Palestinian Islamist group Hamas has called on Canadian singer Justin Bieber to cancel his upcoming concert in what it calls the “Zionist occupation state” of Israel.

Bieber announced his 2022 world tour dates this week, with a concert in Tel Aviv planned for next October. On Thursday, Hamas’ Artistic Production Department issued a statement, cited by the Palestinian Sawa news outlet, “condemning and denouncing” the performer. It called on the star to cancel the show and “boycott the Zionist occupation state in protest at its repeated crimes against the Palestinian people.” 

Read more

A Palestinian boy rides a bicycle past a mural depicting late Hamas leader Abdel-Aziz Al-Rantissi in Gaza City (FILE PHOTO) © REUTERS/Mohammed Salem
UK outlaws Hamas as terrorist organization

Bieber has performed in Israel multiple times, his last performance there having been in 2017 at Park HaYarkon – the same venue slated for next year. Since the announcement of the ‘Justice’ tour dates, calls for him to cancel the Tel Aviv show have gained momentum across social media, with many posters condemning the singer for supporting what one called an “apartheid state.”

Some noted that Bieber was set to arrive in Israel after performing in South Africa. “Justin Bieber is really going straight from SA to Israel. From a country that fought apartheid to a country that’s practicing apartheid,” one Twitter user complained.

A petition asking the singer to boycott Israel and exclude it from his tour has been launched online, and had garnered some 3,700 signatures by Friday. 

In 2018, the New Zealand singer Lorde canceled a concert in Israel, subsequently thanking fans for “educating” her on the issue, and, the same year, US artist Lana Del Rey at first defended her decision to perform in the country, saying her appearance would not be a “political statement,” before backtracking and canceling the gig.

Hamas has been designated a terrorist group by the US, the EU, and, as of Friday, the UK. In April 2021, international non-governmental organization Human Rights Watch concluded in a report that Israel had committed “crimes against humanity of apartheid and persecution.”

If you like this story, share it with a friend!

find more fun & mates at SoShow now !

Syrian-born musician Omar Souleyman, who worked with the likes of Bjork and Damon Albarn, has been detained in Turkey over alleged links to the Kurdistan Workers’ Party, which is deemed a terrorist group by Ankara.

Souleyman was brought in for questioning on Wednesday, with officers also searching through his home in Turkey’s southeastern province of Sanliurfa, the singer’s manager said.

Read more

Pro-Kurdish Peoples' Democratic Party (HDP) supporters shout slogans and hold flags during a rally as part of Nowruz (Newroz). © Tunahan Turhan/SOPA Images/LightRocket via Getty Images
Turkey’s top court accepts indictment to dissolve pro-Kurdish HDP party

The arrest was likely provoked by recent reports that the musician had traveled to an area in Syria controlled by the Kurdish militias known as the YPG, he added.

The YPG have been US allies in the fight against Islamic State (IS, formerly ISIS), but Turkey considers them to be an extension of the Kurdistan Workers’ Party (PKK) and a threat to its national security.

For decades, the Workers’ Party has been fighting Turkish troops in the southeast of the country, striving for greater autonomy for the Kurdish population.  

Souleyman’s son denied his father’s alleged terrorist links, saying he didn’t have any political affiliation and had become the victim of a “malicious report.” Some media outlets claimed the musician could be released from custody later on Thursday.

Coming from Syria’s majority-Kurdish province of Hasekeh, Souleyman had been known as a prolific wedding performer in his home country. But his international career skyrocketed after he moved to Turkey a decade ago, fleeing the Syrian conflict. The 55-year-old’s clips, including his top hit ‘Warni Warni’, have garnered millions of views on YouTube. He performed at the Nobel Peace Prize ceremony in 2013, as well as at many large festivals around the globe.

His unique style, which is based on mixing traditional Middle Eastern folk music with electronic sound, has attracted the attention of such stars as Bjork, Four Tet, Damon Albarn, and Diplo, who have all collaborated with Souleyman.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Corin Stone, Washington College of Law

Corin Stone is a Scholar-in-Residence and Adjunct Professor at the Washington College of Law.  Stone is on leave from the Office of the Director of National Intelligence (ODNI) where, until August 2020, she served as the Deputy Director of National Intelligence for Strategy & Engagement, leading Intelligence Community (IC) initiatives on artificial intelligence, among other key responsibilities. From 2014-2017, Ms. Stone served as the Executive Director of the National Security Agency (NSA).

(Editor’s Note: This article was first published by our friends at Just Security and is the third in a series that is diving into the foundational barriers to the broad integration of AI in the IC – culture, budget, acquisition, risk, and oversight.)

OPINION — As I have written earlier, there is widespread bipartisan support for radically improving the nation’s ability to take advantage of artificial intelligence (AI). For the Intelligence Community (IC), that means using AI to more quickly, easily, and accurately analyze increasing volumes of data to produce critical foreign intelligence that can warn of and help defuse national security threats, among other things. To do that, the IC will have to partner closely with the private sector, where significant AI development occurs. But despite the billions of dollars that may ultimately flow toward this goal, there are basic hurdles the IC still must overcome to successfully transition and integrate AI into the community at speed and scale.

Among the top hurdles are the U.S. government’s slow, inflexible, and complex budget and acquisition processes. The IC’s rigid budget process follows the standard three-year cycle for the government, which means it takes years to incorporate a new program and requires confident forecasting of the future. Once a program overcomes the necessary hurdles to be included in a budget, it must follow a complex sequence of regulations to issue and manage a contract for the actual goods or services needed. These budget and acquisition processes are often considered separately as they are distinct, but I treat them together because they are closely related and inextricably intertwined in terms of the government’s purchasing of technology.

Importantly, these processes were not intended to obstruct progress; they were designed to ensure cautious and responsible spending, and for good reason. Congress, with its power of the purse, and the Office of Management and Budget (OMB), as the executive branch’s chief budget authority, have the solemn duty to ensure wise and careful use of taxpayer dollars. And their roles in this regard are vital to the U.S. government’s ability to function.

Unfortunately, despite the best of intentions, as noted by some in Congress itself, the budget process has become so “cumbersome, frustrating, and ineffective” that it has weakened the power of the purse and Congress’ capacity to govern. And when complicated acquisition processes are layered on top of the budget process, the result is a spider web of confusion and difficulty for anyone trying to navigate them.

The Need for Speed … and Flexibility and Simplicity

As currently constructed, government budget and acquisition processes cause numerous inefficiencies for the purchase of AI capabilities, negatively impacting three critical areas in particular: speed, flexibility, and simplicity. When it comes to speed and flexibility, the following difficulties jump out:

  • The executive branch has a methodical and deliberate three-year budget cycle that calls for defined and steady requirements at the beginning of the cycle. Changing the requirements at any point along the way is difficult and time-consuming.
  • The IC’s budgeting processes require that IC spending fit into a series of discrete sequential steps, represented by budget categories like research, development, procurement, or sustainment. Funds are not quickly or easily spent across these categories.
  • Most appropriations expire at the end of each fiscal year, which means programs must develop early on, and precisely execute, detailed spending plans or lose the unspent funds at the end of one year.
  • Government agencies expend significant time creating detailed Statements of Work (SOWs) that describe contract requirements. Standard contract vehicles do not support evolving requirements, and companies are evaluated over the life of the contract based on strict compliance with the original SOW created years earlier.

These rules make sense in the abstract and result from well-intentioned attempts to buy down the risk of loss or failure and promote accountability and transparency. They require the customer to know with clarity and certainty the solution it seeks in advance of investment and they narrowly limit the customer’s ability to change the plan or hastily implement it. These rules are not unreasonably problematic for the purchase of items like satellites or airplanes, the requirements for which probably should not and will not significantly change over the course of many years.

However, because AI technology is still maturing and the capabilities themselves are always adapting, developing, and adding new functionality, the rules above have become major obstacles to the quick integration of AI across the IC. First, AI requirements defined with specificity years in advance of acquisition – whether in the budget or in a statement of work – are obsolete by the time the technology is delivered. Second, as AI evolves there is often not a clear delineation between research, development, procurement, and sustainment of the technology – it continuously flows back and forth across these categories in very compressed timelines. Third, it is difficult to predict the timing of AI breakthroughs, related new requirements, and funding impacts, so money might not be spent as quickly as expected and could be lost at the end of the fiscal year. Taken together, these processes are inefficient and disruptive, cause confusion and delay, and discourage engagement from small businesses, which have neither the time nor the resources to wait years to complete a contract or to navigate laborious, uncertain processes.


Engage personally with experts on Artificial Intelligence and national security  at The Cipher Brief Threat Conference October 24-26.  If you are an actively working in the national security field, we invite you to apply to attend.  Seats are limited.  


Simply put, modern practices for fielding AI have outpaced the IC’s decades-old approach to budgeting and acquisition. That AI solutions are constantly evolving, learning, and improving both undermines the IC’s ability to prescribe a specific solution and, in fact, incentivizes the IC to allow the solution to evolve with the technology. The lack of flexibility and speed in how the IC manages and spends money and acquires goods and services is a core problem when it comes to fully incorporating AI into the IC’s toolkit.

Even while we introduce more speed and agility into these processes, however, the government must continue to ensure careful, intentional, and appropriate spending of taxpayer dollars. The adoption of an IC risk framework and modest changes to congressional oversight engagements, which I address in upcoming articles, will help regulate these AI activities in the spirit of the original intent of the budget and acquisition rules.

As for the lack of simplicity, the individually complex budget and acquisition rules are together a labyrinth of requirements, regulations, and processes that even long-time professionals have trouble navigating. In addition:

  • There is no quick or simple way for practitioners to keep current with frequent changes in acquisition rules.
  • The IC has a distributed approach that allows each element to use its various acquisition authorities independently rather than cohesively, increasing confusion across agency lines.
  • Despite the many federal acquisition courses aimed at demystifying the process, there is little connection among educational programs, no clear path for IC officers to participate, and no reward for doing so.

The complexity of the budget and acquisition rules compounds the problems with speed and flexibility, and as more flexibility is introduced to support AI integration, it is even more critical that acquisition professionals be knowledgeable and comfortable with the tools and levers they must use to appropriately manage and oversee contracts.

Impactful Solutions: A Target Rich Environment

Many of these problems are not new; indeed, they have been highlighted and studied often over the past few years in an effort to enable the Department of Defense (DOD) and the IC to more quickly and easily take advantage of emerging technology. But to date, DOD has made only modest gains and the IC is even further behind. While there are hundreds of reforms that could ease these difficulties, narrowing and prioritizing proposed solutions will have a more immediate impact. Moreover, significant change is more likely to be broadly embraced if the IC first proves its ability to successfully implement needed reforms on a smaller scale. The following actions by the executive and legislative branches – some tactical and some strategic – would be powerful steps to ease and speed the transition of AI capabilities into the IC.

Statements of Objectives

A small but important first step to deal with the slow and rigid acquisition process is to encourage the use of Statements of Objectives (SOO) instead of SOWs, when appropriate. As mentioned, SOWs set forth defined project activities, deliverables, requirements, and timelines, which are used to measure contractor progress and success. SOWs make sense when the government understands with precision exactly what is needed from the contractor and how it should be achieved.

SOOs, on the other hand, are more appropriate when the strategic outcome and objectives are clear, but the steps to achieve them are less so. They describe “what” without dictating “how,” thereby encouraging and empowering industry to propose innovative solutions. SOOs also create clarity about what is important to the government, leading companies to focus less on aggressively low pricing of specific requirements and more on meeting the ultimate outcomes in creative ways that align with a company’s strengths. This approach requires knowledgeable acquisition officers as part of the government team, as described below, to ensure the contract includes reasonable milestones and decision points to keep the budget within acceptable levels.


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


New Authorities for the IC

Two new authorities would help the IC speed and scale its use of AI capabilities: Other Transaction Authority (OTA)  and Commercial Solutions Openings (CSO). Other Transaction Authority allows specific types of transactions to be completed outside of the traditional federal laws and regulations that apply to standard government procurement contracts, providing significantly more speed, flexibility, and accessibility than traditional contracts. While OTA is limited in scope and not a silver bullet for all acquisition problems, OTA has been used to good effect since 1990 by the Defense Advanced Research Projects Activity (DARPA), DOD’s over-the-horizon research and development organization, among others.

CSOs are a simplified and relatively quick solicitation method to award firm fixed price contracts up to $100 million. CSOs can be used to acquire innovative commercial items, technologies, or services that close capability gaps or provide technological advances through an open call for proposals that provide offerors the opportunity to respond with technical solutions of their own choosing to a broadly defined area of government interest. CSOs are considered competitively awarded regardless of how many offerors respond.

Both OTA and CSO authority should be immediately granted to the IC to improve the speed and flexibility with which the IC can acquire and transition AI into the IC.

Unclassified Sandbox

The predictive nature of the IC’s work and the need to forecast outcomes means the IC must be able to acquire AI at the point of need, aligned to the threat. Waiting several years to acquire AI undermines the IC’s ability to fulfill its purpose. But with speed comes added risk that new capabilities might fail. Therefore, the IC should create an isolated unclassified sandbox, not connected to operational systems, in which potential IC customers could test and evaluate new capabilities alongside developers in weeks-to-months, rather than years. Congress should provide the IC with the ability to purchase software quickly for test and evaluation purposes only to buy down the risk that a rapid acquisition would result in total failure. The sandbox process would allow the IC to test products, consider adjustments, and engage with developers early on, increasing the likelihood of success.

Single Appropriation for Software

DOD has a pilot program that funds software as a single budget item – allowing the same money to be used for research, production, operations, and sustainment – to improve and speed software’s unique development cycle. AI, being largely software, is an important beneficiary of this pilot. Despite much of the IC also being part of DOD, IC-specific activities do not fall within this pilot. Extending DOD’s pilot to the IC would not only speed the IC’s acquisition of AI, but it would also increase interoperability and compatibility of IC and DOD projects.

No-Year Funds

Congress should reconsider the annual expiration of funds as a control lever for AI. Congress already routinely provides no-year funding when it makes sense to do so. In the case of AI, no-year funds would allow the evolution of capabilities without arbitrary deadlines, drive more thoughtful spending throughout the lifecycle of the project, and eliminate the additional overhead required to manage the expiration of funds annually. Recognizing the longer-term nature of this proposal, however, the executive branch also must seek shorter-term solutions in the interim.

A less-preferable alternative is to seek two-year funding for AI. Congress has a long history of proposing biennial budgeting for all government activities. Even without a biennial budget, Congress has already provided nearly a quarter of the federal budget with two-year funding. While two-year funding is not a perfect answer in the context of AI, it would at a minimum discourage parties from rushing to outcomes or artificially burning through money at the end of the first fiscal year and would provide additional time to fulfill the contract. This is presumably why DOD recently created a new budget activity under their Research, Development, Test and Evaluation (RDT&E) category, which is typically available for two years, for “software and digital technology pilot programs.”

AI Technology Fund

Congress should establish an IC AI Technology Fund (AITF) to provide kick-starter funds for priority community AI efforts and enable more flexibility to get those projects off the ground. To be successful, the AITF must have no-year funds, appropriated as a single appropriation, without limits on usage throughout the acquisition lifecycle. The AITF’s flexibility and simplicity would incentivize increased engagement by small businesses, better allowing the IC to tap into the diversity of the marketplace, and would support and speed the delivery of priority AI capabilities to IC mission users.


Go beyond the headlines with expert perspectives on today’s news with The Cipher Brief’s Daily Open-Source Podcast.  Listen here or wherever you listen to podcasts.


ICWERX  

To quickly take advantage of private sector AI efforts at scale, the IC must better understand the market and more easily engage directly with the private sector. To do so, the IC should create an ICWERX, modeled after AFWERX, an Air Force innovation organization that drives agile public-private sector collaboration to quickly leverage and develop cutting-edge technology for the Air Force. AFWERX aggressively uses innovative, flexible, and speedy procurement mechanisms like OTA and the Small Business Innovation Research and Small Business Technology Transfer programs (SBIR/STTR) to improve the acquisition process and encourage engagement from small businesses. AFWERX is staffed by acquisition and market research experts who are comfortable using those authorities and understand the market. While the IC’s needs are not identical, an ICWERX could serve as an accessible “front door” for prospective partners and vendors, and enable the IC to more quickly leverage and scale cutting-edge AI.

De-mystify Current Authorities

While there is much complaining about a lack of flexible authorities in the IC (and a real need for legal reform), there is flexibility in existing rules that has not been fully utilized. The IC has not prioritized the development or hiring of people with the necessary government acquisition and contracts expertise, so there are insufficient officers who know how to use the existing authorities and those who do are overworked and undervalued. The IC must redouble its efforts to increase its expertise in, and support the use of, these flexibilities in several ways.

First, the IC should create formal partnerships and increase engagement with existing U.S. government experts. The General Services Administration’s Technology Transformation Services (TTS) and FEDSIM, for example, work across the federal government to build innovative acquisition solutions and help agencies more quickly adopt AI. In addition, DOD’s Joint AI Center has built significant acquisition expertise that the IC must better leverage. The IC also should increase joint duty rotations in this area to better integrate and impart acquisition expertise across the IC.

Second, the IC must prioritize training and education of acquisition professionals. And while deep acquisition expertise is not necessary for everyone, it is important for lawyers, operators, technologists, and innovators to have a reasonable understanding of the acquisition rules, and the role they each play in getting to successful outcomes throughout the process. Collaboration and understanding across these professions and up and down the chain of command will result in more cohesive, speedy, and effective outcomes.

To that end, the Office of the Director of National Intelligence (ODNI) should work with the many existing government acquisition education programs, as well as the National Intelligence University, to develop paths for IC officers to grow their understanding of and ability to navigate and successfully use acquisition rules. The ODNI also should strengthen continuing education requirements and create incentive pay for acquisition professionals.

Third, the IC should prioritize and use direct hire authority to recruit experts in government acquisition, to include a mix of senior term-limited hires and junior permanent employees with room to grow and the opportunity for a long career in the IC. Such a strategy would allow the IC to quickly tackle the current AI acquisition challenges and build a bench of in-house expertise.

Finally, practitioners should have an easily accessible reference book to more quickly discover relevant authorities, understand how to use them, and find community experts. A few years ago, the ODNI led the creation of an IC Acquisition Playbook, which describes common IC acquisition authorities, practices, and usages. The ODNI should further develop and disseminate this Playbook as a quick win for the IC.

Incentivize Behavior

To encourage creative and innovative acquisition practices, as well as interdisciplinary collaboration, the IC must align incentives with desired outcomes and create in acquisition professionals a vested interest in the success of the contract. Acquisition officers today are often brought into projects only in transactional ways, when contracts must be completed or money must be obligated, for example. They are rarely engaged early as part of a project team, so they are not part of developing the solutions and have minimal investment in the project’s success. Reinforcing this, acquisition professionals are evaluated primarily on the amount of money they obligate by the end of the fiscal year, rather than on the success of a project.

Therefore, to start, project teams should be required to engage acquisition officers early and often, both to seek their advice and to ensure they have a good understanding of the project’s goals. In addition, evaluation standards for acquisition officers should incorporate effective engagement and collaboration with stakeholders, consideration of creative alternatives and options, and delivery of mission outcomes. If an officer uses innovative practices that fail, that officer also should be evaluated on what they learned from the experience that may inform future success.

Lastly, the ODNI should reinvigorate and highlight the IC acquisition awards to publicly reward desired behavior, and acquisition professionals should be included in IC mission team awards as a recognition of their impact on the ultimate success of the mission.

Conclusion

Between the government’s rigid budget and acquisition processes and confusion about how to apply them, there is very little ability for the IC to take advantage of a fast-moving field that produces new and updated technology daily. Tackling these issues through the handful of priority actions set forth above will begin to drive the critical shift away from the IC’s traditional, linear processes to the more dynamic approaches the IC needs to speed and transform the way it purchases, integrates, and manages the use of AI.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

 

The post AI and the IC: The Tangled Web of Budget and Acquisition appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

When The Washington Post reported this week that CIA Director William Burns slipped into Afghanistan on Monday to meet with Taliban leader Abdul Ghani Baradar, it was described as the highest-level face-to-face encounter between the Taliban and the Biden Administration.  WaPo cited anonymous sources for the information and the CIA offered no immediate comment on the reporting.  If the reporting is accurate, it doesn’t answer any immediate questions about why the President would dispatch the CIA director for such a meeting.

What we do know, is that the unexpected advances of the Taliban that have dominated the headlines over the past week and a half were initially blamed on an intelligence failure by many.  Early on, Cipher Brief Expert and former Acting Director of CIA John McLaughlin tweeted that “The ‘intelligence failure’ drumbeat is starting. People should be careful about the charge if they have not actually seen/read the intelligence…”

So, what intelligence did the US have that would have led to a different outcome in Kabul and throughout the country?

  • The New York Times reported last week that “classified assessments by American spy agencies over the summer painted an increasingly grim picture of the prospect of a Taliban takeover of Afghanistan and warned of the rapid collapse of the Afghan military, even as President Biden and his advisers said publicly that was unlikely to happen as quickly.” The paper cited current and former US government officials, saying, “By July, many intelligence reports grew pessimistic, questioning whether Afghan security forces would muster serious resistance and whether the government could hold on in Kabul, the capital.”
  • On August 15, The Wall Street Journal reported that administration officials said they knew that a “total capitulation of the Taliban was a possibility, and they planned their withdrawal efforts accordingly.” But they also cited an administration official, saying “it wasn’t so much a failure in intelligence in which the administration based its decision, but rather, a change in circumstances brought about by the swift U.S. withdrawal.”

But private sector analysts were watching as well. Here’s an inside look at what The Cipher Brief has been publishing since January with key outtakes from Cipher Brief Expert Tim Willasey-Wilsey:

Brief: January 25, 2021

“The Afghans themselves are also monitoring the Washington newsfeeds in forensic detail and will be encouraged by Sullivan’s statement. Recently, all too many conversations in Kabul have been about when to leave and which route to take. Some wealthier Afghans already have their money in Dubai and children in foreign universities. Some even have passports and property in the United States, UK or Germany. For those who are less fortunate, the discussions are about which route to take out. The Uzbekistan border is favoured because a visa costs just $30 and there is a variety of onward routes via Turkey or Russia to the West whereas the routes via Iran or Pakistan are more restrictive or liable to interference.”

Brief: March 11, 2021

“Saleh will advise Ghani not to take Taliban or Pakistani promises on trust. Instead, Ghani may decide to call Washington’s bluff. He may doubt that Washington is really willing to abandon Afghanistan on 1st May with the risk of a rapid Taliban victory jeopardising all the hard-won advances in areas such as women’s rights and counterterrorism over the past 20 years. The spectre of Al Qaida re-establishing camps in Afghanistan would surely be too much for Biden and Blinken.”

“Even if there were no helicopters from the US Embassy roof, the TV pictures of the Taliban entering Kabul, and of Afghan refugees fleeing their advance could evoke memories of Saigon in 1975. The reimposition of Taliban curbs on women would provoke international opprobrium. And subsequent reports of AQ training camps being re-established in Afghanistan would bring back recent and painful memories. After all the blood and treasure expended in Afghanistan that would be a disastrous outcome.”

Brief: April 19, 2021

“The Afghan government may be able to hold on to power for a few years as the Najibullah administration survived after the Soviet departure. However, there is a danger that there will be a sudden dam-burst in confidence with senior officials and politicians leaving en masse and hundreds of thousands of refugees fleeing westwards through Iran, Pakistan and the Central Asian Republics. As the Taliban re-enter Kabul, we could see disturbing scenes of retribution and, in time, the return of Al Qa’ida figures from their hiding-places in the tribal borderlands in Pakistan. Only then will people re-examine this decision and recognise that the Afghan deployments since 2014 have not been that onerous.”


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today.


Brief: June 1, 2021

“According to my sources, the Taliban are convinced they can take Kabul “within days” of the NATO withdrawal and they believe the Afghan army is “in a shambles and demoralised”. Although the Taliban will not disrupt departing US troops (unless attacked) they are not willing to wait until September to continue their campaign against Kabul government forces.”

“But we should not take much comfort from the Najibullah example. The comparisons with today’s Afghanistan are misleading. Najibullah’s government was able to reach and supply all the major towns by military convoy. The Afghan army was deployed to protect towns and road communications. By contrast, in 2021, only the route between Kabul and Jalalabad is reasonably safe. Convoys cannot get through from Kabul to Kandahar, Kandahar to Herat, or Kabul to Mazar-e-Sharif. The Afghan army is spread across the country in piecemeal district centres (often surrounded by Taliban-controlled countryside) and have to be resupplied by air. This is not a sustainable model.”

“Furthermore, a number of today’s Afghan leaders, officials and military officers have received offers to relocate to the United States, Germany and elsewhere. As the security situation continues to deteriorate, the gradual trickle of departures is likely to gather pace. In such circumstances, the government could implode quite suddenly.”

“To some, this may evoke images of the 1975 fall of Saigon with the big losers being the Afghans who remain, particularly the women, who face a future of uncertainty and anxiety. There could also be a migration crisis reminiscent of Syria in the last decade.”

Brief: June 28, 2021

“One key indicator is that Afghan security forces have begun to surrender to the Taliban. The procedure is quick and simple. Tribal elders are used to deliver a stark message to Afghan troops often holding positions in district centres. The message is often; “The non-believers are leaving Afghanistan. They are defeated. Your leaders are corrupt. You can surrender now, and we will protect you; or you can fight, and we will kill you.” Recently, the Taliban appear to have honoured their promise not to punish Afghan soldiers who surrender. News of this new-found leniency is likely to encourage other units to follow suit and lay down their arms. In several provinces, including in the north, the Taliban are tightening their grip on those cities which are still held by the government. The Taliban will soon be in a position to cut off food supplies and demand their surrender, possibly offering a similarly lenient dispensation to the population. Now that the Taliban possesses captured armoured vehicles and artillery, their ability to exert pressure on the cities is enhanced. In Kabul, a sense of panic has begun to grip the capital. There are desperate attempts to sell family homes but there are no buyers even when houses are on the market at one tenth of their previous value. Some families have departed to Tajikistan, conscious that several of the land border crossing-points with the Central Asian Republics have been captured by Taliban forces in recent weeks.”

Read also Putin’s Calculated Afghanistan Play from Cipher Brief Expert Robert Dannenberg


The Cipher Brief hosts private briefings with the world’s most experienced national and global security experts.  Become a member today. 


Read more expert-driven national security insight, perspective and analysis in The Cipher Brief

 

The post What Intelligence was there on Afghanistan? appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

Just three days after restrictions were announced for unvaccinated Austrians, a provincial governor is pressing for a nationwide lockdown of all residents as Covid-19 infections continue to hit record highs.

“If no national lockdown is ordered tomorrow, there will definitely have to be a lockdown of several weeks in Upper Austria, together with our neighboring province Salzburg as of next week,” Upper Austria Governor Thomas Stelzer told lawmakers on Thursday.

That will mean at least two of Austria’s nine provinces will be in full lockdown mode just days after the nation created a two-tier society by locking down approximately two million unvaccinated Austrians.

“We must raise the vaccination rate. It is shamefully low,” Chancellor Alexander Schallenberg said on Sunday, announcing that unvaccinated residents would only be allowed to leave their homes for “essential” purposes, such as to buy groceries or go to a doctor’s office.

Read more

FILE PHOTO: Health care workers exchange a fast PCR test sample in a mobile laboratory truck, amid the coronavirus disease (COVID-19) outbreak, in Soelden, Austria, October 15, 2020. REUTERS/Leonhard Foeger
Lockdown-ready Austria has its PCR system tricked

Police are now doing random checks for proof of vaccination on Austrian streets. Those unvaccinated residents who are found to be in violation of the lockdown order face steep fines of up to €500. Those who refuse to go through a vaccination status check will have to pay about three times as much.

Stelzer and other Austrian governors are scheduled to meet with Schallenberg and Health Minister Wolfgang Mueckstein on Friday, when a full lockdown will likely be considered.

New Covid-19 cases in the country passed the 15,000 mark for the first time on Thursday, far surpassing 2020’s daily high of 9,586, set when no vaccines were available. Upper Austria and Salzburg have been hit the hardest, putting hospitals at risk of bed shortages. With some 66% of its population fully vaccinated, Austria lags behind other Western European countries in terms of the Covid-19 vaccination rate.

While Austria is the first to impose a lockdown on the unvaccinated, other EU countries – including Slovakia, the Czech Republic and Greece – have imposed increasingly tight restrictions on people who haven’t accepted a Covid vaccine.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Scientists in Sweden claim that a single protein in the blood could predict the onset of Type 2 diabetes nearly 20 years in advance. The breakthrough potentially affects hundreds of millions of people worldwide.

Diabetes is the world’s ninth-leading cause of death, and affects nearly half a billion people worldwide, according to the World Health Organisation (WHO). The vast majority of diabetes patients suffer from Type 2 diabetes, a condition that can lead to blindness, kidney failure, heart attacks, strokes, and lower limb amputation. Cases of diabetes quadrupled worldwide between 1980 and 2014, with unhealthy diets and lack of exercise blamed for the rise.

Read more

© Getty Images / Peter Dazeley
NHS setting up fat camps for children

However, researchers at Lund University in Malmo, Sweden claim that elevated levels of a certain protein – follistatin – in the blood can predict the onset of Type 2 diabetes regardless of a person’s age, weight, diet or activity level. In a study published last week, the scientists wrote that high levels of follistatin can predict the condition up to 19 years before symptoms appear.

To discover the link between follistatin and diabetes, the researchers tracked 5,300 people from Sweden, Italy, and the UK for between four and 19 years. Follistatin helps break down body fat, while simultaneously leading to an increase in fat in the liver. This buildup can cause fatty liver disease and Type 2 diabetes.

“This study shows that follistatin has the potential to become an important biomarker to predict future Type 2 diabetes, and it also brings us one step closer to the understanding of the mechanisms behind the disease,” Dr. Yang De Marinis, associate professor at Lund University and lead author of the study, told a university newsletter. De Marinis added that the next step for her team would be to help develop an AI-based diagnostic tool that could analyze a patient’s blood sample and use their follistatin levels – and other biomarkers – to calculate their “risk score” for Type 2 diabetes.

As follistatin levels rise in response to food intake and activity levels, the same advice for prevention of diabetes still applies. “Balanced meals, eat[ing] healthy and regular exercise are important to decrease the risk of developing Type 2 diabetes,” De Marinis told StudyFinds.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

The EU’s drug regulator has backed the emergency use of Merck’s pill for the treatment for clinically vulnerable Covid-19 patients as cases surge across the continent.

On Friday, the European Medicines Agency (EMA) “issued advice” backing the emergency use of the drug developed by Merck in collaboration with Ridgeback Biotherapeutics, although it has not yet been authorized by national authorities.

Read more

© Reuters / Piroschka van de Wouw
EMA green lights new Covid treatments

In a statement, the drug regulator said the medicine called Lagevrio – also known as molnupiravir or MK 4482 – “can be used to treat adults with Covid-19 who do not require supplemental oxygen and who are at increased risk of developing severe Covid-19.

It said the treatment should be administered as soon as possible after Covid-19 is diagnosed and within five days of the start of symptoms. The medicine should be taken twice a day for a period of five days.

The EMA listed the potential side effects of the capsules, including mild or moderate diarrhea, nausea, dizziness and headache. The treatment is not recommended for pregnant women.

The watchdog announced earlier on Friday that it had begun reviewing Pfizer’s medicine Paxlovid for Covid-19 with the same goal “to support national authorities” who may decide on its early use prior to marketing authorization in light of rising cases and deaths in Europe.

On Friday, Austria announced it would enter a new nationwide lockdown from Monday and make vaccination mandatory, while Germany’s health authorities claimed the country had turned into “one big outbreak.”

Both Pfizer and Merck have requested approval for their coronavirus medicines from the US Food and Drug Administration, but it is unclear when it might be granted.

Think your friends would be interested? Share this story!

find more fun & mates at SoShow now !

Japan’s fifth wave of Covid-19 has virtually disappeared so dramatically that some scientists are puzzled as to why it happened. One team suggests the highly infectious Delta strain mutated into extinction on the island nation.

In mid-August, Japan experienced a peak in Covid-19 infections, recording over 23,000 new cases per day. Now the metric is just around 170, with deaths attributed to the disease mostly remaining in single digits this month.

The decline has been attributed by many to high vaccination rates, public acceptance of masks, and other factors, but some researchers say the drop was uniquely significant, compared to other nations with similar conditions.

Ituro Inoue, a geneticist at the National Institute of Genetics, believes that Japan had the good fortune of witnessing the Delta strain mostly rooting out other variants of the SARS-CoV-2 virus before then eradicating itself. He explained his team’s theory to the Japan Times newspaper this week.

For some time now, Inoue and his fellow scientists were researching mutations of SARS-CoV-2 and how they are affected by the protein nsp14, which is crucial for the reproduction of the virus.

RNA viruses, like the one causing Covid-19, tend to have a very high mutation rate, which helps them quickly adapt to changes in the environment. However, this opens the door for a so-called “error catastrophe,” when bad mutations pile up and finally cause the full extinction of a strain. The protein nsp14 appears to offer a form of error proofreading that helps the virus genome to stay below the threshold of the “error catastrophe.”

Read more

© Getty Images / Morsa Images
Fighting for our lives: Humanity’s weapons against Covid-19

In the case of Japan’s fifth wave of Covid-19, the Delta variant’s nsp14 failed at this job, Inoue believes, based on the genetic study of specimens collected from June to October. Contrary to his team’s expectations, there was a lack of genetic diversity, while many samples had many genetic changes in the site called A394V, which is linked to the error-fixing protein.

“We were literally shocked to see the findings,” the researcher told the Japan Times. “The Delta variant in Japan was highly transmissible and [was] keeping other variants out. But as the mutations piled up, we believe it eventually became a faulty virus and it was unable to make copies of itself.”

The theory could be relevant to the previous SARS strain, which was identified in 2003, explaining why it didn’t cause a pandemic. But that would be hard to confirm, since the outbreak ended relatively quickly and didn’t result in the massive collection of genetic data necessary to test the hypothesis.

It’s not clear why Japan had this lucky turn of events, but nothing comparable happened in other East Asian countries like South Korea, where populations are genetically close to that of Japan. Virus mutations similar to those flagged by the scientists have been discovered in at least 24 countries, Inoue said. He and his team plan to publish a paper detailing their findings by the end of November.

Even if the natural extinction theory is confirmed, it is at best a temporary reprieve for the Japanese people. New, more successful strains are likely to eventually find their way into the country, though quarantine measures and immigration control could delay the emergence of new variants in Japan, Inoue believes.

Meanwhile, Tokyo is bracing for a new wave of Covid-19 this winter and is preparing to live with the virus. The government reportedly plans to ease travel restrictions by increasing the number of people it allows to enter the country per day from 3,500 to 5,000.

Like this story? Share it with a friend!

find more fun & mates at SoShow now !

Chris Inglis’ new White House office has a startup feel to it. There are desks, a few chairs, a coffee maker and a poster hanging on the wall.  But as the head of the newly established Office of the National Cyber Director, Inglis has to make due with what he has while still advising President Joe Biden on the smartest ways for the US to prevent and respond to cyberattacks.

Inglis has already had numerous conversations with the president, who has made clear that the government has a role to play in the defense of the private sector and in assisting the private sector in defending critical infrastructure.  And the president knows, says Inglis, that means the government needs to get its own cyber house in order. 

But like any real startup, Inglis’ resources are scarce.  More than three months after being confirmed by the Senate, he still doesn’t have the full staff he needs to take on his timely and critical mission.  That’s because the funding for his office – some $21 million, part of the $1 trillion infrastructure bill making its way through Congress – is still stuck in the political spin cycle.  Why does it matter?

“The threat is greater than I can ever remember,” Inglis told me during last month’s AFCEA and INSA Intelligence & National Security Summit in National Harbor, Maryland. “The audacity, the brazenness, the thresholds that have been crossed at every turn; we’re in a difficult place.”

While he’s waiting for Congress to act, he says he’s spending about fifty percent of his time defining his role, being careful not to duplicate the work already being done by other agencies and departments, while spending another fifty percent building relationships that will be important later.  Eventually, he’s expected to have a staff of some 75 people who will be expected to work hand in glove with CISA, the National Security Council’s cyber staff, the OMB and others.  The remaining fifty percent of his time, Inglis jokes, is spent figuring out how to attract the country’s best talent.   

“People are starting to flow into the organization. I’m confident that we’re coming up to a breakout moment, not for the National Cyber Director, but the contribution that we can and should make. I’m sobered by the nature of the challenge, I’m optimistic we can make a difference.”

Optimistic he is.  And he’s not even complaining about being given a critical task for US national security and then having to wait for politics to play out before being able to act on it.

“It has been a semi-silver lining in that we would not have had time to think about how we want to apply the resources coming our way.”

While Inglis has been waiting, he and his small team have had time to think about the four things they’d like to focus on right away. 

First, is streamlining the roles and responsibilities in government of who handles what when it comes to protecting the public and private sectors from cyberattacks.  He also spoke during his confirmation hearing about the importance of allocation of resources and while the Office of the National Cyber Director doesn’t have the authority to move money, it does have what Inglis calls the responsibility to account for cyber money.

“One of the most critical gaps in cyber is that the physical digital infrastructure is not built to a common standard. The executive order related to this requires that within a certain amount of time we have to install basic procedures like multifactor authentication and encryption of stored material. That is a challenge and a potential vulnerability for us. We need to make sure that we make these investments necessary to buy down the lack of investment for years.

The second gap is in talent related to number of people required to occupy these jobs. It’s not simply the folks with IT or cyber in their name, but general cyber awareness. There is some expenditure of resources of time, attention, and money to get awareness right on the part of the truly accountable parties like agency and department heads. We have to make sure they don’t see cyber as a cost center, but an enabler on the part of all the users as they understand what their roles are and what the accountability is.

He admits there is still a level of education needed within government to get there.

That is usually the case in both the government and the private sector,” he said.  “We need to think this way about cyber and invest in cyber so that we can enable the mission, not hold it back. I think that education is the most important and effective way to handle this. Then, it is to make sure that the accountability is aligned and harmonized. We tend to take risk in one place and expect someone in another place to be the mitigator of a risk they don’t understand was taken in the first place. We need to operate in a collaborative fashion and get away from divisions of effort which are an agreement not to collaborate and allow adversaries to pick us off one at a time.”

Inglis says that unity of effort must start at home.  “The executive order issued in May has begun to lay out common expectations about the hardware, software, and practices that we need to begin in those spaces,” he said.  “Externally, if we have sector risk management agencies who engage the private sector for the purposes of supporting and engaging the critical components of that infrastructure, we need to make sure you don’t need a Ph.D. in government to know who to deal with and what you’re going to get from them.”

He is arguing for the government to also put ‘valuable material’ on the table.  “That could be our convening power,” said Inglis. “We could perhaps address and reduce liability or give companies a clue as to what might be around the corner because the government has access to exquisite intelligence. If that setup is possible, we also need a venue where collaboration takes place. Information doesn’t collaborate, people do.”

Inglis likes to point to the example of CISA and the Joint Cyber Collaborative.  “They put people from the private sector and the public sector side by side to co-discover threats that hold us at common risk. That project sets up the possibility of implicit collaboration in what we then do with that common operational picture. The government could take ideas that private sector companies turn into proprietary systems and enrich and classify them to deal with it in their system.”

Using what he calls “all the tools in the toolkit,” Inglis also notes the importance of international relationships, which fits nicely into the White House’s International Summit on Ransomware last week in Washington, which zeroed in on tighter cryptocurrency standards, among other things. “Beyond the Five Eyes, what do other like-minded nations think about what is expected behavior in this? What are governmental actions that are appropriate,” he asked.  

Inglis has been an active participant in the president’s recent actions in cyber.  He took part in a White House meeting with tech leaders in August that was hosted by President Biden, who Inglis says, spent the first hour sharing his vision about how the country should focus on collaborative integration.  “The companies represented weren’t only companies like Microsoft and Apple, but people who operate in the critical infrastructure space,” said Inglis.  “The people component, educators, were represented reflecting the president’s view that cyberspace is not just technology, it is also the people component. They are a major link in the chain, and we need to get the roles and responsibilities right.”

While he’s waiting for the funding he needs to get his office fully staffed, Inglis said he’s also putting thought into reconciling resources with aspirations.  Managing expectations is going to be important.  Frustration has been growing for years over what some see as a lack of government response to some of the largest hacks in history.  The phrase ‘time and place of our choosing’ as a definition of response has grown old and some Americans are weary of a government that isn’t responding in a more public way to the beating it sees the US taking in cyberspace.

So, I asked Inglis whether there should be red lines in cyber.

“Red lines are both good and bad,” he answered.  “They are clear and crisp, and everybody knows what they are. The downside is that because of that, an adversary knows exactly how far they can go. It means that you set up a somewhat permissive environment. Red lines also don’t have context; sometimes there is a reason that a defender would make the ransomware payment. As a matter of policy, the U.S. government does not pay ransomware, but I imagine there will be a situation at some point where a hospital is against the Russian state and actual life and safety is at risk. If there is no other way to get the material back, in order to get back in the business of saving lives, they would want to rethink if a red line is a red line in that particular situation. I think the right thing to do here is not to establish hard thresholds of things with scripted responses, but outline what we are prepared to defend and what principles we will exercise in defense of those things. We commit to defending the private sector when it is held at risk by a nation state in cyberspace as much as in the kinetic space and make that clear to adversaries. I think that would be more helpful in changing decision calculus and creating a useful ambiguity about when and where we will come in.”

Inglis said he’s also thinking a lot about present and future resilience.  It’s a worthwhile focus, given that the White House estimates that nearly half a million public and private sector cybersecurity jobs are currently unfilled. 

“That is a massive problem,” said Inglis. “However, the more insidious problem is that the 320 million people in the United States who use the internet who have no idea how to properly take their place on the front lines of this issue. There is an awareness issue that requires us not to make Python programmers out of them but to make sure they understand the nature of this space.”

Everyone has heard the old saying that time is money, but in Inglis’ case, time is security so I asked him point blank whether he thought government was moving has quickly as it should on the cyber problem.

“Government is moving at speed; the question is if it is at the necessary speed. I don’t think anyone is moving at the necessary speed. Some are moving at light speed, but at the end of the day, we need an integrated, collaborative approach. While we won’t have unity of command, I think there needs to be a universally felt sense of urgency so that we will all get our heads in the game.”

Congress, are you listening?  Oh, and by the way, that poster in Inglis’ office? It reads, ‘Hours Since the Last Surprise.”

As a startup with maybe too few resources at the start and who often didn’t understand how all the wickets are run, we have our occasional surprise,” said Inglis.  “When we encounter those surprises and go to someone with the deep and sharp expertise to help us navigate that, we get what we need. However, we are not a full functioning, full featured, fully capable organization yet. We’re trying to build somebody else’s airplane while we’re free falling from our own. We have a parachute, and we can land safely, but it is a bit of a challenge at times.”

Find out more about why experts like former NSA Director General Keith Alexander (Ret.), Mandiant CEO Kevin Mandia and others have joined The Cyber Initiatives Group, powered by The Cipher Brief

Read more expert national security insights, perspective and analysis in The Cipher Brief

The post Chris Inglis and the Gathering Cyber Storm appeared first on The Cipher Brief.

find more fun & mates at SoShow now !

The city council in Austria’s second-largest city, Graz, has elected a new mayor. Communist Party member Elke Kahr has become the first Communist leader of a major city in the country.

The 60-year-old politician, who has been working in the municipal government for more than 15 years and previously served as vice mayor of Graz, was elected as the new city leader on Wednesday. A member of the Austrian Communist Party (KPÖ, Kommunistische Partei Österreichs) for almost 30 years, she won the election with 28 of 46 votes. Kahr succeeded the previous long-standing mayor Siegfried Nagl of the center-right, liberal-conservative People’s Party.

Read more

FILE PHOTO: A protester waves a EU flag outside the parliament building in Budapest, December 16, 2014
Brussels, we got a problem! 30 years after collapse of communism, Eastern Europe is losing its faith in Liberal Democracy

Who would have thought that the daughter of a locksmith, a Communist, would become mayor,” she said in her first speech following the vote.

Having acknowledged a number of issues to deal with in the city, especially during the Covid-19 pandemic, the new mayor highlighted a housing policy, pledging to put a stop to profit-driven construction in Ganz.

The Communists have also already formed a coalition with the Greens and the Social Democratic Party (SPÖ), and another precedent in European city governance was made – two women serving as mayor and deputy. Green leader Judith Schwentner was chosen as Graz’s vice mayor, with the new governing coalition saying they would support not only social, but also environmental changes, aiming to improve living standards especially for low-income groups. Providing a bicycle for every child in the city from the municipality is in their program.

However, not everyone in the local government is happy with the new Communist rule. A member of the right-wing Freedom Party of Austria (FPÖ), Alexis Pascuttini, described the choice as “unpleasant,” having accused the Graz Communists of empty catchphrases in their program and refusing to participate in what he described as “left-wing nonsense.” Kahr herself has been exposed to strong pressure to justify her party, being repeatedly asked about her position on “the crimes of communist parties around the world since 1917,” according to Austrian media.

If you like this story, share it with a friend!

find more fun & mates at SoShow now !