there this past month validate the strategy articulated by Usama bin Laden just before the 2004 U.S. presidential election, when he described the ease with which al-Qaeda had been able to “bled Russia for 10 years, until it went bankrupt and was forced to withdraw in defeat” from Afghanistan in 1989, and predicted that the same fate would eventually befall the U.S. And, Sayed Hassan Nasrallah, the Secretary-General of Hezbollah, a Shi’a terrorist organization, for instance, last week delivered a sermon where he described America’s “historic and humiliating defeat in Afghanistan as representing, “the moral downfall of America.”

Silber:  Jihadi chat rooms and online extremist networks are feeling like they have the wind behind them.  It took twenty years, but before the 20th anniversary of the attacks of 9/11 an Islamic emirate has been re-established in Afghanistan.  Suddenly, what seemed impossible has become possible and Islamist insurgencies all throughout the Middle East and South Asia can take inspiration by the determination of the Taliban in their efforts to overthrow a secular democratic government and replace it with an Islamist one.

Clarke:  I do expect morale to be high among terrorist and especially Islamic extremists given the turn of events we’ve seen in Afghanistan. We’re a week and a half out from the 20-year anniversary of 9/11, and Al Qaeda leaders are returning to Afghanistan (this is being displayed in AQ propaganda). We’ve seen al-Qaeda affiliates all over the globe congratulating the Taliban for their victory. I don’t want to overstate the case here, but I do believe that what has occurred in Afghanistan will be a serious boost for the global jihadist movement right at the same time the U.S. and its allies are shifting from counterterrorism to great power competition. There will be fewer resources and energy to deal with terrorists, right at the time we have major threats metastasizing in Afghanistan, potentially with both a reinvigorated al-Qaeda and a stubbornly resilient ISKP.

Read also Mike Leiter’s Why We’re Much Safer from Terrorism Now, Than We Were After 9/11 in The Cipher Brief 

Read also Why We Need a New National Defense Strategy (for terrorism) exclusively in The Cipher Brief 


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


 

The post The Risk of Terrorism at Home and Abroad appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Cipher Brief Expert Tim Willasey-Wilsey is a Visiting Professor at King’s College, London and a former senior British diplomat. From 1996 to 1999 he was senior advisor to the British government on overseas counterterrorism.  This piece was first published by RUSI in London.  The views do not represent those of RUSI.


Analysis of openly available sources indicates that a British report shared with the US in December 1998 described an early stage of the 9/11 plot.


EXPERT PERSPECTIVE — Two extracts from Presidential Daily Briefs (PDB) are given some prominence in the 9/11 Commission report into the terrorist attacks in New York and Washington on 11 September 2001. One is from a PDB delivered to President Bill Clinton on 4 December 1998, and the other is from a PDB given to President George W Bush on 6 August 2001. Both are presented inside a textbox and both contain intelligence ‘from a friendly government’ which provided the first and only significant suggestion that Al-Qa’ida (AQ) planned to hijack aircraft in the US.

Eight months after the attacks, under Congressional pressure, the Bush administration was obliged to reveal some details of the PDBs, and on 17 May 2002 the New York Times disclosed that ‘the report provided to the president on Aug. 6, which warned him that Mr. bin Laden’s followers might hijack airplanes, was based on 1998 intelligence data drawn from a single British source, government officials said today’. The British government was obliged to acknowledge that the intelligence came from British sources. The Guardian reported on 18 May that ‘The memo received by Bush on 6 August contained unconfirmed information passed on by British intelligence in 1998’. The Independent ran much the same story with additional detail.

Both PDBs quoted from one British report from December 1998. The key question is whether this report, with its significant deviations from what actually happened on the day, actually referred to the 9/11 operation. Subsequently published evidence points compellingly to this indeed being an early version of the 9/11 plan.

The heavily redacted British contribution was shown on pages 127 and 128 of the 9/11 Commission’s report. It reads:

‘On Friday December 4 1998 the CIA included an article in the Presidential Daily Brief (PDB) describing intelligence received from a friendly government about a hijacking in the United States.

‘SUBJECT. Bin Laden preparing to hijack US aircraft. Reporting [passage redacted] suggests bin Laden and his allies are preparing for attacks in the US including an aircraft hijacking to obtain the release of Sheikh Omar Abdal Rahman,  Ramzi Yousef and Muhammad Sadiq Awda. One source quoted a senior member of the Gamaat Al-Islamiya (GI) saying that “as of late October the GI had completed planning for an operation in the US on behalf of bin Laden but that the operation was on hold. A senior bin Laden operative from Saudi Arabia was to visit GI counterparts in the US soon thereafter to discuss options – perhaps including an aircraft hijacking. GI leader Islambouli in late September was planning to hijack a US airliner during “the next couple of weeks” to free Abdal Rahman and the other prisoners according to what may be another source. The same source late last month said that bin Laden might implement plans to hijack aircraft before the beginning of Ramadan on 20 December and that two members of the operational team had evaded security checks during a recent trial run at an unidentified New York airport.’


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


In May 2002 the US National Security Advisor Condoleezza Rice issued a statement observing (correctly) that the report had mentioned ‘hijacking in the traditional sense’ with no indication that aircraft would be used as weapons of mass destruction. Her testimony to the 9/11 Commission made broadly the same point.

Indeed, even in late 1998, there was a profusion of threat reports of which the aviation strand was just one. The MI5 official history comments aptly that the Service was puzzled as to why there were so many more reports of threats than actual attacks: ‘Even the most reliably sourced intelligence received on this question usually consists of a snapshot of a proposed plan being discussed. Most of the reporting does not make clear how far advanced the plan is’ (Christopher Andrew, The Defence of the Realm, pp. 802–806). What MI5 did not realise at the time was that AQ operations could take up to three years from inception to execution.

Steve Coll writes that ‘Within the morass of intelligence lay ominous patterns. One was an interest by bin Laden’s operatives in the use of aircraft … yet at the counter terrorism security group meetings and at the CIA’s counter terrorist centre there was no special emphasis placed on bin Laden’s threat to civil aviation or on the several exposed plots where his followers had considered turning hijacked airplanes into cruise missiles’ (Steve Coll, Ghost Wars, pp. 419–420).

Although the December 1998 report appears fragmentary, there were a number of aspects of particular interest. The first was the name Ramzi Yousef. Yousef had studied electrical engineering at Swansea Institute from 1986 to 1990 before exploding a massive bomb under the World Trade Centre in February 1993 and then planning the Bojinka Plot against airliners in the Philippines in 1994. Yousef had been arrested in Islamabad in February 1995 and sent to the US, where he was tried and imprisoned for life. He was an energetic and imaginative terrorist, and his uncle Khalid Sheikh Mohammed was also known to move in terrorist circles.

The aviation link must have struck a chord, too. The British were also interested in Hussain Kherchtou, who had been in Kenya at the time of the Embassy bombings and was himself a pilot. He later provided a debrief to the FBI. His story and his courtship by the British came into the public domain because of a subsequent US court case and a talkative FBI officer.

The Egyptian angle also would have provoked little surprise. On 19 November 1995 Egyptian terrorists had blown up the Egyptian Embassy in Islamabad, killing 13 – only yards from the British High Commission compound with its exposed staff housing and kindergarten. The British had a miraculous escape that day.

The concern for the release of Sheikh Abdal Rahman, ‘the Blind Sheikh’, was consistent with the widespread devotion which the preacher inspired among Islamist radicals and particularly Egyptians. His imprisonment in New York for his part in Yousef’s attack on the World Trade Centre had caused significant distress among his many adherents, who all wanted his release.

The idea that AQ would strike the US had first surfaced in 1997 and felt like the logical next step. Only a month beforehand (in November 1998), AQ had attacked two US Embassies in Kenya and Tanzania, killing 224 people including 12 US citizens. These operations had served as a wake-up call for those who thought the AQ threat was being exaggerated, and some who even conceived of Osama bin Laden himself as a benign figure who had somehow got out of his depth.

There were also some puzzling elements in the report. The first was the rather outdated idea of hijacking an aircraft to demand the release of the Blind Sheikh. It felt more in tune with Palestinian terrorist methods of the 1970s, and it was already known that Ramzi Yousef had developed the idea of exploding full airliners in flight.

The involvement of Gama’at Islamiya (GI) seemed odd. Bin Laden was known to be close to Ayman Al-Zawahiri of Egyptian Islamic Jihad (EIJ), with whom GI were usually at daggers drawn. At the time GI were conceived of more as domestic Egyptian terrorists compared to the internationalist EIJ. Indeed, GI’s most recent operation had been the Luxor Massacre of November 1997, which killed 56 foreign tourists.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


The name Islambouli carried great resonance. This was Mohammed Shawqi Islambouli, who had tried to assassinate Egyptian President Hosni Mubarak in Addis Ababa in 1995. His brother Khalid had been one of the assassins of President Anwar Sadat in October 1981 and had been tried and executed in Cairo. However, although Mohammed was thought to be in Afghanistan, he was not then known to be close to bin Laden, let alone Al-Zawahiri.

The dates made little sense. On the one hand an attack seemed imminent, but on the other hand it was ‘on hold’. But such is the nature of counterterrorist reporting: small fragments of a much bigger jigsaw.

Nonetheless, the report was taken very seriously on its receipt in the US. President Bill Clinton’s counterterrorism advisor Richard Clarke summoned his Counterterrorism Security Group. ‘To address the hijacking warning, the group agreed that New York airports should go to maximum security starting that weekend. They agreed to boost security at other East coast airports. The CIA agreed to distribute versions of the report to the FBI and FAA to pass to the New York Police Department and the airlines. The FAA issued a security directive on December 8, with specific requirements for more intensive air carrier screening of passengers and more oversight of the screening process, at all three New York City area airports.’

Of course, when 9/11 happened nearly three years later, there were two very significant differences. Although aircraft were indeed hijacked, they were used as missiles rather than as bargaining chips, and the terrorists were mainly Saudi and not Egyptian. So what happened between December 1998 and September 2001 which could explain these changes?

The 9/11 Commission report (drawing on material from the interrogation of Khalid Sheikh Mohammed) provides a fascinating section on AQ’s development of aviation methodology. Even before bin Laden had left Sudan in mid-1996, he had allegedly discussed the use of aircraft with Mohammed Atef: ‘(1) they rejected hijackings aimed at gaining the release of imprisoned comrades as too complex, because al Qaeda had no friendly countries in which to land a plane and then negotiate; (2) they considered the bombing of commercial flights in midair, as carried out against Pan Am Flight 103 over Lockerbie, Scotland, a promising means to inflict massive casualties; and (3) they did not yet consider using hijacked aircraft as weapons against other targets.’

So, why was the idea of a traditional hijacking still being discussed as late as December 1998? The answer must lie in the Egyptian jihadists’ determination to win the release of the Blind Sheikh. Mustafa Hamid, a journalist who was with bin Laden in Afghanistan, provides illuminating insight into the wrangling between EIJ and GI in Afghanistan. Hamid documents the tortuous process by which GI, with some reluctance, formed a union (‘The World Islamic Front against Jews and Crusaders’) with AQ, EIJ and others, but recounts how GI insisted on secrecy about their involvement. Hamid also describes GI’s determination to obtain the Blind Sheikh’s release and the involvement of one of their operatives in the African Embassy bombings (Mustafa Hamid and Leah Farrall, The Arabs at War in Afghanistan, p. 241 and pp. 263–266). So GI was indeed part of bin Laden’s group in Afghanistan and was involved in operations at the time of the December 1998 report.

However, bin Laden became increasingly irritated by the endless squabbling among the two Egyptian groups. Lawrence Wright, drawing upon a variety of sources, chronicles the disastrous attack on Luxor, which had the effect of alienating the Egyptian population from both groups. When on 23 February 1998 bin Laden’s second fatwa announcing the ‘World Islamic Front’ was published in an Arabic newspaper in London, GI were appalled, and some members tried to have Rahman pronounced emir instead of bin Laden. No wonder that Wright concludes that ‘bin Laden had had enough of the in-fighting between the Egyptian factions. He told both groups that their operations in Egypt were ineffectual and too expensive and that it was time for them to turn their guns on the United States and Israel’ (Lawrence Wright, The Looming Tower, pp. 290–296). This may explain why the December 1998 report mentions the operation being ‘on hold’. Between December and the spring of 1999, the GI team and Islambouli must have been stood down.

According to the 9/11 Commission report, in March or April 1999, Khalid Sheikh Mohammed (KSM) – who had hitherto allegedly been on the fringes of AQ – was summoned to Kandahar, where he discussed the aircraft plan with bin Laden and Mohammed Atef. Four operatives were chosen to begin work on the US project. However, ‘travel issues … played a part in al Qaeda’s operational planning from the very start. During the spring and summer of 1999, KSM realized that Khallad and Abu Bara, both of whom were Yemenis, would not be able to obtain US visas as easily as Saudi operatives like Mihdhar and Hazmi’. And so, the 9/11 plot developed with 15 of the 19 terrorists being Saudi nationals. Only Mohammed Atta was Egyptian.

KSM’s key involvement in the 9/11 plot makes it evident that there could not have been a second GI plot running in parallel, because KSM and Islambouli were close associates. Robert Baer and the 9/11 Commission report agree that KSM and Islambouli were working together in Qatar in the mid-1990s. For KSM it must have been difficult to abandon the rescue of his nephew, but he would have known that a traditional hostage release operation had none of the ambition or scale of bin Laden’s new thinking.

On 6 August 2001, only five weeks before the attacks, the December 1998 report featured once again in the PDB given to George W Bush at Crawford, Texas, entitled ‘Bin Laden determined to strike in US’. It began: ‘Clandestine foreign government and media reports indicate bin Laden since 1997 has wanted to conduct terrorist attacks in the US’, and concluded: ‘We have not been able to corroborate some of the more sensational threat reporting such as that from a [redacted] Service in 1998 saying that bin Laden wanted to hijack a US aircraft to gain the release of “blind Sheikh” Omar Abdal Rahman and other US-held extremists … Nevertheless, FBI information since that time indicates patterns of suspicious activity in this country consistent with preparations for hijackings or other types of attacks.’

The PDB of 6 August caused some discomfort to the Bush administration and led to a National Security Archive page devoted to that one PDB (of which the December 1998 British report was just one constituent part).

The CIA Director George Tenet, who had been a tireless pursuer of the AQ threat before 9/11 and a regular correspondent with and visitor to London, regretted that more had not been done ‘to protect the United States against the threat. To cite two obvious and tragic failures, only after 9/11 were cockpit doors hardened and passengers forbidden from carrying box-cutters aboard US commercial airliners’ (George Tenet, At the Centre of the Storm, p. 205).

The British report of December 1998 was fragmentary, and while it was certainly ‘sensational’, it was not half as sensational as the actual events of that unforgettable and tragic day.

The views expressed in this Commentary are the authors, and do not represent those of RUSI or any other institution.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

The post The British and 9/11 appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

The Funniest Clothing Labels Ever – When was the last time you read the label on your favorite shirt or most comfortable pair of jeans? Maybe it’s time to take a look, your clothing tags may hide a funny message.

The Perfect Gift For Someone You Hate – Hungry AND tired? You can rest on this soft body pillow shaped like smoked pig’s feet! What really amazes us are the details, it looks so real… and so disgusting.

Every Cat at 3AM – If you currently have or have ever had a cat, you’ll be able to relate to Gus Johnson’s video, in which he demonstrates one of the many ways in which our furry friends can be a-holes.

The Funniest Dog Videos Of All Time – We understand the value of a good funny dog video, so here’s a list of our six best viral pup videos of all time. You’re welcome.

Mildly Infuriating Things In Life – Sometimes the internet shows you a photo that’s ever so slightly wrong that it sticks in your brain forever…

Funny Images Showing How Differently Men and Women Act – Yup, we’re different and there is no denying that fact. We have different bodies, different brains and different ways of using both.

Dads Who Didn’t Want The Damn Dogs In Their Lives – Dad logic is a weird thing. They say they hate dogs, and then you end up with a gallery like this…

Random Funny Pictures – What do you do when you are bored at work? You just mindlessly scroll through random funny pictures, of course!

Mr. Bean Playing Every Role In Hollywood – When one thinks of a rugged, versatile actor capable of elevating any role given to them, Mr. Bean naturally springs to mind. And yet he was never cast as Frodo Baggins or Indiana Jones, which in our eyes is one of the saddest tragedies of modern filmmaking.

Funny Thanksgiving Cake Fails – Thanksgiving is a day to reflect and enjoy time with family… and sometimes to FAIL.

Still bored to tears and want to see more funny and entertaining links? You should check out Linkiest, Leenks, or Fark!

The post This Month’s Funniest Internet Finds first appeared on .

find more fun & mates at SoShow now !

Two climate activists in Australia have brought the world’s busiest coal port to a halt, strapping themselves to a massive piece of machinery and refusing to come down. The stunt follows more than a week of similar actions.

Blockade Australia, a climate group focused on “strategic direct action,” declared that two of its members had clambered atop equipment at the Port of Newcastle and stopped work there late Tuesday night, sharing footage captured by the activists as they suspended themselves from a large loading machine.

“Zianna and Hannah have shut down Newcastle coal port, abseiling from coal handling machinery. The port cannot resume operations until the pair are removed by police,” the group said, identifying the activists by their first names only, adding “This is the tenth consecutive day of disruption to Newcastle coal port and its supply rail network.”

The protest stunt follows at least 16 similar actions over the last week or so, the group said, some targeting the rail line near the port, the world’s largest for coal exports.

Another demonstration carried out on Tuesday saw a second pair of activists breach the port and “hit emergency stop buttons” on machines before strapping themselves to a different piece of equipment. They were brought down and arrested after “several hours” and are expected to appear in court in the coming days.

The disruptions have drawn the ire of state officials, with New South Wales Environment Minister Matt Kean calling them “completely out of line” and urging police to “throw the book” at the protesters, at least 19 of whom have already been arrested so far this month, according to ABC.

“Pull your heads in, get out of the way and stop hurting other people going about their lives, running their businesses,” the minister said during a radio interview on Wednesday. “There are hundreds of ways to make your views known and advocate for change, but risking the lives of rail workers is definitely not one of them.”

The activists could face charges that carry maximum sentences of 25 years in prison, NSW police commissioner Mick Fuller said, noting that local law enforcement has created a “strike force” to deal with future disturbances at the port.

READ MORE: The trillion dollar push to decarbonize global shipping

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Scientists have used artificial intelligence to “predict” formulas for new designer drugs, with the stated goal of helping to improve their regulation. The AI generated formulas for nearly nine million potential new drugs.

Researchers with the University of British Columbia (UBC) used a deep neural net for the job, teaching it to make up chemical structures of potential new drugs. According to their study, released this week, the computer intelligence fared better at the task than the scientists had expected.

The research team used a database of known designer drugs – synthetic psychoactive substances – to train the AI on their structures. The market for designer drugs is ever-changing, since their manufacturers are constantly tweaking their formulas to circumvent restrictions and produce new “legal” substances, while cracking their structure takes months for law enforcement agencies, the researchers said.

Read more

FILE PHOTO: A man living on the streets displays what he says is the synthetic drug fentanyl, in the Tenderloin section of San Francisco, California, February 27, 2020 © Reuters / Shannon Stapleton
Drug overdose deaths in US hit all-time record

“The vast majority of these designer drugs have never been tested in humans and are completely unregulated. They are a major public-health concern to emergency departments across the world,” one of the researchers, UBC medical student Dr. Michael Skinnider has said.

After its training, the AI was able to generate some 8.9 million potential designer drugs. Afterwards, researchers ran a data sheet of some 196 new drugs, which had emerged in real life after the model was trained, and found that more than 90% of these have been already predicted by the computer.

“The fact that we can predict what designer drugs are likely to emerge on the market before they actually appear is a bit like the 2002 sci-fi movie, Minority Report, where foreknowledge about criminal activities about to take place helped significantly reduce crime in a future world,” senior author Dr. David Wishart, a professor of computing science at the University of Alberta, has said.

Identifying completely unknown substances remains an issue for the AI, the research team has noted, but they hope it might potentially help with that task, since the computer was also able to predict which formulas of designer drugs were more likely to be created and hit the market. The model “ranked the correct chemical structure of an unidentified designer drug among the top 10 candidates 72 percent of the time,” while throwing in spectrometry analysis, which is an easily obtained measurement, bumped the accuracy to some 86%.

“It was shocking to us that the model performed this well, because elucidating entire chemical structures from just an accurate mass measurement is generally thought to be an unsolvable problem,” Skinnider stated.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Just three days after restrictions were announced for unvaccinated Austrians, a provincial governor is pressing for a nationwide lockdown of all residents as Covid-19 infections continue to hit record highs.

“If no national lockdown is ordered tomorrow, there will definitely have to be a lockdown of several weeks in Upper Austria, together with our neighboring province Salzburg as of next week,” Upper Austria Governor Thomas Stelzer told lawmakers on Thursday.

That will mean at least two of Austria’s nine provinces will be in full lockdown mode just days after the nation created a two-tier society by locking down approximately two million unvaccinated Austrians.

“We must raise the vaccination rate. It is shamefully low,” Chancellor Alexander Schallenberg said on Sunday, announcing that unvaccinated residents would only be allowed to leave their homes for “essential” purposes, such as to buy groceries or go to a doctor’s office.

Read more

FILE PHOTO: Health care workers exchange a fast PCR test sample in a mobile laboratory truck, amid the coronavirus disease (COVID-19) outbreak, in Soelden, Austria, October 15, 2020. REUTERS/Leonhard Foeger
Lockdown-ready Austria has its PCR system tricked

Police are now doing random checks for proof of vaccination on Austrian streets. Those unvaccinated residents who are found to be in violation of the lockdown order face steep fines of up to €500. Those who refuse to go through a vaccination status check will have to pay about three times as much.

Stelzer and other Austrian governors are scheduled to meet with Schallenberg and Health Minister Wolfgang Mueckstein on Friday, when a full lockdown will likely be considered.

New Covid-19 cases in the country passed the 15,000 mark for the first time on Thursday, far surpassing 2020’s daily high of 9,586, set when no vaccines were available. Upper Austria and Salzburg have been hit the hardest, putting hospitals at risk of bed shortages. With some 66% of its population fully vaccinated, Austria lags behind other Western European countries in terms of the Covid-19 vaccination rate.

While Austria is the first to impose a lockdown on the unvaccinated, other EU countries – including Slovakia, the Czech Republic and Greece – have imposed increasingly tight restrictions on people who haven’t accepted a Covid vaccine.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

For the first time since the start of the pandemic, the number of new daily Covid cases in Germany has exceeded 60,000, according to the country’s disease control and prevention agency, the Robert Koch Institute.

Authorities fear that in reality the figure is even higher, as not all cases are immediately reported or detected. Just a week ago, the number of daily infections across Germany surpassed the 50,000 mark.

Read more

(FILE PHOTO) © REUTERS/Fabian Bimmer
Germans facing ‘really terrible Christmas’

Among the country’s Covid hotspots are Thuringia, Saxony and Bavaria. In the latter region, hospitals are so overwhelmed with Covid patients that they have had to put off any non-emergency surgery.

Against this grim backdrop, lawmakers in the Bundestag on Thursday backed a new set of measures aimed at containing the spread of the disease. The package was proposed by Germany’s Social Democrats, the Green and Free Democratic parties, which are expected to form a new coalition government as early as next week.

If passed by the upper house, the rules would include mandatory daily Covid testing for employees of, and visitors to, care homes, regardless of vaccination status. Germans would also be required to show proof of full vaccination, recovery or a fresh negative Covid test in order to enter their workplace or use public transport.

On top of that, those caught selling and forging fake certificates and tests could face up to five years behind bars. Just like the Covid regulations currently in place, the new plan gives some leeway to regional authorities in terms of restrictions so that, for instance, the banning of recreational, cultural, and sporting events will be at their discretion. However, things like travel bans, curfews and massive closures of businesses would now be off-limits to local government.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Poland’s procedure for appointing senior judges by the executive branch violates EU rules, the Court of Justice of the European Union (CJEU) has said.

Tuesday’s ruling by the CJEU said the situation in Poland in which the justice minister, “who is also the Public Prosecutor General,” can “second judges to higher criminal courts” and terminate them at any time “without stating reasons,” infringes on the independence of the judicial branch.

Read more

The Polish coal-fired power plant Turow is seen from a hill near Vitkov village in the Czech Republic on June 28, 2021. © AFP / Michal Cizek
Poland must pay €500,000 DAILY for ignoring top EU court’s ruling on Turow mine

The EU court’s opinion was requested by a regional court in Warsaw, which was worried that the appointment and termination procedure compromised the presumption of innocence in cases adjudicated by minister-seconded judges.

The CJEU found “a number of factors” that could empower the justice minister to influence judges and thus “may give rise to doubts concerning their independence.” It said appointments and terminations of a judge should be made “on the basis of criteria known in advance and must contain an appropriate statement of reasons.” Under the current procedures, the criteria are not public at all and the minister doesn’t have to explain his or her decision to withdraw the secondment.

The European court also noted that while a judge has to consent to be seconded by the minister, the termination can be done without one, which “may have effects similar to those of a disciplinary penalty.”

The minister’s role as head of the prosecution is problematic in the context of judge appointments, since it calls into question the impartiality of prosecution and trial, the CJEU said.

Lastly, there is an issue with seconded judges’ involvement in disciplinary proceedings brought against other judges. They serve as deputies to the Disciplinary Officer for Ordinary Court Judges, also appointed by the minister of justice. The arrangement could cast doubt on “the imperviousness of the other members of the adjudicating panels concerned to external factors,” the EU court said.

The combination of factors gave the CJEU reason to believe that minister-seconded judges “are not provided with the guarantees and the independence which all judges should normally enjoy” in a member-state of the EU. The minister’s power “cannot be considered compatible with the obligation to comply with the requirement of independence.”

Considering the circumstances, the court added, “the presumption of innocence may be jeopardised” in cases presided over by judges such as these in Poland.

The disputed procedure is part of a sweeping reform of the judicial system, which put the conservative Polish government at loggerheads with the EU. The opinion is the latest blow dealt to Poland in the ongoing conflict.

Last month, the CJEU imposed a €500,000 ($568,000) per day fine on Warsaw for ignoring a previous order from the court in a case regarding a mining operation. Poland called the ruling part of a “political blackmail” campaign by Brussels.

READ MORE: Poland will be punished for challenging EU law primacy, European leader warns, as Warsaw claims Brussels is devoid of democracy

The EU and Poland have long been entrenched in conflicts over domestic policies which officials in Brussels say go against the union’s rules. Warsaw, among other things, has been accused of compromising the rule of law, discriminating against the LGBT community, and curbing freedom of the press. The Polish government says the EU is attempting to encroach upon its national sovereignty.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Covid-19 variants keep emerging in different parts of the world, causing experts to ask how long the pandemic will last, and how effective the current methods of protection really are.

Since the pandemic started in 2019, people have referred to the disease which has paralyzed the world simply as ‘coronavirus’. Now, in 2021, when we talk about it, we mean not just the original variant, but also its numerous mutations. 

Read more

© Getty Images / sasacvetkovic33
Drastic drop in Covid vaccine effectiveness – study

In May, the WHO decided to label the key variants with Greek letters. Since then, the Delta variant has been proclaimed the predominant strain across the world, and now we have titles that look like codes to detail the differences between variants. Last month, the UK was put on high alert over a fast-spreading Delta AY.4.2 variant. This week, Norway reported finding one more version of the Delta strain – AY. 63. The country’s experts suggest it’s not more dangerous than the Delta mutation itself. Meanwhile, another Covid variant, discovered in France (B.1.640), brought the researchers an unpleasant surprise: they said they’d never seen mutations like it. 

Professor David Dockrell, from the Center for Inflammation Research of the University of Edinburgh, described to RT the reasons for the constant mutation of the coronavirus. “The areas in the virus that are most likely to change are those that come into contact with what we call ‘selective pressures’ – or factors that make them need to change,” he explains. “So, a version of the virus which mutates and changes to give it a selective advantage to escape from the immune system is more likely to prosper and become a dominant strain.” 

That’s how it works: The part of the virus many of the immune responses (or antibodies, T-cells etc.) are responding to is called the spike protein (or the S-protein). So, the virus tries to change it in order to survive. 

“We know that a variety of different viruses are able to mutate and change when exposed to the selective pressure of the immune system, whether it would be the human immune system or other species in which these viruses have evolved,” Prof. Dockrell says. “And of course, we’ve seen it most clearly with HIV, which is particularly good at changing and evolving. It does something called ‘reverse transcription’ – it copies material in the reversed direction from DNA to RNA.” 

Covid is still seemingly running faster than humanity’s efforts to curb it, but Prof. Dockrell has some good news. “The coronavirus – and viruses like it – are not as able to make these changes. They are going to do it to some extent, but they are not going to be as successful as retroviruses and HIV.” 

And the other major thing to say: When the viruses make changes, there’s always what we call ‘a fitness cost’. Many of the potential changes that the virus could make will actually not favor its survival. So there are only a certain number, potentially, of changes that the virus can make, before it starts affecting its fitness. 

Now, unfortunately, we are still in a phase where Covid19 can continue to evolve and change. It’s not time to panic, though, because across the world various ways to adapt the current anti-Covid strategies are already in place. First of all, people should keep getting vaccines – maybe receiving slightly altered booster doses, Prof. Dockrell suggests, “in a way, that we, after all, have to do with influenza, by providing a seasonal influenza vaccine and changing it every year.” 

Read more

RT
WHO sounds alarm over looming Covid-19 catastrophe in Europe

“And maybe we have to keep changing some of the treatments like these new monoclonal antibodies against the virus, because they also may be limited by the emergence of a mutation of the virus evolving the S-protein,” he adds. 

Sounds promising – but won’t it become a never-ending race against constantly emerging mutations? 

Hopefully not. According to Prof. Dockrell, there are parts of viruses that scientists call ‘conserved areas’. With time, vaccines and monoclonal antibodies will target these areas, which the virus finds very hard to change. “Clearly, the direction of travel is to develop either vaccine responses that affect more different kinds of virus, or these ‘monoclonal antibodies’ that we could use to prevent or treat infection, that they will target more conserved areas and therefore will be less limited by the ability of these virus to evolve and change,” he concludes.

Think your friends would be interested? Share this story!

 

find more fun & mates at SoShow now !

Corin Stone, Washington College of Law

Corin Stone is a Scholar-in-Residence and Adjunct Professor at the Washington College of Law.  Stone is on leave from the Office of the Director of National Intelligence (ODNI) where, until August 2020, she served as the Deputy Director of National Intelligence for Strategy & Engagement, leading Intelligence Community (IC) initiatives on artificial intelligence, among other key responsibilities. From 2014-2017, Ms. Stone served as the Executive Director of the National Security Agency (NSA).

(Editor’s Note: This article was first published by our friends at Just Security and is the third in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.)

OPINION — As I have written earlier, there is widespread bipartisan support for radically improving the nation’s ability to take advantage of artificial intelligence (AI). For the Intelligence Community (IC), that means using AI to more quickly, easily, and accurately analyze increasing volumes of data to produce critical foreign intelligence that can warn of and help defuse national security threats, among other things. To do that, the IC will have to partner closely with the private sector, where significant AI development occurs. But despite the billions of dollars that may ultimately flow toward this goal, there are basic hurdles the IC still must overcome to successfully transition and integrate AI into the community at speed and scale.

Among the top hurdles are the U.S. government’s slow, inflexible, and complex budget and acquisition processes. The IC’s rigid budget process follows the standard three-year cycle for the government, which means it takes years to incorporate a new program and requires confident forecasting of the future. Once a program overcomes the necessary hurdles to be included in a budget, it must follow a complex sequence of regulations to issue and manage a contract for the actual goods or services needed. These budget and acquisition processes are often considered separately as they are distinct, but I treat them together because they are closely related and inextricably intertwined in terms of the government’s purchasing of technology.

Importantly, these processes were not intended to obstruct progress; they were designed to ensure cautious and responsible spending, and for good reason. Congress, with its power of the purse, and the Office of Management and Budget (OMB), as the executive branch’s chief budget authority, have the solemn duty to ensure wise and careful use of taxpayer dollars. And their roles in this regard are vital to the U.S. government’s ability to function.

Unfortunately, despite the best of intentions, as noted by some in Congress itself, the budget process has become so “cumbersome, frustrating, and ineffective” that it has weakened the power of the purse and Congress’ capacity to govern. And when complicated acquisition processes are layered on top of the budget process, the result is a spider web of confusion and difficulty for anyone trying to navigate them.

The Need for Speed … and Flexibility and Simplicity

As currently constructed, government budget and acquisition processes cause numerous inefficiencies for the purchase of AI capabilities, negatively impacting three critical areas in particular: speed, flexibility, and simplicity. When it comes to speed and flexibility, the following difficulties jump out:

  • The executive branch has a methodical and deliberate three-year budget cycle that calls for defined and steady requirements at the beginning of the cycle. Changing the requirements at any point along the way is difficult and time-consuming.
  • The IC’s budgeting processes require that IC spending fit into a series of discrete sequential steps, represented by budget categories like research, development, procurement, or sustainment. Funds are not quickly or easily spent across these categories.
  • Most appropriations expire at the end of each fiscal year, which means programs must develop early on, and precisely execute, detailed spending plans or lose the unspent funds at the end of one year.
  • Government agencies expend significant time creating detailed Statements of Work (SOWs) that describe contract requirements. Standard contract vehicles do not support evolving requirements, and companies are evaluated over the life of the contract based on strict compliance with the original SOW created years earlier.

These rules make sense in the abstract and result from well-intentioned attempts to buy down the risk of loss or failure and promote accountability and transparency. They require the customer to know with clarity and certainty the solution it seeks in advance of investment and they narrowly limit the customer’s ability to change the plan or hastily implement it. These rules are not unreasonably problematic for the purchase of items like satellites or airplanes, the requirements for which probably should not and will not significantly change over the course of many years.

However, because AI technology is still maturing and the capabilities themselves are always adapting, developing, and adding new functionality, the rules above have become major obstacles to the quick integration of AI across the IC. First, AI requirements defined with specificity years in advance of acquisition – whether in the budget or in a statement of work – are obsolete by the time the technology is delivered. Second, as AI evolves there is often not a clear delineation between research, development, procurement, and sustainment of the technology – it continuously flows back and forth across these categories in very compressed timelines. Third, it is difficult to predict the timing of AI breakthroughs, related new requirements, and funding impacts, so money might not be spent as quickly as expected and could be lost at the end of the fiscal year. Taken together, these processes are inefficient and disruptive, cause confusion and delay, and discourage engagement from small businesses, which have neither the time nor the resources to wait years to complete a contract or to navigate laborious, uncertain processes.


Engage personally with experts on Artificial Intelligence and national security  at The Cipher Brief Threat Conference October 24-26.  If you are an actively working in the national security field, we invite you to apply to attend.  Seats are limited.  


Simply put, modern practices for fielding AI have outpaced the IC’s decades-old approach to budgeting and acquisition. That AI solutions are constantly evolving, learning, and improving both undermines the IC’s ability to prescribe a specific solution and, in fact, incentivizes the IC to allow the solution to evolve with the technology. The lack of flexibility and speed in how the IC manages and spends money and acquires goods and services is a core problem when it comes to fully incorporating AI into the IC’s toolkit.

Even while we introduce more speed and agility into these processes, however, the government must continue to ensure careful, intentional, and appropriate spending of taxpayer dollars. The adoption of an IC risk framework and modest changes to congressional oversight engagements, which I address in upcoming articles, will help regulate these AI activities in the spirit of the original intent of the budget and acquisition rules.

As for the lack of simplicity, the individually complex budget and acquisition rules are together a labyrinth of requirements, regulations, and processes that even long-time professionals have trouble navigating. In addition:

  • There is no quick or simple way for practitioners to keep current with frequent changes in acquisition rules.
  • The IC has a distributed approach that allows each element to use its various acquisition authorities independently rather than cohesively, increasing confusion across agency lines.
  • Despite the many federal acquisition courses aimed at demystifying the process, there is little connection among educational programs, no clear path for IC officers to participate, and no reward for doing so.

The complexity of the budget and acquisition rules compounds the problems with speed and flexibility, and as more flexibility is introduced to support AI integration, it is even more critical that acquisition professionals be knowledgeable and comfortable with the tools and levers they must use to appropriately manage and oversee contracts.

Impactful Solutions: A Target Rich Environment

Many of these problems are not new; indeed, they have been highlighted and studied often over the past few years in an effort to enable the Department of Defense (DOD) and the IC to more quickly and easily take advantage of emerging technology. But to date, DOD has made only modest gains and the IC is even further behind. While there are hundreds of reforms that could ease these difficulties, narrowing and prioritizing proposed solutions will have a more immediate impact. Moreover, significant change is more likely to be broadly embraced if the IC first proves its ability to successfully implement needed reforms on a smaller scale. The following actions by the executive and legislative branches – some tactical and some strategic – would be powerful steps to ease and speed the transition of AI capabilities into the IC.

Statements of Objectives

A small but important first step to deal with the slow and rigid acquisition process is to encourage the use of Statements of Objectives (SOO) instead of SOWs, when appropriate. As mentioned, SOWs set forth defined project activities, deliverables, requirements, and timelines, which are used to measure contractor progress and success. SOWs make sense when the government understands with precision exactly what is needed from the contractor and how it should be achieved.

SOOs, on the other hand, are more appropriate when the strategic outcome and objectives are clear, but the steps to achieve them are less so. They describe “what” without dictating “how,” thereby encouraging and empowering industry to propose innovative solutions. SOOs also create clarity about what is important to the government, leading companies to focus less on aggressively low pricing of specific requirements and more on meeting the ultimate outcomes in creative ways that align with a company’s strengths. This approach requires knowledgeable acquisition officers as part of the government team, as described below, to ensure the contract includes reasonable milestones and decision points to keep the budget within acceptable levels.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


New Authorities for the IC

Two new authorities would help the IC speed and scale its use of AI capabilities: Other Transaction Authority (OTA)  and Commercial Solutions Openings (CSO). Other Transaction Authority allows specific types of transactions to be completed outside of the traditional federal laws and regulations that apply to standard government procurement contracts, providing significantly more speed, flexibility, and accessibility than traditional contracts. While OTA is limited in scope and not a silver bullet for all acquisition problems, OTA has been used to good effect since 1990 by the Defense Advanced Research Projects Activity (DARPA), DOD’s over-the-horizon research and development organization, among others.

CSOs are a simplified and relatively quick solicitation method to award firm fixed price contracts up to $100 million. CSOs can be used to acquire innovative commercial items, technologies, or services that close capability gaps or provide technological advances through an open call for proposals that provide offerors the opportunity to respond with technical solutions of their own choosing to a broadly defined area of government interest. CSOs are considered competitively awarded regardless of how many offerors respond.

Both OTA and CSO authority should be immediately granted to the IC to improve the speed and flexibility with which the IC can acquire and transition AI into the IC.

Unclassified Sandbox

The predictive nature of the IC’s work and the need to forecast outcomes means the IC must be able to acquire AI at the point of need, aligned to the threat. Waiting several years to acquire AI undermines the IC’s ability to fulfill its purpose. But with speed comes added risk that new capabilities might fail. Therefore, the IC should create an isolated unclassified sandbox, not connected to operational systems, in which potential IC customers could test and evaluate new capabilities alongside developers in weeks-to-months, rather than years. Congress should provide the IC with the ability to purchase software quickly for test and evaluation purposes only to buy down the risk that a rapid acquisition would result in total failure. The sandbox process would allow the IC to test products, consider adjustments, and engage with developers early on, increasing the likelihood of success.

Single Appropriation for Software

DOD has a pilot program that funds software as a single budget item – allowing the same money to be used for research, production, operations, and sustainment – to improve and speed software’s unique development cycle. AI, being largely software, is an important beneficiary of this pilot. Despite much of the IC also being part of DOD, IC-specific activities do not fall within this pilot. Extending DOD’s pilot to the IC would not only speed the IC’s acquisition of AI, but it would also increase interoperability and compatibility of IC and DOD projects.

No-Year Funds

Congress should reconsider the annual expiration of funds as a control lever for AI. Congress already routinely provides no-year funding when it makes sense to do so. In the case of AI, no-year funds would allow the evolution of capabilities without arbitrary deadlines, drive more thoughtful spending throughout the lifecycle of the project, and eliminate the additional overhead required to manage the expiration of funds annually. Recognizing the longer-term nature of this proposal, however, the executive branch also must seek shorter-term solutions in the interim.

A less-preferable alternative is to seek two-year funding for AI. Congress has a long history of proposing biennial budgeting for all government activities. Even without a biennial budget, Congress has already provided nearly a quarter of the federal budget with two-year funding. While two-year funding is not a perfect answer in the context of AI, it would at a minimum discourage parties from rushing to outcomes or artificially burning through money at the end of the first fiscal year and would provide additional time to fulfill the contract. This is presumably why DOD recently created a new budget activity under their Research, Development, Test and Evaluation (RDT&E) category, which is typically available for two years, for “software and digital technology pilot programs.”

AI Technology Fund

Congress should establish an IC AI Technology Fund (AITF) to provide kick-starter funds for priority community AI efforts and enable more flexibility to get those projects off the ground. To be successful, the AITF must have no-year funds, appropriated as a single appropriation, without limits on usage throughout the acquisition lifecycle. The AITF’s flexibility and simplicity would incentivize increased engagement by small businesses, better allowing the IC to tap into the diversity of the marketplace, and would support and speed the delivery of priority AI capabilities to IC mission users.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


ICWERX  

To quickly take advantage of private sector AI efforts at scale, the IC must better understand the market and more easily engage directly with the private sector. To do so, the IC should create an ICWERX, modeled after AFWERX, an Air Force innovation organization that drives agile public-private sector collaboration to quickly leverage and develop cutting-edge technology for the Air Force. AFWERX aggressively uses innovative, flexible, and speedy procurement mechanisms like OTA and the Small Business Innovation Research and Small Business Technology Transfer programs (SBIR/STTR) to improve the acquisition process and encourage engagement from small businesses. AFWERX is staffed by acquisition and market research experts who are comfortable using those authorities and understand the market. While the IC’s needs are not identical, an ICWERX could serve as an accessible “front door” for prospective partners and vendors, and enable the IC to more quickly leverage and scale cutting-edge AI.

De-mystify Current Authorities

While there is much complaining about a lack of flexible authorities in the IC (and a real need for legal reform), there is flexibility in existing rules that has not been fully utilized. The IC has not prioritized the development or hiring of people with the necessary government acquisition and contracts expertise, so there are insufficient officers who know how to use the existing authorities and those who do are overworked and undervalued. The IC must redouble its efforts to increase its expertise in, and support the use of, these flexibilities in several ways.

First, the IC should create formal partnerships and increase engagement with existing U.S. government experts. The General Services Administration’s Technology Transformation Services (TTS) and FEDSIM, for example, work across the federal government to build innovative acquisition solutions and help agencies more quickly adopt AI. In addition, DOD’s Joint AI Center has built significant acquisition expertise that the IC must better leverage. The IC also should increase joint duty rotations in this area to better integrate and impart acquisition expertise across the IC.

Second, the IC must prioritize training and education of acquisition professionals. And while deep acquisition expertise is not necessary for everyone, it is important for lawyers, operators, technologists, and innovators to have a reasonable understanding of the acquisition rules, and the role they each play in getting to successful outcomes throughout the process. Collaboration and understanding across these professions and up and down the chain of command will result in more cohesive, speedy, and effective outcomes.

To that end, the Office of the Director of National Intelligence (ODNI) should work with the many existing government acquisition education programs, as well as the National Intelligence University, to develop paths for IC officers to grow their understanding of and ability to navigate and successfully use acquisition rules. The ODNI also should strengthen continuing education requirements and create incentive pay for acquisition professionals.

Third, the IC should prioritize and use direct hire authority to recruit experts in government acquisition, to include a mix of senior term-limited hires and junior permanent employees with room to grow and the opportunity for a long career in the IC. Such a strategy would allow the IC to quickly tackle the current AI acquisition challenges and build a bench of in-house expertise.

Finally, practitioners should have an easily accessible reference book to more quickly discover relevant authorities, understand how to use them, and find community experts. A few years ago, the ODNI led the creation of an IC Acquisition Playbook, which describes common IC acquisition authorities, practices, and usages. The ODNI should further develop and disseminate this Playbook as a quick win for the IC.

Incentivize Behavior

To encourage creative and innovative acquisition practices, as well as interdisciplinary collaboration, the IC must align incentives with desired outcomes and create in acquisition professionals a vested interest in the success of the contract. Acquisition officers today are often brought into projects only in transactional ways, when contracts must be completed or money must be obligated, for example. They are rarely engaged early as part of a project team, so they are not part of developing the solutions and have minimal investment in the project’s success. Reinforcing this, acquisition professionals are evaluated primarily on the amount of money they obligate by the end of the fiscal year, rather than on the success of a project.

Therefore, to start, project teams should be required to engage acquisition officers early and often, both to seek their advice and to ensure they have a good understanding of the project’s goals. In addition, evaluation standards for acquisition officers should incorporate effective engagement and collaboration with stakeholders, consideration of creative alternatives and options, and delivery of mission outcomes. If an officer uses innovative practices that fail, that officer also should be evaluated on what they learned from the experience that may inform future success.

Lastly, the ODNI should reinvigorate and highlight the IC acquisition awards to publicly reward desired behavior, and acquisition professionals should be included in IC mission team awards as a recognition of their impact on the ultimate success of the mission.

Conclusion

Between the government’s rigid budget and acquisition processes and confusion about how to apply them, there is very little ability for the IC to take advantage of a fast-moving field that produces new and updated technology daily. Tackling these issues through the handful of priority actions set forth above will begin to drive the critical shift away from the IC’s traditional, linear processes to the more dynamic approaches the IC needs to speed and transform the way it purchases, integrates, and manages the use of AI.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

 

The post AI and the IC: The Tangled Web of Budget and Acquisition appeared first on The Cipher Brief.

find more fun & mates at SoShow now !