On a Mac, Valve’s Steam keeps its downloaded games in the directory
where Login Name is the name of your home directory. Mine is just "ron" - or better yet, the home directory alias ~/ will do the trick
or simply ~/Library/Steam/SteamApps
I created a Steam directory on my target drive, which is now “/Volumes/Media/Steam”
In order for Steam to be happy with the move of the games to the new storage drive, I had to do three things.
First, I copied the SteamApps directory from the Steam directory in my home file system to the new target drive. Second, I deleted the “SteamApps” directory from its original location. Lastly, I created a symbolic link (not an Apple “Alias”) from the new SteamApps directory on my target drive to the Steam directory on your home file system.
I used the following command to copy the games in SteamApps to my iomega drive:
cp -a ~/Library/“Application Support”/Steam/SteamApps /Volumes/Media/Steam
(Alternatively you can just use finder and drag the SteamApps directory to its new location.)
Next I used finder to navigate to /Volumes/MyMedia/Steam to validate my games had been copied. I then used finder again to navigate to ~/Library/Application Support/Steam and drag the SteamApps folder to the trash.
Lastly, using a terminal window I typed
ln -sf /Volumes/Media/Steam/SteamApps SteamApps
(again, you can't use apple file aliases here!)
That’s it! I’m now downloading my new games. Steam is happy and running. And I’m not clogging up my primary drive.
B - ~64% of the Afghan population participate in and rely on Opium related agriculture.
C - The Taliban and Al Qaeda rely on Afghan Opium export for much of their funding.
Is there a problem here? The Taliban, Al Qaeda, and the US seem to require the Opium trade to achieve their ends - the first two directly, the latter indirectly through the support of a significant portion of the Afghan population.
According to a report published today by StratFor, Afghanistan produces over 90% of the world's opium supply. It is a $2.3 Billion revenue source and represents a $65 Billion trade by the time it gets to end users - some of whom are presumably pharmaceutical companies (though a small percentage).
According to the World Fact Book, almost 80% of the population is involved in agriculture. The most important crop is Opium. Since the Fact Book doesn't include so-called "illicit" exports - the $ 547 M it cites as legitimate exports, implies that Opium represents 80% of all agricultural export dollars.
- Annual Afghani production (of Afghani Opium) : 6000 Tons, 12 M lbs Opium (equivalent to 1.2M lbs Heroin)
- Annual economic impact (to Afghanistan): $2.3 B, $191/lb. Opium, ($1,910/lb Heroin), about 20% of Afghanistan's GDP.
- Annual global economic impact: $65 B, $5,400 /lb. Opium, ($54,000/lb Heroin)
- 78% of the population is involved in Agriculture
With yesterday's 219/214 vote on the reconciliation bill, narrowly passing the House - is the opinion of the American people really that important anymore? With TARP spending exceeding $740 billion - what's a measly $940 billion over 10 years? Perhaps November's election will tell us.
Now polls are just that, and not to be confused with elections. Last week's machinations are just another reminder that the panic begun in the late summer of 2007 has yet to give way to rational and principled governmental action. We appear to be spending our future on the fears of the present, and socializing 1/6 of the largest economy on the planet.
The tide will change - perhaps it already has. If so, Surfs Up! There's an election in November - its time to send a meaningful message. This is likely to be the largest off-year election in recent memory. I hope you'll join me in voting your opinion, and not leave Gallup, Zogbe, and the rest to speak for us.
The democrat leadership are hoping that we, democrat and republican constituencies alike have short memories. They may be short - but not that short.
Seven months and counting down . . .
By Fred Burton and Ben West
The assassination of senior Hamas militant leader Mahmoud al-Mabhouh on Jan. 19 is still generating a tremendous amount of discussion and speculation some six weeks after the fact. Dubai's police force has been steadily releasing new information almost on a daily basis, which has been driving the news cycle and keeping the story in the media spotlight. The most astounding release so far has been nearly 30 minutes of surveillance camera footage that depicts portions of a period spanning the arrival of the assassination team in Dubai, surveillance of al-Mabhouh, and the killing and the exfiltration of the team some 22 hours later.
By last count, Dubai police claim to have identified some 30 people suspected of involvement in the assassination; approximately 17 have been convincingly tied to the operation through video footage either as surveillants, managers or assassins, with the rest having only tenuous connections based on information released by the Dubai police. In any case, the operation certainly was elaborate and required the resources and planning of a highly organized agency, one most likely working for a nation-state.
While the 22-hour period depicted in the video showcased the tactical capabilities of the various teams, it hardly tells the whole story. In order to pinpoint the location of al-Mabhouh on the day of his killing, the organization responsible for this operation would have had to have tracked al-Mabhouh for months, if not years. This can be done in three ways: technical surveillance, utilization of human sources and physical surveillance.
Technical surveillance of al-Mabhouh would include monitoring his e-mail, telephone calls and other forms of electronic communications such as online credit-card transactions and travel reservations. This could reveal his physical location and future plans, which would allow the assassination team to anticipate his location and prepare well ahead of time. With such a large team involved in the assassination, careful coordination and planned movements would have been required to ensure that all members were in place without attracting attention.
But technical surveillance has limitations. An experienced operative like al-Mabhouh (who had been the target of two previous assassination attempts in as many years) would most likely have taken precautions that would have limited his electronic visibility. The operational team likely used human sources with close ties to al-Mabhouh who could corroborate the information and possibly influence the target's movements, putting him in place for the operation. Human sources could have included al-Mabhouh's colleagues within Hamas or a member of a rival group such as Fatah. (Three Palestinians suspected of being members of Fatah were arrested by Dubai authorities in connection with the assassination, indicating that the group may have provided human intelligence to the organization responsible for al-Mabhouh's assassination.) Other people could have been recruited using a number of incentives (including cash) without their knowing the consequences of their assistance. Both the technical and human intelligence operations would have been run by intelligence officers operating abroad and at locations separate from the operational team.
According to Dubai police, physical surveillance was conducted by members of the operational team during al-Mabhouh's previous trips to the United Arab Emirates. Physical surveillance is a critical part of any effective assault (whether it's a clandestine intelligence operation or a car-jacking) because it gives the operatives an opportunity to become familiar with their surroundings and recognize their target in his or her "natural" environment.
Once all this homework was done to establish al-Mabhouh's normal routines and determine his approximate location and duration of his stay in Dubai, the intelligence-collection process moved into the deployment phase and an operational team was sent into action.
Prior to Mabhouh's arrival, surveillance teams set up in the airport and at different hotels to make sure they could obtain a visual confirmation of their target. Based on their intelligence of his prior trips to Dubai, planners placed teams in two hotels to wait for al-Mabhouh approximately an hour before his arrival. They also had a surveillance team waiting for him at the airport to follow him as soon as he entered the country and report his movements to the rest of the team. While it wasn't captured on video, we suspect that a mobile surveillance group tracked al-Mabhouh from the airport by car. To help ensure a successful outcome, the operational team used overwhelming force to prevent the target from ever seeing the same face twice. When it was established that al-Mabhouh was staying at the Al Bustan Rotana, the team responded by abandoning their other posts and directing their focus to that hotel.
Once al-Mabhouh was identified, the team locked on to him at the hotel and started initiating further steps in the operation. The first surveillance team watched al-Mabhouh register at the front desk and then followed him to his room, noting the target's specific room number. This was relayed to other members of the team, who then placed a reservation for the room across the hall from al-Mabhouh, which gave them direct access to their target. The selection of the room is very interesting for two reasons. First, it was directly across the hall from al-Mabhouh's room, giving the team a perfect spot from which to monitor his movements. Second, the room was just behind the video camera for that floor and the camera was trained on the emergency stairwell exit, which allowed the assassination team to carry out the attack on his room without being filmed.
Meanwhile, down in the hotel lobby, surveillance teams were rotating to monitor the target's movements in and out of the hotel. At one point, a surveillant is seen following al-Mabhouh out to the street to relay by cell phone the type of vehicle he had entered. These surveillants, operating in teams of two, used disguises such as hats, sunglasses, beards and work-out gear to establish a cover for action and better conceal their identities. While many members of the operational team were identified on closed-circuit television (CCTV), hats and sunglasses helped distort their images and reduce the already low risk of being recognized by the target or any protective team during the operation.
Another necessity in any operation like this is communications. Surveillance video of the team involved in this operation shows them using cell phones to send text messages and talk to other members of the team. According to reports from Dubai police, the cell phones used in the operation were dialed to an Austrian number, likely the operations and support center for the team on the ground and any others involved in the operation. This might have been an open conference line into which all members of the operational team could dial to monitor the movement of their target. It is unlikely that the center was actually in Austria; it probably used a proxy phone line to mask its true physical location.
Assassination and Exfiltration
At approximately 8:30 p.m. on Jan. 19, after al-Mabhouh returned to his hotel room from a meeting, the assassination team moved in. It was important to carry out the killing at a time and in a manner that would give the team the maximum window of opportunity. They suspected that al-Mabhouh was in for the night, which meant that nobody would miss him until early the following afternoon, giving the team ample time to flee the country. The team carried out the assassination smoothly, with video surveillance showing only two operatives casually talking outside the elevator (a cover for monitoring the hall for possible distractions) -- in other words, nothing out of the ordinary. The assassination team members also exhibited no unusual behavior when they departed the scene. Demeanor is extremely important, and the ability of the team to act calmly and naturally and not catch the attention of security guards monitoring CCTV ensured that the act remained a secret until hotel cleaning staff found the body more than 17 hours after the entire team had departed Dubai.
The assassination team also killed al-Mabhouh in a way that apparently confounded medical examiners trying to determine the cause of death, delaying the announcement of a criminal case for nine days. This delay gave the operational team ample time to cover its tracks, possibly by using third- and fourth-country border crossings, additional false identities and safe-houses, making it much harder for Dubai authorities to track team members to their ultimate destinations. This confusion appears to have been created by the use of a muscle relaxant called succinylcholine (also known as Suxamethonium), which, if used in large enough quantities, can cause the heart to stop, making it appear that the victim died of cardiac arrest. The drug also has a very short half-life, meaning that traces would degenerate and virtually disappear shortly after injection, making it ideal for covert operations such as this one.
The team was not able to pull off the operation with complete anonymity -- it is virtually impossible to operate in a modern environment without leaving some kind of electronic trace. The Dubai police were able to use video surveillance from the airport, hotels and a nearby shopping center to trace back the movements of the operatives and establish their identities according to the passports that they used. These later proved to be fraudulent passports from the United Kingdom, Ireland, Germany and France -- but they were extremely well-made fraudulent passports that were discovered later, only after video surveillance prompted closer scrutiny; customs officials were unable to detect this when the operatives were arriving or departing. Moreover, the credit cards used by several members of the operation team were linked to a company called Payoneer. The company's CEO is a former member of Israel Defense Forces special operations, and Payoneer has financial backing from a company based in Israel.
Dubai police have announced that they retrieved DNA evidence from at least one of the members on the assassination team and fingerprints from several others, giving authorities pieces of evidence that are unalterable, unlike a passport. However, DNA evidence is only helpful when it can be compared against an exemplar. If Dubai police are unable to find a match to the DNA sample or a fingerprint, then these clues will offer little immediate help.
The passports also provide little immediate help in terms of tracking down the suspects. The discovery that fraudulent British, Irish, German and French passports were used has created a diplomatic problem for Israel (Mossad is understandably at the top of the list of suspects), which raises the profile of the operation considerably. This is certainly not what a clandestine operation is supposed to do. Although the operatives will probably never be found and handed over to UAE authorities, the fact that so many details of the assassination have been made public jeopardizes the anonymity that is supposed to surround this kind of operation.
Al-Mabhouh was hardly a likable character. As a senior Hamas military commander, arms smuggler and liaison to Iran, he was already on the terrorist watch lists in the countries that have complained about the use of fraudulent passports. Public indignation is a necessary and expected reaction from these countries to save diplomatic face, but when it comes down to it, there would be few incentives to seriously punish Israel, if it indeed sponsored the hit. The police of Dubai and the United Arab Emirates, rightfully frustrated that they are tasked with solving an unsolvable case, will still probably not miss al-Mabhouh. Their efforts to stir up outrage over the assassination are likely fueled by their desire to save face in the Arab world, where the Palestinian cause is of high rhetorical importance but little strategic importance.
The fact is that the high level of complexity involved in this assassination, along with the smoothness with which it was carried out, is evidence that the operation was undertaken by an elite covert force, the likes of which could only be sponsored by a nation-state. The ability to conduct preliminary intelligence collection, to muster a large and coordinated team of skilled operatives, to fabricate passports to an exacting degree, to successfully exfiltrate all members of the team -- all of this requires a significant and well-funded effort that, we believe, exceeds the current capabilities of any non-state terrorist group. It is worth noting here that the most impressive aspect of the operation was the team's tradecraft and demeanor. All the members of this team were professionals.
Indeed, with so much time having already elapsed, and if the operation was sponsored by a nation-state, it is highly improbable that any of the operatives involved will ever be caught. However, countries around the world are offering their assistance in the case, including the United Kingdom, the United States, Canada and Australia. Few officials from these countries actually believe any of the operatives will be apprehended, but that is not the real reason to participate in the investigation. What officials are really looking for are the granular details of how this group of assassins and surveillants operated. These details are extremely valuable in ongoing counterintelligence efforts by countries to thwart foreign intelligence agencies operating on their home turf. The information can provide clues to past and future cases, and it can be used to build databases on covert operatives, so that if any of these people show up unexpectedly at an airport, hotel or embassy in the United Kingdom, the United States, Canada, Australia or elsewhere, the alarms can be sounded more quickly.
This report may be forwarded or republished on your website with attribution to www.stratfor.com.
Copyright 2010 Stratfor.
(Ron's Note: I find Stratfor's analysis and perspective a refreshing alternative to the ever shrill and adrenaline charged agitation of the commercial media. Many of my readers agree with me. I hope you will, too.)
By Scott Stewart
On Feb. 18, 2010, Joseph Andrew Stack flew his single-engine airplane into a seven-story office building in northwest Austin, Texas. The building housed an office of the Internal Revenue Service (IRS), along with several other tenants. According to a statement he posted to the Internet before taking off on his suicide flight, Stack intentionally targeted the IRS due to a long history of problems he had had with the agency. In the statement, Stack said he hoped that his action would cause "American zombies to wake up and revolt" against the government. Stack also expressed his hope that his message of violence would be one the government could not ignore.
Stack's use of violence to attempt to foster an uprising against the government and to alter government policy means that his attack against the IRS building was an act of domestic terrorism. (Terrorism is defined by the intent of the actor, not the effectiveness of the attack, a topic we will discuss in more detail at another time.) While Stack's terrorist attack ultimately will fail to attain either of his stated goals, he did succeed in killing himself and one victim and injuring some 13 other people. The fire resulting from the crash also caused extensive damage to the building. We have received credible reports that Stack had removed some of the seats from his aircraft and loaded a drum of aviation fuel inside the passenger compartment of his plane. This extra fuel may account for the extensive fire damage at the scene. According to STRATFOR analysts present at the scene, it appears that Stack's plane struck the concrete slab between floors. Had the aircraft not struck the slab head-on, it may have been able to penetrate the building more deeply, and this deeper penetration could have resulted in even more damage and a higher casualty count.
For many years now, STRATFOR has discussed the security vulnerability posed by general aviation and cargo aircraft. Stack's attack against the IRS building using his private plane provides a vivid reminder of this vulnerability.
Framing the Threat
As we have previously noted, jihadists, including al Qaeda's central core, have long had a fixation on attacks involving aircraft. This focus on aviation-related attacks includes not only attacks designed to take down passenger aircraft, like Operation Bojinka, the 2001 shoe bomb plot and the Heathrow liquid explosives plot, but also attacks that use aircraft as weapons, as evidenced by the 9/11 strikes and in the thwarted Library Tower plot, among others -- aircraft as human-guided cruise missiles, if you will. These aviation-focused plots are not just something from the past, or something confined just to the al Qaeda core leadership. The Christmas Day attempt to destroy Northwest Airlines Flight 253 demonstrated that the threat is current, and that at least some al Qaeda franchise groups (al Qaeda in the Arabian Peninsula, or AQAP, in this case) are also interested in aviation-focused plots.
Jihadists are not the only ones interested. Over the past several decades, a number of other actors have also conducted attacks against aviation-related targets, including such diverse actors as Palestinian, Lebanese, Japanese and Sikh militant groups, Colombian cartels, and the Libyan and North Korean intelligence services. Stack and people like Theodore Kaczynski, the "Unabomber," demonstrate that domestic terrorists can also view aviation as a target and a weapon. (UNABOM is an FBI acronym that stood for university and airline bomber, the targets Kaczynski initially focused on.)
The long history of airline hijackings and attacks has resulted in increased screening of airline passengers and an increase in the security measures afforded to the commercial aviation sector. These security measures have largely been reactive, and in spite of them, serious gaps in airline security persist.
Now, while some security vulnerabilities do exist, it is our belief that any future plans involving aircraft as weapons will be less likely to incorporate highly fueled commercial airliners, like those used on 9/11. In addition to newer federal security measures, such as expansion of the air marshal program, hardened cockpits and programs to allow pilots to carry firearms, there has also been a substantial psychological shift among airline crews and the traveling public. As Flight 93 demonstrated on Sept. 11, 2001, the new "let's roll" mentality of passengers and aircrews will make it more difficult for malefactors to gain control of a passenger aircraft without a fight. Before 9/11, crews (and even law enforcement officers traveling while armed) were taught to comply with hijackers' demands and not to openly confront them. The expectation was that a hijacked aircraft and passengers would be held hostage, not used as a weapon killing all aboard. The do-not-resist paradigm is long gone, and most attacks involving aircraft since 9/11 have focused on destroying aircraft in flight rather than on commandeering aircraft for use as weapons.
This change in the security paradigm has altered the ability of jihadists and other militants to plan certain types of terrorist attacks, but that is just one half of the repetitive cycle. As security measures change, those planning attacks come up with new and innovative ways to counter the changes, whether they involve physical security measures or security procedures. Then when the new attack methods are revealed, security adjusts accordingly. For example, the shoe bomb attempt resulted in the screening of footwear. AQAP shifted the attack paradigm by concealing explosives in an operative's underwear. In the case of planners wanting to use aircraft as human-guided cruise missiles, one way the attack paradigm can be shifted is by turning their efforts away from passenger aircraft toward general aviation and cargo aircraft.
Most security upgrades in the aviation security realm have been focused on commercial air travel. While some general aviation terminals (referred to as FBOs, short for fixed base operators) have increased security in the post 9/11 world, like the Signature FBO at Boston's Logan Airport, which has walk-through metal detectors for crews and passengers and uses X-ray machines to screen luggage, many FBOs have very little security. Some smaller airports like the one used by Stack have little or no staffing at all, and pilots and visitors can come and go as they please. There are no security checks and the pilot only has to make a radio call before taking off.
This difference in FBO security stems from the fact that FBOs are owned by a wide variety of operators. Some are owned by private for-profit companies, while others are run by a city or county authority and some are even operated by the state government. The bottom line is that it is very easy for someone who is a pilot to show up at an airport and rent an aircraft. All he or she has to do is fill out a few forms, present a license and logbook and go for a check ride. Mohamed Atta, the commander of the 9/11 operation, was a pilot, and one of the great mysteries after his death was the reason behind some of his general aviation activity. It is known that he rented small aircraft in cities like Miami and Atlanta, but it is not known what he did while aloft in them. It is possible that he was just honing his skills as a pilot, but there are concerns that he may also have been conducting aerial surveillance of potential targets.
But general aviation doesn't just encompass small, single-engine airplanes like the ones owned by Stack and rented by Atta. Anyone with the money can charter a private passenger aircraft from a company such as NetJets or Flexjet, or even a private cargo aircraft. The size of these aircraft can vary from small Learjets to large Boeing Business Jets (a modified 737) and 747 cargo aircraft. In many places it is even possible for passengers to board a charter flight with no security checks of themselves or their baggage. In such a scenario, it would not be difficult for individuals such as Atta and his colleagues to take control of an aircraft from the crew -- especially if the crew is unarmed.
As seen on 9/11, or even in the Stack case, there is very little that can be done to stop an airplane flown by a suicidal pilot. The North American Aerospace Defense Command launched two F-16 fighters in response to the Stack incident, but they were not dispatched until after the incident was over. Only in the case where there is restricted airspace that is constantly patrolled is there much hope of military aircraft responding in time to stop such an attack. The 1994 incident in which an unemployed Maryland truck driver crashed a stolen Cessna into the South Lawn of the White House highlighted how there is very little that can be done to protect a building from this type of threat -- and the level of security at the White House in 1994 was far greater than the security afforded to almost any other building today. The difficulty of protecting buildings from aerial attack demonstrates the need to secure aircraft so they cannot be used in such a manner.
The bottom line, however, is that it would be prohibitively expensive to totally lock down all airports and aircraft nationwide in an effort to prevent them from being used in attacks like the one conducted by Stack. In the face of this reality, the best that can be hoped for is to keep the largest (and therefore most destructive) aircraft safe from this sort of misuse.
There is currently no one authority, like the Transportation Safety Commission, that controls security at all the small airports and FBOs. In the absence of any policy or regulations tightening the security at these facilities and requiring the screening of charter aircraft passengers, the best defense against the threat posed by this vulnerability will be to educate those in the FBO and charter aircraft business and encourage them to exercise a heightened state of situational awareness.
This report may be forwarded or republished on your website with attribution to www.stratfor.com.
Copyright 2010 Stratfor.
By George Friedman, Copyright 2010 Stratfor.
Republished with permission of www.stratfor.com.
The apparent Israeli assassination of a Hamas operative in the United Arab Emirates turned into a bizarre event replete with numerous fraudulent passports, alleged Israeli operatives caught on videotape and international outrage (much of it feigned), more over the use of fraudulent passports than over the operative's death. If we are to believe the media, it took nearly 20 people and an international incident to kill him.
STRATFOR has written on the details of the killing as we have learned of them, but we see this as an occasion to address a broader question: the role of assassination in international politics.
We should begin by defining what we mean by assassination. It is the killing of a particular individual for political purposes. It differs from the killing of a spouse's lover because it is political. It differs from the killing of a soldier on the battlefield in that the soldier is anonymous and is not killed because of who he is but because of the army he is serving in.
The question of assassination, in the current jargon "targeted killing," raises the issue of its purpose. Apart from malice and revenge, as in Abraham Lincoln's assassination, the purpose of assassination is to achieve a particular political end by weakening an enemy in some way. Thus, the killing of Adm. Isoroku Yamamoto by the Americans in World War II was a targeted killing, an assassination. His movements were known, and the Americans had the opportunity to kill him. Killing an incompetent commander would be counterproductive, but Yamamoto was a superb strategist, without peer in the Japanese navy. Killing him would weaken Japan's war effort, or at least have a reasonable chance of doing so. With all the others dying around him in the midst of war, the moral choice did not seem complex then, nor does it seem complex now.
Such occasions rarely occur on the battlefield. There are few commanders who could not readily be replaced, and perhaps even replaced by someone more able. In any event, it is difficult to locate enemy commanders, meaning the opportunity to kill them rarely arises. And as commanders ask their troops to risk their lives, they have no moral claim to immunity from danger.
Now, take another case. Assume that the leader of a country were singular and irreplaceable, something very few are. But think of Fidel Castro, whose central role in the Cuban government was undeniable. Assume that he is the enemy of another country like the United States. It is an unofficial hostility -- no war has been declared -- but a very real one nonetheless. Is it illegitimate to try to kill such a leader in a bid to destroy his regime? Let's move that question to Adolph Hitler, the gold standard of evil. Would it be inappropriate to have sought to kill him in 1938 based on the type of regime he had created and what he said that he would do with it?
If the position is that killing Hitler would have been immoral, then we have a serious question about the moral standards being used. The more complex case is Castro. He is certainly no Hitler, but neither is he the romantic democratic revolutionary some have painted him as being. But if it is legitimate to kill Castro, then where is the line drawn? Who is it not legitimate to kill?
As with Yamamoto, the number of instances in which killing a political leader would make a difference in policy or in the regime's strength is extremely limited. In most cases, the argument against assassination is not moral but practical: It would make no difference if the target in question lives or dies. But where it would make a difference, the moral argument becomes difficult. If we establish that Hitler was a legitimate target, than we have established that there is not an absolute ban on political assassination. The question is what the threshold must be.
All of this is a preface to the killing in the United Arab Emirates, because that represents a third case. Since the rise of the modern intelligence apparatus, covert arms have frequently been attached to them. The nation-states of the 20th century all had intelligence organizations. These organizations carried out a range of clandestine operations beyond collecting intelligence, from supplying weapons to friendly political groups in foreign countries to overthrowing regimes to underwriting terrorist operations.
During the latter half of the century, nonstate-based covert organizations were developed. As European empires collapsed, political movements wishing to take control created covert warfare apparatuses to force the Europeans out or defeat political competitors. Israel's state-based intelligence system emerged from one created before the Jewish state's independence. The various Palestinian factions created their own. Beyond this, of course, groups like al Qaeda created their own covert capabilities, against which the United States has arrayed its own massive covert capability.
The contemporary reality is not a battlefield on which a Yamamoto might be singled out or a charismatic political leader whose death might destroy his regime. Rather, a great deal of contemporary international politics and warfare is built around these covert capabilities. In the case of Hamas, the mission of these covert operations is to secure the resources necessary for Hamas to engage Israeli forces on terms favorable to them, from terror to rocket attacks. For Israel, covert operations exist to shut off resources to Hamas (and other groups), leaving them unable to engage or resist Israel.
Expressed this way, covert warfare makes sense, particularly for the Israelis when they engage the clandestine efforts of Hamas. Hamas is moving covertly to secure resources. Its game is to evade the Israelis. The Israeli goal is to identify and eliminate the covert capability. Hamas is the hunted, Israel the hunter here. Apparently the hunter and hunted met in the United Arab Emirates, and the hunted was killed.
But there are complexities here. First, in warfare, the goal is to render the enemy incapable of resisting. Killing just any group of enemy soldiers is not the point. Indeed, diverting resources to engage the enemy on the margins, leaving the center of gravity of the enemy force untouched, harms far more than it helps. Covert warfare is different from conventional warfare, but the essential question stands: Is the target you are destroying essential to the enemy's ability to fight? And even more important, as the end of all war is political, does defeating this enemy bring you closer to your political goals?
Covert organizations, like armies, are designed to survive attrition. It is expected that operatives will be detected and killed; the system is designed to survive that. The goal of covert warfare is either to penetrate the enemy so deeply, or destroy one or more people so essential to the operation of the group, that the covert organization stops functioning. All covert organizations are designed to stop this from happening.
They achieve this through redundancy and regeneration. After the massacre at the Munich Olympics in 1972, the Israelis mounted an intense covert operation to identify, penetrate and destroy the movement -- called Black September -- that mounted the attack. Black September was not simply a separate movement but a front for various Palestinian factions. Killing those involved with Munich would not paralyze Black September, and destroying Black September did not destroy the Palestinian movement. That movement had redundancy -- the ability to shift new capable people into the roles of those killed -- and therefore could regenerate, training and deploying fresh operatives.
The mission was successfully carried out, but the mission was poorly designed. Like a general using overwhelming force to destroy a marginal element of the enemy army, the Israelis focused their covert capability to destroy elements whose destruction would not give the Israelis what they wanted -- the destruction of the various Palestinian covert capabilities. It might have been politically necessary for the Israeli public, it might have been emotionally satisfying, but the Israeli's enemies weren't broken. Consider that Entebbe occurred in 1976. If Israel's goal in targeting Black September was the suppression of terrorism by Palestinian groups, the assault on one group did not end the threat from other groups.
Therefore, the political ends the Israelis sought were not achieved. The Palestinians did not become weaker. The year 1972 was not the high point of the Palestinian movement politically. It became stronger over time, gaining substantial international legitimacy. If the mission was to break the Palestinian covert apparatus to weaken the Palestinian capability and weaken its political power, the covert war of eliminating specific individuals identified as enemy operatives failed. The operatives very often were killed, but the operation did not yield the desired outcome.
And here lies the real dilemma of assassination. It is extraordinarily rare to identify a person whose death would materially weaken a substantial political movement in some definitive sense -- i.e., where if the person died, then the movement would be finished. This is particularly true for nationalist movements that can draw on a very large pool of people and talent. It is equally hard to reduce a movement quickly enough to destroy the organization's redundancy and regenerative capability. Doing so requires extraordinary intelligence penetration as well as a massive covert effort, so such an effort quickly reveals the penetration and identifies your own operatives.
A single swift, global blow is what is dreamt of. Covert war actually works as a battle of attrition, involving the slow accumulation of intelligence, the organization of the strike, the assassination. At that point, one man is dead, a man whose replacement is undoubtedly already trained. Others are killed, but the critical mass is never reached, and there is no one target who if killed would cause everything to change.
In war there is a terrible tension between the emotions of the public and the cold logic that must drive the general. In covert warfare, there is tremendous emotional satisfaction to the country when it is revealed that someone it regards as not only an enemy, but someone responsible for the deaths of their countryman, has been killed. But the generals or directors of intelligence can't afford this satisfaction. They have limited resources, which must be devoted to achieving their country's political goals and assuring its safety. Those resources have to be used effectively.
There are few Hitlers whose death is morally demanded and might have a practical effect. Most such killings are both morally and practically ambiguous. In covert warfare, even if you concede every moral point about the wickedness of your enemy, you must raise the question as to whether all of your efforts are having any real effect on the enemy in the long run. If they can simply replace the man you killed, while training ten more operatives in the meantime, you have achieved little. If the enemy keeps becoming politically more successful, then the strategy must be re-examined.
We are not writing this as pacifists; we do not believe the killing of enemies is to be avoided. And we certainly do not believe that the morally incoherent strictures of what is called international law should guide any country in protecting itself. What we are addressing here is the effectiveness of assassination in waging covert warfare. Too frequently, it does not, in our mind, represent a successful solution to the military and political threat posed by covert organizations. It might bring an enemy to justice, and it might well disrupt an organization for a while or even render a specific organization untenable. But in the covert wars of the 20th century, the occasions when covert operations -- including assassinations -- achieved the political ends being pursued were rare. That does not mean they never did. It does mean that the utility of assassination as a main part of covert warfare needs to be considered carefully. Assassination is not without cost, and in war, all actions must be evaluated rigorously in terms of cost versus benefit.
This report may be forwarded or republished on your website with attribution to www.stratfor.com.
Copyright 2010 Stratfor.
By Fred Burton and Scott Stewart, (C) 2010 Stratfor (www.stratfor.com)
Usually in the STRATFOR Global Security and Intelligence Report, we focus on the tactical details of terrorism and security issues in an effort to explain those issues and place them in perspective for our readers. Occasionally, though, we turn our focus away from the tactical realm in order to examine the bureaucratic processes that shape the way things run in the counterterrorism, counterintelligence and security arena. This look into the struggle by the U.S. government to ensure visa security is one of those analyses.
As STRATFOR has noted for many years now, document-fraud investigations are a very useful weapon in the counterterrorism arsenal. Foreigners who wish to travel to the United States to conduct a terrorist attack must either have a valid passport from their country of citizenship and a valid U.S. visa, or just a valid passport from their home country if they are a citizen of a country that does not require a visa for short-term trips (called visa-waiver countries).
In some early jihadist attacks against the United States, such as the 1993 World Trade Center bombing, the operatives dispatched to conduct the attacks made very clumsy attempts at document fraud. In that case, the two operational commanders dispatched from Afghanistan to conduct the attack arrived at New York's Kennedy Airport after having used photo-substituted passports (passports where the photographs are literally switched) of militants from visa-waiver countries who died while fighting in Afghanistan. Ahmed Ajaj (a Palestinian) used a Swedish passport in the name of Khurram Khan, and Abdul Basit (a Pakistani also known as Ramzi Yousef) used a British passport in the name of Mohamed Azan. Ajaj attempted to enter through U.S. Immigration at Kennedy Airport using the obviously photo-substituted passport and was arrested on the spot. Basit used the altered British passport to board the aircraft in Karachi, Pakistan, but upon arrival in New York he used a fraudulently obtained but genuine Iraqi passport in the name of Ramzi Yousef to claim political asylum and was released pending his asylum hearing.
But the jihadist planners learned from amateurish cases like Ajaj's and that of Ghazi Ibrahim Abu Mezer, a Palestinian who attempted to conduct a suicide attack against the New York subway system. U.S. immigration officials arrested him on three occasions in the Pacific Northwest as he attempted to cross into the United States illegally from Canada. By the Millennium Bomb Plot in late 1999, Ahmed Ressam, an Algerian who initially entered Canada using a photo-substituted French passport, had obtained a genuine Canadian passport using a fraudulent baptismal certificate. He then used that genuine passport to attempt to enter the United States in order to bomb Los Angeles International Airport. Ressam was caught not because of his documentation but because of his demeanor -- and an alert customs inspector prevented him from entering the country.
So by the time the 9/11 attacks occurred, we were seeing groups like al Qaeda preferring to use genuine travel documents rather than altered or counterfeit documents. Indeed, some operatives, such as Ramzi bin al-Shibh, a Yemeni, were unable to obtain U.S. visas and were therefore not permitted to participate in the 9/11 plot. Instead, bin al-Shibh took on a support role, serving as the communications cutout between al Qaeda's operational planner, Khalid Sheikh Mohammed, and al Qaeda's tactical commander for the operation, Mohamed Atta. It is important to note, however, that the 19 9/11 operatives had obtained a large assortment of driver's licenses and state identification cards, many of them fraudulent. Such documents are far easier to obtain than passports.
After the Sept. 11 attacks and the 9/11 Commission report, which shed a great deal of light on the terrorist use of document fraud, the U.S. government increased the attention devoted to immigration fraud and the use of fraudulent travel documents by terrorist suspects. This emphasis on detecting document fraud, along with the widespread adoption of more difficult to counterfeit passports and visas (no document is impossible to counterfeit), has influenced jihadists, who have continued their shift away from the use of fraudulent documents (especially poor quality documents). Indeed, in many post-9/11 attacks directed against the United States we have seen jihadist groups use U.S. citizens (Jose Padilla and Najibullah Zazi), citizens of visa-waiver countries (Richard Reid and Abdulla Ahmed Ali), and other operatives who possess or can obtain valid U.S. visas such as Umar Farouk Abdulmutallab. These operatives are, for the most part, using authentic documents issued in their true identities.
Concerns expressed by the 9/11 Commission over the vulnerability created by the visa-waiver program also prompted the U.S. government to establish the Electronic System for Travel Authorization (ESTA), which is a mandatory program that prescreens visa-waiver travelers, including those transiting through the United States. The ESTA, which became functional in January 2009, requires travelers from visa-waiver countries to apply for travel authorization at least 72 hours prior to travel. This time period permits the U.S. Department of Homeland Security (DHS) to conduct background checks on pending travelers.
Counterfeit visas are not as large a problem as they were 20 years ago. Advances in technology have made it very difficult for all but the most high-end document vendors to counterfeit them, and it is often cheaper and easier to obtain an authentic visa by malfeasance -- bribing a consular officer -- than it is to acquire a machine-readable counterfeit visa that will work. Obtaining a genuine U.S. passport or one from a visa-waiver country by using fraudulent breeder documents (driver's licenses and birth certificates, as Ahmed Ressam did) is also cheaper and easier. But in the case of non-visa waiver countries, this shift to the use of genuine identities and identity documents now highlights the need to secure the visa issuance process from fraud and malfeasance.
This shift to genuine-identity documents also means that most visa fraud cases involving potential terrorist operatives are going to be very complex. Rather than relying on obvious flags like false identities, the visa team consisting of clerks, consular officers, visa-fraud coordinators and Diplomatic Security Service (DSS) special agents needs to examine carefully not just the applicant's identity but also his or her story in an attempt to determine if it is legitimate, and if there are any subtle indicators that the applicant has ties to radical groups (like people who lose their passports to disguise travel to places like Pakistan and Yemen). As in many other security programs, however, demeanor is also critically important, and a good investigator can often spot signs of deception during a visa interview (if one is conducted).
If the applicant's documents and story check out, and there are no indicators of radical connections, it is very difficult to determine that an applicant is up to no good unless the U.S. government possesses some sort of intelligence indicating that the person may be involved in such activity. In terms of intelligence, there are a number of different databases, such as the Consular Lookout and Support System (CLASS), the main State Department database and the terrorism-specific Terrorist Identities Datamart Environment (TIDE) system. The databases are checked in order to determine if there is any derogatory information that would preclude a suspect from receiving a visa. These databases allow a number of U.S. government agencies to provide input -- CLASS is tied into the Interagency Border Inspection System (IBIS) -- and they allow these other agencies to have a stake in the visa issuance process. (It must be noted that, like any database, foreign language issues -- such as the many ways to transliterate the name Mohammed into English -- can often complicate the accuracy of visa lookout database entries and checks.)
Today the lookout databases are a far cry from what they were even 15 years ago, when many of the lists were contained on microfiche and checking them was laborious. During the microfiche era, mistakes were easily made, and some officers skipped the step of running the time-consuming name checks on people who did not appear to be potential terrorists. This is what happened in the case of a poor old blind imam who showed up at the U.S. Embassy in Khartoum in 1990 -- and who turned out to be terrorist leader Sheikh Omar Ali Ahmed Abdul-Rahman. As an aside, although Rahman, known as the Blind Sheikh, did receive a U.S. visa, DSS special agents who investigated his case were able to document that he made material false statements on his visa application (such as claiming he had never been arrested) and were therefore able to build a visa fraud case against the Sheikh. The case never proceeded to trial, since the Sheikh was convicted on seditious conspiracy charges and sentenced to life in prison.
The U.S. government's visa fraud investigation specialists are the special agents assigned to the U.S. Department of State's DSS. In much the same way that U.S. Secret Service special agents work to ensure the integrity of the U.S. currency system through investigations of counterfeiting, DSS agents work to ensure the inviolability of U.S. passports and visas by investigating passport and visa fraud. The DSS has long assigned special agents to high fraud-threat countries like Nigeria to investigate passport and visa fraud in conjunction with the post's consular affairs officers. In the Intelligence Reform and Terrorism Prevention Act of 2004, Congress ordered the State Department to establish a visa and passport security program. In response to this legislation, a memorandum of understanding was signed between the Bureau of Consular Affairs and the DSS to establish the Overseas Criminal Investigations Branch (OCI). The purpose of the OCI was to conduct investigations related to illegal passport and visa issuances or use and other investigations at U.S. embassies overseas. A special agent assigned to these duties at an overseas post is referred to as an investigative Assistant Regional Security Officer (or ARSO-I).
While the OCI and the ARSO-I program seemed promising at first, circumstance and bureaucratic hurdles have prevented the program from running to the best of its ability and meeting the expectations of the U.S. Congress.
As we've previously noted, there is a powerful element within the State Department that is averse to security and does its best to thwart security programs. DSS special agents refer to these people as Black Dragons. Even when Congress provides clear guidance to the State Department regarding issues of security (e.g., the Omnibus Diplomatic Security and Antiterrorism Act of 1986), the Black Dragons do their best to strangle the programs, and this constant struggle produces discernable boom-and-bust cycles, as Congress provides money for new security programs and the Black Dragons, who consider security counterproductive for diplomacy and armed State Department special agents undiplomatic, use their bureaucratic power to cut off those programs.
Compounding this perennial battle over security funding has been the incredible increase in protective responsibilities that the DSS has had to shoulder since 9/11. The bureau has had to provide a large number of agents to protect U.S. diplomats in places like Afghanistan and Pakistan and even staffed and supervised the protective detail for Afghan President Hamid Karzai for a few years. Two DSS special agents were also killed while protecting the huge number of U.S diplomats assigned to reconstruction efforts in Iraq. One agent was killed in a rocket attack on the U.S. Embassy in Baghdad and the other by a suicide car-bomb attack in Mosul.
The demands of protection and bureaucratic strangulation by the Black Dragons, who have not embraced the concept of the ARSO-I program, has resulted in the OCI program being deployed very slowly. This means that of the 200 positions envisioned and internally programmed by Bureau of Consular Affairs and DSS in 2004, only 50 ARSO-I agents have been assigned to posts abroad as of this writing, and a total of 123 ARSO-I agents are supposed to be deployed by the end of 2011. The other 77 ARSO-I positions were taken away from the OCI program by the department and used to provide more secretarial positions.
In the wake of State Department heel-dragging, other agencies are now seeking to fill the void.
The Vultures Are Circling
In a Feb. 9, 2010, editorial on GovernmentExecutive.com, former DHS Under Secretary for Border and Transportation Security Asa Hutchinson made a pitch for the DHS to become more involved in the visa-security process overseas, and he is pushing for funding more DHS positions at U.S. embassies abroad. To support his case that more DHS officers are needed for visa security, Hutchinson used the case of Umar Farouk Abdulmutallab as an example of why DHS needed a larger presence overseas.
Unfortunately, the Abdulmutallab case had nothing to do with visa fraud, and the presence of a DHS officer at post would certainly not have prevented him from receiving his initial visa. Abdulmutallab was first issued a U.S. visa in 2004, before he was radicalized during his university studies in the United Kingdom from 2005 to 2008, and he qualified for that visa according to the guidelines established by the U.S. government without fraud or deception. Of course, the fact that he came from a prominent Nigerian family certainly helped.
The problem in the Abdulmutallab case was not in the issuance of his visa in 2004. His identity and story checked out. There was no negative information about him in the databases checked for visa applicants. He also traveled to the United States in 2004 and left the country without overstaying his visa, and was not yet listed in any of the lookout databases, so his visa renewal in June 2008 in London was also not surprising.
The real problem in the Abdulmutallab case began when the CIA handled the interview of Abdulmutallab's father when he walked into the embassy in November 2009 to report that his son had become radicalized and that he feared his son was preparing for a suicide mission. The CIA did not share the information gleaned from that interview in a terrorism report cable (TERREP), or with the regional security officer at post or the ARSO-I. (The fact that the CIA, FBI and other agencies have assumed control over the walk-in program in recent years is also a serious problem, but that is a matter to be addressed separately.) Due to that lack of information-sharing, Abdulmutallab's visa was not canceled as it could have and should have been. His name was also not added to the U.S. government's no-fly list.
Again, had there been a DHS officer assigned to the embassy, he would not have been able to do any more than the ARSO-I already assigned to post, since he also would not have received the information from the CIA that would have indicated that Abdulmutallab's visa needed to be revoked.
Once again, information was not shared in a counterterrorism case -- a recurring theme in recent years. And once again the lack of information would have proved deadly had Abdulmutallab's device not malfunctioned. Unfortunately, information-sharing is never facilitated by the addition of layers of bureaucracy. This is the reason why the addition of the huge new bureaucracy called the Office of the Director of National Intelligence has not solved the issue of information-sharing among intelligence agencies.
Hutchinson is correct when he notes that the DHS must go back to basics, but DHS has numerous other domestic programs that it must master the basics of -- things like securing the border, overseeing port and cargo security, interior immigration and customs enforcement and ensuring airline security -- before it should even consider expanding its presence overseas.
Adding another layer of DHS involvement in overseeing visa issuance and investigating visa fraud at diplomatic posts abroad is simply not going to assist in the flow of information in visa cases, whether criminal or terrorist in nature. Having another U.S. law enforcement agency interfacing with the host country police and security agencies regarding visa matters will also serve to cause confusion and hamper efficient information flow. The problem illustrated by the Abdulmutallab case is not that the U.S. government lacks enough agencies operating in overseas posts; the problem is that the myriad agencies already there simply need to return to doing basic things like talking to each other. Getting the ARSO-I program funded and back on track is a basic step necessary to help in securing the visa process, but even that will not be totally effective unless the agencies at post do a better job of basic tasks like coordination and communication.
This report may be forwarded or republished on your website with attribution to www.stratfor.com.
Copyright 2010 Stratfor.
On Feb. 13, some 6,000 U.S. Marines, soldiers and Afghan National Army (ANA) troops launched a sustained assault on the town of Marjah in Helmand province. Until this latest offensive, the U.S. and NATO effort in Afghanistan had been constrained by other considerations, most notably Iraq. Western forces viewed the Afghan conflict as a matter of holding the line or pursuing targets of opportunity. But now, armed with larger forces and a new strategy, the war -- the real war -- has begun. The most recent offensive -- dubbed Operation Moshtarak ("Moshtarak" is Dari for "together") -- is the largest joint U.S.-NATO-Afghan operation in history. It also is the first major offensive conducted by the first units deployed as part of the surge of 30,000 troops promised by U.S. President Barack Obama.
The United States originally entered Afghanistan in the aftermath of the Sept. 11 attacks. In those days of fear and fury, American goals could be simply stated: A non-state actor -- al Qaeda -- had attacked the American homeland and needed to be destroyed. Al Qaeda was based in Afghanistan at the invitation of a near-state actor -- the Taliban, which at the time were Afghanistan's de facto governing force. Since the Taliban were unwilling to hand al Qaeda over, the United States attacked. By the end of the year, al Qaeda had relocated to neighboring Pakistan and the Taliban retreated into the arid, mountainous countryside in their southern heartland and began waging a guerrilla conflict. In time, American attention became split between searching for al Qaeda and clashing with the Taliban over control of Afghanistan.
But from the earliest days following 9/11, the White House was eyeing Iraq, and with the Taliban having largely declined combat in the initial invasion, the path seemed clear. The U.S. military and diplomatic focus was shifted, and as the years wore on, the conflict absorbed more and more U.S. troops, even as other issues -- a resurgent Russia and a defiant Iran -- began to demand American attention. All of this and more consumed American bandwidth, and the Afghan conflict melted into the background. The United States maintained its Afghan force in what could accurately be described as a holding action as the bulk of its forces operated elsewhere. That has more or less been the state of affairs for eight years.
That has changed with the series of offensive operations that most recently culminated at Marjah.
Why Marjah? The key is the geography of Afghanistan and the nature of the conflict itself. Most of Afghanistan is custom-made for a guerrilla war. Much of the country is mountainous, encouraging local identities and militias, as well as complicating the task of any foreign military force. The country's aridity discourages dense population centers, making it very easy for irregular combatants to melt into the countryside. Afghanistan lacks navigable rivers or ports, drastically reducing the region's likelihood of developing commerce. No commerce to tax means fewer resources to fund a meaningful government or military and encourages the smuggling of every good imaginable -- and that smuggling provides the perfect funding for guerrillas.
Rooting out insurgents is no simple task. It requires three things:
Massively superior numbers so that occupiers can limit the zones to which the insurgents have easy access.
The support of the locals in order to limit the places that the guerillas can disappear into.
Superior intelligence so that the fight can be consistently taken to the insurgents rather than vice versa.
Without those three things -- and American-led forces in Afghanistan lack all three -- the insurgents can simply take the fight to the occupiers, retreat to rearm and regroup and return again shortly thereafter.
But the insurgents hardly hold all the cards. Guerrilla forces are by their very nature irregular. Their capacity to organize and strike is quite limited, and while they can turn a region into a hellish morass for an opponent, they have great difficulty holding territory -- particularly territory that a regular force chooses to contest. Should they mass into a force that could achieve a major battlefield victory, a regular force -- which is by definition better-funded, -trained, -organized and -armed -- will almost always smash the irregulars. As such, the default guerrilla tactic is to attrit and harass the occupier into giving up and going home. The guerrillas always decline combat in the face of a superior military force only to come back and fight at a time and place of their choosing. Time is always on the guerrilla's side if the regular force is not a local one.
But while the guerrillas don't require basing locations that are as large or as formalized as those required by regular forces, they are still bound by basic economics. They need resources -- money, men and weapons -- to operate. The larger these locations are, the better economies of scale they can achieve and the more effectively they can fight their war.
Marjah is perhaps the quintessential example of a good location from which to base. It is in a region sympathetic to the Taliban; Helmand province is part of the Taliban's heartland. Marjah is very close to Kandahar, Afghanistan's second city, the religious center of the local brand of Islam, the birthplace of the Taliban, and due to the presence of American forces, an excellent target. Helmand alone produces more heroin than any country on the planet, and Marjah is at the center of that trade. By some estimates, this center alone supplies the Taliban with a monthly income of $200,000. And it is defensible: The farmland is crisscrossed with irrigation canals and dotted with mud-brick compounds -- and, given time to prepare, a veritable plague of IEDs.
Simply put, regardless of the Taliban's strategic or tactical goals, Marjah is a critical node in their operations.
The American Strategy
Though operations have approached Marjah in the past, it has not been something NATO's International Security Assistance Force (ISAF) ever has tried to hold. The British, Canadian and Danish troops holding the line in the country's restive south had their hands full enough. Despite Marjah's importance to the Taliban, ISAF forces were too few to engage the Taliban everywhere (and they remain as such). But American priorities started changing about two years ago. The surge of forces into Iraq changed the position of many a player in the country. Those changes allowed a reshaping of the Iraq conflict that laid the groundwork for the current "stability" and American withdrawal. At the same time, the Taliban began to resurge in a big way. Since then the Bush and then Obama administrations inched toward applying a similar strategy to Afghanistan, a strategy that focuses less on battlefield success and more on altering the parameters of the country itself.
As the Obama administration's strategy has begun to take shape, it has started thinking about endgames. A decades-long occupation and pacification of Afghanistan is simply not in the cards. A withdrawal is, but only a withdrawal where the security free-for-all that allowed al Qaeda to thrive will not return. And this is where Marjah comes in.
Denying the Taliban control of poppy farming communities like Marjah and the key population centers along the Helmand River Valley -- and areas like them around the country -- is the first goal of the American strategy. The fewer key population centers the Taliban can count on, the more dispersed -- and militarily inefficient -- their forces will be. This will hardly destroy the Taliban, but destruction isn't the goal. The Taliban are not simply a militant Islamist force. At times they are a flag of convenience for businessmen or thugs; they can even be, simply, the least-bad alternative for villagers desperate for basic security and civil services. In many parts of Afghanistan, the Taliban are not only pervasive but also the sole option for governance and civil authority.
So destruction of what is in essence part of the local cultural and political fabric is not an American goal. Instead, the goal is to prevent the Taliban from mounting large-scale operations that could overwhelm any particular location. Remember, the Americans do not wish to pacify Afghanistan; the Americans wish to leave Afghanistan in a form that will not cause the United States severe problems down the road. In effect, achieving the first goal simply aims to shape the ground for a shot at achieving the second.
That second goal is to establish a domestic authority that can stand up to the Taliban in the long run. Most of the surge of forces into Afghanistan is not designed to battle the Taliban now but to secure the population and train the Afghan security forces to battle the Taliban later. To do this, the Taliban must be weak enough in a formal military sense to be unable to launch massive or coordinated attacks. Capturing key population centers along the Helmand River Valley is the first step in a strategy designed to create the breathing room necessary to create a replacement force, preferably a replacement force that provides Afghans with a viable alternative to the Taliban.
That is no small task. In recent years, in places where the official government has been corrupt, inept or defunct, the Taliban have in many cases stepped in to provide basic governance and civil authority. And this is why even the Americans are publicly flirting with holding talks with certain factions of the Taliban in hopes that at least some of the fighters can be dissuaded from battling the Americans (assisting with the first goal) and perhaps even joining the nascent Afghan government (assisting with the second).
The bottom line is that this battle does not mark the turning of the tide of the war. Instead, it is part of the application of a new strategy that accurately takes into account Afghanistan's geography and all the weaknesses and challenges that geography poses. Marjah marks the first time the United States has applied a plan not to hold the line, but actually to reshape the country. We are not saying that the strategy will bear fruit. Afghanistan is a corrupt mess populated by citizens who are far more comfortable thinking and acting locally and tribally than nationally. In such a place indigenous guerrillas will always hold the advantage. No one has ever attempted this sort of national restructuring in Afghanistan, and the Americans are attempting to do so in a short period on a shoestring budget.
At the time of this writing, this first step appears to be going well for American-NATO-Afghan forces. Casualties have been light and most of Marjah already has been secured. But do not read this as a massive battlefield success. The assault required weeks of obvious preparation, and very few Taliban fighters chose to remain and contest the territory against the more numerous and better armed attackers. The American challenge lies not so much in assaulting or capturing Marjah but in continuing to deny it to the Taliban. If the Americans cannot actually hold places like Marjah, then they are simply engaging in an exhausting and reactive strategy of chasing a dispersed and mobile target.
A "government-in-a-box" of civilian administrators is already poised to move into Marjah to step into the vacuum left by the Taliban. We obviously have major doubts about how effective this box government can be at building up civil authority in a town that has been governed by the Taliban for most of the last decade. Yet what happens in Marjah and places like it in the coming months will be the foundation upon which the success or failure of this effort will be built. But assessing that process is simply impossible, because the only measure that matters cannot be judged until the Afghans are left to themselves.
This report may be forwarded or republished on your website with attribution to www.stratfor.com.
Copyright 2010 Stratfor.
The restrictions thus function as the equivalent of a prior restraint, giving the FEC power analogous to the type of government practices that the First Amendment was drawn to prohibit.
So wrote Justice Kennedy in today's decision striking down the government's ability to stifle speech during an election, ruling against provisions of the 2002 Bipartisan Campaign Reform Act (BCRA).
This decision is kind of a catharsis, having just watched MI-5's 5th Season opener (thank you NetFlix) - where MI-5 Chief Harry Price and his protectors of the realm foil a coup comprised of the press, big oil, and their foreign intelligence counterparts, MI-6, that would have spawned a police state in the UK.
Although the First Amendment provides that “Congress shall make no law . . . abridging the freedom of speech,” §441b’s prohibition on corporate independent expenditures is an outright ban on speech, backed by criminal sanctions.
A "ban on speech, backed by criminal sanctions." It should be astounding that such a fundamental principal, voiced so simply in the First Amendment, could be essentially ignored by McCain-Feingold, enacted in legislation, and take over 8 years to be remedied. Justice Kennedy went on during oral arguments last September to explore if books could be banned based on this legislation - the chilling (and decisive) determination being yes. A book that was transmitted via satellite to a Kindle for example, would fall under the FEC's law and thereby could be banned if published (or distributed) during the 30 day McCain-Feingold window.
Because speech is an essential mechanism of democracy—it is the means to hold officials accountable to the people—political speech must prevail against laws that would suppress it by design or inadvertence.
Premised on mistrust of governmental power, the First Amendment stands against attempts to disfavor certain subjects or viewpoints or to distinguish among different speakers, which may be a means to control content.A reminder that the Constitution affirms mistrust of governmental power, and stands to defend its citizens against its misuse.
The Government may also commit a constitutional wrong when by law it identifies certain preferred speakers. There is no basis for the proposition that, in the political speech context, the Government may impose restrictions on certain disfavored speakers. Both history and logic lead to this conclusion.
In addition to the author's, one should question the supporters of McCain Fiengold (those that still hold office).
Campaign finance accountability is easy - full disclosure of every dime given to every candidate - with criminal penalties for withholding the same. Follow the money if you must - but you may not touch the
speech. Today's decision upholds the disclosure/disclaimer provisions of the bill.
Today's decision, against the channels that would suggest otherwise, should affirm our faith in our institutions. It reminds me of Churchill's oft' repeated saying, "Democracy is the worst form of government, except for all the others."
The full text of today's supreme court decision can be found in PDF here.
Thanx to the Cato Institute for the alert and coverage of last September's oral arguments.
Whether you like the plan or not, I think Massachusetts has proven a plan can be enacted and administered at the State level. That said - one should evaluate its current performance and ask if this is what is wanted for the other states, let alone the nation.
Do we want basic healthcare for all, or a federally mandated and controlled program? In my opinion, one does not imply the other.
For an example of privately managed and quality healthcare, *Kaiser Permanente was born in 1930. Dr. Sydney Garfield seized an opportunity that simplified his back office (billing) and provided full healthcare to thousands of workers on the LA Aqueduct. He wasn't trying to get rich - just deliver high quality healthcare in the most efficient (business and medical) means possible. *Full Disclosure - I was an employee of Kaiser Permanente from 1991-1999
I don't believe quality healthcare can be born out of pure profit motive (capitalist though I be) nor from government coercion. I believe it can only be forged by like minded individuals, organizations, and health care providers, banding together to articulate a shared objective and selling it to the populace that are to be its beneficiaries.