Saturday, September 28, 2013

Extreme Poverty: The Good News


Nicholas Kristof provides a reminder that, while there is much left to be done in the struggle to eliminate poverty, extreme poverty is declining almost everywhere in the world. As theWorld Bank reported in April, over the course of the thirty years from 1980 to 2010, the proportion of the world’s population living on less than $1.25 a day declined from 1 in 2 to 1 in 5. And there’s reason to believe that the proportion can and will fall even further as disease prevention and development methods that have succeeded in China, India, and across much of sub-Saharan Africa are employed in those areas, many of which have been beset by chronic conflict, that have yet to open fully to aid organizations.

This might be an opportune moment to revisit Hans Rosling's impressive presentation of development data for the two centuries beginning in 1810. As he says, "Pretty remarkable, eh?"

Tuesday, July 23, 2013

Victims of Wars Long Ago


Next Sunday will mark the 99th anniversary of Austria-Hungary’s declaration of war against Serbia, an event that prompted, in quick succession, Russian mobilization for war, the German invasion of Belgium, and French and British declarations of war against Germany. Preparations for the Great War were years in the making; nonetheless, its onset somehow seemed improvised, spontaneous, even accidental.

The last veterans of World War I have all died--the last one on February 4, 2012--but the weapons of that war survive in large numbers in the fields of Belgium and western France. From time to time, they are unearthed and claim new victims. A recent story in the Telegraph describes the work of Dirk Vanparys, a member of the Belgian army’s Explosive Ordnance Disposal Company. On a recent, all-too-normal day, Vanparys and his team collected 73 unexploded shells and 57 grenades and fuses that had been found by farmers. Many of the shells that are recovered on a regular basis contain mustard gas, chlorine gas, or phosgene--agents that killed and disabled hundreds of thousands of troops along the Western Front during the many spasms of chemical warfare in World War I. Four months ago, seven people were hospitalized after a German shell containing gas exploded as a trench was being dug to lay cable south of Ypres.

Weapons used in World War I will continue to kill and maim completely innocent people for years to come. In 2012, Belgian and French authorities collected 185 tons of munitions left from World War I; the total collected in 2011 was 274 tons. Such totals are possible because nearly one and a half billion shells were fired during the war.

In preparation for the Battle of the Somme, an assault by British troops on German trenches that began on July 1, 1916, British artillery fired 1.5 million shells over five days. Tunnels dug under the German lines were packed with explosives—as much as thirty tons of explosives in a single mine—and set off as the assault began. The final artillery barrage—224,221 shells in a span of 65 minutes—created a rumble that, Adam Hochschild writes, “could be heard as far away as Hampstead Heath in London,” almost 200 miles away. In spite of this extraordinary effort to “soften” German defenses, the first day of the Battle of the Somme cost the British Army over 57,000 casualties, including almost 20,000 killed.

A story posted yesterday by the McClatchy News Service describes another unending war. Forty years after the end of U.S. military involvement in the Vietnam War (or, to the Vietnamese, the American War), there are still cases of children being born with severe birth defects caused by Agent Orange, a chemical defoliant used by the United States in Vietnam from 1961 to 1971. The Vietnamese Red Cross estimates that Agent Orange has affected 3,000,000 people in Vietnam, including 150,000 children born with birth defects since the fall of Saigon in 1975.  While the United States has, since 1991, extended disability benefits for any of fifteen diseases linked to Agent Orange to U.S. military personnel who served in Vietnam, it has provided little assistance to the Vietnamese and has avoided acknowledging any responsibility for health problems caused by the use of the chemical. There is a U.S.-funded effort underway to clean up chemical contamination near the Da Nang International Airport, which was used by the U.S. Air Force during the war, but this site is just one of many Agent Orange “hot spots” in Vietnam.

There is some evidence that humankind is getting better at calculating the costs of war and that, as a result, we have become more successful at avoiding it than we have been in the past. What World War I is teaching us now, and what the Vietnam War seems destined to echo, is this: the costs of a war should be calculated out to a century (or more) beyond its conclusion.

Wednesday, April 17, 2013

The End of the Filartiga Era

Today the U.S. Supreme Court gutted the Alien Tort Statute, effectively ending a brief period in the history of American jurisprudence (a mere quarter of a century dating back to the Filartiga case) during which victims of human rights abuse who had no hope of securing justice in their homelands could seek justice in U.S. courts. In the case before the Supreme Court, Kiobel v. Royal Dutch Petroleum, all nine justices agreed that a lawsuit against a multinational oil company for its complicity in the deaths of Nigerian environmental activists should be thrown out. An opinion joined by five of the justices objected to the extraterritorial reach of the ATS in cases like Kiobel, the very feature that has made it an important tool for the promotion of international human rights law.

For more on the ruling, see the New York Times story here, an editorial from the same paper here, and the learned counsel of several experts participating in an "insta-symposium" over at Opinio Juris.

Lawyers representing Big Oil are no doubt celebrating tonight.

Saturday, March 30, 2013

Race to the North

It is a pleasure to note the recent publication of "Race to the North: China's Arctic Strategy and Its Implications" in the Spring 2013 issue of the Naval War College Review. Shiloh Rainwater, a senior Political Science major at Pepperdine, is the author of this important paper analyzing Chinese interests in the Arctic and China's desire to join the Arctic Council.


The cover art for the issue is linked to Rainwater's article, with this description:
Open water in the Arctic ice cap, in a U.S. Coast Guard image posted on the website of the U.S. Geological Survey. This 2009 image, which the photographer titles Reflections, was taken in August, but open water is appearing in ever-greater expanses of the region and for ever-larger proportions of the year—a fact that has drawn the attention of nations far from the pole. In this issue, Shiloh Rainwater explores the Arctic interests of one important non-Arctic nation, the People’s Republic of China.
I am delighted to have served as the thesis advisor for Rainwater on this paper. Congratulations, Shiloh.

Friday, March 29, 2013

"A Cyber-Rampage"

If you're not worried about cyberattacks--and about the security of the many institutions that now rely on the Internet--you're not paying attention.

American Express went offline for two hours yesterday as a result of a cyberattack that experts believe provides evidence that some government-sponsored hackers--current suspicions point toward Iran and North Korea in recent attacks--are interested not in espionage but in destruction. Speaking of similar attacks on South Korean banks last week, the research director of one computer security firm said, "This attack is as much a cyber-rampage as it is a cyberattack." While American Express confirmed that it had come under attack on Thursday, it also said it believed no customer data had been compromised.

Earlier this week, Wells Fargo's website was attacked. A day later Wells Fargo customers experienced problems with bank-issued debit cards, but the company said the problems were unrelated.

Thursday, March 28, 2013

Convictions at the ICTY

Yesterday the International Criminal Tribunal for the Former Yugoslavia (ICTY) handed down sentences in the cases of two former Bosnian Serb officials convicted of crimes against humanity and war crimes. Mićo StaniÅ¡ić and Stojan Župljanin were both sentenced to 22 years in prison having been convicted of the following charges: "persecution, a crime against humanity, through the underlying acts of killings; torture, cruel treatment, and inhumane acts; unlawful detention; establishment and perpetuation of inhumane living conditions; forcible transfer and deportation; plunder of property; wanton destruction of towns and villages, including destruction or wilful damage done to institutions dedicated to religion and other cultural buildings; and the imposition and maintenance of restrictive and discriminatory measures."

Both men were also convicted of murder and torture, which are classified as war crimes. Å½upljanin, but not StaniÅ¡ić, was convicted of extermination as an element in the crimes against humanity.

The charges stemmed from the defendants' efforts to establish an ethnically pure Bosnian Serb state (Republika Srpska) following the breakup of Yugoslavia. The resulting conflict in Bosnia, which lasted from March 1992 to December 1995, claimed approximately 150,000 lives. During the war, scenes reminiscent of those in Nazi concentration camps were played out in various locations across Bosnia as a genocidal policy of "ethnic cleansing" was implemented by the Bosnian Serbs and, on occasion, other parties to the conflict.

To date, the ICTY has indicted 161 people and has discharged cases involving 136. Sixty-nine people have been convicted of crimes; 18 have been acquitted; 13 have been transferred to other courts for trial; 36 cases have been terminated without a verdict (as, for example, in the case against former Serb president Slobodan Milosevic, who died before the conclusion of his trial) or have had charges withdrawn; and 25 cases are ongoing.

Wednesday, March 27, 2013

Spamalot?

The designation of a Dutch web hosting company, Cyberbunker, as a spammer by an informal Internet organization called Spamhaus has touched off a private cyberwar with public consequences thanks to what many regard as a basic flaw in the architecture of the Internet.

Beginning on March 19, a distributed denial of service attack (DDoS) began in an effort to shut down Spamhaus and CloudFlare, the Internet security company in Silicon Valley employed by Spamhaus to try to defeat the attack. The attack, however, has affected not only its primary targets but many innocent bystanders as well. One observer compared what was happening to firing a machine gun into a crowd of people surrounding the actual target.

What makes this particular attack noteworthy is that it is the largest DDoS attack ever publicly announced, having achieved rates of data traffic to the targets ranging from 75 to 300 Gbps (gigabits per second). The attack has reportedly slowed Internet traffic all over the world. This has been achieved using an amplification effect made possible by open DNS servers. DNS (or Domain Name System) servers are open computer servers that provide the essential function of translating domain names (e.g., www.robertewilliamsjr.com) into the number string that makes it possible for messages (including requests to see what's available on a web site) to be routed to the right servers. As a consequence of spoofing, or pretending to be from a different computer, the DDoS attack launched against Spamhaus and CloudFlare used an estimated 30,000 of the DNS servers (out of 25,000,000 worldwide) to send messages back to the servers hosting Spamhaus and CloudFlare. (For more on the technical aspects of the attack, see this story in Tech Week Europe.)

The Internet's present architecture requires the existence of publicly accessible DNS servers to route information properly. It also provides few ways to protect these servers against malicious attacks such as the one targeting Spamhaus and CloudFlare. "Ingress filtering"--analyzing incoming traffic to detect spoofing so that requests associated with DDoS attacks can be rejected--is a possibility, but because it involves financial costs to the private companies that maintain the DNS servers, few have responded to the need.

Internet access has become a public good that is largely under private control with consequences that some experts believe could be catastrophic. The current cyberwar provides a glimpse of what is to come under the current arrangements.

Monday, March 25, 2013

Human Rights NGOs in Russia

There's a good argument to be made that human rights groups played an important role in bringing about an end to the Communist Party's monopoly on power in Russia. (Aryeh Neier makes the argument in his 2012 book, The International Human Rights Movement: A History.) Unfortunately, Russia's current government is showing no gratitude.

Officials from the tax authorities and the general prosecutor's office raided Amnesty International's office in Moscow today. A crew from the government-owned NTV television network arrived at about the same time and, according to a New York Times report, has been trying to gain entrance. The network, according to the Times, "is known for producing salacious reports about critics of the Russian government."

The Moscow office of Memorial, a Russian human rights organization, was raided last week. Memorial was also targeted by a police raid in St. Petersburg in 2008 that resulted in the removal of twelve computer hard drives containing the organization's digital archives.

Tuesday, March 19, 2013

China in the World

The People's Republic of China has an image problem. George Washington University professor David Shambaugh explains the problem and suggests ways Xi Jinping and his new foreign policy team could remedy it in this New York Times op-ed today.

Thursday, March 14, 2013

Ieng Sary (1925-2013)

Brother Number 3, Ieng Sary, has died in Phnom Penh at age 87 while standing trial for genocide, crimes against humanity, and war crimes committed as part of the Cambodian genocide from 1975 to 1979. His case in the mixed UN-Cambodian tribunal called the Extraordinary Chambers in the Courts of Cambodia (ECCC), designated Case 002, will continue with his co-defendants, Nuon Chea and Khieu Samphan. Ieng's wife, Ieng Thirith, was also a co-defendant in the case before her dismissal due to advancing dementia.

Ieng was a co-founder of the Khmer Rouge along with his brother-in-law (and Brother Number 1), Pol Pot. He served as foreign minister during the Communists' genocidal rule in Cambodia, a period in which approximately 1.7 million people died from executions, starvation, and forced labor as the Khmer Rouge attempted to return Cambodia to "Year Zero." Ieng persuaded many educated Cambodians who had left the country to return to help rebuild it; most were subsequently imprisoned, tortured, and killed.

Ieng's death before the conclusion of his trial has highlighted one of the most significant problems with the ECCC. The long delay in its creation coupled with its very slow pace of operation has severely limited its ability to prosecute those who were most responsible for the destruction of Cambodia in the 1970s. Pol Pot died of natural causes in 1998, well before the tribunal began its operations in 2006.

To date, the ECCC has spent $175.3 million and has completed one trial, that of Kaing Guek Eav ("Comrade Duch"), who was in charge of the notorious Tuol Sleng prison in Phnom Penh. Two other cases--Case 003 against Meas Mut and Sou Met and Case 004 against Im Chaem (a Buddhist monk now)--are ready for trial but are mired in political controversy. The government of Hun Sen, who has ruled Cambodia as prime minister since 1985, has numerous links to the Khmer Rouge terror that it prefers not to have revisited through trial testimony. Hun Sen has said that he will block future indictments.

Friday, March 08, 2013

Budgets and Booze

On Monday, Joseph Torsella, the U.S. ambassador for management and reform at the United Nations, told his colleagues in the Fifth Committee (the budget committee) that negotiations might be aided by an increase in sobriety among the delegates. Here are his exact words:
As for the conduct of negotiations, we make the modest proposal that the negotiation rooms should in future be an inebriation-free zone. While my government is truly grateful for the strategic opportunities presented by some recent practices, let's save the champagne for toasting the successful end of the session, and do some credit to the Fifth Committee's reputation in the process.
This is not something one hears often from diplomats.

For more, see this piece by Colum Lynch in Foreign Policy and this New York Times article.

Monday, March 04, 2013

Empowering Women

There is probably no organization that has done more to disentangle American Protestantism from its unholy alliance with the Republican Party than the Sojourners Community founded in the 1970s by Jim Wallis. Social justice has been the touchstone of the organization and its widely read publications including Sojourners magazine and the God's Politics blog.

Today the blog features a story by Pepperdine alumna Deborah Whang. "Justice Starts with Empowering Women in the Developing World" addresses issues that Deborah has been passionate about at least since her days as an undergraduate. It's an interesting and compelling piece--and well worth reading, especially with International Women's Day coming up later this week.

Wednesday, February 13, 2013

The Chinese Cyber Threat

According to the Washington Post, the 2013 National Intelligence Estimate identifies the People's Republic of China as primary culprit in a "massive" and "sustained" hacking campaign against U.S. interests, both public and private. Various economic sectors, including the aerospace, automotive, finance, information technology, and energy industries have been targeted by China. The report identifies Russia, Israel, and France as having engaged in hacking against American economic interests, but suggests that their cyber espionage pales in comparison with that conducted by China.

Monday, January 28, 2013

War and the Liberal Arts

Coming soon to this space is a link to a new paper titled "Arts and Letters, War and Peace: What Painters and Poets Can Teach Us about International Politics."

Wednesday, January 16, 2013

Behind the Scenes at the ICTY

The BBC's Michael Buchanan provides a tour of the International Criminal Tribunal for the Former Yugoslavia in this video. Stops on the brief tour include a courtroom, holding cells on the floor below the courtrooms, and a wing of the prison in Scheveningen.

Monday, January 14, 2013

Nuclear Myths

Ward Wilson of the Monterey Institute of International Studies has an op-ed in today's New York Times arguing that continuing support for nuclear weapons in the United States and abroad is based on five unsubstantiated beliefs about their utility and their inevitability. These myths, Wilson asserts, have formed a major obstacle to the objective of abolishing nuclear weapons.

Wilson's book on the subject, Five Myths about Nuclear Weapons, has just been released by Houghton Mifflin.

Wednesday, January 09, 2013

Iran Strikes Back

Last spring, the computer security company Kaspersky Lab announced its discovery of the Flame malware--an extremely sophisticated cyber weapon infecting computers in the Middle East but apparently directed specifically at Iran. Flame followed Duqu and its predecessor, an extraordinarily complex worm from 2010 called Stuxnet. The target? Industrial systems running control software designed by the German company Siemens--particularly those controlling centrifuges in Iranian nuclear processing plants.

The target of the Stuxnet malware alone strongly hinted that the U.S. government was behind the cyber attack (perhaps in cooperation with Israel), but last June David Sanger reported more definitively in the New York Times that Stuxnet was part of a U.S. program called Olympic Games designed to disrupt the Iranian nuclear weapons program. Sanger, noting that Iran had announced the creation of a cyber force within its military in 2011, added that "there has been scant evidence that it has begun to strike back."

Abundant evidence of retaliatory strikes is now at hand. The New York Times is reporting today that cyber security experts believe Iran is behind a series of denial of service attacks against U.S. banks over the past several weeks. Unlike previous distributed denial of service (DDoS) attacks, the recent efforts to crash bank websites have used clouds of networked computers rather than networks of individually infected computers forming a botnet. This has allowed for larger and more sophisticated DDoS attacks than in previous cases; it has also made tracing the attacks more difficult. The malware being employed is called "Itsoknoproblembro" and the technique of using cloud-based systems to attack websites has prompted cyber security experts to coin the term "bRobot" to refer to a compromised network.

A group called Izz ad-Din al-Qassam Cyber Fighters has claimed responsibility for the attacks, but the Times says that, according to U.S. intelligence officials, the group is a front for the Iranian government.

It is difficult to say what precisely qualifies as a cyberwar and, furthermore, would be very dubious to assert that this is the first one. Regardless, it seems clear that, at a minimum, the U.S. and Iran are now skirmishing in cyberspace.

Tuesday, December 25, 2012

The Christmas Truce

Ninety-eight years ago, at various points along the Western Front, a remarkable thing happened. On Christmas Eve, German and British troops put down their guns, sang Christmas carols--both responsively and together--and eventually crawled out of their trenches to meet in no-man's land to share cigarettes and drinks, to play soccer, to celebrate Christmas, and to bury their dead. The truce was spontaneous: no officers or political leaders authorized it and some, in fact, were incensed by it. And yet it happened, and was deeply meaningful to many of the 100,000 or so soldiers who participated in it. (Consider this sampling of recollections of the Christmas Truce drawn from diaries and memoirs.)

What exactly happened on Christmas in 1914? Was it a sign of the disconnect between raison d'etat and the beliefs of those who were forced to fight in the name of the state? Was it a brief breakthrough of humanity in a war that came to demonstrate the most extreme inhumanity? Was it an act of insubordination by common soldiers? And how could those soldiers so easily return to the fight the day after Christmas? How could men sing together "O Come, All Ye Faithful" one day and kill each other the next?

Saturday, December 08, 2012

"Likes" for Pakistani Taliban

The Los Angeles Times reports that Tehreek-i-Taliban (TTP), the group that Pakistani authorities charge with the assassination of former prime minister Benazir Bhutto, now has a Facebook page. The page, with 281 "likes" as of Friday evening, is used for recruiting. It follows a pattern in recent years of Islamic militant organizations using social media to recruit new members.

Progress on Landmines

This week in Geneva at the review conference of the Ottawa Convention (the Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on their Destruction), six states announced that they have completed demining operations within their borders and are now mine-free. One of the six was Denmark, which in July removed the last of the 1.4 million mines laid by Germany during World War II.

Poland announced that it is prepared to ratify the Ottawa Convention. When it does so, it will become the 161st state party and the last of the European Union's member states to ratify.

The United States, present at the review conference as an observer, stated that it will "soon" complete a review begun in 2009 that was intended to determine whether it should sign the agreement. The United States is the only NATO member state that has not ratified the Ottawa Convention.

Friday, December 07, 2012

Suppressing Dissent in Equatorial Guinea

Human Rights Watch has called for the regime of Teodoro Obiang Nguema to stop harassing members of the political opposition. At least four opposition leaders have been arrested in Equatorial Guinea since November 2011.

The most recent arrest came on Tuesday when Daniel Darío Martínez Ayécaba, leader of the Popular Union party was taken into custody as he was about to leave Malabo for a conference of opposition groups in Madrid. After being questioned in a Malabo jail known as "Guantánamo," Darío was released with orders to report to authorities daily. His passport was confiscated.

The arrests of Darío and, in October, human rights attorney and opposition leader Fabian Nsue Nguema, fit a pattern in Equatorial Guinea of politically motivated arrests in advance of national elections. Equatorial Guinea's legislative elections are expected to take place in January.

Thursday, December 06, 2012

Why Did Thirty-Eight Senators Vote 'No'?

One might be tempted to believe--or at least fervently hope--that the 38 Republican senators who voted against ratification of the Convention on the Rights of Persons with Disabilities on Monday had reasonable objections to the treaty. Even applying a rather generous definition of "reasonable," that was not the case. Thus it is with the opposition party's assault on reason.

As with the opposition to other international agreements, including unratified--at least by the U.S.--human rights treaties such as the Convention on the Elimination of All Forms of Discrimination Against Women and the Convention on the Rights of the Child, Republican concerns focus on how specific provisions of the agreements in question might be interpreted--and thus enforced--by U.S. courts if they were to become part of the "supreme law of the land" as Article VI specifies.

Gail Collins, writing in the New York Times, explains this as well as anyone I've seen so far:
Santorum was upset about a section on children with dis- abilities that said: "The best interests of the child shall be a primary consideration."
"This is a direct assault on us and our family!" he said at a press conference in Washington.
O.K
The hard right has a thing about the United Nations. You may remember that the senator-elect from Texas, Ted Cruz, once railed that a 20-year-old nonbinding United Nations plan for sustainable development posed a clear and present threat to American golf courses.
The theory about the treaty on the disabled is that the bit about "best interests of the child" could be translated into laws prohibiting disabled children from being home-schooled. At his press conference, Santorum acknowledged that wasn’t in the cards. But he theorized that someone might use the treaty in a lawsuit "and through the court system begin to deny parents the right to raise their children in conformity with what they believe."
If I felt you were actually going to worry about this, I would tell you that the Senate committee that approved the treaty included language specifically forbidding its use in court suits. But, instead, I will tell you about own my fears. Every day I take the subway to work, and I use a fare card that says "subject to applicable tariffs and conditions of use." What if one of those conditions is slave labor? Maybe the possibility of me being grabbed at the turnstile and carted off to a salt mine isn’t in the specific law, but what if a bureaucrat somewhere in the Metropolitan Transportation Authority decided to interpret it that way?
It can be difficult trying to explain to those in other countries how 38 percent of the members of one or our two legislative bodies--and the 38 percent with the most fevered imaginations at that--can derail important matters of international law and U.S. foreign poilcy. To say, "That's democracy!" is to give democracy a bad name.

The CRPD Vote

The vote on the Convention on the Rights of Persons with Disabilities on Monday was an embarrassment to the United States and to the Senate itself. Sixty-one senators voted for advice and consent to ratification, but, thanks to the Constitution's anachronistic requirement that treaties garner a two-thirds majority for consent to ratification, that majority was insufficient.

Here are the names of the 38 senators who voted against the Convention on the Rights of Persons with Disabilities:

Lamar Alexander (R-TN)
Roy Blunt (R-MO)
John Boozman (R-AR)
Richard Burr (R-NC)
Saxby Chambliss (R-GA)
Daniel Coats (R-IN)
Tom Coburn (R-OK)
Thad Cochran (R-MS)
Bob Corker (R-TN)
John Cornyn (R-TX)
Mike Crapo (R-IN)
Jim DeMint (R-SC)
Michael Enzi (R-WY)
Lindsey Graham (R-SC)
Chuck Grassley (R-IA)
Orrin Hatch (R-UT)
Dean Heller (R-NV)
John Hoeven (R-ND)
Kay Bailey Hutchison (R-TX)
James Inhofe (R-OK)
Johnny Isakson (R-GA)
Mike Johanns (R-NE)
Ron Johnson (R-WI)
John Kyl (R-AZ)
Mike Lee (R-UT)
Mitch McConnell (R-KY)
Jerry Moran (R-KS)
Rand Paul (R-KY)
Rob Portman (R-OH)
James Risch (R-ID)
Pat Roberts (R-KS)
Marco Rubio (R-FL)
Jeff Sessions (R-AL)
Richard Shelby (R-AL)
John Thune (R-SD)
Patrick Toomey (R-PA)
David Vitter (R-LA)
Roger Wicker (R-MS)

Here are the states whose senators both voted against the treaty: Alabama, Georgia, Idaho, Kansas, Kentucky, Mississippi, Oklahoma, South Carolina, Tennessee, Texas, and Utah.

When Your Computer Threatens You

An article in today's New York Times notes the growing threat posed by "ransomware," the malicious software that disables a computer and demands payment of a "fine" to restore its functionality. (Payment will not fix the problem; never send money to an entity in cyberspace you don't know.)

The Times reports that a computer security expert based in France was able to track the operations of one criminal gang working with ransomware. It infected 18,941 computers in a single day, Owners of those computers paid over $400,000 in ransom payments.

That would explain the appeal of this form of malware to cyber-criminals.

Tuesday, December 04, 2012

The CRPD Fails

Not even the presence of Bob Dole on the Senate floor could persuade more than a handful of Republicans to support the Convention on the Rights of Persons with Disabilities.

A resolution to express the Senate's advice and consent to ratification failed today by five votes (61-38). As Senate majority leader Harry Reid said, "It is a sad day when we cannot pass a treaty that simply brings the world up to the American standard for protecting people with disabilities because the Republican Party is in thrall to extremists and ideologues." Moderate Republicans all supported ratification, but they were greatly outnumbered by those Republican senators who believe that the U.S. will somehow be harmed by agreeing to any international human rights treaty, even one that reflects the principles of the 1990 Americans with Disabilities Act (ADA).

Dole, a former senator and Republican presidential nominee, has been disabled since 1945 when he was hit by German machine gun fire during combat in Italy. He was instrumental in the passage of the ADA and has been a strong supporter of CRPD ratification. Josh Rogin reported that his appearance on the Senate floor today was intended to force Republicans intent on voting against the treaty to walk past him to do so, but the vote occurred after Dole, in a wheelchair, left the floor.

Senator John Kerry's impassioned speech on behalf of ratification is worth watching:



Thursday, November 29, 2012

"Acquisition Malpractice"

Problems with the F-35 Joint Strike Fighter are the subject of a front-page article in today's New York Times. The Times, drawing from a June Government Accountability Office study of the F-35 that focused on "affordability risks," reports that total program costs could reach $396 billion if the Pentagon purchases 2,443 of the planes by the late 2030s as is currently planned. That would make the program the costliest weapons program in history by close to a factor of four. The cost per plane has risen from $69 million in 2001 to $137 million today. Frank Kendall, who has directed the Pentagon's weapons-purchasing operations since May, describes the decision to begin production of the F-35 before flight testing had even started as "acquisition malpractice."

Wednesday, November 28, 2012

Terrestrial Locomotion

Quadrotors have hit the ground running.


Tuesday, November 27, 2012

Considering the CRPD

The United States Senate today voted to proceed to Executive Session in order to consider the Convention on the Rights of Persons with Disabilities. Debate on a resolution of advice and consent to ratification is scheduled to begin tomorrow.

The Convention, which was adopted by the United Nations General Assembly on December 13, 2006, and opened for signature on March 30, 2007, is intended to ensure that states protect the human rights and guarantee the full legal equality of persons with disabilities. It entered into force on May 3, 2008, and currently has 126 parties. Another 28 states, including the United States, have signed but not ratified.

The Senate Foreign Relations Committee reported the CRPD favorably on July 31, 2012, with three reservations, eight understandings, and two declarations. The three reservations pertain to federalism issues (preserving in some instances state laws that would provide less protection for the rights of the disabled than required by the Convention), private conduct (allowing federal law to retain some provisions that allow for discrimination against the disabled as a matter of private conduct), and torture and other cruel, inhumane or degrading treatment (duplicating existing U.S. reservations regarding torture to the 1966 International Covenant on Civil and Political Rights and the 1984 Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment). The eight understandings are generally intended to ensure that the Convention's terms will be interpreted in a manner consistent with existing U.S. law.

The motion to proceed to Executive Session was passed today by a 61-36 vote. Sixty-seven votes will be necessary to adopt the resolution of advice and consent to ratification if all 100 members of the Senate are present and voting. Senator Rick Santorum (R-PA), who has a disabled daughter, and Senator Mike Lee (R-UT), a Tea Party favorite, appeared together today to announce their opposition to the CRPD. It is unclear whether the Convention can gain the two-thirds majority required to give the Senate's consent to ratification during the current lame-duck session. In September, 36 Republicans--more than a third of the Senate's membership--signed a letter opposing any action on treaties in the session following the election.

Obstructing the majority while alienating whole sectors of the population continues to be the Republicans' strategy in Congress. If successful this time, it will deal another blow to the credibility of U.S. leadership on human rights.

Sovereignty and Atrocity

Human Rights Watch is reporting today that eleven children were killed over the weekend when a Syrian MiG-23 dropped cluster bombs on the town of Deir al-'Assafeer. An indiscriminate attack of any kind on noncombatants violates international humanitarian law, but the focus in HRW's account of what happened is on the use of cluster munitions, and for good reasons.

Cluster bombs, first, are used primarily as antipersonnel weapons. When noncombatants die in an attack employing conventional bombs or artillery shells, a plausible claim can sometimes be made that the deaths were unintended collateral damage incidental to an attack on a legitimate target. On the other hand, when civilians--and only civilians--are killed by cluster bombs, there is a strong case to be made that a war crime has been committed.

Second, cluster munitions tend to leave behind a deadly legacy of what are sometimes rather bureaucratically referred to as explosive remnants of war (ERW). Everywhere they have been employed, unexploded submunitions--bomblets--continue to pose a threat to civilians (poor farmers more often than not) long after the conflict ends. Disposing of unexploded submunitions is very hazardous, requiring both resources and political will that post-conflict societies often find to be in short supply. According to HRW, video footage of the attack on Deir al-'Assafeer and its aftermath shows at least fifty unexploded bomblets around the site.

Human Rights Watch maintains that cluster munitions "are subject to a ban under international law due to the harm they cause to civilians," in the words of Mary Wareham, the organization's arms division advocacy director. The ban to which Wareham refers is articulated in the 2008 Convention on Cluster Munitions, which entered into force on August 1, 2010. The Convention today has 111 signatories, 77 of which have ratified the agreement. Syria is not a party to the agreement, however, which means the ban does not apply to it in the absence of a determination that the ban is part of customary international law (a claim that has not, to my knowledge, been pressed by HRW).

There is no question that the use of cluster munitions to deliberately target noncombatants is illegal. The deaths of eleven children in the bombing of Deir al-'Assafeer should be added to the long list of crimes for which the Assad regime ultimately should be held accountable. But it is not clear--in fact, it is almost certainly wrong to say--that international law makes it illegal for Syria to use cluster munitions under any conditions. While I would prefer to side with Wareham and Human Rights Watch on this issue, the fact that Syria is not a party to the Convention on Cluster Munitions is significant. It has opted out of the obligations imposed on states parties by the Convention, as has the United States. The right to do so, however unfortunate in this particular case, is inherent in the notion of sovereignty. Sovereignty shields states--including bad ones like Syria--from the imposition of law, including laws banning cluster munitions, by outsiders. But only up to a point.

Wareham states that "all governments, including Syria’s allies, should condemn Syria’s continued use of cluster bombs," and there is good reason for this, even if Syria is not legally subject to the ban imposed by the Convention on Cluster Munitions. The condemnation of other governments can erode the protection that sovereignty provides for the use of cluster munitions by states that have not ratified the Convention. While sovereignty ensures that states bear primary responsibility for their own laws and their own actions (at least insofar as their actions are confined to their own territories), international law as a means of limiting the freedom of states pushes back against sovereignty where customary international law and, more importantly, peremptory norms (jus cogens) are involved. If cluster munitions are to be "subject to a ban under international law," it will come from universal ratification of the Convention on Cluster Munitions or, more likely, from a sufficiently widespread acceptance of the Convention and broad-based condemnation of holdouts that, in combination, generates a customary international law norm against possession or use of the weapons. Human Rights Watch may have jumped the gun in suggesting that a ban on cluster munitions currently exists, but it is hastening the day when that will be true by publicizing what the Syrian government is doing with these weapons.

Sunday, November 25, 2012

Passwords and Cybercrime

This recent Wired article--"Kill the Password: Why a String of Characters Can't Protect Us Anymore by Mat Honan--should be required reading for anyone who owns--or even borrows--a computer or mobile device. The bottom line is that a strong password isn't enough to protect your data (including the data you have stored in online accounts) from hackers, some of whom are simply malicious teenagers eager to erase every digital photo you've ever taken just for fun. It's not clear whether kids hacking for the thrill of it are better or worse than the professionals who are in it for the money. According to Honan, "In 2011 Russian-speaking hackers alone took in roughly $4.5 billion from cybercrime."

The Campaign to Ban Autonomous Killer Robots

Last week, Human Rights Watch, joined by the Nobel Women's Initiative, launched a campaign to develop an international ban on autonomous killer robots. A 50-page report, Losing Humanity: The Case Against Killer Robots, published jointly by HRW and Harvard Law School's International Human Rights Clinic, was released on Monday.

According to the report, the U.S. Department of Defense is spending roughly $6 billion per year on unmanned systems, a figure projected to grow quickly given the military's avowed interest in procuring more robotic weapons with expanding capabilities. A number of other countries are also investing in military robotics with increasing degrees of autonomy. The most newsworthy example in recent days has been Israel's Iron Dome missile defense system. At present, the Iron Dome system puts a human operator in the loop, but it is clearly a system for which fully autonomous operations would be possible.

The report opposes the deployment of lethal autonomous robots on three grounds: (1) such robots would not conform to the rules of international humanitarian law as they relate to noncombatant immunity, proportionality, and military necessity; (2) they would not be subject to extra-legal protections for civilians such as those predicated on human compassion and empathy, thus making them suitable for use by repressive governments against their own populations; and (3) they would make it difficult to establish accountability for war crimes given the elimination of direct human agency. The report concludes with a recommendation that those involved in the development of robotic weapons generate a code of conduct governing work that might lead to the creation of fully autonomous systems.

Saturday, November 24, 2012

COP18

On Monday, the 18th Conference of Parties (COP18) to the United Nations Framework Convention on Climate Change and the 8th Meeting of the Parties to the Kyoto Protocol will begin in Doha, Qatar. (The agenda is available here.) COP18 has a number of objectives, but the most important involves negotiations toward a climate change treaty to replace the Kyoto Protocol. Under the Durban Platform agreed to at COP17 in Durban, South Africa last year, a new "legal outcome" is to be developed by 2015.

Nathan Hultman, a Brookings Institution fellow, provides an excellent summary of the road to Doha in this post. And, via Andrew C. Revkin's Dot Earth blog at the New York Times, there's this brief--but insightful--video on twenty years of climate change negotiations.


Monday, November 19, 2012

Aung San Suu Kyi Welcomes President Obama

Sometimes a pictures is worth a thousand words.


Sunday, November 18, 2012

Tanks, Rockets, Tweets, and Hacks

As the conflict between Israel and Hamas escalates with rocket attacks aimed at Jerusalem and Tel Aviv on the one hand and air strikes on government offices in Gaza on the other, various cyber dimensions of the conflict are becoming increasingly noteworthy. On the Israeli side, the Israel Defense Forces (IDF), in an effort to control the conflict's narrative, are using Twitter and Facebook with a level of intensity last seen in the Obama campaign. But reviews of the IDF's social media offensive are mixed at best. Michael Koplow's article for Foreign Policy on the IDF Twitter campaign is titled "How Not to Wage War on the Internet." The ability of visitors to an IDF site to earn badges for viewing pages and sharing them on Facebook or other social media sites has prompted some to question whether Israel is "gamifying" war. (Allison Kaplan Sommer helpfully gathers some of the reaction to Israel's social media campaign in a blog post for Haaretz.)

On the other side (in support of, but not initiated by, Hamas), a campaign of cyber attacks against Israeli websites began on Thursday. The loosely organized Internet group Anonymous initiated its effort to deface or take down both government and private websites in Israel in response to the Israeli government's threat to cut off Internet and other telecommunications links between Gaza and the outside world. The Bank of Jerusalem was forced offline for a while and the Ministry of Foreign Affairs website reportedly was compromised. At one point, Anonymous claimed to have taken down over six hundred websites in Israel.

It would be a mistake to try to press these two stories into the same analytical framework just because the Internet and cyberspace are central to both. They bear roughly the same relationship to one another that the use of radio addresses by Roosevelt and Churchill and the development of radar during World War II did. But we can see, nonetheless, that the two stories are important for their own, independent, reasons.

In the case of Israel's efforts to ensure that its narrative about the conflict with Hamas reaches as wide an audience as possible, we can see the application of what media analysts and political campaign strategists have been telling us for years about the movement from old media to new media. Older people--especially males--still sometimes watch network news on TV; if they miss the evening newscasts, they may read about what they missed in the next morning's newspaper (a print edition, of course). Younger people, however, are more likely to get news in small doses throughout the day (and night) via social media and online news outlets. A press conference with reporters and cameras may be the best way to reach the former group while a tweet or a Facebook post (provided it gets retweeted or reposted) will work better for the latter group. (Richard Parker examines some of these differences and breaks down the way the Obama campaign leveraged social media to its benefit here on the New York Times "Campaign Stops" blog.) Thus it seems that perhaps the so-called "CNN effect" was short-lived. Now we get war news (and revolution news and disaster news, etc., etc.) from the people who are involved--not through the lens of a television camera but through the lens of an iPhone or via tweets and Facebook updates. The army (or police force or government ministry) that wants to control the narrative today can't be content with limiting the access of reporters to a conflict zone or a protest site. It must either impose an Internet blackout--and face the wrath of those affected, other governments, and, apparently, a global community of hacktivists--or attempt to keep pace with citizen reporters by offering its own stream of compelling online information. But the information it provides cannot be too compelling. A video of grief-stricken mothers posted by those on the side of the victims looks very different from the same video posted by those who caused the grief in the first place.

Turning to the Anonymous attacks on Israeli websites, these suggest a future in which the strategic calculus involved in going to war (or suppressing protests) must include the possible responses of unseen third parties. After flexing its muscles--successfully, some might suggest--against Scientologists, opponents of Julian Assange and Wikileaks, and now Israel--Anonymous may find it increasingly attractive to weigh in on geopolitical matters. And, given the enormity of cyberspace, there are likely to be other groups developing in other chat rooms around other causes but with the same desire to influence big events in the world. In addition to the loose associations of hacktivists represented by Anonymous, transnational criminal organizations (TCOs) may find ways to use cyber attacks to profit from violent political conflicts while remaining in the shadows. And if states can use cyber attacks to influence the outcome of a rival state's conflict without revealing their involvement, they almost certainly will do so.

If it continues to be more and more difficult for states to control the narrative in conflict and if states continue to face more and more hidden adversaries when they go to war or move to suppress dissent, then the historical advantage that states--and especially the wealthiest and most powerfully armed states--have wielded in the use of force may be eroded to the point where the calculus that leads to armed conflict may be dramatically altered. And that might be a good thing.

Tuesday, November 13, 2012

Ransomware Rising

It's bad when your computer becomes sluggish because some botmaster in Moldova has installed malware on it that turns it into a zombie sending spam to everyone you've ever emailed. It's worse when your computer crashes because the hackers are more interested in the cyber equivalent of vandalism than in "borrowing" your unused computing capacity. The worst, though, may be having your computer lock up and display a message indicating that the hackers will unlock it after you send them money--in other words, online extortion using what is called "ransomware."

The computer security firm Symantec reports that ransomware is spreading and that cyber criminals are finding new and better ways to profit from it. What began about six years ago as a scam targeting computer users in Russia and Eastern Europe has become more sophisticated and has spread to Western Europe and North America.

The malware works like this: A computer user clicks on an infected site--perhaps an ad--that appears legitimate but actually redirects the browser to a hidden website that downloads malware to the user's computer. When the malicious file runs, it locks up the infected computer by preventing essential programs from executing. It then displays a message on the computer's screen demanding that the user pay a "fine," often by using a prepaid electronic payment system or calling a pay-per-call phone number. In some versions, the displayed message is superimposed on a pornographic image and indicates that the "fine" is for having browsed illegal websites. In other versions, the displayed message appears to be from the FBI or another law enforcement agency; it also includes a message alleging illegal activities.

Symantec estimates that up to 3 percent of victims have paid the "fines" of $200 or more, resulting in a haul for cyber criminals of at least $5 million. Payment, incidentally, does not unlock the computer as promised. It is still necessary to remove the malware by running anti-virus software.

For more on ransomware, see this story in ComputerWorld or this CNET story. (Or watch this three-minute video from Symantec.) And for more on protecting your computer, just make sure your anti-virus software is up to date.

Monday, November 12, 2012

McMahan on Just War Theory

Jeff McMahan examines just war theory today and tomorrow on the New York Times' Opinionator blog. Part I, published today, describes the theory, its origins, and contemporary challenges to it. Part II will consider the revisionist critique of just war theory.

Command and Control

One of the most important principles underlying American democracy is civilian control of the military. This principle has been undercut, however, by our society's growing tendency to defer uncritically to the judgment of military leaders and, worse, to regard any questioning of that judgment as unwise or even unpatriotic. This point is supported by U.S. Naval Academy professor Aaron B. O'Connell's op-ed that I noted last week. It is further bolstered by an op-ed  in today's New York Times by military writer Thomas E. Ricks.

Ricks notes that during "an unnecessary war in Iraq and an unnecessarily long one in Afghanistan," civilian leaders have been criticized but "our uniformed leaders have escaped almost any scrutiny from the public"--even though they "bear much of the blame for the mistakes in the wars." Congress fails to exercise oversight, for fear of being seen as "criticizing our troops," and the military itself seems uninterested in self-examination.

The failure of civilian leaders to subject the American military to serious scrutiny has not only allowed poor military decisions in the Iraq and Afghanistan wars to go unpunished (a point that Ricks makes), it has also resulted in a bloated defense budget at a time when the nation can ill afford it. The fault, of course, lies not just with civilian leaders but with citizens--voters--who seem to believe the military can do no wrong. Perhaps General David Petraeus, as he leaves the CIA, can remind us that even the best and brightest of our military officers can, like the rest of us, suffer lapses of judgment.

Sunday, November 11, 2012

Climate and Social Stress

In a report commissioned by the U.S. intelligence community, the National Research Council has concluded that the acceleration of climate change means "disruptive environmental events" will occur with increasing frequency and growing impact on national and global security. The study, titled Climate and Social Stress: Implications for Security Analysis, was prepared by a team led by John Steinbruner, director of the University of Maryland's Center for International and Security Studies.

The study's summary states:
     Anthropogenic climate change can reasonably be expected to increase the frequency and intensity of a variety of potentially disruptive environmental events--slowly at first, but then more quickly. Some of this change is already discern- ible. Many of these events will stress communities, societies, governments, and the globally integrated systems that support human well-being. Science is unlikely ever to be able to predict the timing, magnitude, and precise location of these events a decade in advance, but much is already known that can inform security analysis, including details about the character of events that are becoming more likely and about the general trajectory of increasing risk.
The New York Times summarizes the report and includes comments from Steinbruner in an article here.

Thursday, November 08, 2012

Released

Fabian Nsue Nguema, the Equatorial Guinean human rights attorney who was incarcerated in Malabo's notorious Black Beach Prison on October 22 while visiting a client, has been released. Nsue told Agence France Presse that he was released on October 30 following nine days in solitary confinement without having been charged with a crime.

Monday, November 05, 2012

A New "Third Rail"

For those unfamiliar with the term, "third rail" is a phrase that entered the American political lexicon in the early 1980s to describe an issue--Social Security reform was the particular issue at that time--so politically charged that touching it means certain death at the polls. The term is, of course, derived from the rail of a subway line that carries high-voltage electrical current to run the trains. William Safire traces the metaphorical use of the term back to Kirk O'Donnell, an aide to Speaker of the House Thomas P. "Tip" O'Neill.

Over the years other issues, including Medicare reform, gun control, and criticism of Israel have been called the third rail of American politics. Health care is said to be the third rail of Canadian politics. Now, Aaron B. O'Connell, a professor at the U.S. Naval Academy, makes a strong case that criticism of the military has become a new third rail in the American political system.

O'Connell takes as his starting points President Dwight D. Eisenhower's well-known farewell address in which he warned against "the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex." While O'Connell believes that the military-industrial complex has not influenced foreign policy or distorted the economy in the ways that Eisenhower feared, he argues that the American culture has been militarized by the permanent war preparations against which he warned. "Support the troops" has come to mean the military should never be questioned and its spending should never be cut. "Today," O'Connell writes, "there are just a select few in public life who are willing to question the military or its spending, and those who do--from the libertarian Ron Paul to the leftist Dennis J. Kucinich--are dismissed as unrealistic." 

The real problem, as O'Connell describes it, is this: "That which is left unexamined eventually becomes invisible, and as a result, few Americans today are giving sufficient consideration to the full range of violent activities the government undertakes in their names."

In the aftermath of the election, it would be good if the military-industrial complex--and the level of defense spending in a time of budgetary constraints--could be examined critically by members of both political parties. There is a way that they could do this without committing political suicide. After Democrats and Republicans in 1983 came together in support of the Greenspan Commission's recommendations on Social Security reform, Kirk O'Donnell told Tom Oliphant that the political third rail differs from the one in the subway in this respect: "If a Republican foot and a Democratic foot touch it simultaneously, nothing happens."