Assessment of the Role of Cyber Power in Interstate Conflict

Eric Altamura is a graduate student in the Security Studies Program at Georgetown University’s School of Foreign Service. He previously served for four years on active duty as an armor officer in the United States Army.  He regularly writes for Georgetown Security Studies Review and can be found on Twitter @eric_senlu.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Role of Cyber Power in Interstate Conflict

Date Originally Written:  May 05, 2018 / Revised for Divergent Options July 14, 2018.

Date Originally Published:  September 17, 2018.

Summary:  The targeting of computer networks and digitized information during war can prevent escalation by providing an alternative means for states to create the strategic effects necessary to accomplish limited objectives, thereby bolstering the political viability of the use of force as a lever of state power.

Text:  Prussian General and military theorist Carl von Clausewitz wrote that in reality, one uses, “no greater force, and setting himself no greater military aim, than would be sufficient for the achievement of his political purpose.” State actors, thus far, have opted to limit cyberattacks in size and scope pursuant to specific political objectives when choosing to target information for accomplishing desired outcomes. This limiting occurs because as warfare approaches its unlimited form in cyberspace, computer network attacks increasingly affect the physical domain in areas where societies have become reliant upon IT systems for everyday functions. Many government and corporate network servers host data from industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems that control power generation, utilities, and virtually all other public services. Broader attacks on an adversary’s networks consequently affect the populations supported by these systems, so that the impacts of an attack go beyond simply denying an opponent the ability to communicate through digital networks.

At some point, a threshold exists where it becomes more practical for states to utilize other means to directly target the physical assets of an adversary rather than through information systems. Unlimited cyberattacks on infrastructure would come close to replicating warfare in its total form, with the goal of fully disarming an opponent of its means to generate resistance, so states become more willing to expend resources and effort towards accomplishing their objectives. In this case, cyber power decreases in utility relative to the use of physical munitions (i.e. bullets and bombs) as the scale of warfare increases, mainly due to the lower probability of producing enduring effects in cyberspace. As such, the targeting and attacking of an opponent’s digital communication networks tends to occur in a more limited fashion because alternative levers of state power provide more reliable solutions as warfare nears its absolute form. In other words, cyberspace offers much more value to states seeking to accomplish limited political objectives, rather than for waging total war against an adversary.

To understand how actors attack computer systems and networks to accomplish limited objectives during war, one must first identify what states actually seek to accomplish in cyberspace. Just as the prominent British naval historian Julian Corbett explains that command of the sea does not entail “the conquest of water territory,” states do not use information technology for the purpose of conquering the computer systems and supporting infrastructure that comprise an adversary’s information network. Furthermore, cyberattacks do not occur in isolation from the broader context of war, nor do they need to result in the total destruction of the enemy’s capabilities to successfully accomplish political objectives. Rather, the tactical objective in any environment is to exploit the activity that takes place within it – in this case, the communication of information across a series of interconnected digital networks – in a way that provides a relative advantage in war. Once the enemy’s communication of information is exploited, and an advantage achieved, states can then use force to accomplish otherwise unattainable political objectives.

Achieving such an advantage requires targeting the key functions and assets in cyberspace that enable states to accomplish political objectives. Italian General Giulio Douhet, an airpower theorist, describes command of the air as, “the ability to fly against an enemy so as to injure him, while he has been deprived of the power to do likewise.” Whereas airpower theorists propose targeting airfields alongside destroying airplanes as ways to deny an adversary access to the air, a similar concept prevails with cyber power. To deny an opponent the ability to utilize cyberspace for its own purposes, states can either attack information directly or target the means by which the enemy communicates its information. Once an actor achieves uncontested use of cyberspace, it can subsequently control or manipulate information for its own limited purposes, particularly by preventing the escalation of war toward its total form.

More specifically, the ability to communicate information while preventing an adversary from doing so has a limiting effect on warfare for three reasons. Primarily, access to information through networked communications systems provides a decisive advantage to military forces by allowing for “analyses and synthesis across a variety of domains” that enables rapid and informed decision-making at all echelons. The greater a decision advantage one military force has over another, the less costly military action becomes. Secondly, the ubiquity of networked information technologies creates an alternative way for actors to affect targets that would otherwise be politically, geographically, or normatively infeasible to target with physical munitions. Finally, actors can mask their activities in cyberspace, which makes attribution difficult. This added layer of ambiguity enables face-saving measures by opponents, who can opt to not respond to attacks overtly without necessarily appearing weak.

In essence, cyber power has become particularly useful for states as a tool for preventing conflict escalation, as an opponent’s ability to respond to attacks becomes constrained when denied access to communication networks. Societies’ dependence on information technology and resulting vulnerability to computer network attacks continues to increase, indicating that interstate violence may become much more prevalent in the near term if aggressors can use cyberattacks to decrease the likelihood of escalation by an adversary.


Endnotes:

[1] von Clausewitz, C. (1976). On War. (M. Howard, & P. Paret, Trans.) Princeton: Princeton University Press.

[2] United States Computer Emergency Readiness Team. (2018, March 15). Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. (United States Department of Homeland Security) Retrieved May 1, 2018, from https://www.us-cert.gov/ncas/alerts/TA18-074A

[3] Fischer, E. A. (2016, August 12). Cybersecurity Issues and Challenges: In Brief. Retrieved May 1, 2018, from https://fas.org/sgp/crs/misc/R43831.pdf

[4] Corbett, J. S. (2005, February 16). Some Principles of Maritime Strategy. (S. Shell, & K. Edkins, Eds.) Retrieved May 2, 2018, from The Project Gutenberg: http://www.gutenberg.org/ebooks/15076

[5] Ibid.

[6] Douhet, G. (1942). The Command of the Air. (D. Ferrari, Trans.) New York: Coward-McCann.

[7] Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press.

[8] Boyd, J. R. (2010, August). The Essence of Winning and Losing. (C. Richards, & C. Spinney, Eds.) Atlanta.

Aggression Assessment Papers Cyberspace Emerging Technology Eric Altamura

Alternative Futures: U.S. Options for a Chinese Invasion of North Korea (Part 3 of 3)

(Editor’s Note:  This Options Paper is part of our Alternatives Future Call for Papers and examines an invasion of North Korea by the People’s Republic of China from the point of view of North Korea, South Korea, and the United States.  We hope you have enjoyed all three articles and many thanks to Jason Hansa for choosing to write for Divergent Options!) 

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

National Security Situation:  In an alternative future the People’s Republic of China invades North Korea.

Date Originally Written:  June 14, 2018.

Date Originally Published:  September 10, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the U.S. Secretary of Defense personally briefing the President of the United States regarding a potential Chinese invasion into North Korea, circa 2020.

Background:  The U.S. has a complicated relationship with China.  This complicated relationship spans the nineteenth century to now, including the turn of the twentieth century when the U.S. Army fought alongside allied nations inside Beijing proper to defeat the Boxer rebellion[1].

As the People’s Republic of China (PRC) has grown in power and strength, so have their ambitions.  They have worked to seal the South China Sea from the surrounding nations; they have conducted incursions into Bhutan and engaged with dangerous stand-offs with the Indian Army; they have repeatedly provoked incidents with the Japanese government off the Japanese Senkaku islands[2][3][4].

Against the U.S., the PRC has hacked our systems and stolen intelligence, intercepted our aircraft, and shadowed our fleets.  China is not a friend to the U.S. or to the world at large[5][6][7].

During the Korean War in 1950, as U.S. forces—with our South Korean and United Nations (UN) allies—neared victory, the Chinese attacked across the Yalu River, stretching out the war and quadrupling our casualties[8].

While the North Koreans in the Democratic People’s Republic of Korea (DPRK) are also not a U.S. friend, relations with them have improved while our relations with the PRC simultaneously fell.  Our relationship with the Republic of Korea (ROK) in the south has never been stronger: we have stood shoulder to shoulder with them for seventy years, and their troops fought alongside ours in Vietnam and Afghanistan.  The South Koreans support territorial claims by the North Koreans, thus it’s a near certainty they will see an invasion of the North by the Chineseas as invasion against all of Korea.

Significance:  Our satellites confirm the movement of three Chinese Army Groups towards the North Korean border.  At best, the Chinese plan to invade the Northern provinces, seizing the majority of the North Korean nuclear launch sites and giving themselves a port on the Sea of Japan.  At worst, the Chinese will invade to where North Korea narrows near Kaechon, giving themselves the best possible defensive line upon which to absorb the almost guaranteed combined DPRK and ROK counterattack.  We estimate DPRK forces are currently outnumbered approximately three-to-one.

Option #1:  The U.S. remains neutral.

Risk:  This option maintains our currently relationship with China, and technically is in accordance with the original UN charter and our defense treaties.  If we are not asked to participate, we lose nothing; but if the ROK asks for our assistance and we remain neutral, our allies around the world will question our commitment to their defense.

Gain:  Staying neutral allows us the best possible positioning to advocate for a peaceful ending to hostilities.  Neutrality also allows our nation the opportunity to provide humanitarian aid and assistance, and as war depresses all belligerent economies, our economy will likely strengthen as international investors look for a safe haven for funds.

Option #2:  The U.S. ally with the ROK, but ground forces do not proceed north of the DMZ.

Risk:  For decades, our motto for troops stationed in Korea has been “Katchi Kapshida, ‘We go forward together’.”  If we are asked but decline to fight inside North Korea alongside our long-time South Korean allies, it may bring turmoil and resentment at the diplomatic and military levels.  The PRC may see it as a show of weakness, and push back against us in every domain using a global hybrid warfare approach.

Gain:  Option #2 would preserve our forces from the hard infantry fight that will certainly define this war, while also upholding our treaty obligations to the letter.  We could use our robust logistic commands to support the ROK from within their borders, and every air wing or brigade we send to defend their land is another unit they can free up to deploy north, hopefully bringing the war to a quicker conclusion.

Option #3:  The U.S. fights alongside the ROK across the entire peninsula.

Risk:  North Korea is a near-continuous mountainous range, and the fighting would be akin to a war among the Colorado Rockies.  This will be an infantry war, fought squad by squad, mountaintop to mountaintop.  This is the sort of war that, despite advancements in medical technology, evacuation procedures, and body armor, will chew units up at a rate not seen since at least the Vietnam War.  We will receive thousands of U.S. casualties, a wave of fallen that will initially overwhelm U.S. social media and traditional news outlets, and probably tens-of-thousands of injured who our Department of Veterans Affairs will treat for the rest of their lives.

Also worth noting is that North Korean propaganda for decades told stories of the barbaric, dangerous U.S. troops and prepared every town to defend themselves from our forces.  Even with the permission of the North Korean government, moving forward of the DMZ would bring with it risks the ROK solders are unlikely to face.  We would face a determined foe to our front and have uncertain lines of supply.

Gain:  Fighting alongside our ROK allies proves on the world stage that the U.S. will not sidestep treaty obligations because it may prove bloody.  We have put the credibility of the United States on-line since World War 2, and occasionally, we have to pay with coin and blood to remind the world that freedom is not free.  Fighting alongside the ROK in North Korea also ensures a U.S. voice in post-war negotiations.

Option #4:  The U.S. fights China worldwide.

Risk:  Thermonuclear war.  That is the risk of this option, there is no way to sugarcoat it.  The PRC has left themselves vulnerable at installations around the world, locations we could strike with impunity via carrier groups or U.S.-based bombers.  More than the previous options, this option risks throwing the Chinese on the defensive so overwhelmingly they will strike back with the biggest weapon in their arsenal.  U.S. casualties would be in the millions from the opening nuclear strikes, with millions more in the post-blast environment.  While we would also gain our measure of vengeance and eliminate millions of Chinese, the ensuing “nuclear autumn” or full-on “nuclear winter” would drop international crops by 10-20%, driving worldwide famines and economic collapse.  Short-term instant gains must be balanced with an equally intense diplomatic push by uninvolved nations to keep the war conventional.

Gain:  Quick and easy victories across the globe with a bloody stalemate in the North Korean mountains may push the Chinese to quickly accept a cease-fire and return to the pre-conflict borders.  A well-run media campaign focusing on the numbers of PRC casualties to one-child families across the world may help push the Chinese citizens to overthrow the government and sue for peace before nuclear weapons are used.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Encyclopedia Britannica. Boxer Rebellion. Retrieved 15 June 2018. https://www.britannica.com/event/Boxer-Rebellion 

[2] Guardian, (2018, May 19) China lands nuclear strike-capable bombers on South China Sea islands. Retrieved 15 June 2018. https://www.theguardian.com/world/2018/may/19/china-says-air-force-lands-bombers-on-south-china-sea-islands

[3] Panda, A. (2017, October 22). The Doklam Standoff Between India and China is far from over. Retrieved 14 June 2018. https://thediplomat.com/2017/10/the-doklam-standoff-between-india-and-china-is-far-from-over/ 

[4] Graham-Harrison, E. (2017, February 4). Islands on the frontline of a new global flashpoint: China v japan. Retrieved 15 June 2018. https://www.theguardian.com/world/2017/feb/05/china-v-japan-new-global-flashpoint-senkaku-islands-ishigaki

[5] Nakashima, E. and Sonne, P. (2018, June 8). China hacked a Navy contractor and secured a trove of highly sensitive data on submarine warfare. Retrieved 15 June 2018. https://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-data-on-submarine-warfare/2018/06/08/6cc396fa-68e6-11e8-bea7-c8eb28bc52b1_story.html

[6] Ali., I. (2017, July 24) Chinese jets intercept U.S. surveillance plane: U.S. officials. Retrieved 15 June 2018. https://www.reuters.com/article/us-usa-china-military-idUSKBN1A91QE 

[7] Kubo, N. (2016, June 14) China spy ship shadows U.S., Japanese, Indian naval drill in Western Pacific. Retrieved 15 June 2018. https://www.reuters.com/article/us-usa-pacific-exercises-idUSKCN0Z10B8 

[8] Stewart, R. The Korean War: The Chinese Intervention. Archived 2011, Retrieved 14 June 2018. https://web.archive.org/web/20111203234437/http://www.history.army.mil/brochures/kw-chinter/chinter.htm

Jason Hansa North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea) United States

Assessment of North Korean Strategy in Preparation for High Level Diplomacy in September 2018

David Maxwell is a Senior Fellow at the Foundation For Defense of Democracies focusing on Korea and East Asian security.  He is a retired U.S. Army Special Forces Colonel with five tours in Korea.  He tweets @DavidMaxwell161 and blogs at the Informal Institute for National Security Thinkers and Practitioners.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of North Korean Strategy in Preparation for High Level Diplomacy in September 2018

Date Originally Written:  September 4, 2018.

Date Originally Published:  September 7, 2018.

Summary:  The only way the U.S. will see an end to the nuclear program, threats, and crimes against humanity committed by the North Korean mafia-like crime family cult known as the Kim family regime is through unification and the establishment of a United Republic of Korea (UROK).  The UROK would be secure and stable, non-nuclear, economically vibrant, and unified under a liberal constitutional form of government determined by the Korean people.

Text:  For Kim Jong-un, the Panmunjom Declaration and Singapore joint statement to denuclearize the Korean peninsula are like contracts that specify the precise sequences in which negotiations and action should proceed:

1.  Declare an end to the Korean civil war

2.  Reduce and then end sanctions

3.  Denuclearize South Korea (i.e. end the Republic of Korea (ROK) / U.S. alliance, remove U.S. troops from the peninsula, and remove the U.S. nuclear umbrella over the ROK and Japan)

4.  After completing all of the above, begin negotiation on how to dismantle the North’s nuclear program[1]

The September 2018 summit in Pyongyang between South Korean President Moon Jae-in and North Korean leader Kim Jong-un could set the conditions to end the Korean civil war at the United Nations General Assembly meeting at the end of the month.  While there is disagreement among Korean analysts as to North Korea’s true intent, North Korean actions are best viewed through the lens of the Kim family regime’s decades-old strategy.  This strategy wants to ensure the survival of the Kim family regime, unify the peninsula via subversion, coercion, and use of force to guarantee regime survival, and to split the ROK / U.S. alliance to expel U.S. forces from the peninsula.  Additionally, Kim wants SALT/START-like talks in which the North is co-equal to the U.S. like the Soviets were – but Kim will likely settle for Pakistan-like acceptance.

While U.S. President Donald Trump moved past the last administration’s unofficial policy of strategic patience and now conducts unconventional[2], experimental[3], and top-down diplomacy, it is necessary to consider the full scope of the Korea problem, not just the nuclear issue.  U.S. policy towards North Korea and the U.S. / ROK alliance is based on answers to the following:

1.  What does the U.S. want to achieve in Korea?

2.  What is the acceptable and durable political arrangement than will protect, serve, and advance U.S. and ROK / U.S. alliance interests on the Korean peninsula and in Northeast Asia?

3.  Does the U.S. believe that Kim Jong-un has abandoned Pyongyang’s seven decades-old strategy of subversion, coercion, and the use of force to achieve northern domination of a unified peninsula in order to ensure the survival of the Kim family regime?

4.  Does the U.S. believe that Kim Jong-un has abandoned the objective of splitting the ROK / U.S. alliance to get U.S. forces off the peninsula?  In short, has he abandoned his “divide and conquer” strategy: divide the ROK / U.S. alliance and conquer the South[4]?

While pursuing high-level nuclear diplomacy, the U.S. and ROK will keep in mind the entire spectrum of existing threats (The Big 5) and potential surprises that can affect negotiations.

1.  War – The U.S. and ROK must deter, and if attacked, defend, fight, and win because miscalculation or a deliberate decision by Kim could occur at any time.

2.  Regime Collapse – The U.S. and ROK must prepare for this very real possibility and understand it could lead to war; both war and regime collapse could result in resistance to unification within the North.

3.  Human Rights and Crimes Against Humanity (Gulags, external forced labor, etc.) –Oppression of the population keeps the Kim regime in power and it uses slave labor to do everything from overseas work to mining uranium for the nuclear program.  Furthermore, U.S. / ROK focus on human rights is a threat to the Kim family regime because this undermines domestic legitimacy – and most importantly, addressing this issue is a moral imperative.

4.  Asymmetric Threats – North Korean asymmetric threats include provocations to gain political and economic concessions, coercion through its nuclear and missile programs, cyber-attacks, special operations activities, and global illicit activities such as those conducted by North Korea’s Department 39.  All of these asymmetric threats keep the regime in power, support blackmail diplomacy, and provide capabilities to counter alliance strengths across the spectrum of conflict.  These asymmetric threats also facilitate resistance following a potential regime collapse.

5.  Unification – The biggest challenge since the division of the peninsula is the fundamental reason for the North-South conflict.  Unification is also the solution to the Korea question.  Note that President Trump in the June 30, 2017 joint statement supported the ROK’s leading role in fostering an environment for peaceful unification of the Korean peninsula[5].

While the focus is naturally on North Korea’s nuclear and missile program, the conventional threat from the North remains significant.  Seventy percent of its 1.2 million-man army is offensively postured between the Demilitarized Zone (DMZ) and Pyongyang.  The northern artillery in deeply buried and hardened targets poses a dangerous threat to a millions of Koreans in and around Seoul[6].  Since the Moon-Kim and Trump-Kim summits in April and June 2018 respectively, there has been no reduction in these forces and no confidence-building measures from the North Korean side.

While maintaining its aggressive conventional posture, Pyongyang is also pushing for a peace treaty to remove the justification for U.S. forces on the peninsula, as ROK presidential adviser Moon Chung-in wrote in April 2018[7].  However, the legal basis for U.S. presence lies in the ROK / U.S. Mutual Defense Treaty of 1953, which makes no mention of North Korea or the
Democratic People’s Republic of Korea and exists to defend both nations from threats in the Pacific Region[8].  As such, the treaty would remain valid even if Seoul and Pyongyang were technically at peace.

It is the ROK / U.S. alliance and presence of U.S. forces that has deterred hostilities on the peninsula.  As long as there is a conventional and nuclear threat from the North, the ROK / U.S. alliance is required for deterrence.  Based upon this need for a U.S. deterrent, the North’s desire for the removal of U.S. troops must be treated with deep skepticism.

The challenge for the ROK, the U.S., regional powers, and the international community is how to get from the current state of armistice and temporary cessation of hostilities to unification.  While peaceful unification would be ideal, the most likely path will involve some level of conflict ranging from war to internal civil conflict and potentially horrendous human suffering in the northern part of Korea.  The ROK and its friends and allies face an extraordinary security challenge because of the “Big Five.” War, regime collapse, and the north’s nuclear and missile programs pose an existential threat to the ROK.  Finally, although some advocate that the U.S. should keep the human rights as a separate issue; it is a moral imperative to work to relieve the suffering of the Korean people who live in the worst sustained human rights conditions in modern history.


Endnotes:

[1]  David Maxwell. “Three Simple Things the Trump-Kim Summit Could—and Should—Achieve.” Quartz. https://qz.com/1300494/three-simple-things-the-trump-kim-summit-could-and-should-achieve/ (September 4, 2018).

[2]  James Jay Carafano. July 17, 2018. “Donald Trump and the Age of Unconventional Diplomacy.” The National Interest. https://nationalinterest.org/feature/donald-trump-and-age-unconventional-diplomacy-26011 (August 10, 2018)

[3]  Patrick M. Cronin, Kristine Lee. 2018. “Don’t Rush to a Peace Treaty on North Korea.” The National Interest. https://nationalinterest.org/feature/dont-rush-peace-treaty-north-korea-26936 (August 3, 2018).

[4]  Ibid., Maxwell

[5]  “Joint Statement between the United States and the Republic of Korea.” The White House. https://www.whitehouse.gov/briefings-statements/joint-statement-united-states-republic-korea/ (September 4, 2018).

[6]  “Defense Intelligence Agency: Military and Security Developments Involving the Democratic People’s Republic of Korea 2017 A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2012.” https://media.defense.gov/2018/May/22/2001920587/-1/-1/1/REPORT-TO-CONGRESS-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-DEMOCRATIC-PEOPLES-REPUBLIC-OF-KOREA-2017.PDF

[7]  Moon, Chung-in. 2018. “A Real Path to Peace on the Korean peninsula.” Foreign Affairs. https://www.foreignaffairs.com/articles/north-korea/2018-04-30/real-path-peace-korean- peninsula (August 6, 2018).

[8]  “Avalon Project – Mutual Defense Treaty Between the United States and the Republic of Korea; October 1, 1953.” http://avalon.law.yale.edu/20th_century/kor001.asp (August 6, 2018).

Assessment Papers David Maxwell North Korea (Democratic People’s Republic of Korea) South Korea (Republic of Korea) United States

Alternative Futures: South Korea Options for a Chinese Invasion of North Korea (Part 2 of 3)

(Editor’s Note:  This Options Paper is part of our Alternatives Future Call for Papers and examines an invasion of North Korea by the People’s Republic of China from the point of view of North Korea, South Korea, and the United States.  We hope you enjoy all three articles over the coming weeks and many thanks to Jason Hansa for choosing to write for Divergent Options!) 

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

National Security Situation:  In an alternative future the People’s Republic of China invades North Korea.

Date Originally Written:  June 12, 2018.

Date Originally Published:  September 3, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the South Korean defense minister personally briefing the South Korean President regarding a potential Chinese invasion of North Korea, circa 2020.

Background:  Our nation has a complicated relationship with China, stretching back centuries.  Our geographic location has made the peninsula the battlefield of choice for Chinese and Japanese invaders, going as far back as the double Manchu invasions of the seventeenth century, the Japanese invasions of the sixteenth century, and even skirmishes against Chinese states during our three-kingdoms period in the seventh century[1].

More recently and in living memory, the Chinese Army swarmed across the Yalu River in 1950, extending the war and inflicting tens of thousands of additional casualties upon our forces.  Had the Chinese not intervened, the war would have ended with our nation forming a new unified democracy with the North, not a land with a Demilitarized Zone (DMZ) and a never-ending war[2].

The Chinese have made no secret of their desire to expand at the cost of smaller nations.  Indeed, what the world calls the “South China Sea,” they internally refer to as the South Chinese Sea, a difference in terminology they point to as a misunderstanding.  But in politics and in war, words have meanings, and their meaning is clear.

Finally, while we have had periods of improved and degraded relationships with our wayward cousins in North Korea, we have always supported their territorial claims on the global stage, as they have supported ours.  Because we long for the day our nations reunite, on the international stage, both of our nations often speak with one voice.  Mount Baeku has, for centuries, been either wholly Korean or shared with our Chinese neighbors; the thought of it entirely under the rule of the Chinese due to a pending invasion is a disturbing one[3].

Significance:  Our intelligence agencies have confirmed the Chinese activation of three Army Groups on the North Korean border.  These groups have already begun preparatory movements and logistical staging, and have not issued the standard “only an exercise” proclamations.  It is clear their intent is to claim (at a minimum) the Paeku thumb, and most likely the entire ladle-handle of provinces stretching from Kimcheak north to the Russian Border.  North Korean forces are outnumbered approximately three-to-one.

Option #1:  We remain neutral as the Chinese invade North Korea.

Risk:  This option maintains our current relationship with China and North Korea.  This solution has several risks: if China wins and captures the northern provinces, they may be loath to ever return them; if the North Korean state survives the attack, they might feel betrayed by our lack of assistance, delaying peaceful integration.  If the North Korean regime collapses, we may see hundreds of thousands, possibly millions of refugees streaming across the DMZ that we will have to care for.  And, not least of all, a threatened North Korean regime may use nuclear weapons in a last-ditch effort to defend itself.  This use of nuclear weapons will no doubt bring about a vicious retaliation and devastate their land and risk effecting us as well.

Gain:  If the Chinese are able to topple North Korea, then it’s possible the remnants of the North Korean state would be equitable to peaceful reunification with our nation.  We could then, after absorbing the Northern provinces, pursue a peaceful diplomatic solution with the Chinese to return to an ante bellum border.  Our economy, untroubled by war, would be ready to integrate the provinces or care for refugees if necessary.  Finally, if the North Korea regime survived, our military would stand ready to defend against any vengeful tantrums.

Option #2:  We attack the North Koreans and knock them out of the war.

Risk:  This is an unpalatable solution, but as defense minister, I would be remiss in my duty if I didn’t mention it. 

Launching a strike into North Korea once they are fully engaged fighting the Chinese brings about several risks.  The first risk is that most of our planning and simulations are for defensive wars, or—at most—counterstriking into North Korea after degrading their artillery, air force, and supply lines.  Even engaged against the Chinese, it is unlikely the North Koreans will or can move their currently emplaced heavy artillery, which is aimed towards us.  In essence, we will be attacking into the teeth of a prepared enemy.

Our forces will also not be seen as liberators, avengers, or brothers by the North Koreans, but as vultures looking to finish off an opponent already weakened by the Chinese.  Our own people would not look kindly upon our nation launching a war of aggression, and the world at large will question if we’d made a secret treaty with the Chinese.

Finally, it is an open question if a desperate North Korea would launch nuclear warheads at us, the Chinese, or both.

Gain:  Striking the North Koreans while they are engaged fighting the Chinese means they will fight a two-front war and won’t have a depth of reserves to draw upon.  Their forces may be more inclined to surrender to us than to the foreign Chinese, and striking into the country will surely bring the Chinese pause as they will not want to engage us, and we can seek to liberate as much of the North as we could, as fast as possible, diplomatically leaving us in a better post-war situation.

Option #3:  We—alone—join the war alongside the north.

Risk:  Our Northern cousins have always agreed and supported our territorial claims on the global stage, as we have supported theirs.  No matter our differences, we are Korean and stand united against outsiders.  An invasion of their territory is an invasion of Korea.

A risk in using only our brave and proud forces to assist the North is we would lose one of our most vital military assets: our technologically advanced allies.  The defense of our nation has always been an integrated one, so to leave our allies behind the DMZ as we travel north to fight as we have never trained is a risky proposition.

Gain:  This option gains the diplomatic ability to claim this is a Korean-only situation, allowing our allies to work behind the scenes for diplomatic solutions.  This option would also not preclude our allies from enacting their defensive obligations to us: we can turn more forces to the offense if our skies are still protected by the United States Air Force.  On the ground, the terrain of North Korea is mountainous and unforgiving.  It will be an infantry war, one we are well equipped to fight, but also a quagmire our allies will be wary of participating in.  Finally, fighting side-by-side with only our cousins puts us in the best position to control the post-war reunification negotiations.

Option #4:  We, and our allies, join the war alongside the north.

Risk:  Accepting allied assistance north of the DMZ—outside of medical, humanitarian, and possibly logistical—brings with it a number of risks.  First, this option must meet with North Korean approval, or the people of North Korea themselves might rise up against the very troops hoping to save them from invasion.  Second, a wider war could bring the global economy into a crises and expand—possibly even into a nuclear conflagration—as the forces of the U.S. and China begin worldwide skirmishing.  It is no secret the Chinese strategic weaknesses are nowhere near the peninsula, so it’s a forgone conclusion the Americans would attack anywhere they found an opportunity.  A wider war could expand quickly and with grave consequence to the world.  Finally, a wider war brings with it more voices to the table; the post-war reunification discussion would not be wholly Korean one.

Gain:  The Americans, and others, would strike the Chinese around the globe and deep inside China itself, ensuring their populace felt the pinch of the war.  If managed properly, this might not only bring about a quicker end to the invasion, but maybe even spark a popular uprising that would overthrow the Chinese communist.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] New World Encyclopedia (2018, January 10). History of Korea, Retrieved 14 June 2018. http://www.newworldencyclopedia.org/entry/History_of_Korea 

[2] Stewart, R. The Korean War: The Chinese Intervention. Archived 2011, Retrieved 14 June 2018. https://web.archive.org/web/20111203234437/http://www.history.army.mil/brochures/kw-chinter/chinter.htm 

[3] New York Times, (2016, September 27). For South Koreans, a long detour to their holy mountain. Retrieved 14 June 2018. https://www.nytimes.com/2016/09/27/world/asia/korea-china-baekdu-changbaishan.html

China (People's Republic of China) Jason Hansa North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea)

Call for Papers: The Middle East

middle_east_pol_2013_crop.jpg

Graphic:  U.S. Central Intelligence Agency World Factbook via the University of Texas https://legacy.lib.utexas.edu/maps/middle_east_and_asia/middle_east_pol_2013.pdf

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for national security papers assessing situations or discussing options related to the Middle East.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by October 13th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

To inspire potential writers we offer the following writing prompts:

– Assess the current state of the battle against the Islamic State in the Middle East.

– What options remain to solve or address concerns related to the crisis in Syria?

– What options remain to solve or address concerns related to the Israeli-Palestinian Conflict?

– What options remain to solve or address concerns related to Iran’s desire for a nuclear capability?

– Assess Iran’s current / future influence in Iraq.

– Assess Turkey’s current / future role in Middle East politics.

– What options remain to solve or address concerns related to the conflict between Saudi Arabia and Yemen?

– Assess U.S. policy towards the Middle East with a focus on supporting autocrats vs encouraging self-determination.

– Assess the current / future relationship between Saudi Arabia and the United Arab Emirates.

– Assess the impact to the Middle East when the Sultan of Oman dies.

– Assess the future of the Kurdish people in the Middle East.

– Assess the current / future struggle for regional influence between Qatar and Saudi Arabia.

– Assess the possibility of Egyptian President Sisi stepping down at the end of his second term.

– Assess former President of Egypt Hosni Mubarak. Was he the tyrant the West made him out to be? Was he a regional safety valve?

– Assess the future of the Egyptian Muslim Brotherhood in light of the resignation of the rich from its middle ranks, the extremism of its lower ranks, and the failure of its upper ranks to preserve the group as a one functioning political machine.

Call For Papers Middle East

Alternative Futures: North Korea Options for a Chinese Invasion (Part 1 of 3)

(Editor’s Note:  This Options Paper is part of our Alternatives Future Call for Papers and examines an invasion of North Korea by the People’s Republic of China from the point of view of North Korea, South Korea, and the United States.  We hope you enjoy all three articles over the coming weeks and many thanks to Jason Hansa for choosing to write for Divergent Options!) 

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each to OIF and OEF. He currently works as a military contractor at CASCOM on Fort Lee, Virginia. His twitter address is @HauptmannHansa. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

National Security Situation:  In an alternative future the People’s Republic of China invades North Korea.

Date Originally Written:  June 10, 2018.

Date Originally Published:  August 27, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the North Korean Defense Minister personally briefing his Supreme Leader regarding a potential Chinese invasion, circa 2020.

Background:  Our nation, in truth, owes our existence to our allies in China for their assistance in our most desperate hour in our war to liberate our Southern Comrades.  For this reason, many of our nuclear research and weapons storage facilities were placed within 160 kilometers of their border, to use the Chinese radar and anti-air umbrellas as additional deterrents to American adventurism.

However, our friendship with China has slowly deteriorated, often because they have not always agreed with our decisions when dealing with the U.S. and our Southern Comrades.

Moreover, since our efforts to begin improving relationships with our Southern Comrades, the U.S., and the outside world began during the 2018 Winter Olympics, our relationship with China has soured quickly.  It is also not a secret that the Chinese have welcomed and supported our existence as a buffer state between their borders and that of our ambitious Southern Comrades and their U.S. allies.

The Chinese have long desired a port on the Sea of Japan, and they have spent time and money improving the route between their mostly Korean population of Jillian province and our port-city of Rasan.  We have long-standing agreements allowing them to access our ports with little-to-no customs interference, and they fear that unification will sever their access[1].

Finally, the Chinese have been moving to consolidate territory they consider to be theirs, rightfully or not, as a means to push their dominance onto other nations.  The Chinese have entered into territorial disputes with the Japanese, our Southern Comrades, the Vietnamese, and the Indians[2].  The Chinese have long argued that Mount Baektu, the spiritual homeland of our nation, belongs to them; however, maps and treaties for centuries have either split the mountain down the middle, or made it wholly ours[3][4].  On this, our Southern Comrades agree: the mountain must not be wholly consumed in a Chinese land grab.

Significance:  Our intelligence agencies have determined the Chinese have activated the three Army Groups on our border and intend to invade within the next 48 to 72 hours.  Their goals are to seize our nuclear facilities and many of our northern provinces, most likely from Mount Paektu east to the Sea of Japan.  With most of our forces either aligned towards the south or beginning to stand down in conjunction with peace talks, we are outnumbered approximately three-to-one.

Option #1:  We fight alone.

Risk:  This is a high risk answer because we do not have enough forces in place at this time, and our transportation infrastructure will be the logical first targets in the opening moments of the war.  Our fighter jets, though we have many of them, are antiquated compared to the Chinese air forces.  We do have an advantage in geography: Beijing is close, within our missile range across the Yellow Sea.

Tactically, we would order our forces to hold as long as possible while we brought our southern army groups to bear.  We have the advantages of interior lines, more troops, a populace that is willing to bear any sacrifice against invaders, and incredibly defensible terrain.  We would have to gamble that our Southern comrades would not strike at the same time across the demilitarized zone.

However, if our nuclear launch facilities were in danger of getting overrun by the People’s Liberation Army (PLA), there might be a very real choice in which we must “use-them-or-lose-them” concerning our nuclear weapons.  Millions of Chinese are in range of our weapons, including their capital, but the reprisals would be fierce, our nation as we know it would most likely not survive.

Gain:  We would show the world that our nation is strong and unconquerable, provided we won.  There is a significant chance we would not be able to move our forces in time and would have to concede our northern provinces, though our nation as a whole would survive.

Option #2:  We ask only our Southern Comrades and long-time allies for assistance.

Risk:  Our Southern Comrades have always agreed and supported our territorial claims on the global stage, as we have supported theirs.  No matter our differences, we are all Korean, and stand united against outsiders.  Asking for their support would add their technologically advanced forces to our order of battle, thousands of well-trained and motivated infantrymen plus their supporting forces, and a transportation network stretching from Busan to Rasan.  Asking our international allies—such as Sweden—for diplomatic support would put pressure on China both internationally and economically, and would be a way for our nation to gain global support for our cause and condemnation of China’s activities without their active military participation.

However, there would be no return to a pre-war status quo, no chance of our nation surviving independently.  Asking for assistance and allowing the military forces of the south into our nation and fighting side-by-side as one Korea means that, once the war is over, we would reunite as one Korea.  Finally, it can be safely assumed our Southern Comrades will not allow us to use our nuclear weapons against China, no matter what the cost.

Gain:  This option gains us the military of the South without allowing in the U.S. or other allies, maintaining the pretense of a Korea-only problem.  This allows nations that might not feel comfortable fully siding with us an option to save face by aligning with our allies and conducting diplomatic and economic battle with China while remaining out of the active conflict.  Finally, fighting side-by-side with only our Southern Comrades puts us in the best position to ensure both the survival of our regime leadership and bargain for our people as we reunite with the south after the war.

Option #3:  We ask assistance from any who offer.

Risk:  It is likely assured our Southern Comrades would immediately join with us to fend off an invasion.  It is trickier to know the actions of the Americans, among others.  The Americans would have the most to lose fighting a war with China, their biggest creditor and a major trading partner.  But it could also be offered the Americans have the most to gain, a war against China as a possible means of clearing their debt.

As problematic as accepting U.S. assistance may be, there could be other nations that bring with them a host of issues.  Our people would be loath to accept Japanese military assistance, though they have technological capabilities on par with the U.S. and China.  Accepting Russian help once again puts us in their debt, and they always demand repayments in some form or another.  We may be unwilling to pay the costs of Russian assistance down the road.

Finally, accepting outside assistance means our post-war reintegration will be shaped by nations outside of Korea.  These outside nations desire a unified Korea to meet their needs, which is not necessarily the nation we are meant to be.

Gain:  The Americans, and others, would bring with them the capability of expanding the war, striking the Chinese around the globe, and attacking their supply lines, ensuring that the Chinese populace felt the pinch of the war, not only the PLA.  This global striking would probably dramatically shorten the war and reduce casualties among our brave fighting divisions.  Additionally, the U.S. could rally the world to our cause, bringing with them military, diplomatic, humanitarian, and economic aid.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] AP (2012, August 22) NKorea’s economic zone remains under construction. Retrieved 14 June 2018. https://web.archive.org/web/20120823065244/http://www.thestate.com/2012/08/22/2408642/nkoreas-economic-zone-remains.html#.WyLBFWYUnxh

[2] Panda, A. (2017, October 22). The Doklam Standoff Between India and China is far from over. Retrieved 14 June 2018. https://thediplomat.com/2017/10/the-doklam-standoff-between-india-and-china-is-far-from-over/

[3] Lych, O. (2006, July 31) China seeks U.N. Title to Mt. Beakdu. Retrieved 14 June 2018. http://english.donga.com/List/3/all/26/248734/1

[4] New York Times, (2016, September 27). For South Koreans, a long detour to their holy mountain. Retrieved 14 June 2018. https://www.nytimes.com/2016/09/27/world/asia/korea-china-baekdu-changbaishan.html

China (People's Republic of China) Jason Hansa North Korea (Democratic People’s Republic of Korea) Option Papers South Korea (Republic of Korea)

Assessment of the North Korean Cyberattack on Sony Pictures

Emily Weinstein is a Research Analyst at Pointe Bello and a current M.A. candidate in Security Studies at Georgetown University.  Her research focuses on Sino-North Korean relations, foreign policy, and military modernization.  She can be found on Twitter @emily_sw1.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the North Korean Cyberattack on Sony Pictures

Date Originally Written:  July 11, 2018.

Date Originally Published:  August 20, 2018.

Summary:   The 2014 North Korean cyberattack on Sony Pictures shocked the world into realizing that a North Korean cyber threat truly existed.  Prior to 2014, what little information existed on North Korea’s cyber capabilities was largely dismissed, citing poor domestic conditions as rationale for cyber ineptitude.  However, the impressive nature of the Sony attack was instrumental in changing global understanding of Kim Jong-un and his regime’s daring nature.

Text:  On November 24, 2014 Sony employees discovered a massive cyber breach after an image of a red skull appeared on computer screens company-wide, displaying a warning that threatened to reveal the company’s secrets.  That same day, more than 7,000 employees turned on their computers to find gruesome images of the severed head of Sony’s chief executive, Michael Lynton[1].  These discoveries forced the company to shut down all computer systems, including those in international offices, until the incident was further investigated.  What was first deemed nothing more than a nuisance was later revealed as a breach of international proportions.  Since this incident, the world has noted the increasing prevalence of large-scale digital attacks and the dangers they pose to both private and public sector entities.

According to the U.S. Computer Emergency Readiness Team, the primary malware used in this case was a Server Message Block (SMB) Worm Tool, otherwise known as SVCH0ST.EXE.  An SMB worm is usually equipped with five components: a listening implant, lightweight backdoor, proxy tool, destructive hard drive tool, and a destructive target cleaning tool[2].  The worm spreads throughout the infected network via a trial-and-error method used to obtain information such as a user password or personal identification number known as a brute force authentication attack.  The worm then connects to the command-and-control infrastructure where it is then able to begin its damage, usually copying software that is intended to damage or disable computers and computer systems, known as malware, across to the victim system or administrator system via the network sharing process.  Once these tasks are complete, the worm executes the malware using remotely scheduled tasks[3].

This type of malware is highly destructive.  If an organization is infected, it is likely to experience massive impacts on daily operations, including the loss of intellectual property and the disruption of critical internal systems[4].  In Sony’s case, on an individual level, hackers obtained and leaked personal and somewhat embarrassing information about or said by Sony personnel to the general public, in addition to information from private Sony emails that was sensitive or controversial.  On the company level, hackers stole diverse information ranging from contracts, salary lists, budget information, and movie plans, including five entire yet-to-be released movies.  Moreover, Sony internal data centers had been wiped clean and 75 percent of the servers had been destroyed[5].

This hack was attributed to the release of Sony’s movie, The Interview—a comedy depicting U.S. journalists’ plan to assassinate North Korean leader Kim Jong-un.  A group of hackers who self-identified by the name “Guardians of Peace” (GOP) initially took responsibility for the attack; however, attribution remained unsettled, as experts had a difficult time determining the connections and sponsorship of the “GOP” hacker group.  Former Federal Bureau of Investigation (FBI) Director James Comey in December 2014 announced that U.S. government believed that the North Korean regime was behind the attack, alluding to the fact that the Sony hackers failed to use proxy servers that masked the origin of their attack, revealing Internet Protocol or IP addresses that the FBI knew to be exclusively used by North Korea[6].

Aside from Director Comey’s statements, other evidence exists that suggests North Korea’s involvement.  For instance, the type of malware deployed against Sony utilized methods similar to malware that North Korean actors had previously developed and used.  Similarly, the computer-wiping software used against Sony was also used in a 2013 attack against South Korean banks and media outlets.  However, most damning of all was the discovery that the malware was built on computers set to the Korean language[7].

As for a motivation, experts argue that the hack was executed by the North Korean government in an attempt to preserve the image of Kim Jong-un, as protecting their leader’s image is a chief political objective in North Korea’s cyber program.  Sony’s The Interview infantilized Kim Jong-un and disparaged his leadership skills, portraying him as an inept, ruthless, and selfish leader, while poking fun at him by depicting him singing Katy Perry’s “Firework” song while shooting off missiles.  Kim Jong-un himself has declared that “Cyberwarfare, along with nuclear weapons and missiles, is an ‘all-purpose sword[8],’” so it is not surprising that he would use it to protect his own reputation.

The biggest takeaway from the Sony breach is arguably the U.S. government’s change in attitude towards North Korean cyber capabilities.  In recent years leading up to the attack, U.S. analysts were quick to dismiss North Korea’s cyber-potential, citing its isolationist tactics, struggling economy, and lack of modernization as rationale for this judgement.  However, following this large-scale attack on a large and prominent U.S. company, the U.S. government has been forced to rethink how it views the Hermit Regime’s cyber capabilities.  Former National Security Agency Deputy Director Chris Inglis argues that cyber is a tailor-made instrument of power for the North Korean regime, thanks to its low-cost of entry, asymmetrical nature and degree of anonymity and stealth[9].  Indeed the North Korean cyber threat has crept up on the U.S., and now the its intelligence apparatus must continue to work to both counter and better understand North Korea’s cyber capabilities.


Endnotes:

[1] Cieply, M. and Barnes, B. (December 30, 2014). Sony Cyberattack, First a Nuisance, Swiftly Grew Into a Firestorm. Retrieved July 7, 2018, from https://www.nytimes.com/2014/12/31/business/media/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html

[2] Lennon, M. (December 19, 2014). Hackers Used Sophisticated SMB Worm Tool to Attack Sony. Retrieved July 7, 2018, from https://www.securityweek.com/hackers-used-sophisticated-smb-worm-tool-attack-sony

[3] Doman, C. (January 19, 2015). Destructive malware—a close look at an SMB worm tool. Retrieved July 7, 2018, from http://pwc.blogs.com/cyber_security_updates/2015/01/destructive-malware.html

[4] United States Computer Emergency Readiness Team (December 19, 2014). Alert (TA14-353A) Targeted Destructive Malware. Retrieved July 7, 2018, from https://www.us-cert.gov/ncas/alerts/TA14-353A

[5] Cieply, M. and Barnes, B. (December 30, 2014). Sony Cyberattack, First a Nuisance, Swiftly Grew Into a Firestorm. Retrieved July 7, 2018, from https://www.nytimes.com/2014/12/31/business/media/sony-attack-first-a-nuisance-swiftly-grew-into-a-firestorm-.html

[6] Greenberg, A. (January 7, 2015). FBI Director: Sony’s ‘Sloppy’ North Korean Hackers Revealed Their IP Addresses. Retrieved July 7, 2018, from https://www.wired.com/2015/01/fbi-director-says-north-korean-hackers-sometimes-failed-use-proxies-sony-hack/

[7] Pagliery, J. (December 29, 2014). What caused Sony hack: What we know now. Retrieved July 8, 2018, from http://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/

[8] Sanger, D., Kirkpatrick, D., and Perlroth, N. (October 15, 2017). The World Once Laughed at North Korean Cyberpower. No More. Retrieved July 8, 2018, from https://mobile.nytimes.com/2017/10/15/world/asia/north-korea-hacking-cyber-sony.html

[9] Ibid.

Assessment Papers Cyberspace Emily Weinstein Information Systems

Episode 0006: The Politicization of Retired U.S. Military Generals and Admirals (The Smell of Victory Podcast by Divergent Options)

politicization

Image from https://niskanencenter.org/blog/future-liberalism-politicization-everything/

In 1988 General Paul X. Kelly, a retired United States Marine Corps General, made it known that he endorsed candidate George Bush for President of the United States.  That simple endorsement broke open the dam, emboldening future generations of retired Generals and Admirals to make their views known during each election cycle.  What are the impacts, good or bad, when retired military Generals and Admirals stand on stage to support a candidate for President?  What impacts do these endorsements have on the military members still serving?  Can or should anything be done about these endorsements?  Join Bob Hein and Steve Leonard as they discuss these issues and more on this episode of The Smell of Victory Podcast!

You can listen via Sticher by clicking here, or iTunes by clicking here. You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

The Smell of Victory Podcast by Divergent Options

An Assessment of U.S. Women in Islamic State-related Cases

Brandee Leon is a freelance analyst of counter-terrorism and international relations, focusing on terror in Europe.  She frequently covers women in terrorism.  She has been published in Business Insider, The Strategy Bridge, and The Eastern Project. She can be found on Twitter at @misscherryjones.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of U.S. Women in Islamic State-related Cases

Date Originally Written:  June 20, 2018.

Date Originally Published:  August 13, 2018.

Summary:  Since the inception of Islamic State, ten percent of the related cases in the United States have involved women. The roles of the women involved have varied, from material support to bomb-making. The numbers are small compared to their European counterparts, but there is a definite presence in the United States. But like those in Europe, they are not a group that should be ignored.

Text:  George Washington University’s Program on Extremism (PoE) has been compiling cases of U.S persons involved in Islamic State(IS)-related offenses since 2014[1]. As of April 2018, they have found that 160 individuals have been charged. This article’s analysis to date reveals that 16 of those cases have involved women. The following is an overview of those cases, as well as why they are worth paying attention.

According to the latest infographic put out by GWU PoE, 90 percent of those charged with IS-related offenses in the U.S. have been male. This is up from 86 percent as of December 2015. The average age for the women in the cases is 33, five years older than the overall average age of 28. The oldest woman was 55, and the youngest was 19.

Thirteen of the women are U.S. citizens, six of whom are U.S.-born. Other nationalities represented among the women include Bosnia-Hercegovina[2], Pakistan, Somalia, and Saudi Arabia. Nearly half of the women have children. In one case, the woman’s sons had traveled to Syria in support of Islamic State[3].

The women involved tend to received drastically shorter prison sentences than the overall average: just 5.4 years compared to 13.4 years. One woman (so far) has been acquitted by trial, while another is still at large.

Most of the charges leveled against the women fell under 18 USC §2339, providing material support to terrorists or designated terror organizations. The next, most-frequent charge was 18 USC §1001(a)(2), providing false statements. Money laundering, transmission of a threat, and conspiracy to defraud the U.S. government were among the other charges. Two women were charged with 18 USC §2332a (a)(2), use of weapons of mass destruction, which represents the only straightforward “operational” charges against IS-connected women in America to date[4].

Several of the women conspired with a romantic partner, whether via online contact with a purported member of IS[5], or with a husband or boyfriend[6]. One woman actually traveled to Syria and married a well-known IS fighter[7].

Women in America who have been charged with crimes relating to the Islamic State tend to be slightly older than the male average. The women who have been sentenced to date have received significantly lesser sentences. Nearly all the women were charged with crimes relating to support rather than traveling to join the terror group. The women rarely act on their own, usually partnering with a significant other, either in person or virtually. While comprising just ten percent of the known cases of Americans in Islamic State related offenses, women are actively supporting the cause.

The numbers of American women getting involved with Islamic State are still small compared to the numbers of European women supporting the terror group. One estimate puts the number of European women traveling to join IS at over 500[8], with nearly 100 from Britain, and over 300 from France. The proximity to the Middle East and the larger Muslim population in Europe are likely factors in the numbers. U.S. women, however, could have greater ease of movement and agency, as some European countries are cracking down on Muslim women by way of headscarf and burka bans.

As the author has written before, the roles of women in these groups continue to evolve, and those in the business of counterterrorism and countering violent extremism will need to shed any preconceived notions of women-as-victim. Women are increasingly playing active roles in these organizations, and doing so voluntarily[9]. Most of the focus of women and terrorism remains on European women, but as shown in this article, there is a presence in the U.S.

However small the number of U.S. women actively supporting IS, it does not mean they should not be taken as serious a threat as the men. As the group’s territory disappears, they will find other areas in which to operate. They group has repeatedly called on its supporters to attack locally if they cannot physically travel to Syria or Iraq. And most recently, the group has seemingly loosened its restrictions on women taking up arms for the cause[10]. The Trump administration’s rhetoric and policies toward Muslims could also be a driving force. Whether the above mentioned factors mean there will be an increase in activity in the United States remains to be seen, but this is an issue deserving additional study, particularly regarding the motivations of Western women who choose to affiliate themselves with IS.

“To underestimate or neglect women jihadists would be a huge mistake for security services…– and one they may pay for in the near future.” – Abu Haniyah


Endnotes:

[1] ISIS in America, https://extremism.gwu.edu/isis-america

[2] Seamus Hughes & Bennett Clifford, “First He Became an American—Then He Joined ISIS,” The Atlantic, 25 May 2017, https://www.theatlantic.com/international/archive/2017/05/first-he-became-an-americanthen-he-joined-isis/527622/

[3] US Department of Justice, Collin County Couple Sentenced for Lying to Federal Agents, 13 February 2018, https://www.justice.gov/usao-edtx/pr/collin-county-couple-sentenced-lying-federal-agents

[4] “2 Women Arrested In New York City For Alleged ISIS-Inspired Terror Plot,” CBS New York, 2 April 2015, http://newyork.cbslocal.com/2015/04/02/sources-tell-cbs2-2-women-arrested-in-new-york-city-for-alleged-isis-inspired-terror-plot/

[5] “Shannon Conley, Arvada teen who tried to join ISIS to wage jihad, sentenced to 4 years in prison,” TheDenverChannel, 23 January 2015, https://www.thedenverchannel.com/news/local-news/sentencing-for-shannon-conley-arvada-teen-who-tried-to-join-isis-to-wage-jihad

[6] Joshua Berlinger and Catherine E. Shoichet, “Mississippi woman pleads guilty on charge that she tried to join ISIS,” CNN, 30 March 2016, https://www.cnn.com/2016/03/30/us/mississippi-isis-guilty-plea-jaelyn-young/index.html

[7] Tresa Baldas, “FBI translator secretly married Islamic State leader,” USA Today, 2 May 2017, https://www.usatoday.com/story/news/nation-now/2017/05/02/fbi-translator-secretly-married-islamic-state-leader/309137001/

[8] Shiraz Maher, “What should happen to the foreign women and children who joined Isis?,” New Statesman, 28 August 2017, https://www.newstatesman.com/world/middle-east/2017/08/what-should-happen-foreign-women-and-children-who-joined-isis

[9] Brandee Leon, “Thinking about women’s roles in terrorism,” The View From Here, 12 June 2017, https://misscherryjones.wordpress.com/2017/06/12/thinking-about-womens-roles-in-terrorism/

[10] Brandee Leon, “Changing Roles? Women as Terror Threat,” The View From Here, 28 February 2018, https://misscherryjones.wordpress.com/2018/02/28/changing-roles-women-as-terror-threat/

Assessment Papers Brandee Leon Islamic State Variants United States Women

Alternative Futures: Options for the Deployment of Iraqi Peacekeepers

Mr. Jason Hansa is a retired U.S. Army officer that served in Germany, Korea, and CONUS, with two deployments each in support of Operations Iraqi Freedom and Operation Enduring Freedom.  He currently works as a military contractor at the U.S. Army Combined Arms Support Command on Fort Lee, Virginia.  He can be found on Twitter @HauptmannHansa.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  In an alternative future, the Government of Iraq in 2020 considers deploying its troops as United Nations (UN) Peacekeepers.

Date Originally Written:  June 1, 2018.

Date Originally Published:  August 6, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the Iraqi Defense Minister writing a personal options paper for the Iraqi Prime Minister, circa 2020.  This point of view assumes the Muslim Rohinga minority in Myanmar are still persecuted and an international coalition is forming to help them[1].

Background:  Our nation has been at war for nearly twenty years, thirty if our invasion of Kuwait is included.  Our military, thanks to training with the U.S. and a long war against the Islamic State (IS), is strong and has an experienced Noncommissioned Officer Corps.  Our population votes.  Our women can drive.  We are more moderate than many Islamic nations, and yet, when the people of the world look to the Middle East, they see our nation only for our troubles.  It is nearly impossible to entice foreign investment when the only image potential investors have of us is one of war.  Moreover, the international spotlight often overlooks our nation entirely.  The ongoing rivalry between Iran and Saudi Arabia continues to divide the world, the Palestinians continue their fights with Israel, and Egypt seems to implode every three years.  Our neighbors scare away as much investment as our own beleaguered history.

Significance:  If we are to bring our nation back into the spotlight, we must find a way to attract the world’s attention.  We must find a way to demonstrate our ability to peacefully step up and stand on the world stage.  Failure will keep our economy stagnant.

Option #1:  Iraq asks to participate in UN peacekeeping missions.

Risk:  This is a low-risk option demonstrating the strength of our military by helping others.  Dispatching troops to join UN Peacekeeping operations is a solution that will bring about some short-term media notice, but probably very little else.  Many small nations participate in UN Peacekeeping simply as a way to earn money and help bankroll their own militaries.  There is no formalized training system for Peacekeepers, nations are left to send what units they choose.  Our battle-tested battalions will serve alongside whatever troops the UN can scrounge up[2].

Gain:  Our military hadn’t conducted operations outside of Iraq since our war with Iran in the 1980’s and the 1973 October War against Israel.  Deployments with the UN will allow our forces to practice rotational deployment schedules.  It is not an easy thing, sending troops and equipment outside of our borders, and moving them in conjunction with the UN will allow us time to practice and learn without a heavy media glare.

Option #2:  Iraqi forces join other nations and conduct humanitarian operations in Myanmar.

Risk:  With no prior practice of deployments, we stand the chance of making major mistakes while in the world’s eye.  While we could swallow some pride and ask long-time allies for advice—especially our friends in Indonesia and India—neither country has a long history of overseas deployments.  We would be best served asking new friends with deployment experience, such as the South Koreans, for help, a solution that is both diplomatically palatable and socially acceptable.  Finally, we would have to assure our religious leaders and population that our military is not becoming mercenaries to serve, bleed, and die at the behest of western nations.

Gain:  Participating in a humanitarian effort, especially if we were seen working with the consultation of a friend such as India, would be recognized as a major step towards participation on the global stage.  For our population, assisting fellow brothers in Islam like the Rohinga would be a source of pride in our nation and our military.

Option #3:  Iraqi forces work alongside European nations and conduct rotational operations in the Baltics.

Risk:  This is a high-risk for high-gains solution.  First, we have always maintained a cautious friendship with Russia, as they are a major source of our military’s weapons and arms.  Aligning with Europe and the North Atlantic Treaty Organization (NATO) nations against them will probably close that door for decades.  Second, our people would question why we are sending our nation’s forces to faraway lands, and spending treasure (and possible lives) to fix a problem that does not concern us.  Finally, our deployment inexperience will most hurt us during this option: unlike peacekeeping operations, our forces must deploy fully ready for war.

Gain:  If we are to ask nations to invest in our country, we must stand ready to invest in the safety of theirs.  Putting our forces in the Baltics will present our nation in a favorable light to the people and businessmen of small but relatively wealthy nations.  While we lack deployment experience, we will have the entire logistical backbone and experience of NATO to draw upon to ensure our forces move in an organized fashion.  Finally, the forces NATO assembles and trains in the Baltics are among their very best.  Training alongside these forces is a cost-effective way to ensure our battle-hardened troops maintain their edge[3].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Smith, N. and Krol, C. (2017, September 19). Who are the Rohingya Muslims? The stateless minority fleeing violence in Burma. Retrieved 14 June 2018 https://www.telegraph.co.uk/news/0/rohingya-muslims/

[2] Schafer, B. (2016, August 3). United Nations Peacekeeping Flaws and Abuses: The U.S. Must Demand Reform. Retrieved 14 June 2018 https://www.heritage.org/report/united-nations-peacekeeping-flaws-and-abuses-the-us-must-demand-reform [3] McNamara, E. (NATO Magazine, 2016). Securing the Nordic-Baltic region. Retrieved 14 June 2018. https://www.nato.int/docu/review/2016/also-in-2016/security-baltic-defense-nato/EN/index.htm 

[3] McNamara, E. (NATO Magazine, 2016). Securing the Nordic-Baltic region. Retrieved 14 June 2018. https://www.nato.int/docu/review/2016/also-in-2016/security-baltic-defense-nato/EN/index.htm

Alternative Futures Iraq Jason Hansa Option Papers Peace Missions

U.S. Options for Responding to Sharp Power Threats

Anthony Patrick is a student at Georgia State University where he majors in political science and conducts research on Sharp Power.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Threats to U.S. and allied nations by sharp power actions (defined below).

Date Originally Written:  June 16, 2018.

Date Originally Published:  July 30, 2018.

Author and / or Article Point of View:  The author is an undergraduate student of defense policies and an Officer Candidate in the United States Marine Corps.  This article is written with the base assumption that foreign actions against the U.S political system is a top national security challenge and a continuing threat.

Background:  Recent U.S. news cycles have been dominated by the Mueller investigation into Russian interference in the U.S political system.  Other allied nations such as the United Kingdom, France, Australia, and New Zealand have also recently dealt with foreign political influence campaigns[1].  While historically nations have projected power either through military might (hard power) or cultural influence (soft power), rising authoritarian actors like the People’s Republic of China (PRC), Russia, Iran, and North Korea are resulting to a hybrid mix of classical power projection through emerging technologies with revisionist intent in the international system known as sharp power[2].  Sharp power is more direct than soft power, not as physically destructive as hard power, and does not cause enough damage to justify a military response like Article 5 of the North Atlantic Treaty Organization. 

Sharp power actions are normally covert in nature allowing the perpetrator plausible deniability.  Given the combined military and economic power of western democracies, sharp power is the preferred method for disruptive actions against the international order by authoritarian powers.  The effectiveness of sharp power is amplified by the open nature of democratic societies, especially in the information age[3].  Other examples of sharp power attacks include the North Korean hacking of Sony Pictures, the Iranian hacking of a dam in New York, PRC surveillance of Chinese students in foreign classrooms[4], and Russian actions in Ukraine and Moldova[5]. 

Significance:  The effects of sharp power actions can be very dangerous for western democracies.  One effect is a decrease in democratic legitimacy in an elected government.  When the citizens question if it was themselves or foreign actors who helped elect a government, that government is hamstrung due to a lack of legitimacy.  This lack of legitimacy can create new divisions or heighten polarization in the targeted countries.  Foreign actors can use the internet as a guise, pretend to be domestic actors, and push extreme ideas in communities, creating the potential for conflict.  This series of effects has already happened in U.S communities, where Russian actors have organized a protest and the counter protest[6].  These new divisions can also heighten political infighting, diverting political resources from international problems to deal with issues in the domestic sphere.  This heightened political infighting can give these revisionist actors the breathing room they need to expand their influence.  The increasing prevalence of these effects is a direct threat to U.S national security, chipping away at the government’s freedom of action and diverting resources to the domestic sphere away from international problems. 

Option #1:  Adopt military operational planning methodologies like Effects Based Operations (EBO) and Systematic Operational Design (SOD) at the interagency level to organize a response to adversary sharp power actions.

Risk:  The U.S also has the largest pool of soft power in the world and reverting to sharp power actions would hurt that important U.S resource[7].  Also, since these adversary countries are not as open, targeting would be a difficult task, and actions against the wrong group could be used as a rallying cry in the adversary country.  This rallying cry would give these adversaries a greater mandate to continue their actions against western democracies.  Lastly, successful sharp power actions against authoritarian countries could lead to more destructive domestic instability, harming allies in the region and disrupting global trading networks[8].

Gain:  By utilizing sharp power methodologies, the U.S would be able to strike back at opposing countries and deter further actions against the U.S.  The U.S has a large pool of resources to pull from in the interagency, and only needs a methodology to guide those resources.  Military style operational planning like EBO and SOD contain important theoretical constructs like System of System Analysis, Center of Gravity, and the constant reviewing of new information[9][10].  This planning style fits well for sharp power actions since it allows the government to create an operational plan for directed international political actions.  The U.S government can pull from the wealth of knowledge within the Department of Defense on how to combine these various frameworks to achieve sharp power action given their experience with designing complex operations on the joint level[11].  Successful actions would also give the U.S more leverage in negotiations with these countries on other areas and would divert their political resources from international actions 

Option #2:  Congress passes a Goldwater-Nichols-like Act to create a horizontal organization within the interagency, to address sharp power threats[12].

Risk:  Such reform would be substantial and would take a long time to implement.  The length of this process could delay any government response to both continued foreign interference and other international problems.  The congressional process is historically slow and designing the bill would also take a substantial amount of time.  Different agencies have set rules, procedures, and operating cultures, and changing those enough to allow effective interagency cooperation would also be difficult.  Option #2 would not change the defensive posture of the U.S government, thus it would not create the desired deterrent effect. 

Gain:  Streamlining the interagency process would increase the government’s ability to counter sharp power threats.  Option #2 would lead to better allocation of resources, more intelligence sharing, better allocation of authority during interagency deliberations, and provide more clarity on rules, regulations, and processes that govern interagency cooperation.  By adopting this reform, the national security council would be able to give task to a joint structure instead of a single lead agency.  This joint structure could operate like the joint command within the Department of Defense and create broad policy for interagency work[13].  By keeping a defensive posture, the U.S would also be able to protect its soft power appeal[14]. 

Other Comments:  None.

Recommendations:  None.


Endnotes:

[1]  Kurlantzick, J. (2017, December 13). Australia, New Zealand Face China’s Influence. Retrieved from https://www.cfr.org/expert-brief/australia-new-zealand-face-chinas-influence

[2] National Endowment for Democracy. (2017, December 5). Sharp Power: Rising Authoritarian Influence. Retrieved from https://www.ned.org/sharp-power-rising-authoritarian-influence-forum-report/

[3]  Wanless, A., & Berk, M. (2018, March 7). The Strategic Communication Ricochet: Planning Ahead for Greater Resiliency. Retrieved from https://thestrategybridge.org/the-bridge/2018/3/7/the-strategic-communication-ricochet-planning-ahead-for-greater-resiliency

[4]  Sulmeyer, M. (2018, March 22). How the U.S. Can Play Cyber-Offense. Retrieved from https://www.foreignaffairs.com/articles/world/2018-03-22/how-us-can-play-cyber-offense

[5]  Way, L. A. (2018, May 17). Why Didn’t Putin Interfere in Armenia’s Velvet Revolution? Retrieved from https://www.foreignaffairs.com/articles/armenia/2018-05-17/why-didnt-putin-interfere-armenias-velvet-revolution

[6]  Lucas, R. (2017, November 01). How Russia Used Facebook To Organize 2 Sets of Protesters. Retrieved from https://www.npr.org/2017/11/01/561427876/how-russia-used-facebook-to-organize-two-sets-of-protesters

[7]  Nye, J. S., Jr. (2018, January 24). How Sharp Power Threatens Soft Power. Retrieved from https://www.foreignaffairs.com/articles/china/2018-01-24/how-sharp-power-threatens-soft-power

[8]  Breen, J. G. (2017). Covert Actions and Unintended Consequences. InterAgency Journal,8(3), 106-122. Retrieved from http://thesimonscenter.org/featured-article-covert-action-and-unintended-consequences/

[9]  Strange, J., Dr., & Iron, UK Army, R., Colonel. (n.d.). Understanding Centers of Gravity and Critical Vulnerabilities(United States, Department of Defense, United States Marine Corps War College).

[10]  Vego, M. N. (2006). Effects-based operations: A critique. National Defense University, Washington D.C. Institute for National Strategic Studies.

[11]  Beutel, C. (2016, August 16). A New Plan: Using Complexity In the Modern World. Retrieved    from https://thestrategybridge.org/the-bridge/2016/8/16/a-new-plan-using-complexity-in-the-modern-world

[12]  Dahl, U.S. Army, K. R., Colonel. (2007, July 1). New Security for New Threats: The Case for Reforming the Interagency Process. Retrieved from https://www.brookings.edu/research/new-security-for-new-threats-the-case-for-reforming-the-interagency-process/

[13]  United States, Department of Defense, Joint Chiefs of Staff. (2018). Joint Concept for Integrated Campaigning.

[14]  Nye, J. S., Jr. (summer 2004). Soft Power and American Foreign Policy. Political Science Quarterly,119(2), 255-270. Retrieved from http://www.jstor.org/stable/20202345

Anthony Patrick Below Established Threshold Activities (BETA) Deterrence Major Regional Contingency Option Papers United States

Divergent Trajectories for U.S. Military Power

Jeff Becker is a consultant in the U.S. Joint Staff J-7, Joint Concepts Division and writes extensively on military futures and joint force development, including the 2016 edition of the Joint Operating Environment:  The Joint Force in a Contested and Disordered World. He can be found at LinkedIn at https://www.linkedin.com/in/jeffrey-becker-10926a8 or at Jeffrey.james.becker@gmail.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Divergent trajectories for U.S. military power.

Date Originally Written:  May 30, 2018.

Date Originally Published:  July 23, 2018.

Author and / or Article Point of View:  The author is a military futurist supporting the U.S. Joint Chiefs of Staff J7 which is responsible for the six functions of joint force development: Doctrine, Education, Concept Development & Experimentation, Training, Exercises and Lessons Learned.  The author is a classical realist and believes strongly in the importance of husbanding U.S. strategic power and avoiding wasting conflicts around the world, while simultaneously believing in the judicious use of the U.S. military to protect its interests and support and defend a favorable world order. 

Background:  Today U.S. understanding of the long-term trajectory of its power is at a crossroads, with two divergent and highly consequential potential futures as options[1].  Each future is plausible.  Each future has widely different implications for the kind of Joint Force that the U.S. will need.

Significance:  New national security and national defense strategies direct a recapitalization of the Joint Force after nearly two decades of war.  Clarifying which future is more probable and the force modernization implications that flow from each can help to illuminate what the U.S. and its military can reasonably aspire to and achieve in the future[2].  Basing force design on sound assumptions about the relative trajectory of U.S. power – particularly economic power, but also other intangibles such as scientific innovation or social cohesion – is central to well-defined Joint Force roles and missions and the requisite concepts and capabilities it will need in the future

Articulating two distinct visions for the possible trajectory of American power, and then consistently anchoring force design choices on the expected one, will ensure the future armed forces can be an effective part of future national strategy. 

Option #1:  The consensus future understands the U.S. to remain as the single most powerful state on the world stage.  In this view, the economic and military potential of the U.S. remains relatively constant – or at the very worst – only sees a slight decline relative to other countries over the next two decades.  In such a world, the U.S. and its Joint Force, though generally superior, will be increasingly challenged and the Joint Force is forced to adapt as its power relative to others undergoes a slow erosion.  Such a world emphasizes the need to address great powers, in a period of “long term strategic competition between nations[3].”  Competition is multi-faceted, but nations generally avoid the overt use military force and pursue regional opportunities to challenge U.S. interests and objectives – particularly within their regions – in indirect and subversive ways.    

Risk:  In a world in which U.S. power is perceived as too formidable to confront directly, state rivals may prioritize indirect, proxy, and hybrid approaches as well as new forms of cyber and information confrontation that avoid open clashes with the Joint Force.  This places the Joint Force in a dilemma, as the large nuclear and conventional forces required to keep conflict contained are likely unsuitable to these indirect coercive challenges.  Option #1 would leave the U.S. more vulnerable to threats arising from persistent disorder, substate violent conflict, political subversion, influence operations, and novel and unexpected asymmetric military developments that avoid confronting the U.S. military directly.   

Gain:  Joint Force development activities in this world will be able to take advantage of greater freedom of action – including a large and capable alliance system and ability to operate through and from global commons – to deter and impose costs on competitors and adversaries.  The U.S. may have the strategic and military margins to direct more resources and effort as a “systems administrator” for the global commons.  In this role the U.S. would use military power to secure maritime global trade, open and uninhibited use of space, and thus, continue to support and defend an open world order largely favorable to U.S. against even great power competitors.

Option #2:  In this alternative future, relative U.S. economic and technological decline translate into significant strategic and military challenges more rapidly than many expect.  This world is plausible.  A particularly striking assessment in the U.K.’s Global Strategic Trends describes a 2045 People’s Republic of China (PRC) with an economy more than double that of the United States ($62.9 trillion versus $30.7 trillion) and noting that even today, the PRC military may already be “close to matching that of the U.S., perhaps exceeding it in some areas.”  A CSBA study notes that the trajectory of PRC growth means that it “poses a far greater economic challenge to the United States than did Soviet Russia, Imperial Japan, or Nazi Germany[4].”  In this world, great powers are able to translate this growing relative power into more expansive and often hostile national objectives.  

Risk:  The military consequences of a world in which the U.S. possesses one-fourth the population and one half the economy of the PRC would be profound.  Here, the U.S. is the “smaller superpower” and the PRC translates demographic potential and economic and technological prowess into more expansive strategic goals and potentially overmatches the Joint Force in a number of important capability areas.   In such a world, other competitive and openly aggressive adversaries may also pursue military spheres of influence and make regional and local arrangements incompatible with a free and open international order.  Adversaries may be able to project power globally with advanced expeditionary forces, but also through new space, information, cyber weapons, and long-range precision strike systems.  Combined, these may force the U.S. to invest more in homeland defense at the expense of our own global power projection capabilities.

Gain:  Joint force development efforts in this world are forced to be agile enough to confront aggressive and powerful adversaries in asymmetric, unexpected, and flexible ways.  Counterintuitively, in such a world it may be easier for the U.S. military to counter aggressive adversary moves.  In a world of powerful defensive capabilities in which projecting power through dense and connected defensive complexes is extremely difficult, the U.S. could optimize the Joint Force to construct defensive systems and perimeters around Allies and Partners.  The U.S. can also invest in strategic mobile defenses in-depth to raise the risk and cost of adversary initiatives around the world. 

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1]  These alternative futures are derived from “challenged assumption #1 in a Joint Staff J7 study, Challenged Assumptions and Potential Groupthink (April 2018), p. 9.

[2]  See, Joint Operating Environment 2035 (July 2016), p. 50-51

[3]   Summary of the 2018 National Defense Strategy (January 2018), p. 2.

[4]   Andrew Krepinevich, Preserving the Balance: A U.S. Eurasia Defense Strategy, CSIS (2017), p. 40

Alternative Futures Capacity / Capability Enhancement Economic Factors Jeff Becker Option Papers United States

An Assessment of the Likely Roles of Artificial Intelligence and Machine Learning Systems in the Near Future

Ali Crawford has an M.A. from the Patterson School of Diplomacy and International Commerce where she focused on diplomacy, intelligence, cyber policy, and cyber warfare.  She tweets at @ali_craw.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Likely Roles of Artificial Intelligence and Machine Learning Systems in the Near Future

Date Originally Written:  May 25, 2018.

Date Originally Published:  July 16, 2018.

Summary:  While the U.S. Department of Defense (DoD) continues to experiment with Artificial Intelligence (AI) as part of its Third Offset Strategy, questions regarding levels of human participation, ethics, and legality remain.  Though a battlefield in the future will likely see autonomous decision-making technology as a norm, the transition between modern applications of artificial intelligence and potential applications will focus on incorporating human-machine teaming into existing frameworks.

Text:   In an essay titled Centaur Warfighting: The False Choice of Humans vs. Automation, author Paul Scharre concludes that the best warfighting systems will combine human and machine intelligence to create hybrid cognitive architectures that leverage the advantages of each[1].  There are three potential partnerships.  The first potential partnership pegs humans as essential operators, meaning AI cannot operate without its human counterpart.  The second potential partnership tasks humans as the moral agents who make value-based decisions which prevent or promote the use of AI in combat situations.  Finally, the third potential partnership, in which humans are fail-safes, give more operational authority to AI systems.  The human operator only interferes if the system malfunctions or fails.  Artificial intelligence, specifically autonomous weapons systems, are controversial technologies that have the capacity to greatly improve human efficiency while reducing potential human burdens.  But before the Department of Defense embraces intelligent weapons systems or programs with full autonomy, more human-machine partnerships to test to viability, legality, and ethical implications of artificial intelligence will likely occur.

To better understand why artificial intelligence is controversial, it is necessary to distinguish between the arguments for and against using AI with operational autonomy.  In 2015, prominent artificial intelligence experts, including Steven Hawking and Elon Musk, penned an open letter in which the potential benefits for AI are highlighted, but are not necessarily outweighed by the short-term questions of ethics and the applicability of law[2].  A system with an intelligent, decision-making brain does carry significant consequences.  What if the system targets civilians?  How does international law apply to a machine?  Will an intelligent machine respond to commands?  These are questions with which military and ethical theorists grapple.

For a more practical thought problem, consider the Moral Machine project from the Massachusetts Institute of Technology[3].  You, the judge, are presented with two dilemmas involving intelligent, self-driving cars.  The car encounters break failure and must decide what to do next.  If the car continues straight, it will strike and kill x number of men, women, children, elderly, or animals.  If the car does not swerve, it will crash into a barrier causing immediate deaths of the passengers who are also x number of men or women, children, or elderly.  Although you are the judge in Moral Machine, the simulation is indicative of ethical and moral dilemmas that may arise when employing artificial intelligence in, say, combat.  In these scenarios, the ethical theorist takes issue with the machine having the decision-making capacity to place value on human life, and to potentially make irreversible and damaging decisions.

Assuming autonomous weapons systems do have a place in the future of military operations, what would prelude them?  Realistically, human-machine teaming would be introduced before a fully-autonomous machine.  What exactly is human-machine teaming and why is it important when discussing the future of artificial intelligence?  To gain and maintain superiority in operational domains, both past and present, the United States has ensured that its conventional deterrents are powerful enough to dissuade great powers from going to war with the United States[4].  Thus, an offset strategy focuses on gaining advantages against enemy powers and capabilities.  Historically, the First Offset occurred in the early 1950s upon the introduction of tactical nuclear weapons.  The Second Offset manifested a little later, in the 1970s, with the implementation of precision-guided weapons after the Soviet Union gained nuclear parity with the United States[5].  The Third Offset, a relatively modern strategy, generally focuses on maintaining technological superiority among the world’s great powers.

Human-machine teaming is part of the Department of Defense’s Third Offset strategy, as is deep learning systems and cyber weaponry[6].  Machine learning systems relieve humans from a breadth of burdening tasks or augment operations to decrease potential risks to the lives of human fighters.  For example, in 2017 the DoD began working with an intelligent system called “Project Maven,” which uses deep learning technology to identify objects of interest from drone surveillance footage[7].  Terabytes of footage are collected each day from surveillance drones.  Human analysts spend significant amounts of time sifting through this data to identify objects of interest, and then they begin their analytical processes[8].  Project Maven’s deep-learning algorithm allows human analysts to spend more time practicing their craft to produce intelligence products and less time processing information.  Despite Google’s recent departure from the program, Project Maven will continue to operate[9].  Former Deputy Defense Secretary Bob Work established the Algorithmic Warfare Cross-Functional Team in early 2017 to work on Project Maven.  In the announcement, Work described artificial intelligence as necessary for strategic deterrence, noting “the [DoD] must integrate artificial intelligence and machine learning more effectively across operations to maintain advantages over increasingly capable adversaries and competitors[10].”

This article collectively refers to human-machine teaming as processes in which humans interact in some capacity with artificial intelligence.  However, human-machine teaming can transcend multiple technological fields and is not limited to just prerequisites of autonomous weaponry[11].  Human-robot teaming may begin to appear as in the immediate future given developments in robotics.  Boston Dynamics, a premier engineering and robotics company, is well-known for its videos of human- and animal-like robots completing everyday tasks.  Imagine a machine like BigDog working alongside human soldiers or rescue workers or even navigating inaccessible terrain[12].  These robots are not fully autonomous, yet the unique partnership between human and robot offers a new set of opportunities and challenges[13].

Before fully-autonomous systems or weapons have a place in combat, human-machine teams need to be assessed as successful and sustainable.  These teams have the potential to improve human performance, reduce risks to human counterparts, and expand national power – all goals of the Third Offset Strategy.  However, there are challenges to procuring and incorporating artificial intelligence.  The DoD will need to seek out deeper relationships with technological and engineering firms, not just defense contractors.

Using humans as moral agents and fail-safes allow the problem of ethical and lawful applicability to be tested while opening the debate on future use of autonomous systems.  Autonomous weapons will likely not see combat until these challenges, coupled with ethical and lawful considerations, are thoroughly regulated and tested.


Endnotes:

[1] Paul Scharre, Temp. Int’l & Comp. L.J., “Centaur Warfighting: The False Choice of Humans vs. Automation,” 2016, https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

[2] Daniel Dewey, Stuart Russell, Max Tegmark, “Research Priorities for Robust and Beneficial Artificial Intelligence,” 2015, https://futureoflife.org/data/documents/research_priorities.pdf?x20046

[3] Moral Machine, http://moralmachine.mit.edu/

[4] Cheryl Pellerin, Department of Defense, Defense Media Activity, “Work: Human-Machine Teaming Represents Defense Technology Future,” 8 November 2015, https://www.defense.gov/News/Article/Article/628154/work-human-machine-teaming-represents-defense-technology-future/

[5] Ibid.

[6] Katie Lange, DoDLive, “3rd Offset Strategy 101: What It Is, What the Tech Focuses Are,” 30 March 2016, http://www.dodlive.mil/2016/03/30/3rd-offset-strategy-101-what-it-is-what-the-tech-focuses-are/; and Mackenzie Eaglen, RealClearDefense, “What is the Third Offset Strategy?,” 15 February 2016, https://www.realcleardefense.com/articles/2016/02/16/what_is_the_third_offset_strategy_109034.html

[7] Cheryl Pellerin, Department of Defense News, Defense Media Activity, “Project Maven to Deploy Computer Algorithims to War Zone by Year’s End,” 21 July 2017, https://www.defense.gov/News/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/

[8] Tajha Chappellet-Lanier, “Pentagon’s Project Maven responds to criticism: ‘There will be those who will partner with us’” 1 May 2018, https://www.fedscoop.com/project-maven-artificial-intelligence-google/

[9] Tom Simonite, Wired, “Pentagon Will Expand AI Project Prompting Protests at Google,” 29 May 2018, https://www.wired.com/story/googles-contentious-pentagon-project-is-likely-to-expand/

[10] Cheryl Pellerin, Department of Defense, Defense Media Activity, “Project Maven to Deploy Computer Algorithims to War Zone by Year’s End,” 21 July 2017, https://www.defense.gov/News/Article/Article/1254719/project-maven-to-deploy-computer-algorithms-to-war-zone-by-years-end/

[11] Maj. Gen. Mick Ryan, Defense One, “How to Plan for the Coming Era of Human-Machine Teaming,” 25 April 2018, https://www.defenseone.com/ideas/2018/04/how-plan-coming-era-human-machine-teaming/147718/

[12] Boston Dynamic Big Dog Overview, March, 2010, https://www.youtube.com/watch?v=cNZPRsrwumQ

[13] Richard Priday, Wired, “What’s really going on in those Bostom Dynamics robot videos?,” 18 February 2018, http://www.wired.co.uk/article/boston-dynamics-robotics-roboticist-how-to-watch

Ali Crawford Alternative Futures Artificial Intelligence & Human-Machine Teaming Capacity / Capability Enhancement United Nations

Episode 0005: Mission Creep (The Smell of Victory Podcast by Divergent Options)

mission-creep-syria-iraq-war

Image: http://www.thesleuthjournal.com/us-mission-creep-syria-iraq/

What is mission creep?  What are some examples of mission creep?  What are some effects of mission creep?  Why does the military seem to bat clean up for the rest of the Executive Branch when national security problems rear their ugly heads?  Bob Hein and Steve Leonard discuss these issues and more on this episode of The Smell of Victory Podcast!

You can listen via Sticher by clicking here, or iTunes by clicking here. You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

The Smell of Victory Podcast by Divergent Options

Assessment of the Security and Political Threat Posed by a “Post-Putin” Russia in 2040

Sarah Martin is a recent graduate from George Mason University, where she received her Master of Science in Conflict Analysis and Resolution.  Her thesis examined the motivations of Chechen foreign fighters in Syria fighting for the Islamic State.  She can be found on Twitter @amerikitkatoreo.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Security and Political Threat Posed by a “Post-Putin” Russia in 2040

Date Originally Written:  June 5, 2018.

Date Originally Published:  July 9, 2018.

Summary:  In the upcoming decades, news feeds will probably continue to have a healthy stream of Russian meddling and Russian cyber attack articles.  However, a reliance on cyber attacks may be indicative of deeper issues that threaten Russia’s stability.

Text:  As Americans gear up for the midterm elections in November 2018, there have been a number of articles sounding the alarm on continuing disinformation campaigns from Russia[1].  Vulnerabilities exposed in 2016 have not been adequately addressed, and worse yet, the Kremlin is making their tools and methods more sophisticated, jumping even more steps ahead of policymakers and prosecutors[2].  However, in another 20 years, will the West be engaged in these same conversations, enmeshed in these same anxieties?

In short, yes.

In long—yes, but that might be an indicator of a much deeper problem.

Moscow has been deploying disinformation campaigns for decades, and when it knows the target population quite well, these operations can be quite successful.  Barring some kind of world-altering catastrophe, there is little doubt that Russia will stop or even slow their course.  Currently, disinformation stands as one of many tools the Russian Foreign Ministry can use to pursue its objectives.  However, there are political and economic trends within the country that might make meddling one of Russia’s only diplomatic tool.  Those trends are indicative of rather deep and dark issues that may contort the country to react in unpredictable ways, thus threatening its immediate neighbors, and spark trouble for the Transatlantic security apparatus.

Disinformation is a well-used tool in Russia’s foreign policy arsenal. Its current form is an inheritance from old Soviet tactics.  Under the Komitet Gosudarstvennoy Bezopasnosti (KGB), Service A was responsible for meddling in the West’s public discourse by muddying the waters and sowing discord between constituents, ultimately to affect their decisions at the polling booth[3].  These campaigns were known as “active measures.”  Some of America’s most popular conspiracy theories—like the U.S. Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI) having a role in the assassination of President John F. Kennedy—actually originated as a Service A disinformation campaign[4].  Russia has the institutional knowledge to keep the momentum rolling well into the future.

Not every campaign delivers a home run (see the French 2017 presidential elections).  However, Russia has the capability to learn, adapt, and change.  Perhaps the most appealing aspects of disinformation is its efficiency.  Cyber active measures also have the added benefit of being incredibly cost-effective.  A “regiment” of 1,000 operatives could cost as little as $300 million annually[5].

The economy is one of the trends that indicates a boggier underbelly of the Russian bear.  Russia may have to rely on its cyber capabilities, simply because it cannot afford more aggressive measures on the physical plane.

Russia, for all of its size, population and oil reserves, has no right having an economy smaller than South Korea’s[6].  Its economy is unhealthy, staggering and stagnating, showing no sign of any degree of sustained recovery.  That Russia is a petrostate is one factor for its economic weakness.  Politics—sanctions and counter-sanctions—also play a part in its weakness, though it is mostly self-inflicted.  However, each of these factors belies responsibility from the true culprit—corruption.  According to Transparency International, Russia is as corrupt as Honduras, Mexico and Kyrgyzstan[7].

Corruption in Russia isn’t simply a flaw to be identified and removed like a cancer; it is built into the very system itself[8].  Those who participate in corruption are rewarded handsomely with a seat at the political table and funds so slushie, you could find them at 7-11.  It is a corrupt system where the key players have no incentive of changing.  Everyone who plays benefits.  There has always been an element of corruption in Russia’s economy, especially during the Brezhnev years, but it only became systematic under Vladimir Putin[9].  Corruption will remain after Putin leaves the presidency, because he may leave the Kremlin, but he will never leave power.

Many Kremlin observers speculate that Putin will simply stay in politics after his final term officially ends[10].  If this does happen, taking into account that Putin is 65 years old, it is likely that he could reign for another 10-20 years.  Physically and practically then, Putinism may continue because its creator is still alive and active.  And even if Putin stepped back, the teeth of his policies are embedded so deeply within the establishment, that even with the most well-intentioned and capable executive leadership, it will take a long time to disentangle Putinism from domestic governance.

Another component of Putinism is how it approaches multilateralism.  Putinism has no ideology.  It is a methodology governed by ad hoc agreements and transactionalism.  Russia under Putinism seeks not to build coalitions or to develop friendships.  Russia under Putin is in pursuit of its former empire.  Nowhere is this pursuit more evident than with its Eurasian Economic Union.  While the European Union has its functional problems, it at least is trying to build a community of shared values. None of that exists in the EAEU[11].

Putinism, combined with a foreign policy designed to alienate potential allies and to disincentivize others from helping in times of crisis, connotes fundamental and systematic failures, that in turn, indicate weakness.  The tea leaves are muddy, but the signs for “weak” and “failing state” are starting to form, and weak states are erratic.

Weakness is what pressed Putin into Crimea and the Donbass in 2014, when the possibility of a Western-embracing Ukraine looked more probable than speculative.  Weakness is what pushed Russian troops into Georgia in 2008.  Russia had no other means of advancing their foreign policy objectives than by coercion and force.  One must wonder then what “Crimea, But Worse” might look like.

Russia will continue to use disinformation campaigns to pursue its foreign policy goals, and currently, this is one of many ways it can interact with other countries.  However, disinformation may be the only tool Moscow can afford to keep around.  This lack of other tools would indicate a rotting and faulty economic and political structure, which Russia currently has no incentive to change and may not have the ability to change after President Putin.  A sick Russia is already challenging for the world.  A failing Russia could be absolutely disastrous.


Endnotes:

[1] Rasmussen, A. F., & Chertoff, M. (2018, June 5). The West Still Isn’t Prepared to Stop Russia Meddling in Our Elections. Politico Magazine. Retrieved from https://www.politico.com/magazine/story/2018/06/05/russia-election-meddling-prepared-218594

[2] Ibid.

[3] Kramer, M. (2017, January 1). The Soviet Roots of Meddling in U.S. Politics. PONARS Eurasia. Retrieved from http://www.ponarseurasia.org/memo/soviet-roots-meddling-us-politics

[4] Ibid.

[5] Bergmann, M. & Kenney, C. (2017, June 6). War by Other Means. Center for American Progress. Retrieved from https://www.americanprogress.org/issues/security/reports/2017/06/06/433345/war-by-other-means/

[6] The World Bank. (2016). World Development Indicators. Retrieved from https://datacatalog.worldbank.org/dataset/gdp-ranking

[7] Transparency International. (2017). “Russia.” Corruption Perceptions Index 2017. Brussels. Retrieved from https://www.transparency.org/country/RUS

[8] Commission for Security and Cooperation in Europe (2017). In Brief: Corruption in Russia: An Overview. Washington, DC: Massaro, P., Newton, M. & Rousling, A. Retrieved from https://www.csce.gov/international-impact/publications/corruption-russia-overview

[9] Dawisha, K. (2015). Kleptocracy: Who Owns Russia? New York City.

[10] Troianovski, A. (2018, March 19). Putin’s reelection takes him one step closer to becoming Russian leader for life. The Washington Post. Retrieved from https://www.washingtonpost.com/world/europe/putins-reelection-takes-him-one-step-closer-to-becoming-russian-leader-for-life/2018/03/19/880cd0a2-2af7-11e8-8dc9-3b51e028b845_story.html

[11] Chatham House. (2018). The Eurasian Economic Union Deals, Rules and the Exercise of Power. London: Dragneva, R. & Wolczuk, K.

Alternative Futures Assessment Papers Russia Sarah Martin

Options to Manage the Risks of Integrating Artificial Intelligence into National Security and Critical Industry Organizations

Lee Clark is a cyber intelligence analyst.  He holds an MA in intelligence and international security from the University of Kentucky’s Patterson School.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  What are the potential risks of integrating artificial intelligence (AI) into national security and critical infrastructure organizations and potential options for mitigating these risks?

Date Originally Written:  May 19, 2018.

Date Originally Published:  July 2, 2018.

Author and / or Article Point of View:  The author is currently an intelligence professional focused on threats to critical infrastructure and the private sector.  This article will use the U.S. Department of Homeland Security’s definition of “critical infrastructure,” referring to 16 public and private sectors that are deemed vital to the U.S. economy and national functions.  The designated sectors include financial services, emergency response, food and agriculture, energy, government facilities, defense industry, transportation, critical manufacturing, communications, commercial facilities, chemical production, civil nuclear functions, dams, healthcare, information technology, and water/wastewater management[1].  This article will examine some broad options to mitigate some of the most prevalent non-technical risks of AI integration, including legal protections and contingency planning.

Background:  The benefits of incorporating AI into the daily functions of an organization are widely championed in both the private and public sectors.  The technology has the capability to revolutionize facets of government and private sector functions like record keeping, data management, and customer service, for better or worse.  Bringing AI into the workplace has significant risks on several fronts, including privacy/security of information, record keeping/institutional memory, and decision-making.  Additionally, the technology carries a risk of backlash over job losses as automation increases in the global economy, especially for more skilled labor.  The national security and critical industry spheres are not facing an existential threat, but these are risks that cannot be dismissed.

Significance:  Real world examples of these concerns have been reported in open source with clear implications for major corporations and national security organizations.  In terms of record keeping/surveillance related issues, one need only look to recent court cases in which authorities subpoenaed the records of an Amazon Alexa, an appliance that acts as a digital personal assistant via a rudimentary AI system.  This subpoena situation becomes especially concerning to users, given recent reports of Alexa’s being converted into spying tools[2].  Critical infrastructure organizations, especially defense, finance, and energy companies, exist within complex legal frameworks that involve international laws and security concerns, making legal protections of AI data all the more vital.

In the case of issues involving decision-making and information security, the dangers are no less severe.  AIs are susceptible to a variety of methods that seek to manipulate decision-making, including social engineering and, more specifically, disinformation efforts.  Perhaps the most evident case of social engineering against an AI is an instance in which Microsoft’s AI endorsed genocidal statements after a brief conversation with users on Twitter[3].  If it is possible to convince an AI to support genocide, it is not difficult to imagine the potential to convince it to divulge state secrets or turn over financial information with some key information fed in a meaningful sequence[4].  In another public instance, an Amazon Echo device recently recorded a private conversation in an owner’s home and sent the conversation to another user without requesting permission from the owner[5].  Similar instances are easy to foresee in a critical infrastructure organization such as a nuclear energy plant, in which an AI may send proprietary information to an uncleared user.

AI decisions also have the capacity to surprise developers and engineers tasked with maintenance, which could present problems of data recovery and control.  For instance, developers discovered that Facebook’s AI had begun writing a modified version of a coding language for efficiency, having essentially created its own code dialect, causing transparency concerns.  Losing the ability to examine and assess coding decisions presents problems for replicating processes and maintenance of a system[6].

AI integration into industry also carries a significant risk of backlash from workers.  Economists and labor scholars have been discussing the impacts of automation and AI on employment and labor in the global economy.  This discussion is not merely theoretical in nature, as evidenced by leaders of major tech companies making public remarks supporting basic income as automation will likely replace a significant portion of labor market in the coming decades[7].

Option #1:  Leaders in national security and critical infrastructure organizations work with internal legal teams to develop legal protections for organizations while lobbying for legislation to secure legal privileges for information stored by AI systems (perhaps resembling attorney-client privilege or spousal privileges).

Risk:  Legal teams may lack the technical knowledge to foresee some vulnerabilities related to AI.

Gain:  Option #1 proactively builds liability shields, protections, non-disclosure agreements, and other common legal tools to anticipate needs for AI-human interactions.

Option #2:  National security and critical infrastructure organizations build task forces to plan protocols and define a clear AI vision for organizations.

Risk:  In addition to common pitfalls of group work like bandwagoning and group think, this option is vulnerable to insider threats like sabotage or espionage attempts.  There is also a risk that such groups may develop plans that are too rigid or short-sighted to be adaptive in unforeseen emergencies.

Gain:  Task forces can develop strategies and contingency plans for when emergencies arise.  Such emergencies could include hacks, data breaches, sabotage by rogue insiders, technical/equipment failures, or side effects of actions taken by an AI in a system.

Option #3:  Organization leaders work with intelligence and information security professionals to try to make AI more resilient against hacker methods, including distributed denial-of-service attacks, social engineering, and crypto-mining.

Risk:  Potential to “over-secure” systems, resulting in loss of efficiency or overcomplicating maintenance processes.

Gain:  Reduced risk of hacks or other attacks from malicious actors outside of organizations.

Other Comments:  None.

Recommendation: None.


Endnotes:

[1] DHS. (2017, July 11). Critical Infrastructure Sectors. Retrieved May 28, 2018, from https://www.dhs.gov/critical-infrastructure-sectors

[2] Boughman, E. (2017, September 18). Is There an Echo in Here? What You Need to Consider About Privacy Protection. Retrieved May 19, 2018, from https://www.forbes.com/sites/forbeslegalcouncil/2017/09/18/is-there-an-echo-in-here-what-you-need-to-consider-about-privacy-protection/

[3] Price, R. (2016, March 24). Microsoft Is Deleting Its AI Chatbot’s Incredibly Racist Tweets. Retrieved May 19, 2018, from http://www.businessinsider.com/microsoft-deletes-racist-genocidal-tweets-from-ai-chatbot-tay-2016-3

[4] Osaba, O. A., & Welser, W., IV. (2017, December 06). The Risks of AI to Security and the Future of Work. Retrieved May 19, 2018, from https://www.rand.org/pubs/perspectives/PE237.html

[5] Shaban, H. (2018, May 24). An Amazon Echo recorded a family’s conversation, then sent it to a random person in their contacts, report says. Retrieved May 28, 2018, from https://www.washingtonpost.com/news/the-switch/wp/2018/05/24/an-amazon-echo-recorded-a-familys-conversation-then-sent-it-to-a-random-person-in-their-contacts-report-says/

[6] Bradley, T. (2017, July 31). Facebook AI Creates Its Own Language in Creepy Preview Of Our Potential Future. Retrieved May 19, 2018, from https://www.forbes.com/sites/tonybradley/2017/07/31/facebook-ai-creates-its-own-language-in-creepy-preview-of-our-potential-future/

[7] Kharpal, A. (2017, February 21). Tech CEOs Back Call for Basic Income as AI Job Losses Threaten Industry Backlash. Retrieved May 19, 2018, from https://www.cnbc.com/2017/02/21/technology-ceos-back-basic-income-as-ai-job-losses-threaten-industry-backlash.html

Critical Infrastructure Cyberspace Emerging Technology Lee Clark Option Papers Private Sector Resource Scarcity

Call for Papers: Cyberspace

Cyberspace_Wordle_Word_Cloud_1_2017_Jan

Image From Georgetown Law Library International and Foreign Cyberspace Law Research Guide / http://guides.ll.georgetown.edu/cyberspace

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for national security papers assessing situations or discussing options related to Cyberspace.  To inspire potential writers we suggest you read Paul Rosenzweig’s article “What Are The Important Cyber Conflict Questions (and Answers)?” featured on Lawfare.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by August 11th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

Call For Papers

Assessment of Al-Qaeda’s Enduring Threat Seven Years After Osama bin Laden’s Death

Tucker Berry is a rising graduate student at the Bush School of Government and Public Service, Texas A&M University.  He has conducted and briefed research on counterterrorism methods to the U.S. and three partner nations.  He has also spent time learning about the Arabic speaking Islamic world from within, in locations such as Oman, Jordan, the United Arab Emirates, and Morocco.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Al-Qaeda’s Enduring Threat Seven Years After Osama Bin Laden’s Death 

Date Originally Written:  April 26, 2018. 

Date Originally Published:  June 25, 2018. 

Summary:  A comparative analysis of al-Qaeda messaging from the Osama bin Laden-era to today demonstrates continuity. Such messaging indicates that al-Qaeda continues in the well-worn path of bin Ladenism, even with the seventh anniversary of his death, still adamantly focusing on the United States as enemy number one.

Text:  In 1996, bin Laden faxed an Arabic message from Afghanistan to newspapers titled in part, “Expel the Jews and Christians from the Arabian Peninsula[1].” Included in this message was a call for all Muslims to defend the Ummah, or the global Islamic community, from the United States. Bin Laden commanded, “Clearly after Belief there is no more important duty than pushing the American enemy out of the Holy land[2]…” Then, in 1998, bin Laden co-authored a fatwa, or Islamic legal ruling. This message demonstrates al-Qaeda’s anti-United States point of view, thereby framing the killing of Americans under bin Laden’s leadership as a legitimate strategic goal. 

Killing the Americans and their allies – civilians and military – is an individual duty for every Muslim who can carry it out in any country where it proves possible, in order to liberate Al-Aqsa Mosque and the holy sanctuary [Mecca] from their grip[3]…

A comparative analysis of messaging from the bin Laden era to that of the current al-Qaeda leadership demonstrates continuity. Just days after the death of bin Laden, al-Qaeda issued a formal response, which contained a steadfast reference to planning, plotting, and spilling the blood of Americans. Further fostering the analytical judgment that al-Qaeda maintains the strategic goal of striking any target deemed “American” is language pertaining to both temporality and endurance. If one listens to al-Qaeda, recognizing that in the past they told the world what they meant and meant what they said, this language demonstrates that al-Qaeda has absolutely no intention of replacing their black banner of terror with the white flag of surrender. Aiding analysis is a translated segment[4] of al-Qaeda’s 2011 Arabic response[5], released after the death of bin Laden.

[The death of bin Laden] will remain…a curse that haunts the Americans and their collaborators and pursues them outside and inside their country…their joy will turn to sorrow and their tears will mix with blood, and we will [realize] Sheikh Osama’s oath: America, and those who live in America, will not enjoy security until our people in Palestine do. The soldiers of Islam, together or as individuals, will continue to plot tirelessly and without desperation…until they are struck with a calamity that will make the hair of children turn white.

Reacting to bin Laden’s death, al-Qaeda wanted to demonstrate its perseverance. The tone and language of the response indicated that the death of bin Laden would not impede al-Qaeda. Furthermore, other sections highlight bin Laden’s “martyrdom.” Such language may inspire members to engage in martyrdom operations, paying a posthumous homage to their former leader. Though the death of bin Laden eliminated an unquestionably charismatic leader, the organization has demonstrated a patient commitment to continue harming the so-called far enemy, the United States. Bin Laden’s strong message still resonates loudly with his followers and the new leadership. 

Seven years after the death of bin Laden, the challenging question is now whether the new messengers can carry the same influence. Such a messenger is one of bin Laden’s sons, Hamza. Introduced as “the lion of jihad[6],” Hamza is following in the steps of his father, calling al-Qaeda adherents to attack the United States. In a message from Hamza, he orders, “Know that inflicting punishment on Jews and Crusaders where you are present is more vexing and severe for the enemy[7].” Hamza is calling for attacks wherever a fighter is. Such a call maintains, if not escalates, the threat to the United States in the form of inspired and low-intensity terrorist attacks. Therefore, even with the seventh anniversary of bin Laden’s death, Hamza continues in the well-worn path of his father. Hamza and al-Qaeda continue to perpetuate the legacy of bin Ladenism as first established in the 1996 and 1998 messaging, adamantly focusing on the United States as enemy number one.


Endnotes:

[1] Declaration of Jihad against the Americans Occupying the Land of the Two Holiest Sites, Arabic – Combating Terrorism Center at West Point. (n.d.). Retrieved from https://ctc.usma.edu/harmony-program/declaration-of-jihad-against-the-americans-occupying-the-land-of-the-two-holiest-sites-original-language-2/

[2] Declaration of Jihad against the Americans Occupying the Land of the Two Holiest Sites, English – Combating Terrorism Center at West Point. (n.d.). Retrieved from https://ctc.usma.edu/app/uploads/2013/10/Declaration-of-Jihad-against-the-Americans-Occupying-the-Land-of-the-Two-Holiest-Sites-Translation.pdf

[3] Usamah Bin-Muhammad Bin-Ladin, Ayman al-Zawahiri, Abu-Yasir Rifa’i Ahmad Taha, Shaykh Mir Hamzah, & Fazlur Rahman. (1998, February 23). Jihad Against Jews and Crusaders World Islamic Front Statement. Retrieved from https://fas.org/irp/world/para/docs/980223-fatwa.htm

[4] Al Qaeda statement confirming bin Laden’s death, English. (2011, May 6). Retrieved from https://www.reuters.com/article/us-binladen-qaeda-confirmation-text/text-al-qaeda-statement-confirming-bin-ladens-death-idUSTRE74563U20110506

[5] Al Qaeda statement confirming bin Laden’s death, Arabic. (2011, May 6). Retrieved from http://i2.cdn.turner.com/cnn/2011/images/05/06/aq_binladenmessage.pdf

[6] Riedel, B. (2016, July 29). The son speaks: Al-Qaida’s new face. Retrieved from https://www.brookings.edu/blog/markaz/2015/08/19/the-son-speaks-al-qaidas-new-face/

[7] Joscelyn, T. (2017, May 15). Hamza bin Laden offers ‘advice for martyrdom seekers in the West’. Retrieved from https://www.longwarjournal.org/archives/2017/05/hamza-bin-laden-offers-advice-for-martyrdom-seekers-in-the-west.php

Al-Qaeda Assessment Papers Tucker Berry Violent Extremism

An Assessment of Information Warfare as a Cybersecurity Issue

Justin Sherman is a sophomore at Duke University double-majoring in Computer Science and Political Science, focused on cybersecurity, cyberwarfare, and cyber governance. Justin conducts technical security research through Duke’s Computer Science Department; he conducts technology policy research through Duke’s Sanford School of Public Policy; and he’s a Cyber Researcher at a Department of Defense-backed, industry-intelligence-academia group at North Carolina State University focused on cyber and national security – through which he works with the U.S. defense and intelligence communities on issues of cybersecurity, cyber policy, and national cyber strategy. Justin is also a regular contributor to numerous industry blogs and policy journals.

Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years’ worth of experience in cybersecurity and IT project management. During his service in the Armed Forces, Anastasios was assigned to various key positions in national, NATO, and EU headquarters, and he’s been honored by numerous high-ranking officers for his expertise and professionalism, including a nomination as a certified NATO evaluator for information security. Anastasios currently works as an informatics instructor at AKMI Educational Institute, where his interests include exploring the human side of cybersecurity – psychology, public education, organizational training programs, and the effects of cultural, cognitive, and heuristic biases.

Paul Cobaugh is the Vice President of Narrative Strategies, a coalition of scholars and military professionals involved in the non-kinetic aspects of counter-terrorism, defeating violent extremism, irregular warfare, large-scale conflict mediation, and peace-building. Paul recently retired from a distinguished career in U.S. Special Operations Command, and his specialties include campaigns of influence and engagement with indigenous populations.

Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Information Warfare as a Cybersecurity Issue

Date Originally Written:  March 2, 2018.

Date Originally Published:  June 18, 2018.

Summary:  Information warfare is not new, but the evolution of cheap, accessible, and scalable cyber technologies enables it greatly.  The U.S. Department of Justice’s February 2018 indictment of the Internet Research Agency – one of the Russian groups behind disinformation in the 2016 American election – establishes that information warfare is not just a global problem from the national security and fact-checking perspectives; but a cybersecurity issue as well.

Text:  On February 16, 2018, U.S. Department of Justice Special Counsel Robert Mueller indicted 13 Russians for interfering in the 2016 United States presidential election [1]. Beyond the important legal and political ramifications of this event, this indictment should make one thing clear: information warfare is a cybersecurity issue.

It shouldn’t be surprising that Russia created fake social media profiles to spread disinformation on sites like Facebook.  This tactic had been demonstrated for some time, and the Russians have done this in numerous other countries as well[2].  Instead, what’s noteworthy about the investigation’s findings, is that Russian hackers also stole the identities of real American citizens to spread disinformation[3].  Whether the Russian hackers compromised accounts through technical hacking, social engineering, or other means, this technique proved remarkably effective; masquerading as American citizens lent significantly greater credibility to trolls (who purposely sow discord on the Internet) and bots (automated information-spreaders) that pushed Russian narratives.

Information warfare has traditionally been viewed as an issue of fact-checking or information filtering, which it certainly still is today.  Nonetheless, traditional information warfare was conducted before the advent of modern cyber technologies, which have greatly changed the ways in which information campaigns are executed.  Whereas historical campaigns took time to spread information and did so through in-person speeches or printed news articles, social media enables instantaneous, low-cost, and scalable access to the world’s populations, as does the simplicity of online blogging and information forgery (e.g., using software to manufacture false images).  Those looking to wage information warfare can do so with relative ease in today’s digital world.

The effectiveness of modern information warfare, then, is heavily dependent upon the security of these technologies and platforms – or, in many cases, the total lack thereof.  In this situation, the success of the Russian hackers was propelled by the average U.S. citizen’s ignorance of basic cyber “hygiene” rules, such as strong password creation.  If cybersecurity mechanisms hadn’t failed to keep these hackers out, Russian “agents of influence” would have gained access to far fewer legitimate social media profiles – making their overall campaign significantly less effective.

To be clear, this is not to blame the campaign’s effectiveness on specific end users; with over 100,000 Facebook accounts hacked every single day we can imagine it wouldn’t be difficult for any other country to use this same technique[4].  However, it’s important to understand the relevance of cybersecurity here. User access control, strong passwords, mandated multi-factor authentication, fraud detection, and identity theft prevention were just some of the cybersecurity best practices that failed to combat Russian disinformation just as much as fact-checking mechanisms or counter-narrative strategies.

These technical and behavioral failures didn’t just compromise the integrity of information, a pillar of cybersecurity; they also enabled the campaign to become incredibly more effective.  As the hackers planned to exploit the polarized election environment, access to American profiles made this far easier: by manipulating and distorting information to make it seem legitimate (i.e., opinions coming from actual Americans), these Russians undermined law enforcement operations, election processes, and more.  We are quick to ask: how much of this information was correct and how much of it wasn’t?  Who can tell whether the information originated from un-compromised, credible sources or from credible sources that have actually been hacked?

However, we should also consider another angle: what if the hackers hadn’t won access to those American profiles in the first place?  What if the hackers were forced to almost entirely use fraudulent accounts, which are prone to be detected by Facebook’s algorithms?  It is for these reasons that information warfare is so critical for cybersecurity, and why Russian information warfare campaigns of the past cannot be equally compared to the digital information wars of the modern era.

The global cybersecurity community can take an even greater, active role in addressing the account access component of disinformation.  Additionally, those working on information warfare and other narrative strategies could leverage cybersecurity for defensive operations.  Without a coordinated and integrated effort between these two sectors of the cyber and security communities, the inability to effectively combat disinformation will only continue as false information penetrates our social media feeds, news cycles, and overall public discourse.

More than ever, a demand signal is present to educate the world’s citizens on cyber risks and basic cyber “hygiene,” and to even mandate the use of multi-factor authentication, encrypted Internet connections, and other critical security features.  The security of social media and other mass-content-sharing platforms has become an information warfare issue, both within respective countries and across the planet as a whole.  When rhetoric and narrative can spread (or at least appear to spread) from within, the effectiveness of a campaign is amplified.  The cybersecurity angle of information warfare, in addition to the misinformation, disinformation, and rhetoric itself, will remain integral to effectively combating the propaganda and narrative campaigns of the modern age.


Endnotes:

[1] United States of America v. Internet Research Agency LLC, Case 1:18-cr-00032-DLF. Retrieved from https://www.justice.gov/file/1035477/download

[2] Wintour, P. (2017, September 5). West Failing to Tackle Russian Hacking and Fake News, Says Latvia. Retrieved from https://www.theguardian.com/world/2017/sep/05/west-failing-to-tackle-russian-hacking-and-fake-news-says-latvia

[3] Greenberg, A. (2018, February 16). Russian Trolls Stole Real US Identities to Hide in Plain Sight. Retrieved from https://www.wired.com/story/russian-trolls-identity-theft-mueller-indictment/

[4] Callahan, M. (2015, March 1). Big Brother 2.0: 160,000 Facebook Pages are Hacked a Day. Retrieved from https://nypost.com/2015/03/01/big-brother-2-0-160000-facebook-pages-are-hacked-a-day/

Anastasios Arampatzis Assessment Papers Cyberspace Information and Intelligence Information Systems Justin Sherman Paul Cobaugh Political Warfare Psychological Factors

Assessment of the Military Implication of Chinese Investment in the Port of Djibouti

David Mattingly serves on the board of directors for the Naval Intelligence Professionals and is also a member of the Military Writers Guild.  The views reflected are his own and do not represents the United States Government of any of its agencies.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Military Implication of Chinese Investment in the Port of Djibouti

Date Originally Written:  March 11, 2018.

Date Originally Published:  June 11, 2018.

Summary:  Since the 9/11 attacks, U.S. policy in Africa has focused primarily on defeating Al-Qaeda franchises and other violent extremists.  Djibouti’s natural deep-water harbor and stable government have made it the primary transshipment point for maritime trade in Northeastern Africa and as a naval base.  The People’s Republic of China’s (PRC) recent investment in the Port of Djibouti, a country with a U.S. military base, begins another chapter in geopolitical competition.

Text:  The U.S. has a standing requirement for overseas bases to support its global operations.  The U.S. Navy ship USS Cole was attacked in October 2000 in Yemen by Al Qaeda.  In 2003, the U.S. established Combined Joint Task Force-Horn of Africa (CJTF-HOA) on the French Army’s Camp Lemonnier in Djibouti, to support combat operations in Africa and the Arabian Peninsula.

In 2007, a reorganization of the U.S. military’s unified command structure created United States Africa Command (USAFRICOM) based in Germany.  In Djibouti, since the establishment of USAFRICOM, the CJTF-HOA mission has increased with the growth of al-Qaeda and other groups such as the Islamic State, the conflict in Libya and Yemen, and pirate attacks on merchant shipping in the region.  In addition to the U.S., Camp Lemonnier is used by France, Japan, and other North Atlantic Treaty Organization partners.

Djibouti’s growth as a transshipment port has increased with the global demand for containerized shipping[1].  Additionally, Africa depends on maritime shipping to carry 90% of its imports and exports.  France created the port of Djibouti in 1888 and it became the capital of French Somaliland in 1892.  Once established, the port of Djibouti quickly became an important refueling station and cargo storage facility for ships traversing the Red Sea to and from the Indian Ocean and the Mediterranean Sea via the Suez Canal.  During the closure of the Suez Canal (1967-1975) Djibouti suffered a severe decline in shipping volume.

Today, Djibouti is the linchpin to the PRC’s access to trade with Africa.  Business Tech’s 2015 assessment of African shipping ports states, “Djibouti’s is the only reliable port along the main shipping lanes between Europe and the Gulf and also between Asia on the eastern coast of Africa.” Additionally, Ethiopia lost its access to the sea during its war with Eritrea (1998-2000) and now relies on Djibouti as its transshipment access point.

In 2013, PRC President Xi Jinping, announced the resurgence of the ancient “Silk Road” which linked the PRC to markets in the Middle East and Europe and the idea was formalized in the Belt and Road Action Plan released in 2015.  This plan set out to improve trade relationships through infrastructure investments.  The PRC planned to invest $8 trillion for infrastructure in 68 countries which included Djibouti[2].  The port of Djibouti is critical to both the PRC’s African and European Roads. With the increasing demand for port services, the PRC negotiated to expand existing facilities, build new port facilities, and expand the inland transportation network of Djibouti and Ethiopia.  Due to the lack of natural resources, Djibouti depends on the revenue of its transportation facilities and a 2015 International Monetary Fund Report states “Diversifying [Djibouti’s] economic base remains difficult given that the country lacks natural resources and [its] agriculture and industrial sectors are almost non-existent[3].”

The PRC is the largest source of capital in Djibouti and has provided 40% of the financing for Djibouti’s major infrastructure projects.  Additionally, PRC-based firms built three of the largest projects in Djibouti and the PRC is the minority owners and operators of two of the three[4].

Since the emergence of the Somali pirate threat, the PRC has sought basing rights for the People’s Liberation Army (Navy) (PLA(N)) ships which joined in the international effort to protect shipping in the region.  The PRC’s interest in a navy base was born out of several ship engineering problems that developed while PLA(N) ships were deployed to the region and military ties had not been established between the PRC and Djibouti.  Although it was only speculated at the time, the PRC negotiated basing rights for the PLA(N) ships in a 2015 finance package and the base became active in September 2017.  The South China Morning Post reported, “The scale of the wharf should allow for the docking of a four-ship flotilla at least, including China’s new generation Type-901 supply ship with a displacement of more than 40,000 tons, destroyers and frigates, as well as amphibious assault ships for combat and humanitarian missions[5].”

The Trump administration released its 2017 National Security Strategy and though the administration appears to be aware of the situation in Djibouti stating, “China is expanding its economic and military presence in Africa, growing from a small investor in the continent two decades ago into Africa’s largest trading partner today,” the strategy lacks any concrete steps describing how U.S. diplomacy should proceed in the region.

An analysis of U.S. soft power in the Trump administration was recently published in Foreign Policy by Max Boot.  The article notes a recent Gallup Poll of “approval of U.S. leadership across 134 countries and areas stands at a new low of 30%.”  While the PRC is leveraging its economic power to enhance its military position, Boot opines that Trump’s America First campaign has resulted in the declining global opinion of the U.S. which in the long-term may result in a global environment more hostile to U.S. interests.

In a recent Wall Street Journal article, Henry Kissinger was quoted regarding trends and events that emerged from the Cold War and concludes, “…the rise of India and China is more important than the fall of the Soviet Union[6].”  The U.S. and PRC competition in Djibouti is only the beginning.  While both nations assess each others military forces in Djibouti, other instruments of national power are at work both in Djibouti and elsewhere on the continent.  The U.S. and PRC competition in Africa will likely expand, and be worthy of monitoring over the coming decades.


Endnotes:

[1] Africa’s biggest shipping ports. (2015, March 8). Business Techhttps://businesstech.co.za/news/general/81995/africas-biggest-shipping-ports/

[2] Bruce-Lockhart, Anna. China’s $900 billion New Silk Road. What you need to know. World Economic Forum, June 26, 2017 https://www.weforum.org/agenda/2017/06/china-new-silk-road-explainer/

[3] Djibouti Selected Subjects. International Monetary Fund. November 18, 2015 https://www.imf.org/external/pubs/ft/scr/2016/cr16249.pdf

[4] Downs Erica, and Jeffrey Becker, and Patrick deGategno. China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of Chinas First Overseas Base. The CNA Corporation, July 2017. https://www.cna.org/CNA_files/PDF/DIM-2017-U-015308-Final2.pdf

[5] Chan, Minnie. (2017, September 27). China plans to build Djibouti facility to allow naval flotilla to dock at first overseas base. South China Morning Post. http://www.scmp.com/news/china/diplomacy-defence/article/2112926/china-plans-build-djibouti-facility-allow-naval

[6] Mead, W. R. (2018, February 5). A word from Henry Kissinger. Wall Street Journal. Retrieved February 6, 2018, from https://www.wsj.com/articles/a-word-from-henry-kissinger-1517876551

Africa Assessment Papers China (People's Republic of China) David Mattingly Djibouti United States

Assessing How Article 51 of the United Nations Charter Prevents Conflict Escalation

Jared Zimmerman is an M.A. candidate at American University’s School of International Service where he is studying United States Foreign Policy and National Security with a concentration in terrorism and political violence.  He can be found on Twitter @jaredezimmerman.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing How Article 51 of the United Nations Charter Prevents Conflict Escalation

Date Originally Written:  March 8, 2018

Date Originally Published:  June 4, 2018.

Summary:  Article 51 of the United Nations Charter is sufficiently vague to allow states to assert their right to self-defense without escalating a conflict. While either side in a conflict may see the other as the aggressor acting beyond mere self-defense, Article 51 is vague enough that neither side can prove the other has acted offensively. This vagueness can aid in, if not the de-escalation of conflicts, preventing the rapid escalation of conflicts.

Text:  The first sentence of Article 51 of Chapter 7 of the United Nations Charter reads as follows:

Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security[1].

This sentence is particularly vague on the following points:

  1. It does not define what constitutes an attack. Is the seizure of ships or aircraft an attack? Is the accidental or intentional violation of another country’s airspace an attack? Is industrial espionage an attack? Is a spy satellite taking photographs of military installations an attack?
  2. It does not define what constitutes an armed attack. For example, is a cyber attack an armed attack?
  3. It does not define “collective self-defence.” Does the attacked nation need to request assistance or can other nations preemptively intervene and claim their intervention constitutes collective self-defense? Requiring the attacked nation to request assistance might seem like the most responsible position, but this requires that the United Nations Security Council determine who the original aggressor and defender are. This determination may not be possible or delivered in a timely manner.
  4. The phrase “…until the Security Council has taken measures necessary to maintain international peace and security” begs several questions. What if the Security Council does nothing? What if the Security Council does act, but these actions are not sufficient to resolve the conflict? What constitutes a resolution and who decides whether a resolution is satisfactory?
  5. The phrase: “international peace and security” also begs several questions. What is international peace and security? Was the world at peace during the Cold War? Is the world not at peace when great powers are not in conflict but relatively small regional or civil wars are ongoing? Is the world at peace when there is no open conflict between states but despots murder and oppress their own people?

It is apparent from the questions in the preceding paragraphs that the first sentence of Article 51 is exceedingly vague. Opposed parties in a real-world conflict are certain to interpret portions of the sentence in their own best interest, and these interpretations could be wildly different yet equally valid[2]. But this begs the question, does this vagueness expand and escalate conflicts or limit and de-escalate them?

On the surface it might appear that a more explicit Article 51 is to be desired. If it was clear to states what actions constitute an armed attack and what circumstances allow for collective self-defense, perhaps states would judiciously aim to abide by these rules lest they risk United Nations’ intervention. There are several problems with this approach:

  1. It would be impossible to explicitly account for all types of armed attacks, not simply because of the variety that exists today, but because new types are continually being invented. For example, the authors of the United Nations Charter could hardly have conceived of cyber warfare in 1945.
  2. States are ingenious and will always find new ways to circumvent—or even outright ignore—any explicit rules that are laid out.
  3. If a state realizes it must break one explicit rule to advance its agenda, why not break more? If the United Nations Security Council does not intervene when one rule is broken, will it if two are broken? Three? Four? States will test how far they can push the boundaries because it is advantageous to do so.

Is it possible, however, that having a vague Article 51 is advantageous? The world is not rigid, so would it be beneficial to have a rigid Article 51? Given the reasons above, a rigid Article 51 is certainly not practical. Let us take the Iranian drone shot down by the Israeli Defense Force in February 2018 as an example of the advantages of a vague Article 51.

On February 10th, 2018 an Iranian drone entered Israeli airspace and was shot down by an Israeli helicopter. The Israeli Defense Force followed up by attacking what they believed to be the “drone launch components in Syrian territory[3].” Later, Israeli Air Force (IAF) aircraft attacked 12 targets in Syria, including a mix of Syrian and Iranian military targets. “During the attack, multiple anti-aircraft missiles were fired at IAF aircraft. The two pilots of an F-16 jet ejected from the aircraft as per procedure, one of whom was seriously injured and taken to the hospital for medical treatment[4].”

To summarize, Iranians in Syria used a drone to violate Israeli airspace. The Israelis responded by destroying the drone and the drone’s launch structures in Syria. The Israelis then violated Syrian airspace to attack Syrian and Iranian infrastructure. While doing so, one of their F-16’s was shot down and one of its crew was wounded. All of this has occurred, yet Iran and Israel have not declared war in response.

Incidents like this are so common that it is easy to overlook the miraculous fact that while such incidents are not “peaceful,” the world does not face open war in response to each of them. There are certainly a variety of reasons for this lack of open war that can be unique to each situation such as level-headed leaders on either side, mutually assured destruction, war-weary populations, etc. One compelling reason that many share, however, is that each side can claim it was acting in self-defense while not being able to convince the international community and United Nations Security Council that this is true. In this above example, Israel could claim that it was attacked when the Iranian drone entered its airspace so its response was in self-defense. Iran and Syria could claim that their drone was unarmed and entered Israeli airspace accidentally. Israel then attacked them and they downed an Israeli aircraft in self-defense. This familiar dance occurs in other comparable situations: opposing sides take limited aggressive actions towards each other but generally stop short of open war. Article 51 doesn’t eliminate conflict, but prevents it from escalating or at least escalating quickly.


Endnotes:

[1] United Nations. (n.d.). Charter of the United Nations: Chapter VII. Retrieved February 27, 2018, from http://www.un.org/en/sections/un-charter/chapter-vii/

[2] Glennon, M. (2018, February 13). ILO L201: Public International Law [Class discussion]. The Fletcher School of Law and Diplomacy at Tufts University, Medford, Massachusetts, U.S.

[3] IDF intercepts Iranian UAV. (2018, February 10). Retrieved February 28, 2018, from https://www.idf.il/en/minisites/press-releases/idf-intercepts-iranian-uav/

[4] IDF intercepts Iranian UAV. (2018, February 10). Retrieved February 28, 2018, from https://www.idf.il/en/minisites/press-releases/idf-intercepts-iranian-uav/

Assessment Papers Governing Documents Jared Zimmerman United Nations

Episode 0004: Guest Kori Schake (The Smell of Victory Podcast by Divergent Options)

9M2vSSDs

w2JhNmCf

In this episode of The Smell of Victory Podcast Bob Hein and Steve Leonard interview Dr. Kori Schake the Deputy Director-General of the International Institute for Strategic Studies regarding her newest book “Safe Passage: The Transition from British to American Hegemony.”  We then wander into other potential hegemonic shifts of the future, (is there potential for an Indian hegemony?), what can be done to secure American hegemony for the future, interpreting the end of August Cole and Peter Singer’s novel “Ghost Fleet,” why Kori writes, her time raising cows in California, and how to improve the State Department.

You can listen via Sticher by clicking here, or iTunes by clicking here. You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

The Smell of Victory Podcast by Divergent Options

The Conflict of a New Home: African Migrants and the Push/Pull Factors during Acculturation

Linn Pitts spent a decade in law enforcement prior to transitioning into teaching on a university level.  He presently teaches as an Assistant Professor in the Social Science Department at Shorter University.  He can be found on Twitter @Professor_Pitts and is writing a dissertation on gatekeepers in Countering Violent Extremism programs in the United States.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title: The Conflict of a New Home: African Migrants and the Push/Pull Factors during Acculturation

Date Originally Written:  February 13, 2018.

Date Originally Published:  May 28, 2018.

Summary:  Whether migrant has voluntarily relocated to the US from a country in turmoil or a refugee being resettled to the US, the individual may still face factors that pull them towards the conflict of their homeland and may push them from full acculturation in their new society.

Text:  While it is important for the U.S. to have good foreign policies that are able to help address turmoil in African countries, equally important is the posture taken by entities in the U.S. towards migrants that may have moved or been displaced. According to Boyle and Ali [1] the general theories of migration include three broad categories concerning acculturation (the process of social, psychological, and cultural change that stems from blending between cultures) at the end of the migrant’s journey. The categories include group dynamics, reception of the new society, and the nature of the exit from their home country. All of these categories serve as excellent assessment points for developing an understanding of the issues faced by migrants. For the purposes of this assessment, the primary focus is group dynamics and the reception of a new society. If policy makers understand the nuances of group dynamics and the reception possibilities of a new society, they will be better prepared to provide good governance.

Group dynamics include cultural aspects and family dynamics illustrated by interactions within extended families and communities. These group dynamics can be problematic as Boyle and Ali explain as family structures are impacted by what U.S. law has deemed a family such as the exclusion of polygamy, the allowance of only nuclear family members to migrate as a group, and the lack of elder support in their transplanted home. Boyle and Ali further indicate that conflicts from their home countries have already broken some families apart. Each migratory situation will vary depending on the state of being a migrant or a refugee as noted by Bigelow [2]. Boyle and Ali further specified that the loss of extended family members severely impact the migrant families such as limiting child care and a lack of traditional family roles. In seeking to properly conceptualize these aspects, a purposeful interview was conducted with a migrant. In personal communications with Mia (pseudonym), she noted her family moved to the U.S. when she was approximately eight years of age and she is now 21 years of age. The relocation to the U.S. was prompted by tribal conflicts that limited opportunities in her home country in Central Africa. She confirmed that since arriving in the U.S., the lack of extended family was problematic, especially regarding the roles her parents once held in their home country. In general, these issues would categorically further migrant reliance on state resources such as outside parties to resolve disputes and the social service programs.

The reception of the new society as noted by Boyle and Ali entails a period of adaptation and sometimes it is a struggle due to the removal of family support. Whereas dependence on social service programs may provide time for adaptation and development of social capital, it may not completely replace the extended family. Mia stated she found it difficult to acculturate due to bullying, issues with racial identity, and struggles adapting academically primarily based on differences in English, a point supported by Bigelow. Mia was bullied by African-American children in part due to misperceptions, “African-Americans view (sic) Africans as savages, uneducated, and poor,” Mia remarked. Continuing, she said “often time I do not see myself as black but as African.” It is an interesting concept supported by the work of Bigelow revealing migrant parents of Somali youth were concerned about the perceptions of the interactions with African-American children, especially if their children are viewed as unruly. Mia noted the parental views had merit concerning an understanding of the difficult transitions to life in the United States. While Central African and Horn of African nations are distinct entities in different regions of the Africa, Mia described the cultural contexts as “that’s just African,” She found friendship with children who had relocated from Kenya and Nigeria. Bigelow noted that the migrant children are living in two worlds, their world at home and their world at school. This two-world construct was also supported by Zhou [3] in a discussion of cultural identity and the impact on children of migrants.

Another point of reception in a new society deals with the aspects of understanding local laws during a period of acculturation. The transition can be aided by groups and religious organizations seeking to aid in the transition to the U.S. While recent arrests and later convictions of Minnesota-based Somalis seeking to join the Islamic State captured headlines, consider efforts of municipal agencies in Minnesota [4] and Clarkston, Georgia located on the outskirts metro-Atlanta. According to David (personal communications), a missionary in Clarkston, the city was chosen to be a refugee resettlement area in the 1990s. He noted the area was a prime location for refugee resettlement due to the high degree of apartment complexes (near 80%), featured a low-cost of living, it was close proximity to a major airport, and it had a public transit available to Atlanta. Moreover, he detailed that Time Magazine deemed this portion of Clarkston as the most diverse square mile in the U.S. As an example, approximately 100 languages were spoken at Indian Creek Elementary School in Clarkston. When asked about the Somali population, David stated it was previously the largest migrant population in Clarkston but population dynamics recently shifted due to the Myanmar Crisis. Clarkston is a success because people who come to the U.S. as a result of U.S. asylum and refugee resettlement programs not only have a place to settle, but that place has many features which, according to Salehyan and Gleditsch [5], can help minimize tensions during acculturation. Clarkston, through its ability to make acculturation smoother, allows grievances to be addressed early so they do not lead migrants down extremist pathways.

Regarding grievances and tensions, Somalis, like most inhabitants of developing countries, have a legacy of distrust with the police [6] an aspect intensified by recent efforts of U.S. Immigration and Customs Enforcement officials [7]. Boyle and Ali found Somali men feel persecuted in the United States by law enforcement mainly due to enforcement of laws such as domestic violence. Whereas in Somalia, the family elder may intervene to address problems, due to aforementioned issues the elders are not present. Law enforcement officers have a great deal of discretion in their daily activities, unless arrest is mandated by statute such as domestic violence. Even if law enforcement acts in good faith with the intent of upholding the law, issues could still arise. Weine, Eisenman, Kinsler, Glik, and Polutnik [8] identified that law enforcement may create resentment and ultimately diminish cooperation from communities if these communities are policed in a way seen as culturally incompatible. Weine, Eisenman, Kinsler, Glik, and Polutnik suggested a community health approach. This approach was indirectly supported by Boyle and Ali in their examination and later assessed by Cummings, Kamaboakai, Kapil, and Stone. In closing, while generous U.S. policies enable migrants to come to the U.S., unless the location where they finally arrive is prepared to receive them, and local capabilities are ready to provide close and continuing support during acculturation, the migrant will likely continue to face a friction-filled existence. This existence may make the migrant feel pulled back home and simultaneously pushed into a new society which they do not understand.


Endnotes:

[1] Boyle, E.H., & Ali, A. (2010). Culture, structure, and the refugee experience in Somali immigrant family transformation. International Migration, 48(1), 47-79.

[2] Bigelow, M. (2010). Mogadishu on the Mississippi: Language, racialized identity, and education in a new land. New York: Wiley-Blackwell.

[3] Zhou, M. (2003). Growing Up American: The challenge confronting immigrant children and children of immigrants. Annual Review of Sociology. 23. 63-95. 10.1146/annurev.soc.23.1.63.

[4] Cumings, P., Kamaboakai, E. T., Kapil, A., & Stone, C. (2016). A Growing Community: Helping Grand Forks increase inclusion of new Americans.

[5] Salehyan, I., & Gleditsch, K. S. (2006). Refugees and the spread of civil war. International Organization, 60, 335-366.

[6] Haugen, G. A., & Boutros, V. (2015). The locust effect: Why the end of poverty requires the end of violence. Oxford University Press.

[7] Redmond, J. (2017, April 13). Immigration arrests target Somalis in Atlanta area. Atlanta Journal Constitutional. Retrieved from https://www.ajc.com/news/immigration-arrests-target-somalis-atlanta-area/uYatzrGTOkEGWuwocYmReJ/

[8] Weine, S., Eisenman, D. P., Kinsler, J., Glik, D. C., & Polutnik, C. (2017). Addressing violent extremism as public health policy and practice. Behavioral sciences of terrorism and political aggression, 9(3), 208-221.

Africa Assessment Papers Linn Pitts Migrants United States

Options for U.S. Naval Force Posture in East Africa

Matt Hein is a U.S. Navy Surface Warfare Officer currently studying for his Masters in Security Studies at Georgetown University.  He can be found on Twitter @Matt_TB_Hein.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Low intensity maritime conflict and engagement in Eastern Africa.

Date Originally Written:  February 11, 2018.

Date Originally Published:  May 21, 2018.

Author and / or Article Point of View:  This article addresses U.S. naval force posture options in East Africa and the implications for a resource-constrained force.

Background:  Demands for counter-piracy operations, countering maritime human smuggling, countering the growth of violent extremism in Sub-Saharan African countries, and partner nation capacity building require the constant presence of U.S. naval forces in East African littoral zones.  Friction arises when high-end combatants such as aircraft carriers and destroyers divert from their East African littoral mission to the nearby Persian Gulf and Mediterranean Sea to conduct other missions.

Significance:  U.S. naval presence in East Africa has improved maritime security and facilitated operations on land.  Coalition efforts reduced piracy incidents from 237 attempted hijackings in 2011 to only three such attempts in 2017[1].  Joint exercises, such as Cutlass Express, have developed partner nation maritime law enforcement capacity[2].  Intelligence gathering from sea based platforms has enabled multiple U.S. military missions ashore[3].  Increasing demand for high-end combatants in the Persian Gulf and Mediterranean Sea leaves the East African littoral mission vulnerable to having its gains reversed and questions the utility of those ships for low intensity missions.  Enhanced naval presence from the People’s Republic of China (PRC) in the region, most notably the establishment of a port facility in Djibouti, further complicates force posture decision-making.   Despite the incredible gains realized for maritime security in the region, there is a demand signal for deliberate planning to match appropriate naval assets with a growing range of regional needs.

Option #1:  The U.S. maintains its current naval force posture for the East Africa littoral mission.

Risk:  Current naval force posture rotates multiple Expeditionary Strike Groups and Carrier Strike Groups through the region annually, in addition to several independent deployers dispatched for counter-piracy operations[4].  The opportunity cost of these deployments is enormous.  These ships were designed for much more complex operating environments and can often be better utilized in those environments.  Using multi-billion dollar warships for low intensity engagement not only limits the utility of these ship’s advanced combat systems but also inflates the likelihood they will be diverted to other specialized missions such as ballistic missile defense or integrated air defense.

Gain:  The existing force posture is responsible for enhanced maritime security already realized in the region.  While expanding threats may challenge the ability to maintain these gains, this hasn’t happened to the extent that a dramatic rise in piracy or a drop in partner nation capacity has occurred.  Further, the historical integration and corporate knowledge of U.S. ships deploying to the theater gives them an inherent advantage for conducting these types of operations.

Option #2:  The U.S. forward deploys two Littoral Combat Ships (LCS) to Djibouti Naval Base.

Risk:  Forward-deploying the LCS is expensive and would require a large logistics and maintenance footprint in Djibouti.  Maintenance issues have plagued the LCS and will be exacerbated by a remote maintenance infrastructure with little experience.  Maintenance issues are compounded by difficult crew rotation schedules that have already hampered a similar forward deployment of LCS to Singapore[5].  The probability that forward deployed LCS will provide a persistent capability for the East Africa littoral mission is limited significantly by these LCS-wide problems.

Gain:  The LCS surface warfare mission package is uniquely suited for the East Africa littoral mission.  The LCS uses a combination of high speeds and shallow draft to operate aviation facilities, dedicated boarding teams, and anti-surface capabilities in littoral environments[6].  These attributes make the LCS ideal for intelligence gathering, capacity building, and counter-piracy missions.  Additionally, the use of LCS allows the multi-billion dollar warships currently conducting these missions to operate in more contested environments and across a broader swath of missions in the Red Sea and Persian Gulf.   Option #2 also builds on the surge of LCS in similar mission sets from counter-drug operations in the Caribbean to fisheries patrols and bilateral engagements in Southeast Asia.

Option #3:  The U.S. decreases its naval presence in East Africa.

Risk:  The construction of the PRC naval base in Djibouti means the gap in activity from the U.S. Navy would likely be filled, at least in part, by a PRC presence.  The construction of a military docking facility, capable of berthing most People’s Liberation Army (Navy) ships, means previous PRC task forces deployed to the region could become a permanent fixture[7].  As foreign investment pours into East Africa, a reduced naval presence could cause countries such as Tanzania, Kenya, and Somalia to turn elsewhere for maritime security support of their burgeoning economies.  Option #3 could further challenge the efficacy of counter-extremist efforts on land that require logistical and intelligence support from offshore assets.

Gain:  Decreasing U.S. naval presence does not mean disavowing the East Africa littoral mission entirely.  A P-3 squadron forward-deployed to Djibouti naval base combined with transiting strike groups still leaves intermittent capacity in the region to continue to support the East Africa littoral mission.  Option #3 also eliminates the requirements of keeping ships off the coast of Djibouti.  Not having to keep ships off Djibouti would allow a refocus towards heightened Iranian tensions, threats from Houthi rebels in Yemen, or even relocation to the Pacific fleet operating area in support of growing requirements.

Other Comments:  The Surface Navy Strategic Readiness Review, released in December 2017, stated that increasing readiness “require(s) a variety of naval assets and capabilities tailored to best achieve desired results[8].”  Shifting from a “demand” to “supply” model for naval surface forces means capabilities must be optimized against the mission with which they are tasked.  The options presented in this paper are three examples, of many, for shifting to a supply-based model for naval assets without sacrificing the East Africa littoral mission.

Recommendation:   None.


Endnotes:

[1] Sow, M. (2017, April 12). Figures of the week: Piracy and Illegal Fishing in Somalia. Africa in Focus.Retrieved February 9, 2018. https://www.brookings.edu/blog/africa-in-focus/2017/04/12/figures-of-the-week-piracy-and-illegal-fishing-in-somalia/

[2] Williams, F. (2018, February 7), Exercise Cutlass Express 2018 Closes. Retrieved February 10, 2018. http://www.c6f.navy.mil/news/exercise-cutlass-express-2018-closes

[3] Eckstein, M. (2017, July 5).Textron’s Aerosonde Small Unmanned Aerial Vehicle Eligible for Navy Sea-Based ISR. United States Naval Institute News. Retrieved February 10, 2018. https://news.usni.org/2017/07/05/textrons-aerosonde-small-unmanned-aerial-vehicle-eligible-navy-sea-based-isr

[4] Defense Media Activity for U.S. Navy Office of Information. Navy Versus Piracy  #PresenceMatters. Retrieved February 10, 2018 from http://www.navy.mil/ah_online/antipiracy/index.html

[5] Lartner, D. (2017, February 20) LCS crew marooned in Singapore on open-ended
deployment. Navy Times. Retrieved February 9, 2018 from https://www.navytimes.com/news/your-navy/2017/02/20/lcs-crew-marooned-in-singapore-on-an-open-ended-deployment/

[6] United States Navy Chief of Information. Fact File: Littoral Combat Ships – Surface Warfare Mission Package. Retrieved February 10, 2018 from http://www.navy.mil/navydata/fact_display.asp?cid=2100&tid=437&ct=2.

[7] Chan, M (2017, September 17) China plans to build Djibouti facility to allow naval flotilla to dock at first overseas base. South China Morning Post. Retrieved February 9, 2018 from http://www.scmp.com/news/china/diplomacy-defence/article/2112926/china-plans-build-djibouti-facility-allow-naval

[8] Bayer, M. Roughead, G. (2017, December 4) United States Navy Strategic Readiness
Review. Pg.20. Retrieved February 11, 2018 from http://s3.amazonaws.com/CHINFO/
SRR+Final+12112017.pdf

Africa China (People's Republic of China) Djibouti East Africa Horn of Africa Maritime Matt Hein Option Papers United States

Assessment of Opération Turquoise: The Paradoxical French-led Humanitarian Military Intervention During the 1994 Genocide in Rwanda

Ross Conroy is a researcher and program designer for Komaza Kenya, a social enterprise focused on poverty reduction through sustainable timber production.  Ross also serves as Public Relations advisor for Sudan Facts, a start-up which intends to build investigative journalistic capacity in Sudan.  Ross studied Political Science at the University of New Hampshire, and wrote his capstone on the French military intervention during the Rwandan Genocide.  He spent most of his senior year in Rwanda doing field and archival research to supplement this study.  Ross later attained his Master’s degree in African Studies from Stanford University, where he focused on politics in Central Africa and continued his research on French involvement during the 1994 Genocide.  Ross can be found on Twitter @rossconroy or at rconroy7@outlook.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Opération Turquoise: The Paradoxical French-led Humanitarian Military Intervention During the 1994 Genocide in Rwanda

Date Originally Written:  February 12, 2018.

Date Originally Published:  May 14, 2018.

Summary:   In response to escalating genocidal violence in Rwanda in April 1994, France launched Opération Turquoise for ostensibly humanitarian purposes.  However, much evidence has implicated this mission, and France, in the genocide and subsequent violence.  By examining archives, interviewing genocide survivors, and compiling testimonies of French soldiers, a more clear, and far more sinister, picture of Opération Turquoise emerges.

Text:  The French-led Opération Turquoise, mobilized by the United Nations (UN) Security Council through Resolution 929, was controversial from its genesis.  The debate leading up to the final vote on the resolution was riddled with arguments about France’s true intentions.  Having been the main sponsors of the Hutu regime that was now organizing and perpetrating genocide against the Tutsi minority, an abrupt change in France’s policy was viewed with suspicion.  Publicly, France argued that violence in Rwanda had escalated to the point that it necessitated international intervention on humanitarian grounds.  The wording of the resolution seemed to confirm this, stating that the mission was “aimed at contributing, in an impartial way, to the security and protection of displaced persons, refugees and civilians at risk in Rwanda[1].”  However, due to concerns over France’s intentions, and the proposed departure from the Chapter VI mandate of the United Nations Assistance Mission for Rwanda (UNAMIR) and UNAMIR II, five countries abstained from the final vote[2].  Rather than supplying and funding the existing UNAMIR mission, France wanted a Chapter VII mandate over which they had near complete jurisdiction.  When the mission was eventually condoned by the Security Council, France mobilized their force and, as some countries had feared, used it to promote their interests.  Rather than protecting Tutsis from the genocidal regime, Opération Turquoise was co-opted to allow the perpetrators to continue their campaign of violence and eventually escape the Rwandan Patriotic Front (RPF) advance by fleeing into neighboring Zaire[3].  The results of this would prove disastrous.

The origins of Opération Turquoise were rooted in the close ties between then French President François Mitterrand and his Rwandan counterpart Juvénal Habyarimana.  The Technical Military Assistance Agreement signed between the two countries after Habyarimana came to power in the 1970s solidified this relationship by formally incorporating Rwanda into the linguistic and cultural sphere of la francophonie and promising economic aid and military protection[4].  Following this agreement, military aid was passed for decades to the Rwandan army and its militias directly through the Quai D’Orsay, the French Ministry of Foreign Affairs.  These same weapons were later put to use exterminating the Tutsi minority.

In October 1990, Rwanda was invaded by Rwandese rebels from Uganda who wanted a return to their country of origin.  Due to xenophobic policies of the Rwandan regime, these Rwandese rebels had long been denied this opportunity.  The French, fearing an incursion from what they saw as ‘the anglophone bloc,’ rushed to the aid of their francophone ally.  The rhetoric of French politicians at the time indicated that the Fashoda Syndrome, the inherent French fear of francophone influence being supplanted by anglophone influence, motivated France to support the Rwandan regime, and solidified ties between the two countries further[5].

After the assassination of President Habyarimana in April 1994, it quickly became clear that the violence engulfing Rwanda was of an unspeakable magnitude; a genocide was unfolding.  Despite this, France declined to act, not wishing to aid the RPF in the fight against their erstwhile ally, the Rwandan regime.  As it became clear that the Rwandan government was failing in its fight against the RPF, France chose to intervene under the guise of a much-needed humanitarian mission.  The UN had little choice, given the dearth of alternatives, and accepted the French offer of assistance.

The French originally conceived the mission as a means to halt the advance of the RPF militarily and assist the government of Rwanda in retaking the capital, Kigali[6].  However, it soon became evident that this position was untenable as the evidence of genocide mounted.  The goal of Opération Turquoise was thus altered to aid the Rwandan government forces in fleeing the country to Zaire, with the intention to preserve the government and its hierarchy intact to pursue future power-sharing agreements[7].  It was a final, frantic attempt to avoid losing influence in the region, and one that would have devastating consequences.

In the process of assisting the genocidal regime, France often neglected to protect the Tutsi whom they were charged with safeguarding.  There is irrefutable evidence that the French demonstrated gross negligence of their mandate by abandoning thousands to die in various locations around the country, most notably at Bisesero[8][9].  Indeed, numerous reports cite French soldiers trading sexual favors for food and medical supplies, raping, and even killing Rwandan citizens[10].  The French further neglected to disarm Rwandan troops and militias whom they escorted to Zaire, and in some cases supplied them with food, weapons, and vehicles[11].  These same Rwandan forces would later profiteer in the Zairean refugee camps, syphoning humanitarian aid intended for victims of genocide.  As the refugee camps were often not the internationally required 50 miles from the border of Rwanda, the ex-Rwandan Armed Forces and militias were able to use the camps as bases and launch a devastating and deadly insurgency back into Rwanda, killing thousands[12].  In response to the insurgency, and renewed killings of Tutsi in Zaire, the new RPF-led Rwandan government invaded Zaire, setting in motion the Congo Wars, the most deadly series of conflicts worldwide since the two World Wars.  Years of suffering, disease, and death can be traced back to the decision made by the French to escort the génocidaires to Zaire and continue to supply and support them in a vain attempt to cling to their influence in the region.

Ultimately, Opération Turquoise failed on two fronts: It failed to maintain the integrity and legitimacy of the former Rwandan regime and also failed to uphold its mandate to protect victims of genocide.  Although it is impossible to establish a direct causal relationship between violence in the Great Lakes Region following Opération Turquoise and the 1994 Genocide against the Tutsis, there is ample evidence that Opération Turquoise exacerbated the humanitarian situation.  Opération Turquoise, conceived as a humanitarian mission, thus paradoxically contributed to one of the worst humanitarian disasters in modern history in the Eastern Democratic Republic of the Congo.


Endnotes:

Note: Some names have been changed to protect the identities of interview subjects. 

[1] United Nations Security Council (SC), Resolution 929. (1994, June 22). Opération Turquoise. Retrieved April 22, 2016 from https://documents-dds-ny.un.org/doc/UNDOC/GEN/N94/260/27/PDF/N9426027.pdf?OpenElement

[2] Schweigman, D. (2001). The Authority of the Security Council under Chapter VII of the UN Charter: Legal Limits and the Role of the International Court of Justice. The Hague: Kluwer Law International.

[3] Twenty Years after Genocide France and Rwanda Give Different Versions of History. (2014, April 11) Retrieved February 28, 2016 from http://www.english.rfi.fr/africa/20140410-twenty-years-after-genocide-france-and-rwanda-give-different-versions-history

[4] Totten, S, and Sherman, M. (2005). Genocide at the Millennium. New Brunswick, NJ: Transaction Publishers.

[5] Simon, M. (1998) Operation Assurance: The Greatest Intervention That Never Happened. The Journal of Humanitarian Assistance. Retrieved April 12, 2016 from http://sites.tufts.edu/jha/archives/123.

[6] Melvern, L. (2009). A People Betrayed: The Role of the West in Rwanda’s Genocide. London: Zed.

[7] Mukasarasi, J. (2016, April 17). Personal Interview.

[8] Assemblée Nationale. (1998, December 15). Rapport d’information de MM. Pierre Brana et Bernard Cazeneuve, déposé en application de l’article 145 du Règlement par la mission d’information de la commission de la Défense, sur les opérations militaires menées par la France, d’autres pays et l’ONU au Rwanda entre 1990 et 1994. Paris: French National Assembly.

[9] De Vulpian, L & Prungnaud, T. Silence Turquoise. Paris: France. Don Quichotte.

[10] Mvuyekure, A. (2016, April 16). Personal Interview.

[11] Des Forges, A. (1999). Leave None to Tell the Story: Genocide in Rwanda. New York: Human Rights Watch.

[12] Gribbin, R. (2005). In the Aftermath of Genocide: The U.S. Role in Rwanda. Lincoln, NE: IUniverse.

Assessment Papers France Mass Killings Ross Conroy Rwanda United Nations

Options to Address Terrorism Financing in Australia

Ryan McWhirter has a master’s degree of Terrorism and Security Studies at Charles Sturt University.  He can be found on twitter at ryanmc__89.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The enforcement of terrorism financing for terror organisations such as the Islamic State (IS) within Australia.

Date Originally Written:  January 30, 2018.

Date Originally Published:  May 7, 2018.

Author and / or Article Point of View:  This article is written from the point of view of challenging the symbolism of investigating all terrorism financing with the effect of better employment of limited investigatory resources based upon an impact assessment of action or inaction.

Background:  Most terrorist organisations require vast amounts of external support to fund their operations.  At the height of its power, the Islamic State were vastly different in the way they funded their group, with an estimated valuation at $2 billion US dollars.  The group was almost entirely self-sufficient, relying on natural resources within their controlled territory, taxes and extortion[1].

Whilst the group is most certainly winding down due to being militarily defeated in the terrain they controlled, it is not unsound to assess that other groups will try to emulate them.  During their peak, only 5% of the group’s finances were obtained through foreign donation[2].

Significance:  The enforcement of all things terrorism has become a political hot point within Australia.  Governments profess to the public that they are doing all in their power to suppress the threat groups such as IS pose.  The financing of the group is no exception to this rule and many investigations have been squarely aimed at individuals funding terrorism.

However, when 95% of a groups finances come from internal resources, is the enforcement of external donations a cost-effective measure, particularly in a small nation such as Australia?  Whilst it is unknown the exact amount Australians contributed to IS at its peak, it can safely be measured to be a small amount of the 5% the group reaps from donations.

This situation is purely economic.  Counter terrorism operations are not cheap.  It would not be out of the realm of possibilities to estimate an operation may cost between $100,000 to $150,000 a day, given the amount of staff, resources and other intangibles required to thoroughly investigate.  If an operation runs for three months, the cost is $ 9 million.

Can these resources be put to better use?  A case in point occurred in 2016 when a young male and female were arrested in Sydney, Australia for sending $5,000 to IS[3].  This operation didn’t occur over night.  If for example it ran for two months, intelligence and security agencies spent an estimated $6 million dollars to investigate $5,000 going overseas.  The two offenders were refused bail and remanded in custody, with the male being sent to a supermax prison.  Is sending a young male to supermax for terror financing going to change his views or intensify them?

The key question is, for an almost entirely self-sufficient group, is enforcing this small amount of finance an efficient and productive measure?

Option #1:  The Australian government continues with total enforcement of laws regarding terror finance.

Risk:  This option maintains the status quo.  The continuation of the total enforcement of these offences may lead to effected communities feeling targeted and vilified by authorities.

A risk this option poses is that the resources and finances used in these investigations are not being used in more serious matters.  Whilst intelligence and security agencies are busy investigating small time terror financers, other serious offences are going unchecked, these offences include human trafficking, large-scale drug importations and actual terrorist activity being directed at citizens.

Gain:  This option allows political capital to be garnered, particularly with a government obsessed with giving the appearance of being tough on terror.  It also sets an example to other individuals who may be contemplating financing terror groups that their actions are unacceptable and will be investigated and prosecuted.

Option #2:  The Australian government conducts a cost and benefit analysis before investigating the financing of groups such as IS.

Risk:  The risks in this option are profound.  Individuals may use this loophole to contribute to their group of choice by only donating small amounts, knowing they won’t be investigated if the amount is small enough.  This small donation activity may be seen as a gateway to conducting further terrorist related activities and a key step in the radicalization process.

Politically, this option is problematic.  If this option became policy, it would be seized upon by the government’s opposition to imply they are soft on terrorism.

Gain:  Australian government terrorism-related resources and finances are diverted into more serious criminal offences and social programs.  Deradicalization programs in schools and community centers could be better funded, perhaps stopping individuals wanting to finance a terror group, or even help stop a terrorist attack before it happens.  The government could make the case that by saving resources in this area they are in fact showing a genuine attempt to stop terrorism before it happens, reducing the need to be tough on it.

Other Comments:  It should be noted that in cases of financing terror groups such as Al-Qa’ida who have a greater reliance on outside donation, option two would not be feasible.  As such, these incidents would be investigated as usual.

Recommendation:  None.


Endnotes:

[1]  Centre for the analysis of terrorism. (2015). ISIS Financing

[2]  Ibid.

[3]  Olding, Rachel. (2016) Texts between schoolgirl terror suspect and co-accused Milad Atai released in court. Sydney Morning Herald.

Australia Economic Factors Islamic State Variants Option Papers Ryan McWhirter

Episode 0003: Military Planning Constructs (The Smell of Victory Podcast by Divergent Options)

9M2vSSDs

image003

Screen Shot 2018-05-02 at 4.27.45 PM

 

 


 

 

In this episode of The Smell of Victory Podcast Bob Hein, Steve Leonard, and Phil Walter tackle the phases of military operations and the new Joint Concept for Integrated Campaigning.  The trio discusses the historic role of the phased planning construct and why the Joint Staff felt a need to change.  They also spend a lot of time examining war termination and the implications of not planning adequately for the transition to peace, using Operation Iraqi Freedom as the primary example while also exploring World War 2 and Operation Desert Storm.  Also mentioned on the podcast, and able to be downloaded here, is a July 2013 memo from U.S. Army General and Chairman of the Joint Chiefs of Staff Martin E. Dempsey to the Chairman of the Senate Armed Services Committee that discusses military options in Syria.

You can listen via Sticher by clicking here, or iTunes by clicking here.  You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

Option Papers The Smell of Victory Podcast by Divergent Options

Assessment of the Security Implications of Environmental Crime in Africa

Zachary Lubelfeld is pursuing a Master of Public Administration and a Master of Arts in International Relations at Syracuse University.  He is currently in Maputo, Mozambique on a Boren Fellowship studying Portuguese and the extractive sector in Mozambique.  All opinions in this article are those of the author and do not represent the official positions of Syracuse University or the National Security Education Program.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Security Implications of Environmental Crime in Africa

Date Originally Written:  January 22, 2018.

Date Originally Published:  April 30, 2018.

Summary:  Environmental crime is a growing component of transnational crime, as well as an increasingly lucrative one. Organized crime, militia groups, and terrorist organizations all profit off the illicit sale of everything from minerals to animals. This criminal activity poses a significant threat, not just to the communities in which it occurs or where these entities commit violence, but to the health and safety of people around the world.

Text:  As globalization continues apace, and the world becomes increasingly interconnected, the benefits, like greater access to goods and information, are matched by the costs, such as the increased space for transnational criminal activity. One of the least discussed aspects of this is environmental crime. Global environmental crime is a burgeoning market, worth an estimated $213 billion annually[1]. This environmental crime includes a wide range of illicit activities, such as illegal logging in rainforests, illegal mining of mineral resources, and poaching elephants and rhinoceroses for their ivory.  The lack of focus on environmental crime allows criminal organizations to wreak havoc with relative impunity, and nowhere is this truer than in Africa. The pernicious effects of wildlife exploitation are felt across all of Africa, the security implications of which are myriad. Regional stability, armed conflict and terrorism, and global health are all impacted by wildlife exploitation in Africa, with potentially dangerous results not just for Africans, but for people worldwide.

Environmental crime is an important driver of violence and conflict across Africa, as it provides integral revenue streams for many violent militia groups and terrorist organizations. Perhaps the most well-known example of this are conflict minerals, which refers to minerals that are sold to fund violence. Diamonds have long been a driver of conflict in Africa, a recent example of which is the ongoing civil war in the Central African Republic[2]. Violent militia groups in the Democratic Republic of Congo (DRC) profit from the sales of minerals like cassiterite, a tin ore worth about $500/kg that is used in products such as phones, laptops, and cars[3]. The value of the illicit mineral trade in East, Central, and West Africa is valued at $2.4 billion to $9 billion per year, which rivals the value of the global heroin and cocaine markets combined[4].

Another key component of environmental crime is poaching, both for bush meat and for ivory. Armed militia groups as well as military units in Africa rely on poaching for food – for example, one adult elephant can feed an average army regiment. Ivory is the more lucrative reason for poaching, however. Elephant tusks sell for an estimated $680/kg[5], while rhinoceros horn is worth upwards of $65,000/kg. Ivory can be sold, or traded for supplies and weapons, and is a major funding source across Africa, from the Lord’s Resistance Army in eastern Africa to transnational criminal networks operating in Mozambique; there is even evidence that the Somali terrorist organization al-Shabaab profits from ivory smuggling. The illicit sale of ivory is also an important revenue source for armed militias in the DRC[6] and groups like the Janjaweed, the notorious Sudanese militias responsible for the genocide in Darfur[7].

Lesser known examples of environmental crime are essential to funding the operations of terrorist organizations across Africa, such as illegal logging. One of the primary uses of illegal logging is the production and taxation of charcoal, which is a fuel source for Africans who don’t have access to electricity. Al-Shabab had earned an estimated $56 billion from illicit charcoal by 2014, making it the primary source of funding for their operations.  Additionally, there are reports that the Nigerian terrorist organization Boko Haram derives funding from the trade[8]. Furthermore, profits from the illegal timber trade are used to facilitate arms smuggling in Africa, arming terrorists, as well as rebel groups such as in Sierra Leone and Cote d’Ivoire[9].

As concerning as it is that terrorist organizations and militia groups derive significant benefit from environmental crime, a potentially even greater danger is the consequences it could have on global health. A variety of animals are trafficked internationally, from rare birds and reptiles to gorillas, as well animal parts like pelts and tusks. This contact between animals and humans increases the risk of transmission of dangerous zoonotic diseases. Zoonotic diseases are transmitted from animals to humans. One example is the Ebola virus, which is thought to come from bats and primates, the latter of which may have spread the disease while being trafficked through cities is western Africa[10].

Increased transport of wildlife internationally increased the chances of the spread of dangerous pathogens, especially in the case of illicit trafficking. Pathogens that may otherwise have been contained in one location are sent around the world, increasing the risk of pandemic. While customs procedures designed to screen for these pathogens exist, wildlife traffickers bypass these to avoid detection, so infected animals are not discovered and put in quarantine. Therefore, wildlife trafficking could lead to the international transmission of a disease like Ebola, anthrax, or Yersinia pestis, otherwise known as the bubonic plague.

It is clear that environmental crime is as lucrative for criminals as it is dangerous to everyone else, and therefore shows no signs of slowing down. Given the potential harm that it could cause, by funding groups who seek to bring violence and chaos wherever they go, as well as by increasing the probability of devastating pandemic, environmental crime will certainly continue if it is not addressed by law enforcement and policy makers.


Endnotes:

[1] Vira, V., Ewing, T., & Miller, J. (2014, August). Out of Africa: Mapping the Global Trade in Illicit Elephant Ivory. Retrieved October 18, 2017, from C4ADS: https://c4ads.org/reports/

[2] A Game of Stones: smuggling diamonds in the Central African Republic. (2017, June 22). Retrieved January 17, 2018, from https://www.globalwitness.org/en/campaigns/central-african-republic-car/game-of-stones/#chapter-1/section-3

[3] Morrison, S. (2015, May 16). ‘Conflict minerals’ funding deadly violence in the Democratic Republic of Congo as EU plans laws to clean up trade. Retrieved January 17, 2018, from http://www.independent.co.uk/news/world/africa/conflict-minerals-bringing-death-to-the-democratic-republic-of-congo-as-eu-plans-laws-to-clean-up-10255483.html

[4] Environmental Crime. (n.d.). Retrieved January 17, 2018, from https://www.stimson.org/enviro-crime/

[5] Chen, A. (2016, November 07). Poaching is on the rise – most illegal ivory comes from recently killed elephants. Retrieved January 20, 2018, from https://www.theverge.com/2016/11/7/13527858/illegal-ivory-elephant-radiocarbon-dating-poaching-stockpile

[6] Toeka Kakala, Taylor. “Soldiers Trade in Illegal Ivory” InterPress Service News Agency. 25 July 2013. Web. 25 Mar. 2014. http://www.ipsnews.net/2013/07/soldiers-trade-in-illegal-ivory

[7] Christina M. Russo, “What Happened to the Elephants of Bouba Ndjida?” MongaBay, March 7, 2013. Available at http://news.mongabay.com/2013/0307-russo-elephants-bouba-njida.html

[8] Ibid.

[9] ILLEGAL LOGGING & THE EU: AN ANALYSIS OF THE EU EXPORT & IMPORT MARKET OF ILLEGAL WOOD AND RELATED PRODUCTS(Rep.). (2008, April). Retrieved January 17, 2018, from World Wildlife Foundation website: http://assets.wnf.nl/downloads/eu_illegal_logging_april_2008.pdf

[10] Bouley, T. (2014, October 06). Trafficking wildlife and transmitting disease: Bold threats in an era of Ebola. Retrieved January 15, 2018, from http://blogs.worldbank.org/voices/trafficking-wildlife-and-transmitting-disease-bold-threats-era-ebola

Africa Assessment Papers Criminal Activities Environmental Factors Illicit Trafficking Activities Zachary Lubelfeld

Call for Papers: Alternative Futures

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for papers assessing situations or discussing options related to Alternative Futures.  We define an Alternative Future as a theory about the character of the future national security environment that is grounded in knowledge of current trends and emerging threats.  For more information regarding Alternative Futures here is a DuckDuckGo search that may be of value.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by June 16th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

Call For Papers

Options for Decentralized Local Defence Forces in Iraq & Afghanistan

Patrick Blannin (@PatrickBlannin) is a PhD Candidate, teaching fellow and research assistant at Bond University, Queensland, Australia.  The authors doctoral research focuses on the role and scope of defence diplomacy in contemporary counterinsurgency and counterterrorism.  The author has published a research monograph titled Defence Diplomacy in the Long War (Brill) as well as peer-reviewed journal articles on topics related to transnational terrorism (organisations, funding sources and counter measures).  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  Can decentralized Local Defence Forces (LDF) reliably fill the security void in the Long War (Iraq and Afghanistan)?  Will LDFs such as the Tribal Mobilization Forces and the Afghan Local Police generate or maintain stability until the capability of state forces improves?  Or should such entities remain as a state sanctioned, locally drawn, semi-autonomous component of a formal security apparatus[1]?

Date Originally Written:  January 29, 2018.

Date Originally Published:  April 23, 2018.

Author and / or Article Point of View:  From an academic perspective, the author analyses national security issues, and the responses to them, through the lens of a whole-of-government approach.  This approach ensures all the U.S.’ tools of statecraft (DIMEFIL) are utilized pursuant of its national security strategic objectives[2].

Background:  In a perfect world, when the long-arm of the state is unable or unwilling to extend through the entirety of its sovereign territory, effectively filling the security vacuum by calling for a grass-roots approach to security and policing would represent a “compelling argument[2].”  However, the Long War theatres of Iraq and Afghanistan are far from perfect, and for over a decade numerous iterations of so-called Local Defence Forces (LDF, or Local Police Forces, Community Defence Units, Public Protection Force, etc.) have been stood up.  Results are mixed, with often short-term benefits yielding mid-term pain.  For example, the highly vaulted Sons of Iraq (’Sahawa al-Anbar’, the Sunni Awakening) constituted a number of strategically aligned LDFs which combined to facilitate the routing of Al Qa’ida from Western Iraq (primarily Anbar Province)[3].  At the time however, with stories of its recent successes reported around the world, some analysts were guarded in their praise, identifying the short-term security gains in at least some areas, while recognizing “[T]here is little guarantee that these gains will persist, and there is some chance that the strategy will backfire in the medium term[4].”  Similar conversations, and associated apprehension, regarding Afghanistan were occurring before, during and after the 2009 ‘Surge[5].’  The intoxicating aroma of tactical victory soon fades and is replaced by the lingering odour of arms races and power grabs between tribally aligned militias, and the often undermining influence and/or actions of the state.

Significance:  Over the past 16 years, the U.S. and its Coalition partners have encouraged the Iraq and Afghan governments, such as they were, to incorporate LDFs into their national security strategy.  LDFs are designed to contribute to clearing or holding missions as well as local law enforcement in broader stabilization efforts.  Although each theatre offers innumerable differences and associated challenges, one constant remains, that short-term tactical successes are followed by mid-term strategic losses.  A legacy of its Long War experience, U.S. and Coalition civilian and military decision-makers have a ‘better’ understanding of the social/cultural anthropology in Iraq and Afghanistan.  Although lessons have been learned and mistakes addressed, repeating the same flawed approach remains a primary strategic choice, and our expectations continually failed to be met[6].

Option #1:  Firstly, limit the size of LDFs.  Secondly, ensure U.S. and Coalition personnel play a role, clandestinely wherever possible, in the vetting and training process which would allow the U.S. and its partners to identify recruits and influence the operating culture of the LDF.  Additional constraints could include the amount, and type of weaponry supplied, limit or equalize the political influence/politicization of all LDF leadership as well as introducing an enforceable set of operating parameters[7].

Risk:  Attempts to constrain LDFs by limiting their size, political influence, or access to weapons risks undermining the capacity of the LDF to fulfill their objective.  Moreover, a constrained and disempowered force can leverage traditional community relations to operate a shadow or parallel security apparatus which effectively monopolizes the use of violence within their respective area of operations which would undermine broader stabilization efforts[8].

Gain:  Limiting the size and capability of the LDF makes it more able to be managed by the government.  Additionally, introducing a personnel cap in conjunction with more rigorous vetting would create a more effective and perhaps malleable security force.  Standing up an effective LDF may mitigate the role/presence/agenda of existing militias affording tribal leadership the ability to pursue legitimate, non-violent, political activities[9].

Option #2:  Firstly, acknowledge, accept and plan for the inherent challenges and limitations of LDFs[10].  Secondly, increase the tempo of the current, centrally controlled train, advise, assist, accompany, and enable and police force capacity building programs, leveraging the arrival of the nascent U.S. Army Security Force Assistance Brigades and private sector trainers/advisors.  Centrally controlled, locally drawn LDFs can be generated through the existing security, stabilization and capacity building framework[11].

Risk:  Convincing/guaranteeing local militia and populations that their acquiescence to a degree of central government control and/or oversight will not prove detrimental to their local security objectives will be a challenge.  Lack of progress in establishing security creates a security vacuum which nefarious actors will exploit rendering the situation worse than prior to implementing this option.

Gain:  Using the existing capacity building framework expedites implementation of this option.  Moreover, generating requisite personnel should not represent a barrier, with existing militiae and a willing local population providing significant pool to draw from.

Other Comments:  For many, a situation in which locals (including LDFs) governed locals would significantly reduce tensions.  However, this local-for-local governance does not equate with the preferred central government model.  Both options are based on realities on the ground rather than a theoretical construct, thus LDFs such as the Tribal Mobilization Forces and the Afghan Local Police represent a rare triptych.  This triptych is an opportunity to empower in situ populations, reduce the anxiety of the central government, and achieve the stabilization objectives of the U.S./Coalition Long War strategy.  The objectives and concerns of all stakeholders are legitimate, yet they are diverse and need to be addressed in a comprehensive manner.  LDFs do deliver short-term tactical benefits and can positively contribute to the strategic objective of sustainable stabilization in Iraq and Afghanistan[12].

Recommendation:  None.


Endnotes: 

[1] Clark, K. (2017). ‘Update on Afghan Local Police: Making Sure they are armed, trained, paid and exist’, Afghan Analysts Network at https://www.afghanistan-analysts.org/update-on-the-afghan-local-police-making-sure-they-are-armed-trained-paid-and-exist/; Gaston, E. (2017). ‘Sunni Tribal Forces’, Global Public Policy Institute Report at http://www.gppi.net/publications/sunni-tribal-forces/ ; For a comprehensive list of Article about the Afghan Local Police from Afghan War News see: http://www.afghanwarnews.info/police/ALPnews.htm

[2] Field Manual (FM) 3-0, Operations, defines the “instruments of national power” as Diplomatic, Informational, Military, and Economic, normally referred to as the DIME.  The DIMEFIL acronym encapsulates: Diplomacy, Information, Military, Economic, Financial, Intelligence & Law Enforcement. DIMEFIL is an extension of the DIME construct that can be found in the National Strategy for Combating Terrorism (NSCT-2003) and the National Military Strategic Plan for the War on Terrorism (NMSP-WOT). The NMSP-WOT defines DIMEFIL as the means, or the resources, used for the War on Terrorism (2006: 5) at http://archive.defense.gov/pubs/pdfs/2006-01-25-Strategic-Plan.pdf; For a brief overview of DIMEFIL see: Smith, A.K. (2007), Turning on a DIME: Diplomacy’s Role in National Security, Carlisle, VA: Strategic Studies Institute, pp. 1-17 at https://ssi.armywarcollege.edu/pdffiles/PUB801.pdf

[3] Arraf, J. (2014). ‘A New Anbar Awakening’, Foreign Policy at http://foreignpolicy.com/2014/01/08/a-new-anbar-awakening/; Jones, S. G. (2011). ‘Security from the Bottom Up’, Time at ; Theros, M & Kaldor, (2007) M. ‘Building Afghan Peace from the Ground Up’, A Century Foundation Report, New York: The Century Foundation, pp. 1-60 at http://www.operationspaix.net/DATA/DOCUMENT/4311~v~Building_Afghan_Peace_from_the_Ground_Up.pdf

[4] Hamilton, B. (2017). ‘Illusions of Victory: The Anbar Awakening and the Rise of the Islamic State’, US Army; Kagan, E, (2007). ‘The Anbar Awakening: Displacing al Qaeda from its Stronghold in Western Iraq’, Iraq Report, The Institute for the Study of War & the Weekly Standard, pp. 1-18 at http://www.understandingwar.org/sites/default/files/reports/IraqReport03.pdf

[5] Long, A. 2008). ‘The Anbar Awakening’, Survival’, Vol. 50, no. 2, pp. 67-94 at http://www.tandfonline.com/doi/pdf/10.1080/00396330802034283?needAccess=true

[6] Human Rights Watch. (2012). Impunity, Militias, and the “Afghan Local Police”, pp.  1-100 at https://www.hrw.org/report/2011/09/12/just-dont-call-it-militia/impunity-militias-and-afghan-local-police ; Long, A., Pezard, S., Loidolt, B & Helmus, T. C. (2012). Locals Rule: Historic Lessons for Creating Local Defence Forces for Afghanistan and Beyond, Santa Monica, CA: RAND Corporation, pp. 1-232 at https://www.hrw.org/report/2011/09/12/just-dont-call-it-militia/impunity-militias-and-afghan-local-police

[7] Dearing, M. P. (2011). ‘Formalizing the Informal: Historical Lessons on Local Defense in Counterinsurgency’, Small Wars Journal at http://smallwarsjournal.com/jrnl/art/formalizing-the-informal-historical-lessons-on-local-defense-in-counterinsurgency .

[8] Mansour, R & Jabar, F. A. (2017). ‘The Popular Mobilization Forces and Iraq’s Future’, Carnegie Middle East Center at http://carnegie-mec.org/2017/04/28/popular-mobilization-forces-and-iraq-s-future-pub-68810 ;  Gharizi, O & Al-Ibrahimi, H. (2018). ‘Baghdad Must Seize the Chance to Work with Iraq’s Tribes’, War on the Rocks at https://warontherocks.com/2018/01/baghdad-must-seize-chance-work-iraqs-tribes/

[9] Gibbs, D. 1986). ‘The Peasant as Counter Revolutionary: The Rural Origins of the Afghan’, International Development, Vol. 21, no. 1, pp. 37–45 at http://dgibbs.faculty.arizona.edu/sites/dgibbs.faculty.arizona.edu/files/peasant.pdf

[10] El-Hameed, R. (2017). ‘The Challenges of Mobilizing Sunni Tribes in Iraq’, Carnegie Endowment for International Peace at http://carnegieendowment.org/sada/59401; n/a. (2016). Militias in Iraq: The hidden face of terrorism, Geneva International Center for Justice at http://www.gicj.org/GICJ_REPORTS/GICJ_report_on_militias_September_2016.pdf

[11] Cox, M. (2017). ‘Army Stands Up 6 Brigades to Advise Foreign Militaries’, Military.com; Cooper, N. B. (2017). ‘Will the Army’s New Advisory Brigades get Manning and Intel Right?’, War on the Rocks at https://warontherocks.com/2017/09/will-the-armys-new-advisory-brigades-get-manning-and-intel-right/ ; Gutowski, A. (2017). ‘Newly created ‘teaching’ brigade prepares to deploy to Afghanistan, FDD Long War Journal at https://www.longwarjournal.org/archives/2018/01/sfab.php ; Keller, J. (2018). ‘The 1st SFAB’s Afghan Deployment Is A Moment Of Truth For The Global War On Terror’, Task & Purpose at  https://taskandpurpose.com/sfab-train-advise-assist-afghanistan/  Strandquist, J. (2015). ‘Local defence forces and counterinsurgency in Afghanistan: learning from the CIA’s Village Defense Program in South Vietnam’, Small Wars & Insurgencies, Vol. 26, no. 1, pp. 90–113 at http://www.tandfonline.com/doi/pdf/10.1080/09592318.2014.959772?needAccess=true ; Green, D. (2017). In the Warlord’s Shadow: Special Operations Forces, the Afghans, and their Fight Against the Taliban, Annapolis, MD: Naval Institute Press, 2017, pp. 1-256.

[12] Al-Waeli, M. (2017). ‘Rationalizing the Debate Over the PMF’s Future: An Organizational Perspective’, 1001 Iraqi Thoughts at http://1001iraqithoughts.com/2017/12/14/rationalizing-the-debate-over-the-pmfs-future-an-organizational-perspective/

[13] Inspector General for Overseas Contingency Operations. (2017). Operation Inherent Resolve, Report to the U.S. Congress-July 2017-September 2017, pp. 1-126; U.S. Department of Defence. (2016). Enhancing Security and Stability in Afghanistan, Report to Congress, pp. 1-106 at https://www.defense.gov/Portals/1/Documents/pubs/Afghanistan-1225-Report-December-2016.pdf ; Hammes, T. X. (2015). ‘Raising and Mentoring Security Forces in Afghanistan and Iraq’, in Hooker Jr, R. D., & Joseph J. Collins. J. J. (eds.), Lessons Encountered: Learning from the Long War, Fort MacNair: National Defence University, pp. 277-344 at https://www.sciencedirect.com/science/article/pii/S0030438715000691

Afghanistan Allies & Partners Insurgency & Counteinsurgency Iraq Irregular Forces Option Papers Patrick Blannin United States

Assessment of the How the Media Overstates the Threat Posed by the Erroneously Called ‘Lone-Wolves’

Cristina Ariza holds a master’s degree from the Department of War Studies, King’s College London, where she focused on radicalisation and Countering Violent Extremism (CVE.)  She is a freelance analyst, currently researching on Spanish jihadist networks and the role of families in CVE.  She can be found on Twitter @CrisAriza_C.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the How the Media Overstates the Threat Posed by the Erroneously Called ‘Lone-Wolves’

Date Originally Written:  January 23, 2018.

Date Originally Published:  April 16, 2018.

Summary:  Media outlets, commentators, and prosecutors continue to use the ‘lone wolf’ typology to refer to any kind of individual attacker, which overlooks how the majority of these perpetrators have radicalised in contact with other like-minded individuals. As a result, the threat arising from supposedly ‘undetectable terrorists’ has been markedly overstated, to the point of sowing unnecessary fear.

Text:  A quick Google search of the term ‘lone wolf terrorism’ throws about 459,000 results, which is a striking number given how misleading this concept actually is. Initially, the concept of ‘lone wolf’ was supposed to represent the threat coming from individuals who radicalised in isolation and went on to commit an attack alone. Since they were not receiving instructions from a terrorist command nor they were in contact with other extremists, lone wolves were undetectable threats that could strike at any given time. However, as shown by the media frenzy that arises every time there is an attack, this category has lost all meaning. Now, every attack committed by one individual is automatically labelled as a ‘lone wolf’ attack, regardless of whether said individual actually fits the criteria. Thus, the discourse shifts onto a meaningless debate that contributes nothing to explaining how individuals are actually driven to commit attacks.

The first stumbling block we come across when examining ‘lone wolves’ is conceptual. There seems to be a certain consensus in the literature that in order to be designated as such, ‘lone wolves’ need to be detached operationally and institutionally from larger networks. In his study on Islamist lone attackers, Raffaello Pantucci differentiated between loners, lone wolves, lone wolf packs, and lone attackers. However, only the ‘loners’ had radicalised in total isolation and proceeded to attack alone. The rest of the categories included individuals who did not formally belong to a hierarchical command but had some online or offline contact with extremists, and individuals who committed an attack in small groups[1]. Strictly speaking, only the ‘loners’ could fit the criteria of self-radicalised ‘lone wolves,’ which is why compiling all these categories under the same typology ends up being problematic. For starters, this compiling overlooks the significant differences that exist between self-radicalisation and group radicalisation. As Bart Schuurman et al correctly point out, ‘peer pressure, leader-follower interactions, group polarization and other social-psychological processes by definition rule out including even the smallest „packs‟ under the heading of lone-actor terrorism[2].’

While, in spite of disagreements, literature discussions on ‘lone wolf’ terrorism tend to be very nuanced, this meticulousness appears to be absent in other contexts. In media and public usage, every attack that is committed by an individual perpetrator is at first designated as a ‘lone wolf’ attack, which risks overestimating the threat coming from self-radicalised and independently operating individuals. In 2016, the Nice and Berlin attackers were first wrongly identified as ‘lone-wolves’, even though it later emerged that both perpetrators had radicalised in contact with like-minded individuals. Jason Burke, in his piece entitled ‘The Myth of the Lone-Wolf Terrorist’ compellingly argues that ‘this lazy term [lone wolf] obscures the real nature of the threat against us[3].’

Furthermore, there seems to be a correlation between the modus operandi of an attack and the decision to designate an individual (or even individuals) as ‘lone-wolves.’ A perfect example of this correlation is a Daily Mail headline that claimed: ‘ISIS has abandoned large-scale terror atrocities to focus on ‘lone wolf’ attacks like Nice and Berlin, government report says[4].’ The government report quoted in this article, whose authenticity could not be independently verified, referred more generally to ‘lone actors’ and ‘small groups’, which in sensational media jargon translates as ‘lone wolves.’ Despite the fact that neither the Berlin nor the Nice attacker could actually be categorised as lone-wolves, the article audaciously equated low-cost attacks with lone-wolves, as if tactics had any bearing on radicalisation. While the Daily Mail is not particularly known for its credibility, a journalist from the much more reliable British newspaper ‘The Telegraph’ also suggested that the Westminster 2017 attack and the murder of Lee Rigsby were examples of how lone-wolf attacks did not require sophisticated weapons[5].’ Whereas one could forgive a premature—and ultimately mistaken— analysis on whether Khalid Masood was a lone wolf, both perpetrators in the Lee Rigsby case were linked to Al Muhajiroun, one of the United Kingdom’s largest jihadist recruitment networks. Therefore, the apparent correlation between low-cost weapons and lone wolves—or even ‘pack of wolves’— is not immediately clear. While it stands to reason that individuals who formally belong to terrorist organisations and have planned to commit large-scale attacks might resort to more sophisticated weapons —the Paris and Brussels attackers chose to use suicide vests and bombs—, the decision to strike with a low-cost weapon does not say much about how one individual might become radicalised. Granted, true lone wolves would likely resort to low-cost weapons, but so did the London Bridge attackers or the Magnaville perpetrator. Referring to low-cost attacks as ‘lone wolf attacks’ only contributes to adding another layer of confusion to an already problematic concept.

A more recent trial case in the United Kingdom showed how prosecution has also adopted this terminology. According to The Guardian, Munir Mohammed had ‘resolved upon a lone wolf attack[6].’ Yet he had enlisted the help of his girlfriend to buy the ingredients for a chemical attack. Both had met online and frequently shared extremist content with each other. If this was not reason enough to determine that Munir Mohammed did not radicalise in total isolation, as a so-called ‘lone-wolf’ is supposed to do, the article also showed that Munir Mohammed was in contact with an Islamic State commander and that he was waiting for instructions to attack. The evidence clearly shows that the dynamics of radicalization that led Munir Mohammed to try to commit an attack were diametrically different to the mechanisms of self-radicalisation. Unfortunately, the persistent use of the ‘lone wolf typology’ prevents us from noticing these nuances and communicating them to the general public.

The inaccurate understanding of the lone wolf concept is consistently being applied to terrorism cases that fail to meet the necessary criteria, which only contributes to creating preventable fear amongst the population. It is precisely in a climate of exaggerated fear where terrorists thrive, which is why the ‘lone wolf’ categorisation is no longer adequate to analyse and understand the current terrorist threat.


Endnotes:

[1] Pantucci, R. (2011, March). A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists. ICSR. Retrieved January 23, 2018, from http://icsr.info/wp-content/uploads/2012/10/1302002992ICSRPaper_ATypologyofLoneWolves_Pantucci.pdf

[2] Schuurman, B., Lindekilde, L., Malthaner, S., O’Connor, F., Gill, P., & Bouhana, N. (2017). End of the Lone Wolf: The Typology that Should Not Have Been. Studies in Conflict & Terrorism. Retrieved January 23, 2018, from: http://www.tandfonline.com/doi/abs/10.1080/1057610X.2017.1419554

[3] Burke, J. (2017, March 30). The Myth of the Lone Wolf Terrorist. Foreign Affairs. Retrieved January 23, 2018, from: https://www.foreignaffairs.com/articles/western-europe/2016-07-26/myth-lone-wolf-terrorism

[4] Boyle, D. (2017, January 5). ISIS has abandoned large-scale terror atrocities to focus on ‘lone wolf’ attacks like Nice and Berlin, government report says. Daily Mail. Retrieved January 23, 2018, from: http://www.dailymail.co.uk/news/article-4091844/ISIS-abandoned-large-scale-terror-atrocities-focus-lone-wolf-attacks-like-Nice-Berlin-government-report-says.html#ixzz5518Phdcs 

[5] Coughlin, C (2017, March 22). London attack was simply a question of time: This was the lone wolf Britain has long been fearing. The Telegraph. Retrieved January 23, 2018, from:
http://www.telegraph.co.uk/news/2017/03/22/simply-question-time-lone-wolf-attack-britain-has-long-fearing/

[6] Grierson, J. (2018, January 8). UK couple found guilty of plotting Christmas terror attack. The Guardian. Retrieved January 23, 2018, from: https://www.theguardian.com/uk-news/2018/jan/08/uk-couple-found-guilty-of-plotting-christmas-terror-attack

Assessment Papers Cristina Ariza Violent Extremism

Assessment of the Threat Posed by the Turkish Cyber Army

Marita La Palm is a graduate student at American University where she focuses on terrorism, countering violent extremism, homeland security policy, and cyber domain activities.  She can be found on Twitter at maritalp.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Threat Posed by the Turkish Cyber Army

Date Originally Written:  March 25, 2018.

Date Originally Published:  April 9, 2018.

Summary:  Turkish-sympathetic hacker group, the Turkish Cyber Army, has changed tactics from seizing and defacing websites to a Twitter phishing campaign that has come remarkably close to the President of the United States.

Text:  The Turkish Cyber Army (Ay Yildiz Tim) attempted to compromise U.S. President Donald Trump’s Twitter account in January of 2018 as part of a systematic cyber attack accompanying the Turkish invasion of Syria.  They were not successful, but they did seize control of various well-known accounts and the operation is still in progress two months later.

Although the Turkish Cyber Army claims to date back to a 2002 foundation in New Zealand, it first appears in hacking annals on October 2, 2006.  Since then, the group has taken over vulnerable websites in Kenya, the European Union, and the United States[1].  As of the summer of 2017, the Turikish Cyber Army changed tactics to focus on Twitter phishing, where they used the compromised Twitter account of a trustworthy source to bait a target to surrender log-in credentials[2].  They do this by sending a direct message from a familiar account they control telling the desired victim to click on a link and enter their log-in information to a page that looks like Twitter but actually records their username and password.  Upon accessing the victim’s account, the hackers rapidly make pro-Turkish posts, download the message history, and send new phishing attacks through the new account, all within a few hours.  The Turkish Cyber Army claim to have downloaded the targets’ messages, apparently both for intelligence purposes and to embarrass the target by publicly releasing the messages[3].  Oddly enough, the group has yet to release the private messages they acquired in spite of their threats to do so.  The group is notable both for their beginner-level sophistication when compared to state hackers such as Fancy Bear and the way they broadcast every hack they make.

The first documented victim of the 2018 operation was Syed Akbaruddin, Indian Permanent Representative to the United Nations.  Before the attack on Akbaruddin, the hackers likely targeted Kurdish accounts in a similar manner[4].  Since these initial attacks, the Turkish Cyber Army moved steadily closer to accounts followed by President Trump and even managed to direct message him on Twitter[5].  In January 2018, they phished multiple well-known Western public figures such as television personality Greta van Susteren and the head of the World Economic Forum, Børge Brende.  It so happened that Greta and Eric Bolling, another victim, are two of the only 45 accounts followed by President Trump.  From Eric and Greta’s accounts, the hackers were able to send messages to Trump.  Two months later, the Turkish Cyber Army continued on Twitter, but now primarily with a focus on Indian accounts.  The group took over Air India’s Twitter account on March 15, 2018.  However, the aftereffects of their Western efforts can still be seen: on March 23, 2018 the Chief Content Officer of Time, Inc. and the President of Fortune, Alan Murray tweeted, “I was locked out of Twitter for a month after being hacked by the Turkish cyber army…” Meanwhile, the Turkish Cyber Army has a large and loud Twitter presence with very little regulation considering they operate as an openly criminal organization on the platform.

President Trump’s personal Twitter account was also a target for the Turkish Cyber Army.  This is not a secret account known only to a few.  President Trump’s account name is public, and his password is all that is needed to post unless he has set up two-factor authentication.  Trump uses his account to express his personal opinions, and since some of his tweets have had high shock value, a fake message intended to disrupt might go unquestioned.  It is fair to assume that multiple groups have gone at President Trump’s account with a password cracker without stopping since inauguration.  It is only a matter of time before a foreign intelligence service or other interested party manages to access President Trump’s direct messages, make provocative statements from his account that could threaten the financial sector or national security, and from there go on to access more sensitive information.  While the Turkish Cyber Army blasts their intrusion from the compromised accounts, more sophisticated hacking teams would be in and out without a word and might have already done so.  The most dangerous hackers would maintain that access for the day it is useful and unexpected.

While nothing immediately indicates that this group is a Turkish government organization, they are either supporters of the current government or work for it.  Both reporter Joseph Cox and the McAfee report claimed the group used Turkish code[6].  Almost a hundred actual or bot accounts have some identifier of the Turkish Cyber Army, none of which appear to be censored by Twitter.  Of particular interest in the group’s history are the attacks on Turkish political party Cumhuriyet Halk Partisi’s (CHP) deputy Eren Erdem’ın, alleging his connections with Fethullah Gulen and the 2006 and possible 2017 attempts to phish Kurdish activists[7].  The Turkish Cyber Army’s current operations occurred on the eve of massive Turkish political risk, as the events in Syria could have ended Turkish President Recep Tayyip Erdogan’s career had they gone poorly. Not only did Turkey invade Syria in order to attack trained troops of its North Atlantic Treaty Organization (NATO) ally, the United States, but Turkish representatives had been banned from campaigning in parts of the European Union, and Turkish banks might face a multi-billion dollar fine thanks to the Reza Zarrab case[8].  Meanwhile, both Islamist and Kurdish insurgents appeared emboldened within the country[9].  Turkey had everything to lose, and a cyberattack, albeit not that sophisticated but conducted against high value targets, was a possibility while the United States appeared undecided as to whom to back — its proxy force or its NATO ally.  In the end, the United States has made efforts to reconcile diplomatically with Turkey since January, and Turkey has saved face.


Endnotes:

[1]  Ayyildiz Tim. (n.d.). Retrieved January 24, 2018, from https://ayyildiz.org/; Turks ‘cyber-leger’ kaapt Nederlandse websites . (2006, October 2). Retrieved January 24, 2018, from https://www.nrc.nl/nieuws/2006/10/02/turks-cyber-leger-kaapt-nederlandse-websites-11203640-a1180482; Terry, N. (2013, August 12). Asbury park’s website taken over by hackers. McClatchy – Tribune Business News; Ministry of transport website hacked. (2014, March 5). AllAfrica.Com. 

[2] Turkish hackers target Sevan Nishanyan’s Twitter account. (2017, July 28). Armenpress News Agency.

[3] Beek, C., & Samani, R. (2018, January 24). Twitter Accounts of US Media Under Attack by Large Campaign. Retrieved January 24, 2018, from https://securingtomorrow.mcafee.com/mcafee-labs/twitter-accounts-of-us-media-under-attack-by-large-campaign/.

[4] #EfrinNotAlone. (2018, January 17). “News that people  @realDonaldTrump followers have been hacked by Turkish cyber army. TCA made an appearance a few days ago sending virus/clickey links to foreigners and my Kurdish/friends. The journalist who have had their accounts hacked in US have clicked the link.”  [Tweet]. https://twitter.com/la_Caki__/status/953572575602462720.

[5] Herreria, C. (2018, January 17). Hackers DM’d Donald Trump With Former Fox News Hosts’ Twitter Accounts. Retrieved March 25, 2018, from https://www.huffingtonpost.com/entry/eric-bolling-greta-van-susteren-twitter-hacked_us_5a5eb17de4b096ecfca88729

[6] Beek, C., & Samani, R. (2018, January 24). Twitter Accounts of US Media Under Attack by Large Campaign. Retrieved January 24, 2018, from https://securingtomorrow.mcafee.com/mcafee-labs/twitter-accounts-of-us-media-under-attack-by-large-campaign/; Joseph Cox. (2018, January 23). “Interestingly, the code of the phishing page is in… Turkish. “Hesabın var mı?”, or “Do you have an account?”.”  [Tweet]. https://twitter.com/josephfcox/status/955861462190383104.

[7] Ayyıldız Tim FETÖnün CHP bağlantısını deşifre etti. (2016, August 27). Retrieved January 24, 2018, from http://www.ensonhaber.com/ayyildiz-tim-fetonun-chp-baglantisini-desifre-etti-2016-08-28.html; Turks ‘cyber-leger’ kaapt Nederlandse websites . (2006, October 2). Retrieved January 24, 2018, from https://www.nrc.nl/nieuws/2006/10/02/turks-cyber-leger-kaapt-nederlandse-websites-11203640-a1180482.

[8] Turkey-backed FSA entered Afrin, Turkey shelling targets. (2018, January 21). BBC Monitoring Newsfile; Turkey blasts Germany, Netherlands for campaign bans. (2017, March 5). BBC Monitoring European; Zaman, A. (2017, December 07). Turkey probes US prosecutor in Zarrab trial twist. Retrieved January 24, 2018, from https://www.al-monitor.com/pulse/originals/2017/11/turkey-probes-reza-zarrab-investigators.html.

[9] Moore, J. (2017, December 28). Hundreds of ISIS fighters are hiding in Turkey, increasing fears of attacks in Europe. Retrieved January 24, 2018, from http://www.newsweek.com/hundreds-isis-fighters-are-hiding-turkey-increasing-fears-europe-attacks-759877; Mandıracı, B. (2017, July 20). Turkey’s PKK Conflict Kills almost 3,000 in Two Years. Retrieved January 24, 2018, from https://www.crisisgroup.org/europe-central-asia/western-europemediterranean/turkey/turkeys-pkk-conflict-kills-almost-3000-two-years.

Assessment Papers Cyberspace Marita La Palm Trump (U.S. President) Turkey

Assessment of Infrastructure Development in Africa and Shifting Chinese Foreign Policy

Tyler Bonin is a history and economics instructor.  He is also a veteran of the U.S. Marine Corps, where he developed and participated in host nation infrastructure projects as a construction wireman.  He can be found on Twitter @TylerMBonin.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of Infrastructure Development in Africa and Shifting Chinese Foreign Policy

Date Originally Written:  January 12, 2018.

Date Originally Published:  April 2, 2018.

Summary:   The People’s Republic of China’s continued infrastructure investment in Africa through its One Belt, One Road initiative has led to incremental change in its foreign policy. Security challenges arising in Africa due to continued PRC investment might lead to an increased PRC military presence on the continent, as well as a complete revision of its non-interference policy.

Text:  In 2013, People’s Republic of China (PRC) President Xi Jinping proposed a $5 trillion international infrastructure plan entitled One Belt, One Road (OBOR), intended to advance land and maritime trade routes between Asia, Europe, and Africa[1]. Initial expansion has included approximately 1,700 road, railway, pipeline, and port projects undertaken by PRC state-owned and private enterprises. The state-developed Silk Road Fund and several multilateral development banks have financed these infrastructure projects, in addition to PRC commercial bank loans to OBOR partner countries[2].

A combination of private and state-owned PRC construction firms have built several railways between major African cities, including the Addis Ababa – Djibouti line, which is Africa’s first transnational electric railway. PRC-built railways have opened landlocked countries’ access to seaports, eased the burden of travel for workers, and ultimately facilitated the development of industrial economic corridors. Additionally, PRC companies have continued their investment in roadways and ports. Construction of a port at Bagamoyo in Tanzania will have the two-fold effect of easing congestion at neighboring ports and attracting foreign direct investment; it is slated to be Africa’s largest port[3]. Overall, views toward PRC development activities have been enthusiastic. Survey data from Afrobarometer demonstrates that 63% of Africans (averaged across all countries) view PRC influence as “somewhat” or “very” positive[4]. The PRC’s increasing global investment in infrastructure improves the country’s access to natural resources and also opens access to markets for PRC goods and services. It also serves as a powerful element of the PRC’s increasing soft power.

The PRC’s ever-expanding investment in Africa has also meant its increased role in security on the African continent. As the PRC has invested heavily in the Sudanese oil industry, civil conflict in South Sudan in 2013 led Beijing to take a proactive mediation position. In addition to promising to continue PRC participation in United Nations (UN) peacekeeping missions, President Jinping has also promised to support the development of counter-terrorism measures within African countries[5]. All of these activities have been a departure from the PRC’s traditional “non-interference” foreign policy stance. Security concerns in the past have arisen as the direct result of terrorist activity in Africa, including the kidnapping of PRC workers by the jihadist group Boko Haram. Furthermore, the PRC is now focusing on security as a manner in which to protect its infrastructure investments. Civil unrest and terrorist activity stalls PRC projects and hinders economic activity; the large upfront capital investment required of these infrastructure projects requires continuity in development, which is interrupted by civil strife.

However, security concerns in Africa may also surface as a direct result of PRC infrastructure development. While PRC activity in Africa has been viewed positively on average, PRC labor practices have received negative attention in particular regions. While PRC construction firms have used local workers for projects in regions where the pool of skilled labor is steady, PRC nationals have been brought into regions where skilled laborers do not exist in large enough numbers. Thus, a narrative of foreign workers taking jobs in which local workers could be employed has given rise to periodic populist movements in Africa. One example of populist movement activity is in Kenya, where a group demanding that a PRC project provide jobs to local citizens attacked PRC railway construction workers[6].

Furthermore, young and unemployed populations provide the foundation for rebel movements; As rebel groups may seize access to a country’s resources—and use the sales of such for continuing to fund the movement—participation in rebellion essentially provides young individuals with their only means to income[7]. Many fragile states are the product of extended civil war. Subsequently, these states have seen low levels of education and loss of skills among their working age populations. These fragile states, such as Angola and the Democratic Republic of the Congo, represent the situation in which PRC workers are used[8]. Thus, PRC activities are a possible catalyst for violence in fragile states where infrastructure projects continue.  In these fragile states, local resentment and populist fervor may build due to the perception that political elites only profit from the governmental arrangement with Beijing, while persistent unemployment exists during an ever-increasing influx of PRC workers. These factors combined may provide the impetus for rebellion that would harm the long-term goals of the PRC’s OBOR.

Due to the preceding, PRC roles in security in Africa may continue well beyond the current financing of counterterrorism measures and the provision of troops to UN peacekeeping operations. Specifically, the PRC’s non-intervention foreign policy may give way to a policy that seeks to actively finance state police forces and provide a stronger military advisory role.  While Djibouti currently maintains a permanent PRC naval station, an active PRC military presence seems likely to grow as investment in Africa increases, especially in fragile states. The dynamics of increased PRC economic and military influence in Africa are just now coming into existence and will pose interesting questions for future security considerations.


Endnotes:

[1] van der Leer, Y., Yau, J. (2016, February). China’s New Silk Route: The Long and Winding Road. Retrieved January 10, 2018, from https://www.pwc.com/gx/en/growth-markets-center/assets/pdf/china-new-silk-route.pdf

[2] Gang, W. (2017, May 9). SOEs Lead Infrastructure Push in 1,700 ‘Belt and Road’ Projects. Retrieved January 10, 2018, from https://www.caixinglobal.com/2017-05-10/101088332.html

[3] Tairo, A. (2017, October 3). Tanzania Surrenders Bagamoyo Port Project to Chinese Firm. Retrieved January 10, 2018, from http://www.theeastafrican.co.ke/business/Tanzania-Bagamoyo-port-project-to-Chinese/2560-4122244-rxa9wtz/index.html

[4] Lekorwe, M., Chingwete, A., Okuru M., and Samson R. (2016, October 24). China’s Growing Presence in Africa Wins Largely Positive Popular Reviews. Retrieved January 11, 2018, from http://afrobarometer.org/sites/default/files/publications/Dispatches/ab_r6_dispatchno122_perceptions_of_china_in_africa1.pdf

[5] Forum on China-Africa Cooperation. (2012, July 19). Fifth Ministerial Conference of FOCAC Opens Further China-Africa Cooperation. Retrieved January 11, 2018, from http://www.focac.org/eng/dwjbzjjhys/t954274.htm

[6] White, E. Analysis: Unpacking Attacks On Chinese Workers in Africa. (2016, August 5). Retrieved January 22, 2018, from https://international.thenewslens.com/article/45988

[7] World Bank’s World Development Report (2011). Retrieved January 12, 2018, from http://siteresources.worldbank.org/INTWDRS/Resources/WDR2011_Chapter2.pdf

[8] Coroado, H. and Brock, J. (2015, July 9). Angolans Resentful As China Tightens Its Grip. Retrieved January 12, 2018, from https://www.reuters.com/article/us-angola-china-insight/angolans-resentful-as-china-tightens-its-grip-idUSKCN0PJ1LT20150709

Africa Assessment Papers China (People's Republic of China) Tyler Bonin

Episode 0002: U.S. & PRC Maritime Competition (The Smell of Victory Podcast by Divergent Options)

9M2vSSDs

In this episode of The Smell of Victory Podcast Bob Hein leads the way in a discussion focusing on maritime competition between the United States and the People’s Republic of China while Steve Leonard and Phil Walter sprint to keep up!

This episode begins with a brief overview of A.T. Mahan and Julian Corbett and the differences between Sea Control and Power Projection.  Your trio of hosts then takes four ideas Andrew Marshall posed in his 1972 RAND paper “Long-Term Competition with the Soviets: A Framework for Strategic Analysis” and discusses them in a United States and People’s Republic of China maritime competition context.  Per Andrew Marshall:

A natural sequence of steps in the development of a policy, or strategy, for the long-term strategic arms competition is the following:

1. Characterization of the nature of the competition.

2. Delineation of u.s. goals in the competition.

3. Development of an appropriate strategy, or strategies, for achieving these goals.

4. Development of analytical methods and modification of inputs required to design and program U.S. strategic forces in accordance with this strategy.

Mahan, Corbett, Marshall, and even Bob Hein’s preferred cigar brands (Montecristo and My Father) are discussed in this episode!

You can listen via Sticher by clicking here, or iTunes by clicking here.  You can also listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

RSS Feed for The Smell of Victory Podcast by Divergent Options

The Smell of Victory Podcast by Divergent Options

Options to Manage the Kingdom of Saudia Arabia’s Nuclear Ambitions

Joshua Urness is an officer in the United States Army who has served both in combat and strategic studies roles.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


National Security Situation:  In a notional future the Kingdom of Saudi Arabia (KSA) Defense Ministry leadership are strongly advocating for initiating a domestic nuclear weapons development program and have begun discussing the issue at King Abdullah City for Atomic and Renewable Energy.

Date Originally Written:  January 14, 2018.

Date Originally Published:  March 26, 2018.

Author and / or Article Point of View:  This article is written from the point of view of a non-proliferation and arms control professional working in the U.S. government. This professional was asked to provide recommendations to members of the national security council on how to dissuade the Kingdom of Saudi Arabia from pursuing nuclear weapons.

Background:  This background, though containing some facts, is based on the above described notional situation. Key drivers for the KSA on the issue are anticipation of the expiration of the Iranian Joint Comprehensive Plan of Action within 10-15 years and persistent adversarial relations with Iran; likely attributable to continued Islamic Revolutionary Guard Corps activity throughout the Gulf Cooperation Council region. This adversarial activity includes perceived Iranian support of Houthi Rebels, by proxy, in Yemen, a force that frequently fires ballistic missiles into KSA territory and has destabilized the KSA’s southern border region.

For this notional scenario we assume that the KSA:

– is a member of the Nuclear Non-proliferation Treaty (NPT) and has actively supported the establishment of a Weapons of Mass Destruction Free Zone in the Middle East (as recently as May, 2017[1]).

– does not currently possess the technological, intellectual or infrastructural capability necessary to produce fissile material or a nuclear weapon[2].

– has been working to develop a domestic nuclear energy program.

– possesses nuclear weapon capable delivery vehicles which were purchased in 2007 from China (DF-21 ballistic missile variants) and has spent substantial resources developing its Strategic Missile Force[3].

– recently published a plan for state-level economic reformation (“Vision 2030”[4]).

– signed a memorandum of understanding with the U.S. in 2008 on nuclear energy cooperation, an objective also discussed with France[5].

– has illicit agreements with states such as Pakistan for “off the shelf” nuclear weapons capabilities based on the known fact that the KSA funded work by A.Q. Khan[6].

Significance:  This situation matters to the United States because of the following U.S. national security interests:

– Prevent the spread and use of weapons of mass destruction (National Security Strategy, 2017)

– “Checking Iran’s malign influence while strengthening regional friends and allies” (Defense Posture Statement, 2017) and, therefore, the security of trade within and through the Middle East.

– Support of the Nuclear Non-Proliferation Treaty and the NPT 2020 review.

– Support of weapons of mass destruction free zones and, therefore, the establishment of a nuclear weapon free zone in the Middle East.

Option #1:  The U.S. focuses on influencing KSA key stakeholder and future king, Crowned Prince Mohammed Bin Salman, to neutralize proponents of nuclear weapons development by supporting his keystone political platform, “Vision 2030.”

“Vision 2030” is an extremely ambitious and aggressive plan that is heavily reliant on both foreign direct investment[7] and non-native intellectual contribution to domestic institutional development. The U.S. could assist the KSA in providing both in a manner that emphasizes domestic nuclear energy and deemphasizes the pursuit of nuclear weapons. Mohammed Bin Salman, author of the plan, is expected to accede the throne soon (to ensure the passing of power under supervision of the current king), and already exercises significant authority regarding the KSA’s future and will be the primary stakeholder in all major decisions.

Risk:  This option accepts that the KSA develops a domestic nuclear energy program which may require more than customary monitoring to determine if this program will become dual-use for nuclear weapons development.

Gain:  This option demonstrates public U.S. support for key allies sustainable economic development in a manner that obscures specific intentions of policy and  will benefit the U.S. economy in long run because of increased ties to development.

Option #2:  The U.S. enhances its current security guarantee and cooperation by expanding the types of weapon systems/services delivered to the KSA and making rapid initial delivery of key systems, which will provide public regional assurance of commitment.

Recent weapons agreement with the KSA totaling $110 billion (bn) U.S. dollars ($350 bn over 10 years) does not include long-range stand-off weapons (land, air or sea) capable of counter-battery fire that could reach Iran. The agreements do include air defense systems (Patriot, THAAD) in limited numbers. This option would expand the current weapons agreement to include such stand-off weapons and increases in air defense systems. This option also emphasizes rapid delivery of equipment currently available to satisfy urgency of KSA military leaders. Expanding service packages with equipment would require forward stationing of U.S. service members in the KSA to train, maintain and develop technical institutional knowledge of new systems, further promoting STEM initiatives of “Vision 2030.”

Risk:  This option only passively addresses KSA nuclear weapon development discussions as it seeks to address insecurity by attempting to conventionally deter Iran.

Gain:  The U.S. Department of Defense is currently seeking acquisition of long-range munitions in significant numbers and funding from this expanded agreement could be used to jump-start production. Rapid delivery would reinforce commitment to all allies in the region.

Other Comments:  Option #1 maximizes benefits for both parties, better than other options. While U.S. national interests are supported in the region, the U.S. will also benefit economically from partnerships built out of acknowledgment and support of the KSA’s effort to achieve “Vision 2030.” Option #1 will also demonstrate U.S. engagement in the region’s key interests and political/economic initiatives. Discussions of nuclear weapons development will be decisively dealt with in a non-public manner; an issue that, if handled publicly, could cause concern in other regional states.

Recommendation:  None.


Endnotes:

[1] “United Nations PaperSmart – Secretariat – UNODA – NPT – First Session (NPT) – Documents.” Accessed September 22, 2017. http://papersmart.unmeetings.org/secretariat/unoda/npt/2017-first-session-of-the-preparatory-committee/documents/

[2] “Will Saudi Arabia Acquire Nuclear Weapons? | NTI.” Accessed September 22, 2017. http://www.nti.org/analysis/articles/will-saudi-acquire-nuclear-weapons/

[3] “Why Did Saudi Arabia Buy Chinese Missiles?” Foreign Policy. Accessed September 22, 2017. https://foreignpolicy.com/2014/01/30/why-did-saudi-arabia-buy-chinese-missiles/

[4] “Saudi Vision 2030.” Accessed September 22, 2017. http://vision2030.gov.sa/en

[5] Department Of State. The Office of Electronic Information, Bureau of Public Affairs. “U.S.-Saudi Arabia Memorandum of Understanding on Nuclear Energy Cooperation,” May 16, 2008. https://2001-2009.state.gov/r/pa/prs/ps/2008/may/104961.htm

[6] Sanger, David E. “Saudi Arabia Promises to Match Iran in Nuclear Capability.” The New York Times, May 13, 2015, sec. Middle East. https://www.nytimes.com/2015/05/14/world/middleeast/saudi-arabia-promises-to-match-iran-in-nuclear-capability.html

[7] “Goals | Saudi Vision 2030.” Accessed September 22, 2017. http://vision2030.gov.sa/en/goals

Capacity / Capability Enhancement Joshua Urness Nuclear Issues Option Papers Saudi Arabia (Kingdom of Saudi Arabia) Weapons of Mass Destruction

Assessment of the Role of Authoritarianism in Fomenting Extremism in the Arab World

Hari Prasad is an independent researcher on Middle East/South Asian Politics and Security. He holds a MA in International Affairs from George Washington University.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Role of Authoritarianism in Fomenting Extremism in the Arab World

Date Originally Written:  December 29, 2017.

Date Originally Published:  March 19, 2018.

Summary:  Many Countering Violent Extremism (CVE) works have focused on the role of individual and enabling factors in the rise of extremism, yet it is important to not overlook larger structural factors.  In particular, authoritarianism in the Arab world has proven to help foment conditions that can help encourage the rise of extremism, or discredit counter extremism efforts.

Text:  In recent years with the rise of extremist groups like the Islamic State, the concept of CVE has gained traction in policy and academic circles.  A lot of emphasis has been put on the individual and community level with ideas such as examining the effects of discrimination, mental illness, and extremist ideology on influencing individuals to join violent extremist organizations.  However, it is also important to have an understanding of how larger structural issues, such as regime type, might allow for an environment that fosters extremism.  Using examples from throughout the Arab World, this assessment paper will show how authoritarianism contributes to extremism by encouraging divisions in society, undermining religious messaging, normalizing extremist rhetoric, denying outlets for political expression, and even facilitating the rise of extremist groups.

First and foremost, many Arab regimes fail to counteract sectarianism in the region. Instead of resolving ethnic, sectarian, or other tensions, the regimes exploit them.  As Syrian opposition intellectual Yassin al-Haj Saleh has observed, sectarianism played an important role in consolidating Syrian President Bashar al-Assad and his regime’s power[1].  Encouraging divisions in society causes the various sects to suspect one another, and ‘otherise’ them.  This ‘otherising’ continues sectarian tension and demonization, something that becomes operationalized to deadly effect during times of upheaval.  Authoritarian regimes also try to position themselves, especially to minority groups, as the sole protectors from radical groups.  This protector role provides some blackmailing towards minorities to support the regime or else, while also playing into the narratives of extremist groups that majority groups like Arabs and Sunnis are discriminated against by the regime[2].

Especially in combatting religious extremism, authoritarian Arab regimes can easily undermine religious messaging.  Often Arab regimes attempt to hold influence or control their respective official religious establishments to monitor the content as well as prevent criticism of the regime itself[3].  Although this has been used to also try to counteract extremist messaging, the fact that many religious establishments rarely stray from the regime narrative undermines counter-extremist messaging.  As official religious establishments primarily propagate a pro-regime narrative, they will be accurately perceived as simply another mouthpiece for the authoritarian regime.  Rather than serving as an important pulpit for counteracting extremist messages, the delegitimization of these religious institutions instead inadvertently encourage followers to seek out alternative narratives.

Along with this regime undermining of religious messaging, religion also is a valuable tool for regimes to turn to in times of crisis.  Former Iraqi President Saddam Hussein enacted his ‘faith campaign’ while dealing with the harsh sanctions regime.  This campaign led to the rise of new Islamic institutions and organizations, including institutions that the Islamic State’s leader, Abu Bakr al Baghdadi, attended[4].  In Egypt, despite overthrowing the democratically elected Islamist Mohammad Morsi, Egyptian President Abdel Fattah al-Sisi has also turned to Islam to help prop up his rule[5].  Regime manipulation of religion only further delegitimizes traditional religious leaders, while also normalizing religious language in denigrating their opponents.  Indeed, one of Egypt’s former Muftis went as far as to engage in similar takfirist (to declare a Muslim an apostate) justifications against Sisi’s opponents that the Islamic State and other extremist groups have engaged in[6].  Although it can be debated whether these initiatives are carried out to co-opt leaders or out of the personal faith of the leaders, these initiatives instead help normalize extremist rhetoric rather than counteracting it.

Many authoritarian regimes in the Arab World also limit political freedoms and outlets for political expression and change.  Indeed, scholars like Mohammad Hafez have demonstrated the role that repression and political exclusion has played in the rise of Islamic extremist movements around the world[7], especially in the Arab World.  Rather than serving as islands of stability, authoritarian regimes remain fragile and encourage resentment.  As there are few outlets to express one’s political opinions, and many ‘opposition’ parties are co-opted by the regimes, this encourages the rise of groups that lay outside of the realm of formal politics.

Finally, authoritarian regimes can directly facilitate the rise of extremist groups.  It is no secret that since the 9/11 attacks, many Westerners have preferred the ‘secular’ dictators instead of an ‘Islamist.’  These secular dictators have used the specter of Islamism to justify crackdowns and repression against all opposition.  While playing into the other factors that encourage victims to seek alternative ways of confronting the state, this has also proven useful for states that lack international legitimacy.  It is well-known that to support its narrative that it was simply fighting terrorists, the Assad regime released extremists and other unsavory characters from its prisons during the initial uprising in Syria[8].  As the initial protests turned to an uprising, these former prisoners formed organizations that helped paint the groups opposing Assad as extremist.  Groups like the Islamic State even temporarily received support from the Assad regime in its fight against the Free Syrian Army and other Syrian opposition groups.  Of course these are temporary alliances, but it demonstrates how authoritarian regimes will tactically allow extremist groups to form for the sake of their own survival.

Without reforming or changing these authoritarian structures in the Arab World, CVE efforts will only have a limited effect.  Of course, the demise of authoritarianism will not necessarily lead to an extremist free region.  After all, it is the newly democratic Tunisia that has become a large contributor for fighters for the Islamic State.  Nor will authoritarian reform lead to the erasure of extremist ideologies.  Yet, changing these authoritarian structures will provide a political opening that will allow better combatting of extremist ideology, while also providing a less repressive life for those that live in the region.  Authoritarian reform should not be mistaken as purely a humanitarian effort.  It is no secret that Western support for authoritarian regimes has been a common grievance for many extremist groups in the Middle East.  Mohammad Hafez in his keynote remarks to the RESOLVE Network in 2016 noted that the choice between repressive states or extremists, or rather “between barrel bombs and beheadings” is a false one, and one that the regimes themselves try to create[9].  Extremism in the region will never be fully addressed until policymakers understand the structural factors within authoritarian regimes that drive this behavior.


Endnotes:

[1] Saleh, Y. A. (2017). The Impossible Revolution: Making Sense of the Syrian Tragedy. Chicago, IL: Haymarket Books.

[2] Shabi, R. (2014, April 10). Battling Perceptions: Minorities in the Arab World. Retrieved December 29, 2017, from http://www.aljazeera.com/indepth/opinion/2014/04/battling-perceptions-minorities–20144965348535478.html

[3] Brown, N. (2017, May 11). Official Islam in the Arab World: The Contest for Religious Authority. Retrieved December 29, 2017, from http://carnegieendowment.org/2017/05/11/official-islam-in-arab-world-contest-for-religious-authority-pub-69929

[4] McCants, W. (2015, September 1). The Believer: How Abu Bakr al-Baghdadi Became Leader of the Islamic State. Retrieved December 29, 2017, from http://csweb.brookings.edu/content/research/essays/2015/thebeliever.html

[5] Springborg, R. (2014, May 24). Sisi’s Secret Islamism. Retrieved December 29, 2017, from https://www.foreignaffairs.com/articles/middle-east/2014-05-26/sisis-secret-islamism

[6] Elmasry, M. (2015, June 27). Ali Gumah: Sisi’s Most Loyal Islamic Scholar. Retrieved December 29, 2017, from http://www.middleeasteye.net/columns/ali-gumah-sisi-s-most-loyal-islamic-scholar-1205811558

[7] Hafez, M. M. (2005). Why Muslims Rebel: Repression and Resistance in the Islamic World. Boulder: Lynne Rienner .

[8] Gutman, R. (2016, December 01). Assad Henchman: Here’s How We Built ISIS. Retrieved December 29, 2017, from https://www.thedailybeast.com/assad-henchman-heres-how-we-built-isis

[9] 2016 RESOLVE Forum Flashback: Keynote Speaker Dr. Mohammed Hafez. (2017, September 15). Retrieved December 29, 2017, from http://www.resolvenet.org/news/2016-resolve-forum-flashback-keynote-speaker-dr-mohammed-hafez

Assessment Papers Government Hari Prasad Violent Extremism

Options for the U.S. to Deter China in the East & South China Seas

Lieutenant Colonel Christopher Curtin is a Field Artillery Officer with over 20 years of experience in the United States Marine Corps, including at the Pacific Division of Plans, Policies, and Operations at Headquarters Marine Corps.  Annie Kowalewski is a Chinese military and defense researcher at Georgetown’s Center for Security Studies. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  Chinese militarization of artificial islands in disputed waters in the East and South China Seas.

Date Originally Written:  March 1, 2018.

Date Originally Published:  March 12, 2018.

Author and / or Article Point of View:  The authors are a military member and a defense researcher.  The authors believe that Chinese actions in the East and South China Sea are destabilizing and threaten to shift the balance of power in the Asia-Pacific region.

Background:  China is showing no evidence of slowing down its territorial aspirations within the “nine dash line” and continues to emplace anti-aircraft guns and close-in weapons systems on its man-made islands in the East and South China Seas[1].  China also uses its maritime militia to bully neighboring countries and extend Chinese fishing rights and territorial reach.  The United States has thus far been unsuccessful in responding to or deterring these Chinese challenges to the status quo.

Significance:  Chinese actions represent a “salami-slicing” strategy aimed at slowly changing regional norms and asserting Chinese dominance in the East and South China Seas.  This strategy allows China to exert influence and establish itself as a regional hegemon, thereby threatening the balance of power and U.S. primacy in the region.  Chinese militarization and power projection also threaten the United States’ allies and security partners, some of which the United States is bound by treaty to offer security assistance.

Option #1:  The United States invests in capabilities-based deterrents that can deter specific Chinese actions.

Risk:  China has objected to the capabilities that provide this type of deterrent, such as the new F-35B fighter operating on naval vessels in the pacific[2].  China may use the deployment of these capabilities as an excuse to finally militarize islands such as the Scarborough Shoal.

Gain:  A capabilities-based deterrent will make Chinese islands in the East and South China Seas vulnerable and, ultimately, a military liability rather than an advantage.  New technologies such as the F-35B allow the United States more flexibility when operating in the Pacific, by providing U.S. and allied commanders with a 5th generation aircraft that is normally only employed off traditional U.S. aircraft carriers.  Option #1 would not only help offset the eventual Chinese People’s Liberation Army Navy (PLA(N)) numerical superiority in the Pacific, but also demonstrate the U.S. commitment to modernizing a capability that has been historically suited for military operations against static, geographically isolated island targets.  This option may help shift China’s risk calculus when deciding how aggressively it hopes to militarize the islands, once it realizes that increased island investment actually increases vulnerability instead of capability.

Option #2:  The United States invests in strategic deterrence by helping boost allies’ and security partners’ amphibious capabilities.

Risk:  Boosting allies’ and security partner amphibious capabilities runs the risk of antagonizing China.  China has already strongly condemned proposed amendments to the Japanese constitution calling for a larger defense budget[3].  China has been known to use economic and political coercion to pressure regional countries to adopt, or abandon, policies.

Gain:  Boosting allies’ and security partner amphibious capabilities will be key to creating a sea force able to challenge an increasingly capable PLA(N).  This option would also allow allies and security partners to better deal with Chinese salami-slicing activities by providing them with the capability to deter or engage the Chinese on their own, rather than rely on U.S. deployments and assistance[4].

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] Bader, Jeffrey. (2014). The U.S. and China’s Nine-Dash Line: Ending the Ambiguity. Retrieved from https://www.brookings.edu/opinions/the-u-s-and-chinas-nine-dash-line-ending-the-ambiguity/.

[2] Lockheed Martin. (2018). The F-26B Lightning II. Retrieved from https://www.f35.com/about/variants/f35b.

[3] Huang, Kristin. (2017, October 23). China to keep wary watch on Abe’s push to change pacifist constitution. Retreived from http://www.scmp.com/news/china/diplomacy-defence/article/2116635/china-keep-wary-watch-abes-push-change-pacifist.

[4] Erickson, Andrew. (2016, September 21). Seapower and Projection Forces in the South China Sea. Retreived from https://armedservices.house.gov/legislation/hearings/seapower-and-projection-forces-south-china-sea.

A2AD (Anti Access and Area Denial) Allies & Partners Annie Kowalewski China (People's Republic of China) Christopher Curtin Maritime Option Papers South China Sea United States

Options for the Strategic Goals of the Royal Canadian Navy

Lieutenant(N) Fred Genest is a Naval Warfare Officer in the Royal Canadian Navy and has deployed operationally in HMCS Charlottetown and HMCS Fredericton.  He is currently completing a Master of Public Administration degree while on staff at the Royal Military College of Canada.  He tweets at @RMCNavyGuy.  This article does not represent the policies or opinions of the Government of Canada or the Royal Canadian Navy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The Royal Canadian Navy (RCN) is in the process of recapitalizing its fleet but has not had a significant debate on its strategic goals in decades.

Date Originally Written:  December 19, 2017.

Date Originally Published:  March 12, 2018.

Author and / or Article Point of View:  This article is written from the point of view of the senior Canadian political and military leadership.

Background:  Successive governments have asserted that Canada must deploy warships overseas to help maintain international security and stability[1].  Despite the RCN’s fleet recapitalization, there has been no debate about the best way to employ its forces.

Current RCN employment is based on history, Cold War thinking, and national myths. Canada sees itself as “punching above its weight” since the Second World War.  In that war, Canada gave control of its forces to the British and American leaders, with disastrous results at home such as the closure of the St. Lawrence seaway.  During the Cold War, Canadian warships deployed with North Atlantic Treaty Organization (NATO) Standing Naval Forces; this continues in the 21st century.  In its role as a “junior partner” since World War 2, Canada has followed the British and American lead in security and defence, subordinating its national interest to the alliance’s goals.

Significance:  As a sovereign middle power, Canada can set its own strategic priorities[2].  A commitment-capability gap—insufficient units to accomplish designated tasks—has been identified in the RCN since at least the 1964 White Paper on Defence[3].  The Canadian Department of National Defence (DND) saw this as normal at the end of the Cold War[4].  A 2013 report[5] stated that Canada would have difficulty meeting its readiness and force posture requirements until well into the 2020s.  Adjusting the current strategy could help reduce the gap.

Option #1:  Maintain the status quo with a medium global force projection navy[6], constant rotations with NATO, and a worldwide presence.

Risk:  With Option #1 the commitment-capability gap could grow.  The Government of Canada (GoC) intends to be prepared to participate in concurrent operations across multiple theatres[7].  However, readiness goals will not be met until the late 2020s[8], perhaps even until the Canadian Surface Combatant (CSC) project is completed in the 2040s.  Manning is, and will remain, a problem in certain areas like anti-submarine warfare and engineering.

By continuing the historical pattern of letting alliance leaders determine its strategy, Canada is abdicating its responsibility to protect its national interests.

Gain:  There is prestige in being one of the few navies that routinely deploys around the world[9], and RCN ships are recognized by its allies as the “go-to” during operations[10].  Option #1 improves Canada’s standing in the world, especially amongst peer allied nations, and allows Canada to exercise some leadership in international affairs.  This increased leadership role allows Canada to further its interests through diplomacy.

Furthermore, there is a morale-boosting effect in having regular overseas deployments; sailors, like soldiers, are keen to acquire “bits of coloured ribbon.”  In the RCN, this is achieved through overseas operations.  Regular overseas deployments or lack thereof may therefore be a factor in recruitment and retention.

There is also an internal political gain: by highlighting successes abroad, the GoC can raise awareness of the RCN and increase popular support for its foreign policy[11].  This is beneficial to the RCN, as popular support can translate into political pressure to obtain the tools required to achieve its institutional goals.

Option #2:  Downgrade the RCN to a medium regional power projection navy.  Cease overseas deployments except for specific, time-limited United Nations or NATO missions critical for peace or security.

Risk:  No longer routinely deploying internationally would be seen as a loss of prestige, and could lead to a loss of informal diplomatic leadership.

Local operations are often unpopular with sailors, and removing the opportunity to go overseas could lead to a loss of morale, with obvious effects on retention.  Also, one of the main ways Canadian sailors are trained for full-spectrum operations is through workups leading to an overseas deployment, and through multinational exercises while deployed.  Removing those training opportunities could reduce personnel readiness.  Option #2 could also harm the justifications for future, or even current, procurement projects.

Gain:  RCN commitments would be more in line with capabilities.  The GoC’s commitments will continue to be difficult for the RCN to meet in the next decade[12]; reducing the level of commitment would allow the RCN and its allies to plan based on actual capabilities.

Carefully selecting operations as part of Option #2 would also let Canada set its own priorities for its warships.  In recent years, Canadian ships have taken part in operations that were only vaguely related to Canadian interests, such as European Union migrant activities.  Not committing to those operations would free up the RCN to take part in more nationally-relevant operations.

With the CSC, Canada will maintain a full-spectrum capability, and being a medium regional power projection navy does not preclude overseas deployments.  Option #2 would bring Canada in line its European NATO peers, who keep their warships near their own waters, to protect their national interests.

Another challenge for the RCN is its maintenance budget, which is insufficient to meet all requirements. One of the effects is that ships have to swap parts to achieve material readiness and some repairs are left undone due to a lack of parts or available personnel.  Deployments, especially repeated overseas deployments by the same units, are hard on equipment. Reducing the number of overseas deployments under Option #2 would reduce premature failures and maintenance costs.

Other Comments:  Option #2 may not be feasible in the current political climate, but this does not preclude vigorous examination.

Recommendation:  None.


Endnotes:

[1] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf 
— Leadmark 2050 is a document produced by the Royal Canadian Navy to set its long-term vision beyond its five-year strategic plan. It is a follow-up to the 2001 publication, Leadmark 2020.

[2] Lindley-French, J. (2017). Brexit and the Shifting Pillars of NATO. Retrieved from http://www.cgai.ca/brexit_and_the_shifting_pillars_of_nato

[3] Department of National Defence. (1964). White Paper on Defence. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2012/dn-nd/D3-6-1964-eng.pdf — While it did not call it as such, the concern was evident.
  In Commonwealth countries, White Papers are used to provide information about government policy to parliamentarians and the public.  In Canada, there have been three White Papers on Defence since World War 2: 1964, 1971, and 1994. Major defence policy documents were also released in 1984, 1992 and 2017.

[4] Department of National Defence. (1987). Challenge and commitment : a defence policy for Canada. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2012/dn-nd/D2-73-1987-eng.pdf

[5] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf 
— This document evaluated the RCN’s performance from 2008 to 2013, particularly the ability to generate and employ naval forces as directed by the GoC.

[6] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf

[7] Department of National Defence. (2017b). Strong Secure Engaged: Canada’s Defence Policy. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2017/mdn-dnd/D2-386-2017-eng.pdf

[8] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf

[9] Department of National Defence. (2017a). Leadmark 2050: Canada in a New Maritime World. Ottawa. Retrieved from http://navy-marine.forces.gc.ca/assets/NAVY_Internet/docs/en/analysis/rcn-leadmark-2050_march-2017.pdf

[10] Department of National Defence – Chief Review Services. (2013). Evaluation of Naval Forces. Ottawa. Retrieved from http://publications.gc.ca/collections/collection_2015/mdn-dnd/D58-33-2013-eng.pdf

[11] Ibid.

[12] Ibid.

Canada Fred Genest Maritime Option Papers Strategy

China’s Options Towards the (Re)emerging Quadrilateral Security Dialogue

Adam Ni is a researcher at the Strategic and Defence Studies Centre, Australian National University.  His areas of interest include China’s foreign and security policy.  He can be found on Twitter @adam_ni.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


National Security Situation:  The People’s Republic of China (China) is facing the (re)emergence of the Quadrilateral Security Dialogue, known as the Quad, consisting of the United States, India, Japan and Australia.  The unstated aim of the Quad is to constrain China’s growing power in Asia through possible military and economic cooperation that would raise the cost if Beijing challenges the status quo.

Date Originally Written:  February 28, 2018.

Originally Published:  March 5, 2018.

Author and / or Article Point of View:  The author is a scholar of China’s foreign and security policy.  The article is written from the point of view of Chinese decision-makers considering policy options in response to the Quad’s challenges.

Background:  The Quad can be traced back to 2007 when diplomatic efforts culminated in a multilateral naval exercise off the Bay of Bengal.  While the countries involved contended that their activities were not aimed at China, it was clear that these activities were largely a response to China’s growing power.  However, the Quad was short-lived with Australia pulling out in February 2008 under Chinese pressure[1].

Recently, the Quad has been revived in the face of an increasingly powerful and assertive China with expanded geopolitical ambitions.  In November 2017, officials from the Quad nations met on the sidelines of the East Asia Summit in the Philippines and agreed that a “free, open, prosperous and inclusive Indo-Pacific region” is in the interest of all countries[2].  This meeting was followed in January by the meeting of the Quad navy chiefs at the Raisina Dialogue in India.  During the meeting, Admiral Harry Harris, the Commander of U.S. Pacific Command, characterized China as a “disruptive, transitional force” in the region, and urged Quad nations to take measures against China’s “unilateral ways to change the use of global commons” and uphold “rule-based freedom of navigation[3].”  This sentiment was echoed by the navy chiefs of the other three Quad nations.

Significance:  While it is still too early to tell what the Quad would entail, in theory, it aims to constrain China’s growing power and to ameliorate China’s behavior by altering Beijing’s strategic calculus.  The military dimension of the Quad could take the form of expanded military cooperation that would raise the cost for China to use or threaten the use of force, including in relation to the East and South China Seas.  The economic dimension could take the form of expanded economic and infrastructure cooperation that would compete with China’s Belt and Road Initiative, a grand plan to reshape the world economy with China at the center.

Option #1:  Reassurance.  China continues to emphasize to the Quad nations its intent to develop peacefully through public statements and diplomatic channels.

Risk:  Without pushing back against the Quad, the Quad nations and others in the region may believe that China is unwilling to impose a cost on them for challenging China’s security and economic interests.  This lack of push back may lead to further coalescence of the Quad and may even draw in other states in the region that have become wary of China’s growing power, including those that have territorial disputes with China in the South China Sea.

Gain:  Option #1 may help to undermine the narrative of an ambitious China with a willingness to adopt coercive means to protect and advance its interests.  This option would strengthen the arguments of domestic forces in the Quad nations that advocate a softer approach in responding to Chinese power.

Option #2:  Punishment.  China applies a high degree of economic and diplomatic pressure on Quad nations to demonstrate the cost of challenging China’s interests and thus deter further challenges.  This option could take the form of economic coercion, formal diplomatic protests, and the downgrading of bilateral cooperation in key fields.

Risk:  Option #2 would strengthen the rationale for the Quad and the argument for constraining China’s power in the first place by demonstrating China’s willingness to adopt coercive measures against those that challenge its interests.  This option may further exacerbate the negative perception of China among the Quad nations, especially where there is already a lively debate about China’s influence (such as in Australia and the United States).  In addition, economic coercion may damage the Chinese economy and in the long run make the target economies less dependent on China.

Gain:  China demonstrating strength and resolve early on may lead to the collapse of the Quad if the Quad nations are not willing to pay the high cost of challenging China’s interests.  For example, Australia is highly dependent on China for trade and investment flows.  The Chinese government could put in place measures to reduce Chinese tourists or students from going to Australia and link these restrictions to Australia’s involvement with the Quad.  Such measures may also deter other regional countries from cooperating with the Quad against China’s interests.

Option #3:  Reassurance and caution.  China continues to emphasize its peaceful intent while also signaling its willingness to impose an economic and political cost on the Quad nations should they continue to challenge China’s interests.

Risk:  Option #3 may not be effective due to a lack of concrete cost imposed on the Quad nations, through, for example, coercive economic measures.  At the same time, the cautioning may be interpreted as an aggressive warning of China’s coercive intent, further exacerbating public anxiety in the Quad nations.

Gain:  This approach may be enough to forestall the further development of the Quad through providing reassurance but also signals China’s resolve to protects its interests.  Option #3’s key benefit is that it does not incur large political or economic cost for China immediately, but hinges Chinese retaliation on further Quad activities.

Other Comments:  The revived Quad is still in the early stages of its development, and it is too early to tell what the Quad would entail.  The above options are presented on the basis that the Quad may involve military and economic dimensions that challenge China’s interests, including its territorial claims in the South China Sea as well as its Belt and Road Initiative.  Given the diversity of strategic interests between the Quad nations in relation to China, there is a likelihood that the Quad will not develop beyond a mechanism for dialogue.

Recommendation:  None.


Endnotes:

[1] Indrani Bagchi, “Australia to pull out of ‘quad’ that excludes China,” Times of India, February 6, 2008. Available at: https://timesofindia.indiatimes.com/india/Australia-to-pull-out-of-quad-that-excludes-China/articleshow/2760109.cms.

[2] “India-Australia-Japan-U.S. Consultations on Indo-Pacific (November 12, 2017),” Ministry of External Affairs, Government of India, November 12, 2017. Available at: http://mea.gov.in/press-releases.htm?dtl/29110/IndiaAustraliaJapanUS_Consultations_on_IndoPacific_November_12_2017

[3] “‘China a disruptive power,’ say navy chiefs of Quadrilateral nations,” Times of India, January 19, 2018. Available at: https://timesofindia.indiatimes.com/india/china-a-disruptive-power-quad-nations-navy-chiefs/articleshow/62562144.cms.

Adam Ni Australia China (People's Republic of China) India Japan Option Papers United States

Options to Build Local Capabilities to Stabilise the Lake Chad Region

Fulan Nasrullah is a national security policy adviser based in Nigeria.  He currently works for an international research and policy advisory firm.  Fulan tweets at @fulannasrullah and blogs here.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government.


National Security Situation:  Counterinsurgency and stabilisation campaigns in the Lake Chad region.

Date Originally Written:  December 11, 2017.

Date Originally Published:  March 5, 2018.

Author and / or Article Point Of View:  This article is written from the point of view of a Nigerian National Security Advisor, offering options on the building of key local capabilities in the Lake Chad region to further degrade destabilising non-state armed groups in the region, while fostering stability in the area.

Background:  With the launch of conventional offensives by the Nigerian and Chadian armies in 2015, non-state armed groups in the Lake Chad region and Northeast Nigeria have lost much of the territory which they had earlier captured.  The successes of the regional governments’ conventional offensives have forced the non-state armed groups to return to a heavy emphasis on revolutionary and asymmetric warfare, which the local armies and governments are ill prepared to confront.

The conventional offensive resulted in a situation where local security capabilities, already inadequate, are  increasingly overstretched and worn down, by having to manage multiple security problems over such a wide area.

The Nigerian Army has an estimated 40,000-45,000 combat and support personnel (out of a total 130,000+ personnel) deployed in Northeast Nigeria, in over forty combat battalions.  These include the battalions that make up the in theatre 7 and 8 Divisions, plus those backfilling from 3, 1 and 2 Divisions.  These forces represent the majority of the Nigerian Army’s combat deployable strength, most of whom have been serving a minimum of 2 years of continuous deployment in the Northeast theatre.

However, unlike the much larger Nigerian military, other regional armies involved in this conflict have fewer manpower and material resources to expend.  These less capable forces struggle to combat an insurgency that has proven itself adaptable, and which despite losing conventionally, has sustained itself and progressively gained momentum on the asymmetric front.  The insurgency specifically uses armed groups to offset the disadvantage they suffer in conventional strength, through guerrilla operations, terror, and a heavy focus on information operations and ideological education and propagation targeted at local populations in rural areas.

Weak institutional capabilities, in addition to lack of intelligence and analysis-based understanding of these armed groups, have contributed to multiple conflicting and unrealistic strategies from the regional states, plus enhanced insurgent momentum.

Significance:  United States investment in building local capabilities is a necessity for both the U.S. and Lake Chad regional states, both to degrade active non-state armed groups in the region, and to build, foster, and maintain stability.  Without this investment by the United States, regional states will  be unable to stop the conflict which, though currently at a  strategic stalemate, could turn into a strategic victory for the insurgent groups.

While Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad poses a serious threat to local stability, the Islamic State’s West African Province (ISWAP) is a greater worry for United States’ interests globally and in the long-term.  The power vacuum created by regional states failing to degrade insurgent capabilities[1], thus ceding territory, will create a huge opening for ISWAP and its local affiliates in the Lake Chad, Sahel, and Libyan regions to exploit.  Power vacuums have already been created in the Lake Chad Islands[2], and will be further created as the Nigerian government plans to abandon the rural Borno State[1].

Option #1:  The U.S. invests solely in a kinetic buildup, by establishing a regional infantry and counterinsurgency training centre in Nigeria, in the mold of the Fort Irwin National Training Centre, drawing on lessons the U.S. military learnt in Iraq and Afghanistan, to train local militaries.  A kinetic build up would also involve providing training and funding for more troops and units for the Nigerian and Chadian armies.  These troops would be dedicated to the clearing out of the Lake Chad Islands and areas around the Lake, in addition to training and funding more special operations units with the firepower and mobility necessary to engage in relentless pursuit of insurgents.  Finally, this option would invest in training, funding, and arming already existing local volunteer militia and paramilitary organisations such as the Civilian Joint Task Force in Nigeria, while embedding U.S. advisors with both militia, paramilitary, and regular armed forces units down to the platoon level.

Risk:  Option #1 results in the U.S. de facto owning the war against non-state armed groups in the Lake Chad region.  In the U.S. this owning would lead to deeper engagement in yet another foreign war in an era of President Donald Trump’s “America First,” and increase the risks of more American combat deaths in this region with the accompanying political blowback.  Within the region, Option #1 would increase resistance from local political and military elements who do not want to admit they are incapable of dealing with the crisis themselves, or who may simply be war profiteers not interested in this conflict ending.

Gain:  Option #1 results in the degrading of the military, logistic, and organisational capabilities of ISWAP and Jamaa’atu Ahlis-Sunnati Lid-Da’wati Wal-Jihad and the rolling back of ISWAP’s growing structure in the region.  This degrading and rolling back would place destabilising actors under constant crushing military pressure, increase the tactical performance of local military forces, and use existing volunteer militias to stabilize the government-controlled areas when the conventional military forces depart.  All of the preceding will enable military units to concentrate on offensive operations thus eliminating the ability of global-level actors, e.g. the Islamic State and Al-Qaeda, to use bases and ungoverned spaces in the region to attack U.S. interests.

Option #2:  The U.S. invests in a non-kinetic build-up, by helping to establish and expand regional states’ information operations capabilities particularly in electronic warfare, psychological operations, and targeted information dissemination via “Radio-In-A-Box” and other mediums.  Option #2 also includes the U.S. providing training and funding for comprehensive reformations of local intelligence services to create lacking signals intelligence, human intelligence, and intelligence analysis capabilities.  Option #2 will enhance the U.S. Security Governance Initiative programme[3] which seeks to enhance local civil administration capabilities in law enforcement, anti-corruption, and criminal justice, and enhance local capabilities to deliver humanitarian support and government services to communities in the conflict zone.

Risk:  Option #2 reduces emphasis on degrading insurgent capabilities so soft-power efforts are properly funded.  This option would leave the insurgents alone and lead to indirect validation of regional government falsehoods that the insurgents have been defeated and the war is over.  This indirect validation will foster nonchalance and complacency from states of the region, to the strategic advantage of the insurgents. Option #2 will ensure de facto reduction of pressure on the insurgents, which gives room for the insurgents and their external allies to exploit the resultant power vacuum.

Gain:  Option #2 strengthens local governance capabilities, increases civil stability in government controlled areas, and is less expensive, less visible, and shorter term in an era of “America First.”  Option #2 would greatly reduce the risk of American combat deaths.

Other Comments:  None

Recommendations:  None.


Endnotes:

[1] Carsteen, Paul and Lanre, Ola. (December 1, 2017) “Nigeria Puts Fortress Towns At Heart Of New Boko Haram Strategy”, Reuters, retrieved from: https://www.reuters.com/article/us-nigeria-security-borno/nigeria-puts-fortress-towns-at-heart-of-new-boko-haram-strategy-idUSKBN1DV4GU

[2] Taub, Ben (December 4, 2017), “Lake Chad: World’s Most Complex Humanitarian Disaster”, New Yorker Magazine, retrieved from: https://www.newyorker.com/magazine/2017/12/04/lake-chad-the-worlds-most-complex-humanitarian-disaster

[3] Chalfin, Julie E. and Thomas-Greenfield, Linda. (May 16, 2017), “The Security Governance Intiative” PRISM Vol 6. No.4, Center For Complex Operations, National Defense University (US) retrieved from: http://cco.ndu.edu/News/Article/1171855/the-security-governance-initiative/

Africa Fulan Nasrullah Insurgency & Counteinsurgency Irregular Forces Lake Chad Option Papers United States

Call for Papers: The Pacific

89920-050-809B5D63

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for papers assessing situations or discussing options related to national security interests with a Pacific Ocean nexus.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by April 13th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

One of our Strategic Advisors, Dr. Kori Schake, offered the following prompts to inspire potential writers:

– Assess the potential second-order effects of a U.S. preventative strike on North Korea.

– Develop options to compensate for the U.S. losing blue water invulnerability and air superiority in potential conflicts with China.

Our Twitter and Facebook followers offered the following prompts to inspire potential writers:

– Assess U.S. national interests regarding North Korea and their associated intensities.

– What options does the U.S. have regarding North Korea?

– Assess the threat of sea-based missile capabilities.

– What options do countries have to defend against sea-based missile capabilities?

– Assess the threat to freedom of navigation posed by Chinese man-made islands in the Pacific.

– What additional options does China have in a military conflict in the Pacific now that they have built and militarized islands?

– What options does the U.S. have towards the tri border region of Malaysia, Indonesia, and the Philippines?

– What options does the U.S. have regarding joint military training with China?

– Assess if a U.S. military-to-military relationship with Japan prior to World War 2 would have impacted the likelihood of war.

– Assess the impact narratives about World War 2 have on today’s security environment.

– What options does the U.S. have to balance its priorities and risk as it shifts away from the Middle East and towards the Pacific?  A specific focus on shifting strategic air assets, munitions, and wartime reserve and prepositioned stocks stocks away from two still active wars in Iraq and Afghanistan and partner activities in Yemen is welcome.

Call For Papers Option Papers

Episode 0001: U.S. National Security Strategy (The Smell of Victory Podcast by Divergent Options)

SZOozPgx

While Thru-Hiking the Appalachian Trail in 2017, Divergent Options co-founder Bob Hein listened to a lot of podcasts.  Along the way, he asked himself, “Why not a Divergent Options podcast?”

Bob completed his thru-hike and has taken the helm on a new line of effort at Divergent Options, a podcast called The Smell of Victory.

The Smell of Victory podcast debuts with 58 minutes of Phil Walter, Steve Leonard, and Bob Hein discussing the United States National Security Strategy (NSS).  They begin by noting the requirements for an NSS established in 50 U.S. Code § 3043, and then examine the “Strategy in a Regional Context” portion of President Donald Trump’s NSS, which begins on page 45 of the document.  As always, Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  

You can listen via Sticher by clicking here, or iTunes by clicking here.  You can also can listen on our website by clicking play below or download The Smell of Victory to your favorite podcatcher via our RSS feed below.

RSS Feed for The Smell of Victory Podcast by Divergent Options

The Smell of Victory Podcast by Divergent Options

Should I Stay or Should I Go Now?  Options for the U.S. Presence in Syria

Dr. Christopher Bolan has served in Jordan, Tunisia, and Egypt and worked as a Middle East foreign policy advisor to Vice Presidents Gore and Cheney.  He presently teaches and researches national security issues at the Strategic Studies Institute at the U.S. Army War College.  He can be found on Twitter @DrChrisBolan.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.  


National Security Situation:  U.S. Force Posture in Syria following the strategic defeat of the Islamic State (IS).

Date Originally Written:  February 23, 2018.

Date Originally Published:  February 26, 2018.

Author and / or Article Point of View:  Author writes from the perspective of a seasoned regional analyst focusing on the Middle East.

Background:  The U.S. military battle against IS is nearing completion in both Iraq and Syria.  An intensified U.S. air campaign in support of local ground forces has effectively (and literally) destroyed the physical infrastructure of the so-called IS “caliphate” that at its peak occupied a territorial expanse roughly equivalent to that of Great Britain, extended its brutal authority over 11 million people, and gave it access to annual economic resources estimated at $1 billion[1].  In Iraq, a combination of U.S.-equipped and trained Iraqi security forces fighting alongside a variety of Shi’ia militia groups (some backed by Iran) allowed Iraqi Prime Minister Haider al-Abadi to declare victory over IS in early December 2017.  In Syria, Kurdish and Syrian Arab forces enabled by U.S. special operations forces and an aggressive coalition bombing campaign liberated the IS caliphate’s self-proclaimed capital at Raqqa last fall and IS is now largely restricted to the Idlib province.

Significance:  The combined coalition military advances in both Iraq and Syria represent the strategic defeat of IS as a terrorist organization capable of holding territory in the Middle East.  These visible defeats strike at the heart of IS’s claim to leadership of the global jihadist movement.  The destruction of the ‘caliphate’ leaves IS a much diminished and impoverished organization.  Nonetheless, these significant battlefield victories do not entirely eliminate the IS threat as it remains capable of inspiring (if not planning) attacks that threaten regional instability and target Western interests.  In Iraq, a continued U.S. military presence codified through traditional security assistance programs in coordination with the central Iraqi government in Baghdad is virtually a foregone conclusion.  However, Syria presents a different strategic calculus for U.S. policymakers as they weigh options at a time when Syrian President Bashar al-Assad appears to be consolidating his control with the active support of his allies in Moscow and Tehran.

Option #1:  Establish a long-term U.S. military presence in Syria.  U.S. Secretary of State Rex Tillerson announced in mid-January 2018 that the U.S. “will maintain a military presence in Syria” for an indefinite period of time[2].  In doing so, Tillerson committed the U.S. to achieving an expansive set of strategic objectives that include: ensuring the defeat of IS and al-Qa’ida; diminishing the influence of Iran; facilitating the return of Syrian refugees; advancing a United Nations (UN)-led political resolution to the crisis; and guaranteeing that Syria is free of weapons of mass destruction.

Risk:  The continued presence of the U.S. military in Syria is opposed to one extent or another by virtually every other important actor in Syria including the internationally recognized government of President Bashar al-Assad, Russia, Iran, and even North Atlantic Treaty Organization (NATO) ally Turkey.  The proximate defeat of IS and the failure of the U.S. Congress to explicitly authorize U.S. military operations in Syria seriously erodes the international and domestic legal basis for this presence.  More importantly, the actual risk of direct military conflict between the U.S. and any one of these outside actors or their local proxies is real and growing.  In early February 2018, the U.S. conducted defensive strikes killing hundreds of Syrian troops and dozens of Russian contractors.  Meanwhile, the U.S. announcement that it was creating a Kurdish security border force in northern Syria prompted the ongoing Turkish incursion into Afrin that is now threatening a direct military confrontation between a NATO ally and both the Syrian Army and U.S-backed Kurdish militias.  Lastly, Turkish President Recep Erdogan has directly threatened the U.S. with a punitive ‘Ottoman slap’ if the U.S. doesn’t end its support for Kurdish elements or abandon its positions further east in Manbij[3].

Gain:  Russian and Iranian military support to Assad have given him the decisive advantage in the civil war restoring his control over the majority of Syria’s population and key economic centers.  Given this existing reality, an indefinite U.S. military presence in eastern Syria may well be the only concrete leverage that the U.S. has to influence the behavior of the other actors in this crisis.  To accomplish the wide-ranging goals of U.S. strategy as articulated by Tillerson, however, this presence will likely need to maintained or even expanded for the foreseeable future.

Option #2:  Withdraw U.S. military forces from Syria.  The U.S. could use the recent battlefield victories against IS as a justification to declare ‘mission accomplished’ and begin a phased and conditions-based withdrawal of forces from Syria.

Risk:  As Tillerson himself argued, a U.S. withdrawal from Syria could create a security vacuum which IS and other Islamist terrorist groups would exploit to regain a foothold in eastern Syria.  Moreover, with the UN Geneva peace process moribund, the absence of a physical U.S. presence on the ground will leave policymakers with precious little direct leverage to influence the ultimate political or military outcomes in Syria.  This approach also feeds the perception of declining U.S. regional influence and could bolster the reputation of Russia and Iran as reliable partners.

Gain:  U.S. policymakers could use a phased withdrawal as diplomatic leverage to press for the withdrawal of all foreign forces from Syria to include Russia, Iran, and their paramilitary proxies (e.g., Hizbollah, Islamic Revolutionary Guards Corps).  The scale and timing of the U.S. withdrawal could be explicitly tied to the departure of these other foreign forces, as well as to progress in defeating the remnants of IS.  This would accomplish the two most critical U.S. strategic objectives outlined by Tillerson:  the defeat of IS; and reducing the influence of Iran.  Additionally, such a phased withdrawal would relieve the U.S. of the substantial costs of reconstruction in Syria which is estimated to easily exceed $250 billion[4].  Finally, the prospect of an imminent U.S. military withdrawal would increase pressure on Kurdish elements to come to a workable compromise with both Damascus and Ankara and thereby bolster prospects for a durable political outcome in Syria that enhances regional stability.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] John Feffer, “The Fall of the House of ISIS,” Foreign Policy in Focus, October 25, 2017.  Available at: http://fpif.org/fall-house-isis/.

[2] Secretary of State Rex W. Tillerson, “Remarks on the Way Forward for the United States Regarding Syria,” Hoover Institute at Stanford University, January 17, 2018.

[3] Bethan McKernan, “Turkish President Erdogan offers US ‘Ottoman Slap’ ahead of Rex Tillerson’s visit to Turkey,” The Independent, February 15, 2018.

[4] UN estimate quoted by Somini Sengupta, “Help Assad or Leave Cities in Ruins?  The Politics of Rebuilding Syria,” The New York Times, December 3, 2017.

Dr. Christopher Bolan Islamic State Variants Option Papers Syria U.S. Army War College Violent Extremism

Assessment of Violent Extremism: The Push of Identity Crisis and the Pull of Ideologies

Linn Pitts holds a B.S. in Marketing/Organization Management and a M.S. in Criminal Justice from the University of South Carolina.  He also has studied Public Policy on a graduate level and holds an Ed.S. in Educational Leadership from Liberty University.  Linn spent a decade in law enforcement prior to transitioning into teaching on a university level.  He presently teaches as an Assistant Professor in the Social Science Department at Shorter University.  He can be found on Twitter @Professor_Pitts and is writing a dissertation on gatekeepers in Countering Violent Extremism programs in the United States.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of Violent Extremism: The Push of Identity Crisis and the Pull of Ideologies

Date Originally Written:  November, 7, 2017.

Date Originally Published:  February 26, 2018.

Summary:  Successful recruitment of individuals into violent extremist organizations involves a recruiter leveraging the lack of social capital and identity capital to convince the radical-to-be that the organization will meet their needs.  Unless potential recruits have an established identity, resilience to deal with the overtures of recruiters, or have trusted individuals in their life that they can turn for help, the individual will be at risk for recruitment into violent extremist organizations.

Text:  Social Capital involves the problem and the potential solution to violent extremism due to the social identity that is sought by individuals at risk of recruitment for extremist groups.  Robert Putnam[1] identified that social capital aids society via collective action and empowerment.  On the opposite end of the spectrum, Lester, Maheswari, and McLain[2] noted that negative influences within family connections can create negative social capital.  In particular, groups that may exhibit extremist tendencies may seem like viable avenues for individuals struggling with identity.  James Côté[3] has further established that a branch of social capital is that of identity capital.  Identity capital is the manifestation of discovering one’s own distinctiveness and plotting their life course.   Therefore, individuals will seek purpose in their life and may turn to extremist movements if they perceive an injustice[4].  Berbrier[5] had previously found that white supremacists will take on a victim identity to exacerbate the sense of injustice of their group’s persona in order to become more attractive to individuals struggling with this aspect in their life.

Ilardi found that recruitment of potential jihadist may not be a top-down recruitment process but it may be more of an individual attraction once introduced to the material such as the messages of radical clerics or videos depicting violence in the defense of religion.  Moreover, Futrell and Simi[6] identified similar activities among white supremacist as occurring at free spaces such as home-based Bible studies, small local bars not frequented by outsiders, or private concerts.  One can easily understand that charismatic leaders may be knowledgeable of these places via organizational ties as noted by Wood[7].  Extremist groups recruit at-risk but willing volunteers, who are seeking purpose in their life.  Though Wood primarily looked at the recruiting methods of the Islamic State, researchers[8] found similar recruiting efforts of white supremacy terror groups.

The key to successful violent extremism recruitment is at-risk individuals and their vulnerabilities such as the following factors discussed by Mitchell[9] while citing Bartlett and Miller, “four often overlooked elements that can move some people toward violent extremism: an emotional impulse to correct an injustice; the thrill of doing something ‘cool’; peer pressure; and attaining a certain status in a hierarchy.”  Three of these, (thrill/cool factor, peer pressure, and status seeking,) directly relate to identity capital as defined by Côté, especially in his discussion of adolescents struggling with the transition to adulthood and identity formation.

Though no apparent correlation to the work of Côté, the emotional impulse concerning an injustice is a view parlayed by Nawaz[10] as he recounted the story of his own radicalization and described the moment of empowerment.  Nawaz’ radicalization occurred while he accompanied his brother and a group of friends when they were accosted by several white nationalists.  He noted his brother mentioned to the white nationalist’s leader that he was carrying a bomb in his backpack [see author’s note].  The incident quickly ended, the white nationalists fled, and Nawaz’s feelings of legitimate identity associated with Islamist ideology.  In this case, it is easy to see Nawaz’s lack of understanding of the radical Islamist ideology, but his nascent view of the identity traits found an appealing association and it related to Côté from the aspect of an altered life-course.  Nawaz and his immigrant family had relocated Essex, England did not feel readily accepted in his transplanted home.  It is not uncommon to find cultural identity struggles faced by second-generation immigrants[11].  In comparison, it may not be limited to strictly struggles faced only by immigrants.  According to Al Raffie[12], “[s]tudies on radicalization find identity to stand at the fore of the radicalization process.  Success partially lies in the radical’s ability to provide the radical-to-be with a distinctive identity[p. 67].”  This identity may be based on an extremist religious ideology or a distinctive worldview such as white nationalism, but the radical-to-be does not fully comprehend the lifestyle they are pursuing and may become indoctrinated because they are seeking the identity.  Consider the life-course of Frank Meeink[13], as he struggled with identity growing up as the product of a broken home, eventually moving in with his father in his preteen years.  Meeink noted that he was constantly harassed/assaulted on the way to school by African-American youth in his South Philadelphia neighborhood.  The turning point for Meeink was a summer with his cousin in a rural area of Pennsylvania that introduced him to white supremacy.  Meeink noted that it made sense to him through the lens of a child that despised African-Americans in his home neighborhood.  It should be further noted this fits Ilardi’s view and that of Lester et al. as identity struggles led to an ideology fit via causal interactions.  Therefore, factors in Nawaz’s radicalization was the result of mistreatment due to his immigrant status akin to Meeink being of a different race in his South Philadelphia neighborhood.  Meeink’s and Nawaz’s story of deradicalization also share similar themes.

In examining societal structures, Cole, Alison, Cole, and Alison[14] cited Munchie’s 1999 work as they discussed that poorly applied preventions may further embolden anti-social identities which was discussed by Mitchell.  The significance of this discussion is that individuals struggling with aspects of self-concept will experiment with different identities and will seek reactions when they sample these new identities such as forms of different dress and customs.  Ultimately, this search leads to a cognitive opening as identified by Carpenter, Levitt, and Jacobson[15] that an extremist recruiter can exploit.  It is further supported by Horgan[16] that individuals joining radical groups do not understand the ideology, but become entrenched in the ideology when isolated from their typical peers.  Therefore, Mitchell’s findings in British Columbia Schools concerning moments where youth were on the fringe of radicalization became teachable moments.  It’s worth noting Mitchell’s respondents felt training concerning bullying and safe school communities offered them the ability to diffuse situations though they had not had formal training on radicalization.

Author’s note:  Some news sources have discredited this personal account by Nawaz, though it is symbolic of his apparent beliefs.


Endnotes: 

[1] Putnam, R. D. [1995]. Bowling alone: America’s declining social capital. Journal of democracy6[1], 65-78.

[2] Lester, M., Maheshwari, S. K., & McLain, P. M. [2013]. Family Firms and Negative Social Capital: A Property Rights Theory Approach. Journal of Behavioral and Applied Management15[1], 11.

[3] Côté, J. E. [2005]. Identity capital, social capital and the wider benefits of learning: generating resources facilitative of social cohesion. London review of education3[3], 221-237.

[4] Ilardi, G. J. [2013]. Interviews with Canadian radicals. Studies in Conflict & Terrorism36[9], 713-738.

[5] Berbrier, M. (2000). The victim ideology of white supremacists and white separatists in the United States. Sociological Focus, 33(2), 175-191.

[6] Futrell, R., & Simi, P. (2004). Free spaces, collective identity, and the persistence of US white power activism. Social Problems, 51(1), 16-42.

[7] Wood, G. (2016). The Way of the Strangers: Encounters with the Islamic State. Random House.

[8] Simi, P., Windisch, S., & Sporer, K. (2016). Recruitment and Radicalization among US Far Right Terrorists Recruitment and Radicalization among US Far-Right Terrorists.

[9] Mitchell, M. R. [2016]. Radicalization in British Columbia Secondary Schools: The Principals’ Perspective. Journal for Deradicalization, [6], 132-179.

[10] Nawaz, M. [2012]. Radical: My journey from Islamist extremism to a democratic awakening. Random House.

[11] Zhou, M. [2003]. Growing Up American: The challenge confronting immigrant children and children of immigrants. Annual Review of Sociology. 23. 63-95. 10.1146/annurev.soc.23.1.63.

[12] Al Raffie, D. [2013]. Social identity theory for investigating Islamic extremism in the diaspora. Journal of Strategic Security6[4], 67.

[13] Meeink, F. and Roy, J.M. [2010]. An Autobiography of a Recovering Skinhead: The Frank Meeink Story. Hawthorne Books.

[14] Cole, J., Alison, E., Cole, B., & Alison, L. [2010]. Guidance for identifying people vulnerable to recruitment into violent extremism. Liverpool, UK: University of Liverpool, School of Psychology

[15] Carpenter, J. S., Levitt, M., & Jacobson, M. [2009]. Confronting the ideology of radical extremism. J. Nat’l Sec. L. & Pol’y3, 301.

[16] Horgan, J. [2008]. From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science618[1], 80-94.

Assessment Papers Linn Pitts Psychological Factors Violent Extremism

Assessing Al Suri’s Individual Terrorism Jihadist Against Lone Wolves

Cory Newton served as a Machinegunner in the United States Marine Corps from 1996-2000 and earned a B.S. in Philosophy, Politics, and Economics form Eastern Oregon University in 2012.  Cory authored Constitutional Capitalism and Common Defense in 2014 and can be found on Twitter @corynewton78 or on the web at www.corynewton.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing Al Suri’s Individual Terrorism Jihadist Against Lone Wolves

Date Originally Written:  December 11, 2017.

Date Originally Published:  February 19, 2018.

Summary:  Terrorism is a tactic and often results in dead or wounded civilians.  Both individual terrorism jihadists and lone wolves use this tactic.  Despite this tactic producing similar results by whomever uses it, there is a distinct difference between individual terrorism jihadists and lone wolves.  Until governments understand and accept this difference, data related to attacks that use terrorism tactics will be skewed.

Text:  The Global Islamic Resistance Call was published by Abu Mus’ab al-Suri in January 2005[1].  The military theory of the Resistance Call is based on applying two forms of jihad.  The first form is individual terrorism jihad and secret operational activity of small units totally separated from each other.  The second form is participation in jihad at the open fronts wherever the necessary preconditions exist.  The individual terrorism jihadist differs from an open front jihadist in that the individual jihadist is unable to make it to the open front.  The individual terrorism jihadist also differs from the small cell jihadist in that their actions are truly independent.  Individual terrorism jihad was specifically designed to maximize feelings of helplessness of the targeted population by unleashing the innovation, initiative, and creativity inherent in a decentralized structure.

Individual terrorism jihad enables anyone, anywhere, at any time to wage jihad using terrorism without formally being affiliated with a terrorist organization.  All the individual terrorism jihadist must do is be properly motivated to take action in the name of jihad, identify a weakness or vulnerability, and apply force to exploit it.  Although the attacker does not have any direct ties to a terrorist organization, the attacker has rationally chosen to wage jihad using terrorism in a manner which they expect the attack to produce more benefits than costs.

There is a clear distinction between participation in what Al-Suri identified as individual terrorism jihad and lone wolf violent extremists who use terrorist tactics in the name of their cause.

Suppose a person who is inspired by, but not directly affiliated with, any one of the 917 hate groups in the United States identified by the Southern Poverty Law Center (SPLC)[2] carries out a lone wolf terrorist attack.  Despite the violent extremists’ non affiliation with an SPLC-identified hate group, the attack will likely be investigated as an act of terror.

On the other hand, suppose a marginalized person is seduced by an outside of the mainstream Islamist organization.  The person lacks affiliation to a terrorist organization but possess “a resolute, personal decision to perform the individual duty of jihad[1]” which motivates them to conduct an active shooting, knife attack, or vehicular ramming assault in which they verbalize their intentions with an Allahu Akbar war cry.  Despite the attacker’s non affiliation with a terrorist organization, the attack will likely be investigated as an act of terror.

One difference between the two acts of terror described above is that the former is carried out by a lone wolf using terrorism to wage war on a local scale, while the latter is performed by an individual terrorism jihadist locally waging war on a global scale.  The lone wolf who carries out a terrorist attack does not belong to a decentralized military theory of global Islamist resistance, as the individual terrorism jihadist does.  Individual terrorism jihad is similar to an independent franchise.  A lone wolf attack is independent, but usually does not occur within the context of a global resistance movement.

The individual terrorism jihadist and the lone wolf are two different threats.  As terroristic violence that specifically originates from the concept of individual terrorism jihad differs from terroristic violence that originates from the lone wolf, consideration should be given to classifying each differently in order to measure the frequency and severity of individual terrorism jihadist attacks.  If the frequency and severity of terrorist attacks by lone wolves is measured separately, terrorism data will be more accurate.  Both types of terrorist attacks will often have identical consequences.  The carnage wrought by an individual terrorism jihadist may very well be indistinguishable from the carnage wrought by a lone wolf white nationalist or lone wolf ecological extremist.  One is the result of global jihad attacking locally.  The other is a localized attack seeking national media attention.

As individual terrorism jihad and lone wolf attacks continue to increase, it is important properly identify and properly categorize each.  Theodore Kaczynski is the best example of a lone wolf who waged war using terrorism.  The threat posed by a person in that category is significantly different from an individual jihadist locally attacking a variety of soft targets using rifles, blades, explosives, or vehicles in the context of a global resistance movement.

Both individual terrorism jihad attacks and lone wolf attacks will continue to increase and evolve.  In order to combat these attacks in the future it is best if government officials understand whether the terrorist actions are part of global resistance movement or based on a personal or localized motivation.  In the case of individual terrorism jihad, these attacks will continue until the cost far exceeds the benefits.  The U.S. is very effective at determining the amount of force necessary to destroy enemy personnel and equipment.  Unfortunately, the U.S. still has a long way to go in determining the fine line between the amount of force necessary to destroy the enemies’ will to fight, and the amount of force that will galvanize the enemies’ will to resist.


Endnotes:

[1] Lia, Brynjar (2008) Columbia University Press, Architect of Global Jihad, The Global Islamic Resistance Call (Key Excerpts), Military Theory of The Global Islamic Resistance Call, Page 371

[2] Southern Poverty Law Center Hate Map. (n.d.). Retrieved December 13, 2017, from https://www.splcenter.org/hate-map

Assessment Papers Cory Newton Information and Intelligence Violent Extremism

The Impact of Extremists in Civil War: Syria’s Shabbiha

Estelle J. Townshend-Denton is a post-graduate student at the University of Waikato in New Zealand.  She is currently working on a Phd on religion and foreign policy.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  The Impact of Extremists in Civil War: Syria’s Shabbiha

Date Originally Written:  December 9, 2017.

Date Originally Published:  February 12, 2018.

Summary:  Violent extremists frequently emerge when state authority breaks down within civil wars.  Escalatory dynamics are particularly hard to avoid when extremist groups emerge that are embedded in the existing social framework of their identity group.  In Syria the Shabbiha has grown from a trans-border criminal network to sectarian militias fighting for the regime.  The Shabbiha are a significant impediment to the resolution of the Syrian civil war.

Text:  Extremist groups in Syria such as the Shabbiha often emerge from existing social phenomenon.  For instance, prior to the outbreak of the Syrian civil war, the Shabbiha were Allawite smugglers and racketeers that primarily operated out of the Allawite heartland in coastal Latakia.  Given the poverty of the Allawite community opportunities were scarce, and Allawite young men saw a way to purchase highly sought after, but banned, Western items in Lebanon, and smuggle them back across the border into Syria.  This smuggling was largely overlooked by Bashar al-Assad’s regime in return for Shabihha loyalty to the Assads[1].

In order to understand the Shabbiha, their place in Syrian society, and their role within the civil war, it is necessary to look into the history of the Allawite sect to which they belong.  The Allawites are a Shia sect whose religion incorporates aspects of Islam, Christianity, Paganism and Zoroastrianism.  The Allawites have been persecuted and marginalised throughout their history.  A Syrian analyst concluded that this persecution has become built into the Allawite identity.  As a result Allawites are highly security conscious[2].

The embattled Assad regime is primarily, but not exclusively, Allawite.  The collapse of the Ottoman Empire after World War 1 provided an opportunity for the Allawites to climb out of their position at the bottom most rung of Syrian society to control the state and it’s military.  The Ottoman territory had been divided up between the French and the British.  The French received the mandate for the territory that was to become the state of Syria.  The ruling elite in Syria had been Sunni and they were resistant to French rule.  In order to subdue the Sunni resistors, the French employed a strategy of divide and rule.  Thus the French created a military that consisted of minorities, including the Allawites[3].  Soon, joining the military emerged as the key means for Allawites to climb up the social and economic ladder, and over time they came to dominate the officer class.  Eventually the military emerged as what Horowitz identifies as a “significant symbol of ethnic domination[4].”  Later, Druze and Allawite military leaders staged a coup which ultimately led to the Allawite dominated Assad regime.

Syria was relatively stable under the Assads until the “Arab Spring” of 2011, when the protests sweeping the region spread to Syria.  The regimes of Tunisia and Egypt had already toppled, and most of the world predicted that the Syrian regime would be next.  However, unlike the Tunisian officer class which contributed to the toppling of the Tunisian Government, the Syrian military leadership was heavily invested in the Assad regime.  Furthermore the Assad regime took a lesson from the Egyptian experience and dealt decisively with the protests.  As such, the Assads used the military against the protesters, working to turn the peaceful protests into an armed rebellion.  The regime then developed a narrative that denied the unrest was part of the “Arab Spring” but alternatively asserted it was spawned by external actors and led by Islamist extremists.

Soon the Assad regime faced another problem.  Whilst the Syrian army’s officer class was mostly Allawite, the rank and file was predominantly Sunni.  Sunni were more reluctant to fire on what was emerging as a largely Sunni protest movement.  The regime had Allawite crack units, but they needed to expand the loyal Allawite base of their military capacity through encouraging Allawite civilian participation in the fighting.  One of the ways the Assad regime did this was through the Shabbiha, whose networks were developed and expanded into civilian militias who fought for the Assad regime[5].  Since then, the links between the Assads and the Shabbiha have become increasingly apparent.  The European Union imposed sanctions in 2011 on two of Bashar al Assad’s cousins, Fawwar and Munzir, for their involvement in the “repression against the civilian population as members of the Shabbiha[6].”  According to a relation of the President’s cousin Rami Makhlouf, the expansion of the Shabbiha from a regime linked Allawite criminal network into an extremist paramilitary force loyal to the regime, doing the regime’s dirty work within the civil war, was planned by Makhlouf and the President’s brother Maher al Assad[1].  The presence or absence of gangs of violent fanatics such as the  Shabbiha is described by Ethnic Conflict and International Relations theorist Barry Posen as “a key determinant of the ability of groups to avoid war as central political authority erodes[7].”  Thus the Shabbiha were a significant escalatory dynamic within the Syrian civil war.

Rhetoric from the Shabbiha accessed via the internet is sectarian, brutal, and very loyal to Bashar al Assad with mottos like “Bashar, don’t to be sad: you have men who drink blood[8].”  With a corresponding brutality and sectarianism emerging amongst Sunni Islamist fanatics within the rebellion, the violence and rhetoric of extremists on both sides escalated the civil war.  This brutality and sectarianism worked to strengthen the regime’s legitimacy as protectors of Syria’s minority religious groups against repression from the Sunni majority.  The regime’s reliance on extremist sectarian militias such as the Shabbiha to support the security forces was not only responding to sectarian tension within the unrest but also heightening it[9].

Posen identified that extremists on both sides escalate retaliatory violence and drive up insecurity.  He stated that fanatics “produce disproportionate political results among the opposing group – magnifying initial fears by confirming them….the rapid emergence of organized bands of particularly violent individuals is a sure sign of trouble[7].”  The initial fears resulting from the historical persecution of Allawites under Sunni elites, coupled with fears of revenge on the sect as a whole for the violence of both the Shabbiha and the regime within the civil war, has mobilised the sect in defense of the Assad regime.  What began as a grass-roots protest movement for the removal of the autocratic regime has escalated into a sectarian driven civil war intensified by the violent acts of both the Shabbiha and the Sunni Islamist extremists, to the advantage of the Assads.


Endnotes:

[1] Amor, Salwa and Sherlock, Ruth. How Bashar al-Assad created the feared shabiha militia: an insider speaks. The Telegraph. [Online] March 23, 2014. http://www.telegraph.co.uk/news/worldnews/middleeast/syria/10716289/How-Bashar-al-Assad-created-the-feared-shabiha-militia-an-insider-speaks.html

[2] Worren, Torstein Schiotz. Fear and Resistance: The Construction of Allawite Identity in Syria. Oslo : University of Oslo, 2007.

[3] Whitman, Elizabeth. The Awakening of the Syrian Army: General Husni al-Za’am’s Coup and Rein, 1949: Origins of the Syrain Army’s Enduring Roel in Syrian Politics. Columbia University. [Online] April 4, 2011.

[4] Horowitz, D.L. Ethnic Groups in Conflict. London : University of California Press, 1985.

[5] Salih, Y. The Syrian Shabbiha and their State. Heinrich Boll Stiftung. [Online] December 21, 2012. http://www.lb.boell.org/web/52-801.html

[6] Flamand, H.M. Syria: Brutally Violent Militaia Member tell it like it is. Global Post. [Online] June 15, 2012. http://www.globalpost.com/dispatch/news/regions/middle-east/syria/120614/syria-shabbiha-thug-assad-mafia-guns-smuggling-violence-houla

[7] The Security Dilemma and Ethnic Conflict. Posen, Barry R. 1993, Survival, Vol. 35, No. 1, pp. 27-47.

[8] Sherlock, H. A. The Shabiha: Inside Assad’s Death Squads. The Telegraph. [Online] June 2, 2012. http://www.telegraph.co.uk/news/worldnews/middleeast/syria/9307411/The-Shabiha-Inside-Assads-death-squads.html

[9] Abdulhamid, A. The Shredded Tapestry. Syrian Revolution Digest. [Online] November 9, 2012. https://ammar.world/2012/09/11/the-shredded-tapestry-the-state-of-syria-today/

Assessment Papers Estelle J. Townshend-Denton Illicit Trafficking Activities Syria Violent Extremism

An Assessment of Violent Extremist Use of Social Media Technologies

Scot A. Terban is a security professional with over 13 years experience specializing in areas such as Ethical Hacking/Pen Testing, Social Engineering Information, Security Auditing, ISO27001, Threat Intelligence Analysis, Steganography Application and Detection.  He tweets at @krypt3ia and his website is https://krypt3ia.wordpress.com.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of Violent Extremist Use of Social Media Technologies

Date Originally Written:  November 9, 2017.

Date Originally Published:  February 5, 2018.

Summary:  The leveraging of social media technologies by violent extremists like Al-Qaeda (AQ) and Daesh have created a road map for others to do the same.  Without a combined effort by social media companies and intelligence and law enforcement organizations, violent extremists and others will continue to operate nearly unchecked on social media platforms and inspire others to acts of violence.

Text:  Following the 9/11 attacks the U.S. invaded Afghanistan and AQ, the violent extremist organization who launched these attacks, lost ground.  With the loss of ground came an increase in online activity.  In the time before the worldwide embrace of social media, jihadi’s like Irhabi007 (Younis Tsouli) led AQ hacking operations by breaking into vulnerable web pages and defacing them with AQ propaganda as well as establishing dead drop sites for materials others could use.  This method was pioneered by Irhabi007, who was later hunted down by other hackers and finally arrested in 2005[1].  Five years after Tsouli’s arrest, Al-Qaeda in the Arabian Peninsula (AQAP) established Inspire Magazine as a way to communicate with its existing followers and “inspire” new ones[2].  Unfortunately for AQAP, creating and distributing an online magazine became a challenge.

Today, social media platforms such as Twitter, Facebook, VKontakte, and YouTube are now the primary modus for jihadi extremists to spread the call to jihad as well as sow fear into those they target.  Social media is perfect for connecting people because of the popularity of the platforms and the ease of use, creation of accounts, and ability to send messages that could have a large audience.  In the case of Daesh, they use Twitter and YouTube as their primary means of messaging not only for fear but also command and control as well as recruitment.  Daesh sees the benefits of using social media, and their use has paved the way for others.  Even after Twitter and YouTube began to catch on and act against the Daesh accounts, it is still easy still for Daesh to create new accounts and keep the messages flowing with a new user name followed by a digit.

AQ’s loss of terrain combined with the expansion of social media set the conditions for movement toward inciting the “far war” over the local struggle as AQ saw it before Osama bin Laden was killed.  In fact, the call to the West had been made in Inspire magazine on many occasions.  Inspire even created a section of their magazine on “Open Source Jihad” which was later adopted by Dabiq[3] (Daesh’s magazine), but the problem was actually motivating the Western faithful into action.  This paradigm was finally worked out in social media where recruiters and mouthpieces could, in real-time, talk to these potential recruits and work with them to act.

Online messaging by violent extremist organizations has now reached a point of asymmetry where very little energy or money invested on the jihadi’s part can produce large returns on investments like the incident in Garland Texas[4].  To AQ, Daesh, and others, it is now clear that social media could be the bedrock of the fight against the West and anywhere else if others can be incited to act.  This incited activity takes the form of what has been called as “Lone Wolf Jihad” which has caused several incidents like the Garland shootings to current day events like the attack in New York City on the bike path by Sayfullo Saipov, a green card holder in the U.S. from Uzbekistan[5].

With the activating of certain individuals to the cause using the propaganda and manuals put out by the jihadi’s on social media, it is clear that the medium works and that even with all the attempts by companies like Facebook and Twitter to root accounts out and delete them, the messaging still gets to those who may act upon it.  The memetic virus of violent extremism has a carrier and that is social media.  Now, with the advent of social media’s leveraging by Russia in the campaign against the U.S. electoral system, we are seeing a paradigm shift into larger and more dangerous memetic and asymmetric warfare.

Additionally, with the advent of encryption technologies to the social media platforms the net effect has been to create channels of radicalization, recruitment, and activation over live chats and messages that cannot be indicted by authorities easily.  This use for encryption and live chats and messages makes the notion of social media as a means of asymmetric warfare even more prescient.  The jihadis now have not only a means to reach out to would be followers, but also a constant contact at a distance, where before they would have to radicalize potential recruits a physical location.

Expanding this out further, the methodologies that the jihadi’s have created and used online are now studied by other like-minded groups and can be emulated.  This means that whatever the bent, a group of like-minded individuals seeking extremist ends can simply sign up and replicate the jihadi model to the same ends of activating individuals to action.  We have already started to see this with the Russian hybrid warfare at a nominal level by activating people in the U.S. such as neo nazi’s and empowering them to act.

Social media is a boon and a bane depending on it’s use and it’s moderation by the companies that create the platforms and manage them.  However, with the First Amendment protecting freedom of speech in the U.S., it is hard for companies to delineate what is free speech and what is exhortation to violence.  This is the crux of the issue for companies and governments in the fight against violent extremism on platforms such as YouTube or Twitter.  Social media utilization boils down to terms of service and policing, and until now the companies have not been willing to monitor and take action.  Post Russian meddling in the U.S. election though, social media company attitudes seems to be changing.

Ultimately, the use of social media for extremist ideas and action will always be a problem.  This is not going away, and policing is key.  The challenge lies in working out the details and legal interpretations concerning the balance of what constitutes freedom of speech and what constitutes illegal activity.  The real task will be to see if algorithms and technical means will be helpful in sorting between the two.  The battle however, will never end.  It is my assessment that the remediation will have to be a melding of human intelligence activities and technical means together to monitor and interdict those users and feeds that are seeking to incite violence within the medium.


Endnotes:

[1] Katz, R., & Kern, M. (2006, March 26). Terrorist 007, Exposed. Retrieved November 17, 2017, from http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR2006032500020.html

[2] Zelin, A. Y. (2017, August 14). Inspire Magazine. Retrieved November 17, 2017, from http://jihadology.net/category/inspire-magazine/

[3] Zelin, A. Y. (2016, July 31). Dabiq Magazine. Retrieved November 17, 2017, from http://jihadology.net/category/dabiq-magazine/

[4] Chandler, A. (2015, May 04). A Terror Attack in Texas. Retrieved November 17, 2017, from https://www.theatlantic.com/national/archive/2015/05/a-terror-attack-in-texas/392288/

[5] Kilgannon, C., & Goldstein, J. (2017, October 31). Sayfullo Saipov, the Suspect in the New York Terror Attack, and His Past. Retrieved November 17, 2017, from https://www.nytimes.com/2017/10/31/nyregion/sayfullo-saipov-manhattan-truck-attack.html

 

Al-Qaeda Assessment Papers Cyberspace Islamic State Variants Scot A. Terban Violent Extremism

An Assessment of the Conceptualizing of Charisma / Persuasion and Coercion

Dr. Michael Warstler has served in the United States Navy from 2008 to Present and has worked as an adjunct professor and task manager for the Department of Defense.  He recently completed a Doctorate of Philosophy in Leadership from the University of the Cumberlands and successfully defended a dissertation addressing group psychological abuse experienced in fundamental religious organizations.  He can be found on LinkedIn @ https://www.linkedin.com/in/michael-warstler-908805109.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Assessment of the Conceptualizing of Charisma / Persuasion and Coercion

Date Originally Written:  December 4, 2017.

Date Originally Published:  January, 29, 2018.

Summary:  Charismatic leaders embody personalized qualities that allow them to influence followers – oftentimes, in the case of destructive leaders, at the detriment of the follower.  Coercion occurs when a threat against an individual is levied in exchange for obedience and submission[1] and the influencing of an individual through various techniques to perform a task that he or she would normally not want to do[2].

Text:  Le Bon[3] wrote that it is not all that difficult for inspiring leaders to persuade individuals if their needs are being fulfilled and if they are ready to sacrifice self-interest for their “happiness.”  Coercion, on the other hand, requires that a charismatic leader leverage social elements against the better judgment of the individual – oftentimes through manipulation.  Sandberg and Moreman write that charisma is a relationship where followers typically transfer control and accountability to the leader “often in a worship-like manner[4].”  Being that charisma, in itself, is intrinsically morally neutral; instances of abuse of authority are derived when either party in the relationship is given too much influence over the other.

Coercion and persuasion are noted as the forces at work in the conceptualization of the nature of power in relationships.  Coercion, as noted by Hartshorne is the “power to determine every detail of what happens in the world,” and persuasion is the power to “significantly influence the happenings in the world[5].”  Ultimately, coercion and persuasion remain intrinsically neutral until employed for good or evil ends; but both are grounded in the nature of power.  Referring to the individual perspective of charismatic attribution from followers to leaders, if the individual has a perspective of empowerment as coercive, he or she will typically conceive any form of influence as “coercion.” While if he or she has a perspective of empowerment in terms of “love” or “compassion” then he or she might view such empowerment as “persuasion[6].”

Coercion, as noted by famed cult researcher Robert Lifton, is when a threat against an individual is levied in exchange for obedience and submission[7].  It is saying “obey, or else” – the threat of “or else” might be “anything from death to social ostracism, any form of physical or emotional pain[8].”  With any form of non-rational imbalance of authority also comes an imbalance in individual responsibility[9].  A deficit in individual responsibility allows the controlling leader to make the primary decisions for the subservient follower.  While the follower is given a semblance of control over his or her own decisions and well-being, bullying has been known to occur in imbalanced leader-follower relationships from the subtle to the more blatant and grotesque[10].

Power is a central theme in the process of coercive and persuasive influence.  “Leadership” in itself, is a process of influencing and mobilizing individuals towards the attainment of a collective goal.  It is important, then, to differentiate between leadership as a positive attribution of social influence[11] where followership is voluntary, and abuse of authority, “where followers are coerced into compliance or obedience[12].”  A charismatic leader might passively persuade an individual that a course of action is in his or her best interest, while the coercer might leverage some form of threat against the individual in order to force them into compliance.

Coercion is the “despot’s ideal of power[13].”  It involves the coercer and the coerced – and the outcome typically resembles a diminished freedom and responsibility of choice on part of the coerced. Or as Reichard notes “a violation that most would argue, at least in practical terms, is a moral violation[14].”  In a leader-follower relationship where a significant imbalance of power is granted to the leader to “adjust the psyche” of his or her followers (oftentimes masked as the attainment towards a collective goal), such influence could just as easily be abused to fulfill the motives of the respective leader.  This dilemma, as noted by Ciulla[15] has been aptly named the “Hitler problem.”  It is posited by Tourish and Pinnington, could a “Hitler,” then, be viewed as a transformational leader?  If so, could one that displays these characteristics also be grouped in the same category with those perceived as moral leaders such as Gandhi or Mother Teresa[16]?

Hitler, Mao, and Stalin are case examples of individuals that displayed high levels of charisma as well as a lack of morality and a focus on idealized influence.  Such individuals often influence followers to negatively pursue destructive ends[17].  Research has identified two forms of charismatic leadership, socialized and personalized[18].  The socialized leader focuses on the needs and service to others in the group, while the personalized leader focuses on his or her own needs[19].  A personalized leadership approach often results in magnetism towards the fulfillment of the leader’s own needs vice that of the collective group[20].  Such actions are often self-serving and any doubt of loyalty to the group and its leadership are highly discouraged[21].

While doubt and resistance to authority within these groups certainly occurs, coercion and persuasion are key methods employed by abusive charismatic leaders in order to influence individuals to obtain a “converted” mindset[22].  Oftentimes when “converted” individuals may relinquish his or her resistance to doubt and submit to authority, he or she may become more liable to display the most zealous characteristics and become the most vocal proponents “aligned with the belief system chosen for them by powerful others[23].”  In the instance of Saul’s conversion to Paul in the Book of Acts, one might find that the most zealous resistors to change are also the most likely proponents once converted.  Coercion and persuasion, when employed effectively, can evolve into a “discursive system of constraint” that is often highly difficult to challenge and resist even if one considers themselves to be a “strong-willed” individual[24].


Endnotes:

[1] Lifton, R. J. (1961). Thought Reform and the Psychology of Totalism: A Study of “Brainwashing” in China. Mansfield Centre, CT: Martino Publishing.

[2] Tourish, D., Collinson, D., & Barker, J. R. (2009). Manufacturing conformity: Leadership through coercive persuasion in business organisations. M@n@gement, 12(5), 360-383.

[3] Le Bon, G. (1917). The Crowd: A Study of the Popular Mind. Mineola, NY: Dover Publications, Inc.

[4] Sandberg, Y., & Moreman, C. M. (2015). Common threads among different forms of charismatic leadership. Journal of Religion and Business Ethics, 3(1), p. 13.

[5] Hartshorne, C. (1984). Omnipotence and Other Theological Mistakes. Albany, NY: State University of New York Press, p. 11.

[6] Reichard, J. (2014). Relational empowerment: A process-relational theology of the spirit- filled life. Pneuma: The Journal of the Society for Pentecostal Studies, 36(2), 226-245, p. 231.

[7] Lifton, R. J. (1961). Thought Reform and the Psychology of Totalism: A Study of “Brainwashing” in China. Mansfield Centre, CT: Martino Publishing, p. 438.

[8] Ibid.

[9] Sandberg, Y., & Moreman, C. M. (2015). Common threads among different forms of charismatic leadership. Journal of Religion and Business Ethics, 3(1).

[10] Samnani, A., & Singh, P. (2013). When leaders victimize: The role of charismatic leaders in facilitating group pressures. Leadership Quarterly, 24(1), 189-202.

[11] Shamir, B. (1999). Taming charisma for better understanding and greater usefulness: A response to Beyer. The Leadership Quarterly, 10, 555-562.

[12] Tourish, D., Collinson, D., & Barker, J. R. (2009). Manufacturing conformity: Leadership through coercive persuasion in business organisations. M@n@gement, 12(5), 360-383, p. 362.

[13] Hartshorne, C. (1984). Omnipotence and Other Theological Mistakes. Albany, NY: State University of New York Press, p. 12.

[14] Reichard, J. (2014). Relational empowerment: A process-relational theology of the spirit- filled life. Pneuma: The Journal of the Society for Pentecostal Studies, 36(2), 226-245, p. 231-232.

[15] Ciulla, J. (1995). Leadership ethics: Mapping the territory. Business Ethics Quarterly, 5, 5- 28.

[16] Tourish, D., & Pinnington, A. (2002). Transformational leadership, corporate cultism and the spirituality paradigm: An unholy trinity in the workplace? Human Relations, 55(2), 147-172, p. 149.

[17] Vann, B. A., Coleman, A. N., & Simpson, J. A. (2014, September). Development of the Vannsimpco Leadership Survey: A delineation of hybrid leadership styles. SBS Journal of Applied Business Research, 3, 28-38.

[18] Howell, J. M., & Shamir, B., (2005). The role of followers in the charismatic leadership process relationship and their consequences. The Academy of Management Review, 30, 96-112.

[19] Howell, J. M. (1988). Two faces of charisma: Socialized and personalized leadership in organizations. Charismatic Leadership: The Elusive Factor in Organizational Effectiveness. (pp. 213−236). San Francisco, CA: Jossey-Bass.

[20] Lussier, R. N., & Achua, C. F. (2013). Leadership: Theory, Application, & Skill Development (6 ed.). Boston: Cengage Learning.

[21] Northouse, P. G. (2013). Leadership: Theory and Practice (6th ed.). Thousand Oaks, CA: SAGE.

[22] Tourish, D., Collinson, D., & Barker, J. R. (2009). Manufacturing conformity: Leadership through coercive persuasion in business organisations. M@n@gement, 12(5), 360-383.

[23] Ibid, p. 364.

[24] Ibid.

Assessment Papers Dr. Michael Warstler Leadership

An Historic Assessment of the Role and Participation of Women as Active Agents in Violent Extremist Organizations

Brandee Leon is a freelance analyst of counter-terrorism and international relations, focusing on terror in Europe.  She frequently covers women in terrorism.  She has been published in Business Insider, The Strategy Bridge, and The Eastern Project. She can be found on Twitter at @misscherryjones.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  An Historic Assessment of the Role and Participation of Women as Active Agents in Violent Extremist Organizations

Date Originally Written:  December 4, 2017.

Date Originally Published:  January 22, 2018.

Summary:  Despite their continual portrayal as being exploited by violent extremist organizations, women have actually been active agents for decades. From purveyors of propaganda and operational support, to participating in combat and suicide missions, women have been involved in the anarchist campaigns of the turn of the century, the anti-colonial fights in the mid-century, and the current wave of religious-based terrorism.

Text:  “Women as victim” is a common narrative, told for ages. Its current form is manifested in stories of “jihad brides,” those women and girls supposedly lured to Iraq and Syria by the Islamic State. That narrative fails to capture the reality of the role of women in the Islamic State, or any other terrorist or violent extremist group. The real story is that women have been playing an active role in these groups for over a century.

In the late 1800s, an anarchist group founded in Russia, Narodnaya Volya, planned assassinations of state officials and other political persons. One of the group’s leaders was a woman named Vera Figner. Figner helped organize the underground, as well as help plan attacks. Several other women were involved in the group’s activities. A member named Anna Yakimova helped construct bombs, and Figner’s own home was used as a workshop[1]. Several other women played active roles in Narodnaya Volya’s plots. Narodnaya Volya’s influence lived on, most notably in the Paris terror campaign in the 1880s[2]. That campaign included the participation of many women.

Throughout the Twentieth Century, women would play prominent roles in violent extremist groups all over the world. During the Algerian War, women featured prominently, planting bombs for the National Liberation Front (FLN) during the Battle of Algiers. Djamila Bouhired[3] planted a bomb in a café which killed 11 people in 1957. Hassiba Ben Bouali was killed alongside other FLN militants during a French bombing raid. Perhaps the most well-known female militant in Algeria was Zohra Drif. Drif was very active in the anti-colonial independence movement, gathering support, running the underground, and planting bombs.

Germany’s Red Army Faction (RAF), also known as the Baader-Meinhof Group, was co-founded in 1970 by a woman named Ulrike Meinhof. During the group’s first two years, Meinhof participated in numerous robberies and bombings. Although Meinhof was captured in 1972, she was not the only woman active in RAF’s twenty-plus yearlong campaign. Verena Becker was imprisoned in 1977 for criminal involvement, but later released. She was also convicted in 2012 for a murder committed during her time with RAF.

Women’s roles in violent extremist groups took a new direction when the Liberation Tigers of Tamil Eelam (LTTE) began using women as suicide bombers in their bid for independence. In Sri Lanka, women were second-class citizens, but LTTE women were viewed as equals, having roles in military leadership, and even having their own divisions. Women were trained and participated in all areas of combat, and like their male counterparts, were given the title of martyr[4].

In the late 1990s, Germany saw another terror campaign in which a woman played a role. Between 1998 and 2011, the National Socialist Underground (NSU), a neo-Nazi group, was responsible for ten murders, three bombings, and 15 bank robberies. Though the German prosecutors say the group only comprised of three members – Uwe Mundlos, Uwe Böhnhardt, and a woman, Beate Zschäpe – others say they have ties to neo-Nazi groups all over Germany. Zschäpe, the only surviving member of NSU, has admitted to arson, but is accused of aiding in the robberies and murders. Before turning herself in, she set fire to an apartment in order to destroy evidence[5].

The insurgency in Chechnya during the First and Second wars produced some of the most well-known women as active agents. Women from the North Caucasus were responsible for over 30 suicide bombings in Russia between 2000 and 2010. Women were also participants in the Dubrovka Theater and Beslan School sieges[6]. Their actions have not been limited to Chechnya; a Dagestani woman is thought to have blown herself up in Istanbul in 2015.

Since al-Qaeda’s inception, women have played an active role. Many women in al-Qaeda have conducted surveillance, run propaganda accounts in order to recruit, and some have even conducted operations themselves. On November 6, 2005, a Belgian woman named Murielle Degauque strapped on a suicide belt and detonated herself near a U.S. Army patrol in Baquba, Iraq. Sajida al Rishawi attempted to detonate a suicide belt in Amman, Jordan. Sajida was the first woman of al-Qaeda arrested. And in December 2015, Tashfeen Malik, along with her husband, committed an act of terror in San Bernardino, California. Malik was inspired by both al-Qaeda and Islamic State[7].

As the Islamic State faces military defeat in Iraq and Syria, the roles the women are playing as supporters are evolving. Previously, women had participated in online propaganda campaigns, and in policing other women as part of the Al-Khansaa and Umm Al-Rayan brigades[8]. But in September 2016, a group of French women guided by the Islamic State were intercepted before they could carry out a bombing plot in Paris[9]. There have even been reports of Islamic State women as suicide bombers, but as of this writing, nothing has been confirmed.

Throughout the decades, women have played an active role in violent extremist organizations. Their roles have varied from organization to organization, and the ideology spans the spectrum. One thing is certain, women as violent extremists does not seem to be a phenomenon that will disappear any time soon.


Endnotes:

[1] John Simkin, “Vera Figner,” http://spartacus-educational.com/RUSfigner.htm, (accessed November 2017)

[2] John Merriman, The Dynamite Club (Boston New York: Houghton Mifflin Harcourt, 2009)

[3] Ali Adeeb Alnaemi (translator), “Djamila Bouhired: A Profile From the Archives,” http://www.jadaliyya.com/Details/27072/Djamila-Bouhired-A-Profile-From-the-Archives

[4] Mia Bloom, Bombshell (Philadelphia: University of Pennsylvania Press, 2011)

[5] Antonia von der Behrens, “The NSU Case in Germany,” https://www.nsu-watch.info/2017/03/the-nsu-case-in-germany/, (accessed November 2017)

[6] Brandee Leon, “The Curious Case of Russia: History and Russia’s Female Suicide Bombers,” https://thestrategybridge.org/the-bridge/2014/4/16/the-curious-phenomenon-of-russia-history-russias-female-suicide-bombers, (accessed November 2017)

[7] Brandee Leon, “The Roles Women Play: al Qaeda and Islamic State,” https://misscherryjones.wordpress.com/2016/01/11/the-roles-women-play-al-qaeda-and-islamic-state/, (accessed November 2017)

[8] Brandee Leon, “Women and the Islamic State,” https://wordpress.com/posts/misscherryjones.wordpress.com, (accessed December 2017)

[9] Souad Mekhennet and Joby Warrick, “The jihadist plan to use women to launch the next incarnation of ISIS,” https://www.washingtonpost.com/world/national-security/the-jihadist-plan-to-use-women-to-launch-the-next-incarnation-of-isis/2017/11/26/e81435b4-ca29-11e7-8321-481fd63f174d_story.html, (accessed November 2017)

Assessment Papers Brandee Leon Violent Extremism Women

Assessment of the Factors Leading to the Recruitment of Violent Extremists

Jason Baker is an Officer in the United States Air Force, with a recent deployment supporting the fight against the Islamic State.  Jason is also an M.A. candidate at American University’sSchool of International Service.  He can be found on Twitter @JasonBakerJB.  All opinions in this article are those of the author and do not represent the official positions of the United States Department of Defense or United States Air Force.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Factors Leading to the Recruitment of Violent Extremists

Date Originally Written:  December 3, 2017.

Date Originally Published:  January 15, 2018.

Summary:  Governments traditionally focus counterterrorism efforts on intelligence, kinetic capabilities, and enhanced domestic security policies.  Neglected still, and likely why terror attacks persist, is governments understanding the forces that motivate people to join violent extremist organizations in the first place.  Unfortunately, a marriage between counterterrorism efforts and the study of socioeconomic equality, may still be far off.

Text:  Terror attacks around the world continue to occur with a regularity that has made them a seemingly normal part of life.  As such, the response to, and prevention of, such attacks is a topic regularly covered by journalists, news anchors, and security experts.  These analyses usually focus on the need for intelligence to identify terrorists, the use of kinetic capabilities to target terrorists, and enhanced domestic security policies to prevent and protect against attacks.  While the majority of the U.S. counterterrorism strategy focuses on these three areas, terror attacks persist.  An area of study that continues to be neglected is that which seeks a better understanding of where recruits for violent extremist organizations come from and why they join, so that policy to prevent people from being radicalized in the first place can be made.  The biggest drivers of extremist propaganda and recruitment are not a religious message, but income inequality, social resentment, and unstable governments or refugee situations.

Income inequality is a growing problem throughout the world.  So much so that in 2015 the World Economic Forum ranked rising income inequality as the world’s top priority[1].  The economically disenfranchised develop strong feelings that can often turn into anger and resentment about their situation, which can drive a need for revenge when they feel they have no power to change the status quo.  Such an income equality situation creates favorable conditions for violent extremist organizations to win new recruits and operate[2].

Similar to feeling economically disenfranchised, many extremist recruits come from the ranks of the socially ostracized.  To be certain, this is not to say those who just “don’t fit in” (although that can contribute) to society, but those that are marginalized by their government or large parts of their society.  This socially ostracized population could be migrants in a new land who are not afforded the chance to assimilate into society (as seen in Europe) or religious or ethnic minorities in states with hard-line governments (Sunni majorities being governed by Shia hardliners and vice versa).  Sometimes ostracism even metastasizes into something as awful as the situation in Myanmar where many Rohingya feel as though they are left with almost no option other than to attack the government.

The greatest of all these factors that leads to terror recruitment are failed states and refugee situations.  In violent, lawless places like Syria the group that can offer a better way of life whatsoever is often the one that is joined.  Violent extremist organizations such as the Islamic State offer services and security in exchange for committing to their cause.  A similar situation is seen in Yemen.  These failed states create refugee and internally displaced persons (IDP) situations that can become breeding grounds for violent extremist recruiting.  Violent extremist organizations have their choice of recruiting tactics when dealing with refugee camps and IDPs.  Some violent extremist organizations offer food and cash in exchange for joining, and some offer a message of hope and promise of revenge to those angry about their situation.  The situation then feeds itself.  While anything from failed states to climate change can cause refugee and IDP situations, violent extremism is clearly becoming a more important factor in driving people from their homes.  In Iraq, the pre-2003 Christian population of 1.5 million is estimated to have dwindled to 400,000, while over half a million of Syria’s 1.8 million Christians have been displaced[3].  Elsewhere, there are in excess of 2.5 million displaced in Yemen[4] and over 600,000 in Myanmar[5].   The humanitarian reasons for solving the displaced persons crisis the world faces are evident, but it is also a dire security issue.

All of these are problems the world needs to address individually, for their own specific reasons, but also because they create fertile grounds for violent extremist organization recruitment.  There is not often a lot of cross over between those who care deeply about countering violent extremism, and those who care about socioeconomic equality.  Connecting the two together however, can bring more urgency to the issue of fighting violent extremist organization recruiting with more problem solvers at the table.  Policy and decision makers who focus on the drivers of violent extremism organization recruitment may be able to go further than intelligence, kinetic capabilities, and policies that enhance domestic security have thus far.


Endnotes:

[1] The Outlook on the Global Agenda 2015. World Economic Forum. Retrieved December 03, 2017, from http://reports.webforum.org/outlook-global-agenda-2015/

[2] Seaver, B. M., Hyman, G. F., Toft, M. D., & McCarthy, D. (2015, September 1). The National Interest. This Is Why Global Income Inequality Is a Real National-Security Threat. Retrieved December 03, 2017, from http://nationalinterest.org/feature/why-global-income-inequality-real-national-security-threat-13747

[3] Koser, K. (2016, July 29). IDPs, Refugees, and Violent Extremism: From Victims to Vectors of Change. The Brookings Institute. Retrieved December 03, 2017, from https://www.brookings.edu/blog/order-from-chaos/2015/02/20/idps-refugees-and-violent-extremism-from-victims-to-vectors-of-change/

[4] Internal Displacement Monitoring Centre (IDMC) – Norwegian Refugee Council. (2015, December 31—updated May 2016). Yemen IDP Figures Analysis. Retrieved December 03, 2017, from http://www.internal-displacement.org/middle-east-and-north-africa/yemen/figures-analysis

[5] Internal Displacement Monitoring Centre (IDMC) – Norwegian Refugee Council. (2017, September 28). How many internally displaced Rohingya are trapped inside Myanmar? Retrieved December 03, 2017, from http://www.internal-displacement.org/library/expert-opinion/2017/how-many-internally-displaced-rohingya-are-trapped-inside-myanmar

Assessment Papers Economic Factors Jason Baker Violent Extremism

An Australian Perspective on Identity, Social Media, and Ideology as Drivers for Violent Extremism

Kate McNair has a Bachelor’s Degree in Criminology from Macquarie University and is currently pursuing her a Master’s Degree in Security Studies and Terrorism at Charles Sturt University.  You can follow her on Twitter @kate_amc .  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  An Australian Perspective on Identity, Social Media, and Ideology as Drivers for Violent Extremism

Date Originally Written:  December 2, 2017.

Date Originally Published:  January 8, 2018.

Summary:  Countering Violent Extremism (CVE) is a leading initiative by many western sovereigns to reduce home-grown terrorism and extremism.  Social media, ideology, and identity are just some of the issues that fuel violent extremism for various individuals and groups and are thus areas that CVE must be prepared to address.

Text:  On March 7, 2015, two brothers aged 16 and 17 were arrested after they were suspected of leaving Australia through Sydney Airport to fight for the Islamic State[1].  The young boys fouled their parents and forged school letters.  Then they presented themselves to Australian Immigration and Border Protection shortly after purchasing tickets to an unknown middle eastern country with a small amount of funds and claimed to be on their way to visit family for three months.  Later, they were arrested for admitting to intending to become foreign fighters for the Islamic State.  October 2, 2015, Farhad Khalil Mohammad Jabar, 15 years old, approached Parramatta police station in Sydney’s West, and shot civilian police accountant Curtis Cheng in the back[2].  Later it was discovered that Jabar was inspired and influenced by two older men aged 18 and 22, who manipulated him into becoming a lone wolf attacker, and supplied him the gun he used to kill the civilian worker.

In November 2016 Parliament passed the Counter-Terrorism Legislation Amendment Bill (No. 1) 2016 and stated that “Keeping Australians safe is the first priority of the Turnbull Government, which committed to ensuring Australian law enforcement and intelligence agencies have the tools they need to fight terrorism[3].”  More recently, the Terrorism (Police Powers) Act of 2002 was extensively amended to become the Terrorism Legislation Amendment (Police Powers and Parole) Act of 2017 which allows police to have more powers during investigations and puts stronger restrictions and requirements on parolees when integrating back into society.  Although these governing documents aim at honing in on law enforcement and the investigation side of terrorism efforts, in 2014 the Tony Abbot Government implemented a nation-wide initiative called Living Safe Together[4].  Living Safe Together opposed a law enforcement-centric approach and instead focused on community-based initiatives to address the growing appeal of violent extremist ideologies in young people.

Levi West, a well-known academic in the field of terrorism in Australia highlighted that, in the cases of the aforementioned individuals, they have lived there entire lives in a world where the war of terror has existed.  These young men were part of a Muslim minority and have grown up witnessing a war that has been painted by some as the West vs Islam.  These young men were influenced by many voices between school, work, social events, and at home[5].  This leads to the question on whether these young individuals are driven to violent extremism by the ideology or are they trying to find their identity and their purpose in this world.

For young adults in Australia, social media is a strong driver for violent extremism.  Young adults are vulnerable and uncertain about various things in their life.  When people feel uncertain about who they are, the accuracy of their perceptions, beliefs, and attitudes, they seek out people who are similar to them in order to make comparisons that largely confirm the veracity and appropriateness of their own attitudes.  Social media is being weaponised by violent extremist organizations such as the Islamic State.  Social media, and other communicative Peer-to-Peer sharing platforms, are ideal to facilitate virtual learning and virtual interactions between young adults and violent extremists.  While young adults who interact within these online forums may be less likely to engage in a lone wolf attack, these forums can reinforce prior beliefs and slowly manipulate people over time.

Is it violent extremist ideology that is inspiring young individuals to become violent extremists and participate in terrorism and political violence?  Decentralized command and control within violent extremist organizations, also referred to as leaderless resistance, is a technique to inspire young individuals to take it upon themselves, with no leadership, to commit attacks against western governments and communities[6].  In the case of the Islamic State and its use of this strategy, its ideology is already known to be extreme and violent, therefore its interpretation and influence of leaderless resistance is nothing less.  Decentralization has been implemented internationally as the Islamic State continues to provide information, through sites such as Insider, on how to acquire the materiel needed to conduct attacks.  Not only does the Islamic State provide training and skill information, they encourage others to spread the their ideology through the conduct of lone wolf attacks and glorify these acts as a divine right.  Together with the vulnerability of young individuals, the strategy of decentralized command and control with the extreme ideology, has been successful thus far.  Based upon this success, CVE’s effectiveness is likely tied to it being equally focused on combating identity as a driver for violent extremism, in addition to an extreme ideology, and the strategies and initiative that can prevent individuals to becoming violent extremists.

The leading strategies in CVE have been social media, social cohesion, and identity focused.  Policy leaders and academics have identified that young individuals are struggling with the social constraints of labels and identity, therefore need to take a community-based approach when countering violent extremism.  The 2015 CVE Regional Summit reveled various recommendations and findings that relate to the use of social media and the effects it has on young, vulnerable individuals and the realities that Australia must face as a country, and as a society.  With the growing threat of homegrown violent extremism and the returning of foreign fighters from fighting with the Islamic State, without programs that address individual identity and social cohesion, violent extremism will continue to be a problem.  The Australian Federal Police (AFP) have designated Community Liaison Team members whose role is to develop partnerships with community leaders to tackle the threat of violent extremism and enhance community relations, with the AFP also adopting strategies to improve dialogue with Muslim communities. The AFP’s efforts, combined with the participation of young local leaders, is paramount to the success of these strategies and initiatives to counter the violent extremism narrative.


Endnotes:

[1] Nick Ralston, ‘Parramatta shooting: Curtis Cheng was on his way home when shot dead’ October 3rd 2015 http://www.smh.com.au/nsw/parramatta-shooting-curtis-cheng-was-on-his-way-home-when-shot-dead-20151003-gk0ibk.html Accessed December 1, 2017.

[2] Lanai Scarr, ‘Immigration Minister Peter Dutton said two teenage brothers arrested while trying to leave Australia to fight with ISIS were ‘saved’’ March 8th 2015 http://www.news.com.au/national/immigration-minister-peter-dutton-said-two-teenage-brothers-arrested-while-trying-to-leave-australia-to-fight-with-isis-were-saved/news-story/90b542528076cbdd02ed34aa8a78d33a Accessed December 1, 2017.

[3] Australian Government media release, Parliament passes Counter Terrorism Legislation Amendment Bill No 1 2016. https://www.attorneygeneral.gov.au/Mediareleases/Pages/2016/FourthQuarter/Parliament-passes-Counter-Terrorism-Legislation-Amendment-Bill-No1-2016.aspx Accessed December 1, 2017.

[4] Australian Government, Living Safer Together Building community resilience to violent extremism. https://www.livingsafetogether.gov.au/pages/home.aspx Accessed December 1, 2017.

[5] John W. Little, Episode 77 Australian Approaches to Counterterrorism Podcast, Covert Contact. October 2, 2017.

[6] West, L. 2016. ‘#jihad: Understanding social media as a weapon’, Security Challenges 12 (2): pp. 9-26.

Assessment Papers Australia Cyberspace Islamic State Variants Kate McNair Social Media Violent Extremism

Playing “Good Jihadi-Bad Jihadi”

Ian Wilkie is an American lawyer and terrorism expert living outside of New York City.  Wilkie has lived in Europe, Asia, and Africa and speaks multiple foreign languages.  He is a veteran of the U.S. Army (Infantry), completed French Foreign Legion commando training, and graduated from Vassar College and Tulane Law School.  Wilkie lived in South Asia post-9/11 where he conducted research and has been a consultant and advisor to two U.S. government agencies.  He has also worked for two of the three largest law firms in the world and has served as general counsel to hedge funds.  Wilkie possesses a deep knowledge of terrorist strategy and is currently working on a book called “Checkmate: Jihad’s Endgame.”  Follow Wilkie on Twitter @Wilkmaster.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Playing “Good Jihadi-Bad Jihadi”

Date Originally Written:  December 5, 2017.

Date Originally Published:  January 1, 2018.

Summary:  U.S. Presidents Jimmy Carter[1] and Ronald Reagan[2] aligned the U.S. with jihadists in Afghanistan against Russia and later gave weapons to Salafi-jihadis allied with Osama Bin Laden[3].  Less than 20 years later, Al Qaeda brought down the World Trade Center and attacked the Pentagon.  Presently the U.S. is bogged down in Syria and continues to make the foreign policy mistake of playing “Good Jihadi-Bad Jihadi.”

Text:  The United States has been fitfully fighting Muslim-majority countries since shortly after the founding of the nation.  President Thomas Jefferson saw enough of a piracy and kidnap threat to mobilize the Navy and newly formed Marine Corps and deploy them to Africa[4].  Centuries later, the use of violence against civilians is a hallmark of Islamist extremists.  Informed by Islamist interpretations of ample examples in scripture (Qu’ran[5] and Hadith[6]), religious “holy warriors” find it easy to commit atrocities and justify them on perceived religious grounds.  Some clerics support this violence, and some have even gone so far as to condone the use of nuclear[7] and biological[8] weapons against “infidels” based their interpretation of sacred texts.  The violence of these Islamist actors, whether on 9/11 or in Europe, Africa, or the various countries of the Middle East today, is not in doubt.  The history of violence associated with the Islamist jihad (“struggle”) to convert the world to Islam is rife with examples of massacres and forced conversions[9].  Put bluntly, the blood lust of these violent Islamists is not even an open question, yet the U.S. still works with some of the extremists, while trying to kill others.

Afghanistan in the decade from 1979-1989 saw the U.S. advance a strategy of opposing Russia without fighting Russia directly.  The U.S., primarily the Congress and Central Intelligence Agency (CIA), believed that Russia could be bloodied and beaten if the “right” people were given the right weapons, clandestinely.  To this end, close ties were forged between the CIA and jihadists and Salafi-jihadis who believed in pedophilia, polygamy, and the liberal application of violence against civilians, including religious minorities.  America knew what Osama bin Laden and Gulbuddin Hekmatyar stood for, yet we still worked with them according to “the enemy of my enemy is my friend” theory of geopolitics[10].  On September 11, 2001, America and the world learned the true dangers of allying with Islamist religious zealots: they may kill U.S. enemies, but they will never be U.S. allies.  Islamist religious zealots answer to their God and no one else, regardless of which faith they profess.

The cold, realpolitik calculus that the CIA made in Afghanistan to work with jihadists and Salafi-Jihadis may have hastened the break-up of the Soviet Union, but it also hastened the end of America’s moral leadership in the eyes of the world.  When these “good” jihadis the U.S. once armed and trained utilized tactics from World War 2[11] against American buildings, the American response was telling: the Saudi allies and sponsors of violent jihad were permitted to leave the U.S., no questions asked[12].  The softball investigation of official Saudi ties to Al Qaeda and 9/11 reflected yet another Machiavellian choice by Washington; the oil money and strategic advantage of remaining allied to the bandit Kingdom[13] outweighed any practical considerations of justice for the victims.  The Saudi departures and lackluster investigation were a clear case of vested interests and money overwhelming U.S. morality and yet, almost two decades later, the survivors and the almost 3,000 dead still demand justice.

America’s reaction to 9/11 consisted of removing the Afghan Taliban from power, but not eliminating their base of support in Pakistan, their illicit drug networks, or their financial backing across the Sunni Muslim world.  The American response largely ignored the fundamentalist horrors of the Afghan Taliban’s behavior towards women, children, and minorities and focused only on which “externally focused” terrorists they were giving refuge to.  Rather like its 180° shift on Osama Bin Laden, the U.S. went from bombing the Afghan Taliban to inviting them to peace talks, in effect treating them like normal people and not the barbarians that they are.  In 2017, the U.S. is still open to sitting across the table from “men” who rape little boys[14] as a matter of honor and shoot schoolgirls in the face[15] as a point of pride, which is moral capitulation of the very worst kind.

Shifting to Syria, we encounter the most egregious examples of playing “Good Jihadi-Bad Jihadi” that the U.S. has ever engaged in.  The fact that the CIA was willing to advance the fiction that foreign fighters from Sunni theocracies were anything but jihadis shows you how gullible and uninformed they believe Americans are[16].  From an ethical point of view, there is no such thing as a “moderate” Sunni foreign insurgent in Syria and there never will be.  Syria is another example of the U.S. trying to advance a larger goal (oppose Shia Iran and Syrian President Bashar al-Assad) by making a moral compromise and allying with malign forces.  In Syria, the U.S. has sent entire warehouses full of weapons to some of the most suspect killers on the planet[17].  For example, U.S. antitank missiles have been used by “friendly, moderate rebels” to attack medevac missions and even journalists[18].  Jihadis that the U.S. knows, and possibly trained[19], have used chemical weapons dozens of times in that conflict[20].  That the insurrection in Syria failed is largely due to the fact that Islamist jihadis don’t fight in lanes; they fight everyone and especially each other.  The U.S. continues to arm “bad” jihadis, as there is no such thing as a “good” jihadi, and the results speak for themselves.


Endnotes:

[1] Brzezinski, Zbigniew (Interview). “How Jimmy Carter and I Started the Mujahideen” https://www.counterpunch.org/1998/01/15/how-jimmy-carter-and-i-started-the-mujahideen/ (Accessed 22 Nov 2107).

[2] Kaplan, Fred. “Reagan’s Osama Connection” http://www.slate.com/articles/news_and_politics/war_stories/2004/06/reagans_osama_connection.html (Accessed 22 Nov 2017).

[3] Harnden, Toby. “Taliban still have Reagan’s Stingers” http://www.telegraph.co.uk/news/worldnews/asia/afghanistan/1357632/Taliban-still-have-Reagans-Stingers.html (Accessed 22 Nov 2017).

[4] Hitchens, Christopher. “Jefferson Versus the Muslim Pirates” https://www.city-journal.org/html/jefferson-versus-muslim-pirates-13013.html (Accessed 22 Nov 2017).

[5] Ali, Ayaan Hirsi. “Islam Is a Religion of Violence” http://foreignpolicy.com/2015/11/09/islam-is-a-religion-of-violence-ayaan-hirsi-ali-debate-islamic-state/ (Accessed 22 Nov 2017).

[6] Anonymous. “1.B Violence in Hadith Books” https://islamreligionofwar.wordpress.com/1b-violence-in-hadith-books/ (Accessed 22 Nov 2017).

[7] Tobey, William & Zolotarev, Pavel. “The Nuclear Terrorism Threat” https://www.belfercenter.org/sites/default/files/legacy/files/nuclearterrorismthreatthailand2014.pdf (p.10, Accessed 22 Nov 2017).

[8] Gunaratna, Rohan & Pita, René. “Revisiting Al-Qa`ida’s Anthrax Program” https://ctc.usma.edu/posts/revisiting-al-qaida’s-anthrax-program (Accessed 22 Nov 2017).

[9] Konrad, Mike. “The Greatest Murder Machine in History” http://www.americanthinker.com/articles/2014/05/the_greatest_murder_machine_in_history.html (Accessed 5 December 2017).

[10] Coll, Steve (2004). Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001. Penguin, pp. 125-128.

[11] Editor, Military History Now. “One Way Ticket – Japan’s Kamikazes Weren’t the Only Suicide Pilots of WW2” http://militaryhistorynow.com/2014/03/17/one-way-ticket-japans-kamikazes-werent-the-only-suicide-pilots-of-ww2/ (Accessed 22 Nov 2017).

[12] Sperry, Paul. “Inside the Saudi 9/11 coverup” https://nypost.com/2013/12/15/inside-the-saudi-911-coverup/ (Accessed 24 Nov 2017).

[13] Zakaria, Fareed. “Saudi Arabia: The devil we know” https://www.washingtonpost.com/opinions/saudi-arabia-the-devil-we-know/2016/04/21/2109ecf6-07fd-11e6-b283-e79d81c63c1b_story.html (Accessed 22 Nov 2017).

[14] Agence France-Presse. “Male rape and paedophilia: How Taliban uses ‘honey trap’ boys to kill Afghan police” http://www.firstpost.com/world/male-rape-and-paedophilia-how-taliban-uses-honey-trap-boys-to-kill-afghan-police-2837546.html (Accessed 22 Nov 2017).

[15] Johnston, Ian. “Malala Yousafzai: Being shot by Taliban made me stronger” https://www.nbcnews.com/news/other/malala-yousafzai-being-shot-taliban-made-me-stronger-f6C10612024 (Accessed 22 Nov 2017).

[16] Mazzetti, Mark, Goldman, Adam & Schmidt, Michael S. “Behind the Sudden Death of a $1 Billion Secret C.I.A. War in Syria” https://www.nytimes.com/2017/08/02/world/middleeast/cia-syria-rebel-arm-train-trump.html (Accessed 4 Dec 2017).

[17] Sanger, David E. “Rebel Arms Flow Is Said to Benefit Jihadists in Syria” http://www.nytimes.com/2012/10/15/world/middleeast/jihadists-receiving-most-arms-sent-to-syrian-rebels.html (Accessed 22 Nov 2017).

[18] Russia Today. “US anti-tank TOW missile used in attack on RT journalists in Syria” https://www.rt.com/news/323810-us-missile-journalists-attack-syria/ (Accessed 5 Dec 2017).

[19] Adl-Tabatabai, Sean. “State Dept: US-Backed Forces Executed Chemical Weapons Attack in Syria” http://yournewswire.com/state-dept-us-forces-chemical-weapons-syria/ (Accessed 22 Nov 2017).

[20] “State Dep. Admits Opposition in Syria Has Chemical Weapons”
https://www.telesurtv.net/english/news/State-Dep.-Admits-Opposition-in-Syria-Has-Chemical-Weapons-20171020-0006.html (Accessed 24 Nov 2017).

Allies & Partners Assessment Papers Ian Wilkie Islamic State Variants Taliban (Islamic Emirate of Afghanistan) United States Violent Extremism

Call for Papers: Africa

True Size of Africa.jpg

Background:

Divergent Options is a non-politically aligned national security website that, in 1,000 words or less, provides unbiased, dispassionate, candid articles that assess a national security situation, present multiple options to address the situation, and articulate the risk and gain of each option.  Please note that while we assess a national security situation and may provide options, we never recommend a specific option.

Call for Papers:

Divergent Options is calling for papers assessing situations or discussing options related to Africa.

Please limit your article to 1,000 words and write using our Options Paper or Assessment Paper templates which are designed for ease of use by both writers and readers alike.

Please send your article to submissions@divergentoptions.org by February 16th, 2018.

If you are not interested in writing on this topic, we always welcome individual articles on virtually any national security situation an author is passionate about.  Please do not let our call for papers cause you to hesitate to send us your idea.  We look forward to hearing from you!

Thoughts from our Twitter Followers to Inspire Potential Writers:

What countries in Africa are hot spots for friction between the United States and the People’s Republic of China?

Does the construction of ports in Kenya drag all of Africa’s wealth to one part of the continent?  If so, what are the impacts?

Assess the performance of United States Africa Command.

Assess the impact of activities conducted by large corporations in Africa.

Describe options to combat human trafficking and slavery in Africa.

Describe options to address famine in Africa.

If cryptocurrencies are utilized by unbanked populations in Africa, what will the impact be to the global economy?

Can the G5 Sahel group counter threats in West Africa?

Assess the status of Islamist terrorists from the Horn of Africa to West Africa.

Are clandestine or covert programs conducted in Africa by third countries a stabilizing or destabilizing force?

Assess the impact of fishery development in Somaliland.

Assess the strategic implications of water security, e.g., the stand-off over the Ethiopian hydroelectric dam on the Nile.

What strategic planning efforts does United States Africa Command need to undertake to be more effective in its mission?

Assess the national security implications of wildlife exploitation in Africa.

Assess the current impact of France’s actions and inactions related to the 1994 genocide in Rwanda.

Africa Call For Papers

Assessment on the Revised Use of Afghan Militias

Suzanne Schroeder is an independent analyst.  She can be found on Twitter @SuzanneSueS57, and on Tumblr.  She is currently working on a long-term project on school poisonings in Afghanistan and has previously written for War on the Rocks.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Date Originally Written:  November 27, 2017.

Date Originally Published:  December 25, 2017.

Summary:  A new plan is under consideration by the Afghan Government to transform the Afghan Local Police into an Afghan Territorial Army.  While this transformation contributes to the current U.S. strategy in Afghanistan, without proper oversight, the Afghan Territorial Army could be co-opted by regional strong men.

Text:  The number of U.S. and North American Treaty Organization troops currently in Afghanistan is insufficient to carry out U.S. President Donald Trump’s strategy.  This strategy has multiple parts involving an increased use of air power, employing Special Operations Forces in more ambitious ways, and a constant fight to reverse Taliban gains and prevent the Taliban from securing additional territory.  Additionally, there is a counter-terrorism part of the U.S. mission, which unilaterally focuses on containing/defeating the Islamic State-Khorasan Province[1].

On November 19, 2017, The Guardian newspaper reported that Afghanistan President Ashraf Ghani is currently considering a U.S. proposal to restructure the Afghan Local Police into the Afghan Territorial Army, modeled after the Indian Territorial Army[2].  The Guardian also reported that the proposal would start with 1,000 men, and possibly reach 20,000, over two years[3].  This proposal has raised numerous concerns with human rights groups, including the United Nations and Human Rights Watch, that fear any new iteration of the militia system will revive the serious abuses that the militias have been accused of in the past ranging  from child sexual abuse to extra judicial killings.  As global attention shifts away from Afghanistan, increased misuses of power are a concern.

If one types the word “arbakis,“ the Pashto world that generally means militias, into the search field on the Taliban’s alemarah website the result is 81 pages where the term is used.  Despite the deceptions and exaggerations that often appear in Taliban propaganda, the negative opinions regarding militias allow the Taliban to gain political capital by exploiting the distrust of these groups based on their records of abusive practices towards civilians.  If this anti-militia narrative did not produce some benefit for the Taliban, it is doubtful they would continue to adhere to it so closely.

The plans to form an Afghan Territorial Army are an attempt to provide a second-line defense against Taliban gains.  The Taliban understand that repeated attacks on military and police targets accomplish the goal of psychological intimidation.  For anyone who may be considering joining the Afghan National Security Forces, the awareness of how often security forces are targeted is a strong deterrent.  Taliban attacks on police and military targets have become increasingly ambitious, complex, and deadly.

The war in Afghanistan is both regionally strategic, and a micro-level conflict driven by local concerns.  All regional players have their own motives for involvement in the conflict in Afghanistan, whether related to security concerns (containing the Islamic State for both Russia and Iran, as an example), or economic opportunities, as in the case with India and the People’s Republic of China.  Also involved are the ever-complex machinations of Pakistan and its security services.  Concurrently, there are numerous local competitions for resources, favors, development projects, drugs, and all other commodities.  These conditions have allowed local powerbrokers, most of whom have connections to the Afghan National Unity Government, to consolidate their power and establish local fealties, policed by militias.  The idea that an Afghan Territorial Army would not be co-opted in some fashion by regional strong men seems dangerously naïve.  Afghan Territorial Army units might also be used as conduits for influence from other regional actors.  There is no reason why Russia, who already assists the Taliban with small arms and a fuel supply scheme[4], wouldn’t seek to co-opt the Afghan Territorial Army.  Any establishment of an Afghan Territorial Army must also take into account the shifting of alliances, which have been so characteristic of this conflict.

A critical part of the counter-terrorism mission in Afghanistan includes the avoidance of another civil war, such as the devastating one that followed the Soviet departure in 1989.  While the continuation of Western aid would seem to prevent this outcome, it’s still a danger that existing conditions can be worsened by sectarianism, social inequality, and the ever-present corruption, that is too entrenched to be effectively combated.  The establishment of an Afghan Territorial Army that is unregulated and operates outside of an accountability structure, would further fuel declining social and political cohesion.  Combined with abuses, and little or no means of redress, Afghan hostilities may be directed at the Afghan National Unity Government, which ironically is greatly lacking in “unity.”  The inability of Afghans to redress the actions of an unregulated Afghan Territorial Army would ensure the Taliban gains support.  One way to preempt this inability of redress is to truly model the Afghan Territorial Army after the Indian Territorial Army, which is subordinated to the Indian Army to ensure proper oversight.

An Afghan Territorial Army with sufficient oversight, including maintaining an accurate inventory of its weapons and equipment, could contribute towards the U.S. strategic goal of recapturing territory from the Taliban (80% back in Afghan government control, after two years), and sufficiently degrading Taliban capabilities to make negotiations seem a reasonable option[5]. While this strategic goal is lofty, a narrower tactical goal could be an Afghan Territorial Army that succeeds in addressing the localized nature of the conflict and offsets the high level of desertions, among other problems that plague the Afghan National Army.

Any future development of the Afghan Territorial Army will require a functioning, sustainable system of oversight, and an awareness of consequences that could potentially damage U.S. engagement in Afghanistan, thus strengthening support for the Taliban.  If the U.S. is invested the creation of an Afghan Territorial Army, then Afghan partners must be willing to adhere to mutually agreed upon guidelines for its employment and oversight, and due care must be taken to evaluate both the potential successes and failures of this type of program throughout its life.


Endnotes:

[1] Author interview, with The Guardian’s Kabul correspondent, Sune Engel Rasmussen, September 11, 2017.

[2] Rasmussen, S. E. (2017, November 19). UN concerned by controversial US plan to revive Afghan militias. Retrieved November 27, 2017, from https://www.theguardian.com/world/2017/nov/19/afghanistan-militias-us-un-diplomats

[3] Ibid.

[4] Loyd, A. (2017, November 11). Afghanistan: the war that never ends. Retrieved November 27, 2017, from https://www.thetimes.co.uk/article/afghanistan-the-war-that-never-ends-mchjpgphh

[5] Stewart, P., Ali, I. (2017, November 20).  U.S. General Sets Two-Year Goal for Driving Back Afghan Taliban.  Retrieved November 27, 2017, from www.usnews.com/news/world/articles/2017-11-20/us-general-sets-two-year-goal-for-driving-back-afghan-taliban

Afghanistan Assessment Papers Irregular Forces Suzanne Schroeder Taliban (Islamic Emirate of Afghanistan) United States

Assessment of the Trump Administration’s Communications with the “Muslim World”

Jason Criss Howk conducted defense, intelligence, diplomatic, and education missions for the U.S. Government focusing on Afghanistan and Muslim cultures for 23 years.  He now teaches, writes, and speaks nationally to decrease anti-religious bigotry.  He shares a variety of information on Twitter @jason_c_howk and at dispatchesFromPinehurst.com. His award-winning book is The Qur’an: A Chronological Modern English Interpretation.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Trump Administration’s Communications with the “Muslim World”

Date Originally Written:  December 10, 2017.

Date Originally Published:  December 18, 2017.

Summary:  Fear of Muslims is irrational. Prohibiting a discussion of Islam’s relationship to modern terrorist groups is too. The continuing success of terror recruiting reveals their ideology is a center of gravity, but you cannot shoot an ideology. You have to expose its flaws and turn people against it. One must use the correct terminology when you speak or it empowers terrorists. This is where the Trump Administration has taken 3-steps forward but 1-step back.

Text:  Fear of Muslims is irrational.  Prohibiting a discussion of Islam’s relationship to modern terrorism is too.  President George W. Bush took America into a War on Terrorism[1], President Barack Obama shifted to countering violent extremism[2].  Both stated correctly that America was not at war with Islam.  While acknowledging the importance of countering a terrorist’s ideology[3], neither slowed the spread of violent radical Islamist or khawarij ideologies used to recruit.  Not talking about Islam and its relationship to terrorism has likely contributed to increasing bigotry against Muslims and damaged America’s ability to decrease recruiting.

The number of nations plagued by terrorists has increased, despite America’s excellence at hunting terrorists.  The continuing success of recruiting hints that their ideology is the likely center of gravity.  You cannot shoot or “drone”[4] an ideology.  You have to understand it, expose its flaws, argue about it, and turn people against it thus ensuring the world understands that violent radical Islamism (separate from the religion of Islam) is a failed political ideology causing death and destruction is critical.

Incorrect terminology further empowers mankind’s enemy.  Here the Trump Administration has improved since the campaign yet occasionally stumbles.   President Trump should listen to his advisors that have operated in the “Muslim World,” listen to solid Muslim allies, and only use precise language that helps Muslims to separate violent radicals from society.  President Trump loses ground when he echoes false experts or bigots that push him to use “alpha-male” language that sounds tough, but makes it more difficult for Muslims to stanch the bloodshed.

Not all terrorists are Muslim and not all Muslims are terrorists; only ignorant people believe otherwise.  So, put the straw-man argument aside that says explaining the role of Islam in modern terrorist propaganda will cause anti-Muslim hatred.  The majority of the deadliest terrorists think they are the most pious Muslims in the world.  Their first murder victims were likely Muslims that they deemed “not Muslim enough for them;” (an old khawarij concept).  Most terrorism victims since 2001 were Muslim. It’s illogical not talk about Islam in relation to modern terrorism.

I have spent almost three years leading talks about the religion of Islam, the political ideology of Islamism, and the khawarij or “violent radical Islamist” ideology used by terrorists.  A few things were made clear to me–often angrily.  First, the American people never felt Bush or Obama understood the enemy.  Second, they felt that neither was able to explain a logical strategy for victory.  Finally, audiences felt the Presidents failed them by not talking about how Islam, Islamism, and terrorist ideologies are connected and disconnected.  Americans felt the Presidents believed their citizens were too stupid to have a discussion about Islam.

Instead of civilly talking about Islam and how terrorists can use some parts of the Qur’an to attract fighters to their cause, previous presidents presented straw-man arguments about why they should or would not discuss Islam.  At my discussions, it takes 45 minutes for people who have never studied Islam to grasp this entire concept.  After Bush and Obama, a third president cannot underestimate the intelligence and curiosity of the American people.

If the Crown Prince of Saudi Arabia can talk about extreme interpretations of Islam[5] and its relationship to many terrorist groups, and the King of Jordan can succinctly label our enemy as Khawarij[6] using terminology from Islam’s history, the American President can have a straightforward conversation about the topic.

America’s terminology should not drive a wedge between the U.S. and our Muslim allies.  Our language should help Muslims drive a wedge between the khawarij butchers and possible recruits and supporters of this deadly cause.

America can’t use words that help our enemy by complementing murderers or lumping them in with hundreds of millions of peaceful Muslims.

Violent radical Islamists want to be called mujahedeen, jihadis, and Muslims.  The word jihad in the Qur’an means to struggle or strive nobly with all your person and wealth in the way of God.  A parallel in Catholicism is the system of sainthood.  Only the most selfless Catholics following God’s path to help others are sainted.  Similarly, in a religious sense, only the best among Muslims should be called mujahedeen (jihadis) which means someone who has performed true jihad.  The word is only used about 14 times in the Qur’an and should be returned to its religious context and taken away from butchers and human rights abusers.  You can’t make jihad into a negative term in a religious sense; so, don’t use it at all.

Instead, insult and brand these violent radical Islamists.  Use the term butcher, murderer, terrorist, khawarij, violent Islamist, loser, Islamist ideologue, distorter or corruptor of Islam, people ignorant of the Qur’an, disgraces, or betrayers of God.

Don’t call violent radical Islamists Muslims or use any negative modifiers in front of the word Islam or Muslim.  These corruptors have left Islam and should be a disgrace to their families.  “Islam” and “Muslims” are both positive words in the Islamic world.  Attaching “Radical” to it is often viewed to mean the entire religion or all Muslims are radical and therefore evil.

Every generation of violent radical Islamist butchers seems to form faster, become more radicalized, kill more gruesomely, and think they are more pious.  The world must stop this trend.

President Trump (obviously not an Islamic scholar) has asked his team and America’s allies to talk clearly about extreme interpretations of the Qur’an and the ideology used by our enemies.  His Riyadh speech[7] was pointed, and by mostly using correct terminology, supported a change[8] that is already underway[9] in the Muslim world.  Start this same discussion in America and ensure that violent radical Islamists and the people who sponsor and provide top-cover for the modern-day Khawarij are exposed and shut down.  Help decrease bigotry towards Muslims.

The world should applaud organizations like this Kuwaiti business[10] that honestly confronted those who purposely misinterpret the Qur’an to justify murder.  All governments should be this brave and clear.

Education won’t end terrorism, but it will impact the long-term fight against Islamist inspired terrorists.  No problem ever improved by refusing to fully examine it and honestly talk about it.


Endnotes:

[1] U.S. Government (2003, February) National Strategy for Combatting Terrorism, retrieved December 11, 2017,  https://www.cia.gov/news-information/cia-the-war-on-terrorism/Counter_Terrorism_Strategy.pdf

[2] U.S. Government (2011, June) National Strategy for Counterterrorism, retrieved December 11, 2017, https://obamawhitehouse.archives.gov/sites/default/files/counterterrorism_strategy.pdf

[3] U.S. Government (2006, September) National Strategy for Combatting Terrorism, retrieved December 11, 2017, https://fas.org/irp/threat/nsct2006.pdf

[4] Friedersdorf, Conor (2016, December 23) Obama’s Weak Defense of His Record on Drone Killings, retrieved December 11, 2017 https://www.theatlantic.com/politics/archive/2016/12/president-obamas-weak-defense-of-his-record-on-drone-strikes/511454/

[5] Chulov, Martin (2017, October 24) I will return Saudi Arabia to moderate Islam, says crown prince, retrieved December 11, 2017 https://www.theguardian.com/world/2017/oct/24/i-will-return-saudi-arabia-moderate-islam-crown-prince

[6] Jordan Times (2015, June 11) Nothing treats Islam with more contempt than Khawarij actions — King, retrieved December 11, 2017 http://www.jordantimes.com/news/local/nothing-treats-islam-more-contempt-khawarij-actions-—-king

[7] U.S. Government (2017, May) President Trump’s Speech in Riyadh Saudi Arabia, retrieved December 11, 2017 https://dispatchesfrompinehurst.com/2017/05/22/howks-notes-of-president-trumps-speech-in-saudi-arabia/

[8] Bergen, Peter (2017 September 27) Saudi women driving a sign bigger change is coming, retrieved December 11, 2017 http://www.cnn.com/2017/09/27/opinions/symbolism-of-saudi-women-driving/index.html

[9] IRNA, (2017 October 29) Iranian woman appointed first ever no. 2 at Oil Ministry, retrieved December 11, 2017 http://www.irna.ir/en/News/82712122

[10] Zain Mobile (2017 May 26) Anti-Terrorism Video for Ramadan 2017, retrieved December 11, 2017 https://www.youtube.com/watch?v=U49nOBFv508

Assessment Papers Jason Criss Howk Trump (U.S. President) United States Violent Extremism

Assessment of the Lone Wolf Terrorist Concept

Linda Schlegel holds a BA in Liberal Arts from the University College Maastricht (NL) and an MA in Terrorism, Security and Society from King’s College London (UK).  Her main topics of interest are radicalization, the role of identity in extremism, and societal resilience.  She can be found on Twitter at @LiSchlegel.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessment of the Lone Wolf Terrorist Concept

Date Originally Written:  November 12, 2017.

Date Originally Published:  December 11, 2017.

Summary:  The label “lone wolf” is attached easily to an individual attacker by politicians and the media, but must be used with care.  These actors do not perceive themselves as acting alone, but as part of a group.  This group is increasingly found in the virtual realm, begging the question of whether traditional notions of membership in terrorist groups is still a valid indication of whether an attack was perpetrated by a lone wolf or not.

Text:  In recent years, the phenomenon of so-called lone wolf terrorism has increased with more and more attacks perpetrated by single actors.  Lone wolf attacks occur in the context of multiple ideological frameworks and are not confined to a single group or system of belief.  The Islamist attack in Nice, France, in 2016 was just as much the work of a lone actor as the atrocities perpetrated by right-wing extremist Anders Breivik in Norway in 2011.  While governments and the media are quick to attach the label lone wolf to a single perpetrator, one needs to ask what this concept actually entails.  Individuals do not exist in a vacuum and one should not make the mistake of equating the reference to lone action to objective isolation or disengagement from society at large.  It needs to be discussed what the label actually says about the perpetrator, how the perpetrator views himself, and whether there can be lone wolves in the age of global connectivity through social media.

Politically, the concept lone wolf is used to reassure the public and communicate that the danger is no longer immanent.  Academically as well as practically, the concept entails more than this reassurance[1].  Following ideas put forward by Ramon Spaaje in 2010, a lone wolf terrorist can be defined as a person who “operates individually, does not belong to an organized terrorist group or network and whose modi operandi are conceived and directed by the individual without any direct outside command or hierarchy[2].”  Therefore, there are two conditions which need to be fulfilled in order to classify someone as a lone wolf.  Firstly, the individual perpetrating an attack cannot have formal membership in a terrorist organization or be part of a network of terrorists.  This does not mean that the lone actor needs to be completely innovative in his ideology or actions.  In fact, radicalization is often driven by organizations disseminating propaganda and terrorists learn from each other even if they belong to very different ideological backgrounds.  Breivik, for instance, took inspiration from Al-Qaeda for his attacks[3].  But lone wolves cannot be recognized members of organizations and take action on behalf of this group.  Secondly, the individual must have planned, prepared and executed the attack without operational support from others and without direct orders to do so.  While seemingly straightforward, these criteria are increasingly difficult to apply in today’s circumstances.

Sociologist Max Weber postulated in his writings that in order to understand a social phenomenon, it is not enough to judge it from the outside, one must put oneself in the shoes of the social actor.  Do lone wolves view themselves as lone wolves?  Most of the time, the answer is no.  Terrorists are rarely motivated by nihilism, they are motivated by altruism[4] and take action on behalf of a group.  Islamist terrorists often claim to act in defense of the ummah, the global community of Muslims, and right-wing extremists on behalf of the white race, the nation or, as Breivik, on a self-composed category such as “Nordic Europeans.”  Lone wolves do not view themselves as lone wolves; precisely the contrary holds true.  Lone wolves often perceive themselves as part of a heroic avant-garde seeking to protect a larger group of people.  It is important to understand that lone wolf is a label attached to an individual by external forces not the actor himself.  One could argue that this by itself does not render the above-mentioned criteria invalid, as objectively the individual was acting alone, regardless of whether he or she believes to belong to an organization or take action on behalf of a group or not.  Membership in groups and “acting alone,” however, are concepts increasingly difficult to apply in a world where terrorist organizations increasingly organize virtually through social media.

What does it mean to “belong to an organized terrorist group or network[5]” when groups of all ideological backgrounds are increasingly organizing in the virtual sphere[6]?  Online, thousands of people access, view, read, comment on and engage with extremist content disseminated by terrorist groups.  Individuals can feel strongly about the virtual community and construct their individual identity in relation to the collective online movement[7].  A network can now refer to a virtual social network spanning the globe with various degrees of real-life and virtual involvement with the organization.  In the age of clicktivism, the notion of membership in a terrorist organization is increasingly less straightforward.  Is it feasible to consider somebody to be a lone wolf if this person was an active member of an online network run by an organized group even if he or she perpetrated the attack alone?  Facilitating lone actor attacks has become part of deliberate strategies of extremist organizations[8] and attacks sometimes represent hybrids between lone actor and “normal” terrorist action.  For example, during the recent attacks in Germany, the attacker was continuously in contact with members of the so-called Islamic State through instant messaging applications[9], including receiving encouragement and practical hints.  Can a case like this still be considered lone wolf terrorism?

Terrorism is constantly evolving and the concept of lone wolf terrorism is not as unambiguous as it might have seemed previously.  Social media has changed the way membership in violent organizations can be conceptualized and calls into question how alone lone wolves really are in the age of instant virtual communication. The lone wolf concept needs to be reevaluated and adapted to changed circumstances.  Should these actors be regarded as peripheral members of terrorist organizations?  How can we conceptualize those that followed general calls for action, but executed attacks individually?  Can we understand some individuals as “remote-controlled” by official members of terrorist organizations?  Currently, there are more questions than answers on the content and validity of the lone wolf concept, but we should be alert and aware that the external conditions have changed, and old responses may not be appropriate anymore to present-day lone actor terrorism.


Endnotes:

[1] For an overview see Ellis, C., Pantucci, R., de Roy van Zuijdewijn, J., Bakker, E., Gomis, B., Palombi, S. and Smith, M. (2016). Lone-Actor Terrorism: Final Report. Royal United Service Institute: London
https://rusi.org/sites/default/files/201604_clat_final_report.pdf

[2] Appleton, C. (2014). Lone wolf terrorism in Norway. The International Journal of Human Rights. Vol. 18 (2), pp.127-142
See also Spaaij, R. (2010). The Enigma of Lone Wolf Terrorism: An Assessment. Studies in Conflict & Terrorism. Vol. 33 (9), pp. 854-870

[3] Borchgrevink, A. (2012). A Norwegian Tragedy: Anders Behring Breivik and the Massacre on Utoya. Cambridge: Polity Press

[4] Atran, S. (2010). Talking to the enemy: Violent Extremism, sacred values, and what it means to be human. Penguin Books: London

[5] Appleton, C. (2014). Lone wolf terrorism in Norway. The International Journal of Human Rights. Vol. 18 (2), pp.127-142

[6] Garcia, F. (9/3/16). White nationalist movement growing much faster than ISIS on Twitter, study finds. The Independent. http://www.independent.co.uk/news/world/americas/white-nationalist-movement-twitter-faster-growth-isis-islamic-state-study-a7223671.html

[7] Berntzen, L.E. and Sandberg, S. (2014). The Collective Nature of Lone Wolf Terrorism: Anders Behring Breivik and the Anti-Islamic Social Movement. Terrorism and Political Violence. Vol 26 (5)., pp.759-779

[8] Burke, J. (6/15/16). Islamist terror has evolved toward lone actors- and it’s brutally effective. The Guardian. https://www.theguardian.com/us-news/2016/jun/15/islam-jihad-terrorism-orlando-shooting-paris-attack

[9] Joscelyn, T. (2016). Terror Plots in Germany, France Were ‘remote-Controlled’ by Islamic State Operatives. FDD’s Long War Journal. Retrieved from: http://www.longwarjournal.org/archives/2016/09/terror-plots-in-germany-france-were-remote-controlled-by-islamic-state-operatives.php

Assessment Papers Linda Schlegel Violent Extremism

Writing Contest Winners

shutterstock-and-the-winner-is-header-image-copy-650x433.jpg

During a 70 day period from July 26th to October 4th, we ran our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  We received four entries in two different categories.  The winners are as follows:

First Place in the category of Most Disruptive is Adam Yefet for his article Options for U.S. National Service.

Second Place in the category of Most Disruptive is Michael C. Davies for his article Victory Over the Potomac: Alternatives to Inevitable Strategic Failure.

Third Place in the category of Most Disruptive is Dr. John T. Kuehn for his article Options for Streamlining U.S. Department of Defense Decision Making.

First Place in the category of Most Able to be Implemented is Jeremy J. Grunert for his article Assessment of Possible Updates to the National Security Act of 1947.

We truly enjoyed our first writing contest and look forward to doing this again in 2018!

 

Contest

2018 Call for Papers Schedule

write-for-us

We learned a lot our first year, are applying those lessons to our second year, and we hope you can join us!

As always we want to fit into the busy lives of our Writers so we publish our Call for Papers schedule as early as possible.  Also, as always, no one should feel constrained by our Call for Papers schedule.  If you have an idea, get in touch!  E-Mail:  submissions@divergentoptions.org

The full Call for Papers schedule, with background and writing formats, can be found by clicking here.

2018 Call for Papers Schedule:

Topic:  Africa

Call for Papers Begins:  January 2018

Call for Papers Ends:  Mid-February 2018

Publish Date:  Late-February 2018

Topic:  The Pacific

Call for Papers Begins:  March 2018

Call for Papers Ends:  Mid-April 2018

Publish Date:  Late-April 2018

Topic:  Alternative Futures

Call for Papers Begins:  May 2018

Call for Papers Ends:  Mid-June 2018

Publish Date:  Late-June 2018

Topic:  Cyberspace

Call for Papers Begins:  July 2018

Call for Papers Ends:  Mid-August 2018

Publish Date:  Late-August 2018

Topic: The Middle East

Call for Papers Begins:  September 2018

Call for Papers Ends:  Mid-October 2018

Publish Date: Late-October 2018

Topic:  Europe

Call for Papers Begins:  November 2018

Call for Papers Ends:  Mid-December 2018

Publish Date:  Late-December 2018

Call For Papers

Options for Streamlining U.S. Department of Defense Decision Making

Dr. John T. Kuehn has served at the U.S. Army Command and General Staff College, Fort Leavenworth, Kansas since 2000.  He retired from the U.S. Navy in 2004 with the rank of Commander.  He presently teaches as a Professor of Military History in the Department of Military History, as well as teaching for Norwich University (Vermont), Naval War College (Rhode Island), and Wolverhampton University (UK) as an adjunct professor.  He can be found on Twitter @jkuehn50 and writes at https://networks.h-net.org/node/12840/blog.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  Updating the National Security Act of 1947 (NSA 47) so that Department of Defense (DoD) decision-making is as streamlined as possible.

Date Originally Written:  August 30, 2017.

Date Originally Published:  December 4, 2017.

Author and / or Article Point of View:  The author is a retired Naval Officer and values a return to a national defense structure that includes a broader range of advice and decentralization of power as represented by cabinet secretaries.

Background:  NSA 47 has outlived its utility in the service of the national security of the United States.  In a post-Cold War world of the 21st Century, the system the United States used prior to 1947 is much more suitable to its traditions, Constitution, and the range of threats posed today.  NSA 47 has gone beyond the utility it provided to the United States after World War II.  NSA 47 once had value, especially in a bi-polar Cold War strategic dynamic informed by the terror of atomic and thermonuclear weapons[1].  However, NSA 47’s utility and value have degraded, especially with the end of the Cold War in 1989-1991.  History moved forward while the United States’ macro-security structure remained static.  Subsequent reforms to the 1947 re-organization, such as that by the Goldwater-Nichols Reform Act of 1987 (GNA), have merely “polished the bowling ball,” not recast it into a new shape[2].

Significance:  The Project for National Security Reform (PNSR) began looking at this issue in 2008 and found that NSA 47 no longer fit the strategic environment we are currently facing or will face in the 21st Century[3].  The 2011 PNSR did a good job of describing the problem and challenges in reforming and reorganizing the system[4].  However, the 2011 PNSR provided little else—no bold recommendations about how to make this happen.  What follows are options I modified from a summation of recommendations the PNSR solicited from me in 2011-12:

Option #1:  Disestablish the position of Secretary of Defense (SecDef) and the Office of the Secretary of Defense (OSD).  The SecDef / OSD structure has too broad a span of control and this limits the scope of strategic advice Presidents receive.  The SecDef functions would move back under the civilian secretaries of the military departments: Army, Navy and Air Force.

Risk:  Medium.  The risk here was much lower when I first made this recommendation in 2010.  It is higher right now because of the North Korean situation and the need for unity of command of the nuclear arsenal if the worst happens and the U.S. needs to conduct a retaliatory strike should North Korea use nuclear weapons first.  However, the ultimate transfer of that unity of command could go to the Chairman, Joint Chiefs of Staff (JCS) although the President would have to be a direct participant in any nuclear release, just as he is now.  One need not burn the Pentagon down and start afresh, but certainly who answers to whom is a legitimate topic worthy of serious discussion and, more importantly, serious action—by Congress AND the President.

Gain:  DoD decision-making is decentralized to the Military Departments and thus decisions are made quicker.  OSD manpower is redistributed to the Military Departments and the Office of the Chairman of the Joint Chiefs of Staff thus increasing their respective capability to support the military operations conducted by the Combatant Commands.

Option #2:  Move the civilian Secretaries of Navy, Air Force, and Army back into the cabinet, but retain the SecDef, similar to the way things were organized prior to and during World War II.  The SecDef would still be a part of cabinet, but would be co-equal with the other civilian service secretaries.  Retain the current JCS organization and staff, but enhance the Chairman’s role on the National Security Council (NSC).  As an appointed position, the Chairman can always be relieved in the same manner that President Truman relieved General MacArthur.

Risk:  Low to medium low, for similar reasons listed for Option #1, the security situation is fluid as of this writing with threat of nuclear war.  No other current “crisis,” though, need impede the move to reform.  JCS Chairman role on NSC should include a substantial decrease in the size of the NSC staff, which should leverage more the capabilities of existing organizations like the JCS and the U.S. Intelligence Community.

Gain:  A balance is struck between decentralizing and streamlining decision-making to the Secretaries of the Military Departments while maintaining a SecDef in a coordinating role.  Option #2 is likely more palatable to Congress as current structures are maintained manpower wise yet power is shifted around.

Other Comments:  Congress must be a part of the solution[5].  Policy recommendations need Congressional oversight, responsibility, and accountability so that if a President goes against an NSC-recommended policy or strategy Congress will be in the loop.  One fear has been that this might drive the U.S. toward a “cabinet” system of government and curtail Presidential power.  That fear sounds like a benefit to me.

Additionally, there will be a need for a national debate that includes social media—where politicians quit pre-emptively tweeting and sniping at each other and instead “message” about national security reform—staying on task and staying on message as the public participates in the dialog.  We might turn again to the past, as a generation of millennial Publius’s step forward in a new round of Federalist Paper-type thinking and writing to kick these ideas around and to build real consensus—not just that of Washington insiders[6].  There is no deficit of political and intellectual talent out there-despite what the pundits say and write.  All too often, however, we consult the advice of specially constituted commissions (such as that for 9/11) and then ignore their advice or imperfectly implement only the portions that stop the media howl.

The United States has time.  The current system, as ineffective as it is, is not so broken that we must act quickly and without reflection.  However, I prefer to close with an even more powerful means of highlighting the problem—a story.  Every year, at the end of my World War II series of classes to military officers attending the Army Command and General Staff Office Course, I post the following questions: “The security system that existed prior to and during World War II was so ineffective that it had to be replaced in 1947, right?  This was the same system that the United States used to lose the most desperate and far-ranging war in its history, right?”  Wrong—we won World War II–handily–and we can win again by adopting a system that proved successful in a pre-Cold War world that looks a lot like our world of today.  So-called progress does not always lead to better solutions.  The founders looked backwards to go forward, so can we.

Recommendation:  None.


Endnotes:

[1] This is not the first time the author has made this argument, see John T. Kuehn, “Abolish the Office of the Secretary of Defense?” Joint Force Quarterly, Issue 47, 4th Quarter 2007, 114-116.

[2] Recent attempt have been made to have a second round of GNA via the Project for National Security Reform effort, see James Locher et al. “Project for National Security Reform: Preliminary Findings” January 2008 (hereafter PNSR 2008), Washington, D.C.; and more recently the follow-on report from the PNSR from November 2011, “AMERICA’S FIRST QUARTER MILLENNIUM: ENVISIONING A TRANSFORMED NATIONAL SECURITY SYSTEM IN 2026,” see www.pnsr.org (accessed 7/31/2017). Full disclosure, the author was an unpaid consultant for the second report.

[3] PNSR, 2008 and 2011.

[4] PNSR, 2011, p.5.

[5] John T. Kuehn, “I Liked Ike . . . Whence Comes Another? Why PME Needs a Congressional Advocate,” in Joint Force Quarterly 83 (4th Quarter, October 2016): 40-43.

[6] Publius was the pen name for the authors of the Federalist Papers who argued the merits and reasoning behind the Constitution: Alexander Hamilton, John Jay, and (especially) James Madison. See, Hamilton, Jay, and Madison, The Federalist Papers (New York: Penguin, 1987), paperback.

Contest Governing Documents John T. Kuehn Option Papers United States

Assessment of the Threat to Southeast Asia Posed by Illegal, Unregulated and Unreported Fishing

Blake Herzinger is a private-sector maritime security advisor assisting the U.S. Pacific Fleet in implementation and execution of the Southeast Asia Maritime Security Initiative and Pacific Command-wide maritime security efforts.  He served in the United States Navy as an intelligence officer in Singapore, Japan, Italy, and exotic Jacksonville, Florida.  His writing has appeared in Proceedings, CIMSEC and The Diplomat.  He can be found on Twitter @BDHerzinger.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Threat to Southeast Asia Posed by Illegal, Unregulated and Unreported Fishing

Date Originally Written:  September 24, 2017.

Date Originally Published:  November 27, 2017.

Summary:  Regional conflict brews in Southeast Asia as states vie for access to fish stocks and, increasingly, rely on Illegal, Unreported and Unregulated Fishing (IUUF) to meet national requirements.  IUUF risks the collapse of targeted fish stocks, destroys the maritime environment, degrades internal security, and brings national security forces into increasingly-escalatory encounters.

Text:  Over one billion residents of the Asia-Pacific rely upon fish as their primary source of protein, and the fish stocks of the region are under a relentless assault[1].  Current estimates place IUUF at between 11 and 26 million metric tons (MMT) yearly (total legal capture is approximately 16.6 MMT yearly), with an estimated value loss to regional economies of $10-23.5 billion[2][3].  Over a 25 year period, fish stocks in the South China Sea have declined anywhere from 6 to 33 percent, with some falling as much as 40 percent over the last 5 years.  In 2015, at least 490 million people in Southeast Asia lived in chronic hunger, with millions of children throughout the region stunted due to malnutrition[4].

Illegal fishing’s pernicious by-product is the critical damage done to the maritime environment by those flouting fishery regulations.  As large fish become more scarce as a result of industrial-scale overfishing, smaller-scale fishermen turn to dangerous and illegal practices to catch enough fish to survive.  Blast fishing obliterates coral reefs and kills indiscriminately, but despite prohibitions continues at a rate of nearly 10,000 incidents a day in Philippines alone[5].  Cyanide fishing is also still widespread, despite being banned in several Southeast Asian countries.  Used to stun fish for live capture (for aquariums or regionally popular live fish restaurants), cyanide contributes to the devastation of coral reefs across the SCS.  Giant clam poaching also has deleterious effects on reefs across the region as poachers race to feed Chinese demand for these shellfish.  Reefs throughout the Coral Triangle are interdependent, relying on one another for pollination, and as the reefs are destroyed by poachers seeking short-term gains, or even by small fishermen eking out a subsistence lifestyle, the effects of collapse ripple outward across the region.  The region is approaching an inflection point at which the damage will be irreparable.

The People’s Republic of China (PRC), which accounts for one-third of global fish consumption and is the world’s largest seafood exporter, fittingly leads the way in aggressively protecting its fishing fleets with an overwhelmingly powerful coast guard that dwarfs any other maritime law enforcement body in Asia[6][7].  As IUUF and environmental destruction cut into maritime resources and competition for those increasingly scarce resources escalates, national maritime law enforcement and naval forces are being rapidly expanded and widely deployed to protect natural resources and domestic fishing fleets.  If unmanaged, the friction generated by these fleets’ increasing interaction could easily explode into violent conflict.

For many countries in the region, the state’s legitimacy rests largely upon its ability to provide access to basic necessities and protect its citizens’ livelihoods.  Tens of millions across East Asia and Southeast Asia depend on fisheries for employment and, in many cases, their survival.  Should fish stocks begin to fail, regional states’ foundations will be threatened.  The combination of inadequate food supply and loss of livelihood could reasonably be expected to spur civil unrest.  In a state such as Indonesia, where 54 percent of the population relies on fish as its primary animal protein, historically weak institutions and propensity for military intervention only amplify the potential consequences of food insecurity.  In the PRC, the Chinese Communist Party (CCP) actively encourages illegal fishing to provide its 1.379 billion people with the fish, seafood and marine products that its lower-and-middle-class, as well as elites, expect.  Legitimacy of the CCP, at least in part, is dependent on the continued production of regional fisheries and desire to buttress its legitimacy will continue to drive this vicious cycle.

The above mentioned calamities can occur in isolation, but they are most often interlinked.  For instance, in the infamous 2012 Scarborough Shoal incident, Philippines maritime law enforcement boarded a PRC fishing boat that had been engaged in giant clam and shark poaching, as well as coral reef destruction.  Armed PRC maritime law enforcement vessels intervened and sparked an external dispute that continues in 2017[8].  Ensuing flame wars between Filipino and Chinese hackers and economic measures enacted by the PRC against the Philippines threatened stability in both the domestic and international spheres of both countries.  The threat posed by IUUF is not just about fish, its direct and follow-on effects have the potential to drag Southeast Asia into disastrous conflict.


Endnotes:

[1] Till, G. (2013). Seapower: a guide for the 21st century. London: Routledge Ltd.

[2] Caputo, J. (2017). A Global Fish War is Coming. Proceedings, 143(8), 1,374. Retrieved October 10, 2017, from https://www.usni.org/magazines/proceedings/2017-08/global-fish-war-coming

[3] One of the World’s Biggest Fisheries Is on The Verge of Collapse. (2017, August 02). Retrieved October 25, 2017, from https://news.nationalgeographic.com/2016/08/wildlife-south-china-sea-overfishing-threatens-collapse/

[4] Asia-Pacific region achieves Millennium Development Goal to reduce hunger by half by 2015. (2015, May 28). Retrieved October 25, 2017, from http://www.fao.org/asiapacific/news/detail-events/en/c/288506/

[5] Guy, A. (n.d.). Local Efforts Put a Dent in Illegal Dynamite Fishing in the Philippines. Retrieved October 25, 2017, from http://oceana.org/blog/local-efforts-put-dent-illegal-dynamite-fishing-philippines

[6] Jacobs, A. (2017, April 30). China’s Appetite Pushes Fisheries to the Brink. Retrieved October 25, 2017, from https://www.nytimes.com/2017/04/30/world/asia/chinas-appetite-pushes-fisheries-to-the-brink.html

[7] Asia-Pacific Maritime Security Strategy (Rep.). (2015, August 14). Retrieved https://www.defense.gov/Portals/1/Documents/pubs/NDAA%20A-P_Maritime_SecuritY_Strategy-08142015-1300-FINALFORMAT.PDF

[8] Are Maritime Law Enforcement Forces Destabilizing Asia? (n.d.). Retrieved October 25, 2017, from https://csis-ilab.github.io/cpower-viz/csis-china-sea/

Assessment Papers Blake Herzinger Environmental Factors Resource Scarcity South China Sea Southeast Asia

Options for U.S. National Service

Adam Yefet has a Master’s degree in International of Affairs at George Washington University’s Elliott School of International Affairs.  He is based in Israel.  He can be found on Twitter at @YefetGlobal.  Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

Editor’s Note:  This article is an entry into our 70th Anniversary Writing Contest: Options for a New U.S. National Security Act.  The author submitted this article under the contest heading of Most Disruptive.


National Security Situation:  A revised National Security Act of 1947 could create a national service requirement.

Date Originally Written:  September 30, 2017.

Date Originally Published:  November 20, 2017.

Author and / or Article Point of View:  Adam Yefet has a Master’s degree in International Affairs from George Washington University.  He writes here as an American concerned with U.S. National Security.

Background:  Seventy years after the signing of the 1947 National Security Act, the world is still an unpredictable and dangerous place, but it is not governed by the same fears.  In 1947, the chief concerns of U.S. national security professionals were re-establishing European stability, and preparing for the coming Cold War with the Soviet Union, and ensuring the United States remained atop the new post-war order in an age of industrialized, mass-produced warfare and nuclear bombs.  The urgency of a threat could be measured in the number of troops, tanks, ships, missiles etcetera that enemy states could marshal.  As such, the 1947 National Security Act established an American military and intelligence complex meant to sustain American interests in the face of these challenges.  Today, conventional warfare remains a primary concern, but not the only one.

Significance:  The modern American political environment has revealed intense cleavages in American socio-politics.  Social trust seems on the verge of breakdown as citizens retreat to curated information bubbles not limited to of-the-day political commentary but expanding into the very facts and analysis of events both modern and historical.  Shared truths are shrinking and becoming a thing of the past.  Internal divisions are the greatest existential threat to the United States of America.  A 2017 National Security Act that includes provisions to bridge this divide could reunite the American people behind the values that helped shape America.

Option #1:  Mandatory National Service.  

A new National Security Act could include a provision for one year of mandatory national service to be required of all Americans to be completed between a certain age rage, for example between the ages of 18 and 25.  There would need to a be a number of service options, some existing, some needing to be created, including service in any of the military branches (which would require longer service) or one of several national organizations such as Peace Corps, Teach for America, and City Year.  New services to be created could involve public, local community, and international development, such as public works projects, agriculture development, vocational work, early childhood development, and senior care.  National service will affect all Americans equally, across socioeconomic, ethnic, cultural, gender, racial, and religious lines. No one can buy their way out of the program.

Risk:  The creation of a national service program in peaceful and relatively prosperous times would be a massive economic and political endeavor that would reshape several industries with an influx of cheap labor.  The financial investment on the part of the government to train, house, and pay even a meager salary would be enormous.  The transition process within affected industries would be long and complicated and would face a winding legal path.  The executive power to do so and the consent of the government and the governed to receive it may be impossible to create outside the aftermath of a sharp crisis like World War II and the ensuing Cold War that brought about the original National Security Act.

The gaping political divide and widespread political disillusionment the program seeks to solve would be two of the greatest threats to undermine the program before it got started.  A requirement of national service would be anathema to many Americans as an assault on their principles of limited government and freedom.  Bipartisan political support may not be enough in the current political environment.  Prolonged resistance to service could be politicized and create another ugly divide within the nation.  A program plagued by political divides and undermined from the beginning would risk doing more harm than good.

Gain:  This requirement to serve would be an opportunity for young Americans to live, work, and consociate and will bind them to each other in common national cause.  Service will create an equal opportunity for American citizens to work and learn in a team environment with a sense of national purpose.

Americans found a significant common bond in the 20th century in the course of winning two world wars, crossing the Depression in between, and living the fears and competitions of the Cold War.  Success in these endeavors came from a sense of purpose, for American victory, and required massive government investments in people, jobs, infrastructure and science that paid off in the creation of our modern state and economy a modern global order that has delivered peace and prosperity to more people than at any previous time in human history.  A mandatory national service program would give all American’s a common bond of shared burden that comes before political divisions.

Option #2:  Re-Instate the Draft.

The United States military is stretched thin from the two longest wars in the country’s history, and the global deployment of troops and resources.  If these conflicts are going to be seen to a successful end while maintaining the U.S. military as the strongest in the world, the United States must ask more of its citizens.  Global politics are entering a transitional period heralding the decline of the American-led global order established after World War II.  Interstate and intrastate conflicts are spreading across the Middle East, Asia, and Eastern Europe.  The future of international relations and affairs is unknowable but the U.S. military and intelligence apparatus should be prepared for catastrophic events.  The Selective Service and Training Act[1] already requires young men, and now women, to register.  The foundation already exists for America’s men and women to be called to service.

Risk:  The peacetime draft of potentially millions of citizens will require the enlargement of the already massive Defense Department budget.  The long-term increased costs for veteran support areas of the government, especially health care, would be significant.  The influx of potentially millions of troops, many of whom do not want to be there will demand experienced leadership from military and political figures who may not be up to the task.  The draft may have the effect of lowering the standards of the military branches as they seek to find places for new soldiers and retain them into the future to meet the demands of American foreign policy.

Gain:  All Americans will share the burden of America’s global role as a military and economic superpower.  Service will give the United States government the manpower it needs to be prepared for the conflicts of the present and future.  The American people called to service will have a greater appreciation of their responsibility as citizens in the management of American democracy and American foreign policy.  The draft would pull in America’s best and brightest for service to the nation’s security.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] 50 U.S.C. – SELECTIVE TRAINING AND SERVICE ACT OF 1940. (n.d.). Retrieved October 27, 2017, from https://www.gpo.gov/fdsys/granule/USCODE-2009-title50/USCODE-2009-title50-app-selective-dup1

Contest National Service Option Papers United States