Number of results to display per page
Search Results
452. The Intelligence Cycle of Targeted Killing in the United States
- Author:
- Christine Sixta Rinehart
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The United States has been using Remotely Piloted Aircraft (RPA) to assassinate terrorist targets since its first RPA strike on November 3, 2002, when a U.S. Predator fired a hellfire missile at a car traveling through the Mar’ib province of Yemen. The intelligence cycle of this targeted killing process is murky at best, and the policy has changed throughout the successive administrations of U.S. presidents. Details exist but there is no defined tangible chain of analysis concerning the selection of the target, the monitoring of the target, and finally, the assassination of the target. This paper attempts to elucidate the intelligence chain of analysis concerning American targeted killing and examine how the intelligence cycle of targeted killing varies through successive presidential administrations. This paper will begin with a short analysis of relevant literature, although sources concerning this topic are scarce. The occurrence of targeted killings of U.S. citizens will also be explained in the literature section. The paper will continue with an elaboration of a generic intelligence cycle model, which will be used to illustrate the intelligence cycle of U.S. targeted killings using both the Reaper and the Predator RPA.[1] The paper will then address differences in the intelligence cycles and processes that have occurred between successive presidents since targeted killing first began in 2002 with President George W. Bush. Lastly, the paper will provide policy prescriptions in reference to improving targeted killing in the Middle East and Africa...
- Topic:
- Security, Intelligence, Drones, and Targeted Killing
- Political Geography:
- Africa, Middle East, North America, and United States of America
453. The Need for Countries to Establish Robust and Transparent Vulnerabilities Equities Processes
- Author:
- Sharon Bradford Franklin
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- In 2017, leaders of the U.S. Intelligence Community warned that “more than 30 nations are developing offensive cyberattack capabilities.”1 This means that more than 30 countries may be conducting hacking operations as a method for surveillance, disruption, or destruction. Unregulated cyber surveillance and cyberattacks by government actors can pose risks not only to a government’s foreign adversaries, but also to its own citizens. Thus, as the United States and other nations work to enhance their own offensive cyber capabilities, as well as to develop strategies to defend against potential attacks, it is critical that these countries establish legal regimes to govern such conduct in cyberspace. Although Germany has established a legal framework to regulate government hacking activities,[2] few countries have done so.[3] To bring government hacking operations within the rule of law, a crucial step is to design rules regarding the management of vulnerabilities that governments discover or acquire. As with other cyber actors, when governments conduct hacking operations, this frequently involves exploiting vulnerabilities in computer hardware and software systems. But these same flaws can also be manipulated by a government’s foreign adversaries or other malicious actors. Therefore, when countries consider their abilities to rely on hacking as an investigative tool, as well as their interests in exploiting vulnerabilities for military and intelligence operations, they must also evaluate the capacity of information and communications technology providers to repair bugs and protect the cybersecurity of all users. Determining whether to exploit a vulnerability or disclose it to a vendor for patching involves balancing a variety of different security concerns against each other. Some countries have made progress in formalizing the rules for making these decisions and in publicizing these rules to promote public accountability. In November 2017, the United States released a charter governing its Vulnerabilities Equities Process (VEP), which outlines how the U.S. government weighs the various competing equities.[4] The charter delineates which components of the government will participate in determinations regarding whether to disclose or retain each newly discovered vulnerability, and it sets forth the criteria to be used and the process to be followed in making such assessments. One year later, the United Kingdom (UK) announced its Equities Process, which follows a similar approach.5 Most recently, in March 2019, Australia released its “Responsible Release Principles for Cyber Security Vulnerabilities,”[6] and Germany is currently working to develop a VEP and is expected to make information about its process public in early 2019.[7] However, as described below, the VEP procedures revealed to date need further improvement,[8] and most of the nations with offensive cyber capabilities have not developed—or at least have not announced—any such framework...
- Topic:
- Security, Intelligence, Science and Technology, and Cybersecurity
- Political Geography:
- North America and United States of America
454. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David Sanger
- Author:
- David Sanger and Travis Frederick
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- In The Perfect Weapon, David Sanger argues that the nature of global power itself is undergoing dramatic changes, brought about by the proliferation of highly advanced cyber capabilities. Today, internet access is nearly ubiquitous, the cost of entry is low, and, particularly in the domain of cyberwarfare, there is one fundamental fact: offensive capabilities have critically outpaced cyber defenses. A weak and impoverished nation like North Korea can hold large swaths of public and private infrastructure in America at risk, steal military OpPlans, and pilfer millions of dollars from foreign banks. A Kremlin reeling from sanctions, low oil prices, and historically low public trust is able to threaten the very foundations of American democracy through targeted social media campaigns and hacking and leaking the emails of a major political party. But while the offensive advantage has given weaker powers greater capacity to pursue their geopolitical objectives, U.S. leadership has found that their response options have not similarly benefitted. America’s offensive cyber prowess so exceeds its own defensive capabilities that officials often hesitate to strike back for fear of establishing norms of retaliation against vulnerable infrastructure or inciting unintended escalation. Sanger argues that without an open public debate among government policy makers, military planners, and academics to coordinate a grand strategy, the United States will be forced to accept a world of constant cyberattacks, limited response options, and the greater risk of capitulating to foreign coercion...
- Topic:
- Security, Intelligence, Science and Technology, Cybersecurity, and Book Review
- Political Geography:
- North America and United States of America
455. Obstacles to IT Modernization: The New National Security Imperative
- Author:
- Richard Beutel and Andrew Caron
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- As the December 2018-January 2019 government shutdown pressed forward into unexplored territory, no one asked what impact the continuing funding delays might have upon information technology (IT) modernization. This should be a significant concern, as IT modernization is now widely recognized as a national security imperative. The cumbersome and lengthy acquisition process stifles innovation and allows U.S. adversaries such as China to develop and deploy cutting-edge technologies far faster than the United States is able. The loser is the U.S. military, which is often saddled with obsolete capabilities. The recently released Third Volume of the Section 809 Panel report states this explicitly—we are on a “war footing”—and the government’s cumbersome acquisition policies are a primary culprit. The shutdown certainly did not help any of this. The authors can offer no solution regarding how to solve the threat of another shutdown. The issues are no longer substantive—both parties see “the wall” as emblematic to their political base. But we can talk about recent green shoots in addressing the IT acquisition. Without mincing words or exaggeration, the government has a dismal record of successful IT modernization.[1] The U.S. Government Accountability Office (GAO), a respected government watchdog, has exhaustively documented the government’s dependence on outdated legacy IT and the billions of U.S. dollars wasted by agencies in failed modernization attempts.[2] The causes are numerous: a compliance-oriented acquisition workforce, perverse incentives that reward “box checking” rather than end-user outcomes, and an entrenched cultural fear of “doing things differently” caused by an overblown concern about potential bid protests and increased congressional oversight.[3] Recently, however, a new awareness has arisen across the government that the old ways of IT procurements no longer serve the country. Current acquisition techniques are relics of an age before commercialized internet services even existed; they were not designed to keep pace with the rapid evolution of IT technologies.
- Topic:
- National Security, Science and Technology, and Modernization
- Political Geography:
- China, Asia, North America, and United States of America
456. Resilient Power: A New Model for Grid Security
- Author:
- Lewis Milford and Samantha Donalds
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- In the last few years, Washington has been preoccupied with a debate about the security of the nation’s electric grid. The debate is as old as the grid itself: as electrification has come to drive all commerce and government, making it a key element of the country’s national security, what is the best way to protect the grid from terrorist, weather, or cyber-related threats or attacks? As with most things of a political nature, where you stand depends on where you sit. Proponents of coal, oil, and nuclear make the argument that traditional large-scale power plants are not only vital to grid stability, but also that this centralized generation model is the only economically or techno- logically feasible option.[1] It’s an old argument wrapped in new national security rhetoric, and it’s increasingly straining against the facts. More and more analysis and real-life examples show that distributed renewable energy, combined with energy storage technologies, can provide reliable power more affordably and reliably than the centralized generation alternatives...
- Topic:
- Security, Energy Policy, Infrastructure, and Electricity
- Political Geography:
- North America and United States of America
457. Q&A with Kristin Smith (MAAS ’14): A Day in the Life of Beirut’s Cultural Attaché
- Author:
- Vicki Valosik and Kristin Smith
- Publication Date:
- 02-2019
- Content Type:
- Special Report
- Institution:
- Center for Contemporary Arab Studies
- Abstract:
- For Kristin Smith, MAAS alum and Cultural Affairs Officer for the U.S. Embassy in Beirut, culture and diplomacy go hand-in-hand. “My job is really using culture and art to bring people closer together,” Smith told the Lebanese newspaper The Daily Star at a U.S. Embassy event celebrating the Lebanese writer Khalil Gibran. “It’s not just about deepening our ties and getting to know each other on a cultural level though. If we have these similarities in [the arts], then perhaps that will lead to future cooperation in other ways.” During her time in the MA in Arab Studies program, Smith—who holds a BA in Near Eastern Languages and Civilization from Harvard—pursued an academic concentration in Culture and Society, managed a yoga studio, and served as a Public Diplomacy Fellow at the U.S. Consulate General in Casablanca. Following graduation, she joined the Foreign Service, serving in Taiwan before beginning her current position in 2017. Her portfolio as Cultural Affairs Officer covers five primary issues: arts and culture, non-formal education, academic outreach, interfaith and minority outreach, and alumni programming.
- Topic:
- Diplomacy, Culture, Language, and Arabic
- Political Geography:
- Middle East, Lebanon, North America, Beirut, and United States of America
458. Diplomacy and the Art of Storytelling
- Author:
- Isabel Roemer
- Publication Date:
- 05-2019
- Content Type:
- Special Report
- Institution:
- Center for Contemporary Arab Studies
- Abstract:
- A MAAS grad’s work at the intersection of diplomacy and cinematic arts is shaping American narratives and empowering storytellers around the globe. When people think about the tools of diplomatic engagement, narrative storytelling is not one that usually comes to mind. But for Rachel Gandin Mark, Program Director of the American Film Showcase (ASF)—the State Department’s film, television, and digital diplomacy program —the two go hand-in-hand. “I love thinking about how to incorporate entertainment, particularly story and character, into specific foreign policy strategies,” says Gandin Mark, who graduated from MAAS in 2003. “Some of our country’s biggest diplomatic challenges today stem from conflicting global narratives. Film and TV, when produced with authenticity and nuance, have the potential to complicate narratives and reveal a shared human experience.”
- Topic:
- Diplomacy, Culture, Media, and Film
- Political Geography:
- Middle East, North America, and United States of America
459. Mobilizing Memories
- Author:
- Carol Graham
- Publication Date:
- 04-2019
- Content Type:
- Special Report
- Institution:
- Center for Contemporary Arab Studies
- Abstract:
- Carol Madison Graham (MAAS ’81) was the first MAAS graduate to enter the United States Foreign Service. She reflects on how the 1984 embassy bombing in Beirut inspired her current work to strengthen the Foreign Service for future generations.
- Topic:
- Foreign Policy, Diplomacy, Violence, and Memoir
- Political Geography:
- Middle East, Lebanon, North America, and United States of America
460. New Law Hinders Public Diplomacy and Penalizes Palestinian Students
- Author:
- Kaylee Steck and Mohammed Alhammami
- Publication Date:
- 05-2019
- Content Type:
- Special Report
- Institution:
- Center for Contemporary Arab Studies
- Abstract:
- Last fall, Congress enacted a law that indirectly led to 29 young Arab leaders losing their scholarships to U.S.-accredited universities and dealt another blow to educational and cultural exchange programming, a critical part of U.S. public diplomacy efforts.
- Topic:
- Diplomacy, Government, Law, and Higher Education
- Political Geography:
- Middle East, Palestine, North America, and United States of America