Wales on Odom, 'Fixing Intelligence: for a More Secure America'
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Freedom Or Theocracy?: Constitutionalism in Afghanistan and Iraq Hannibal Travis
Northwestern Journal of International Human Rights Volume 3 | Issue 1 Article 4 Spring 2005 Freedom or Theocracy?: Constitutionalism in Afghanistan and Iraq Hannibal Travis Follow this and additional works at: http://scholarlycommons.law.northwestern.edu/njihr Recommended Citation Hannibal Travis, Freedom or Theocracy?: Constitutionalism in Afghanistan and Iraq, 3 Nw. J. Int'l Hum. Rts. 1 (2005). http://scholarlycommons.law.northwestern.edu/njihr/vol3/iss1/4 This Article is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of International Human Rights by an authorized administrator of Northwestern University School of Law Scholarly Commons. Copyright 2005 Northwestern University School of Law Volume 3 (Spring 2005) Northwestern University Journal of International Human Rights FREEDOM OR THEOCRACY?: CONSTITUTIONALISM IN AFGHANISTAN AND IRAQ By Hannibal Travis* “Afghans are victims of the games superpowers once played: their war was once our war, and collectively we bear responsibility.”1 “In the approved version of the [Afghan] constitution, Article 3 was amended to read, ‘In Afghanistan, no law can be contrary to the beliefs and provisions of the sacred religion of Islam.’ … This very significant clause basically gives the official and nonofficial religious leaders in Afghanistan sway over every action that they might deem contrary to their beliefs, which by extension and within the Afghan cultural context, could be regarded as -
Live News: a Survival Guide for Journalists
AA SURVIVALSURVIVAL GUIDEGUIDE FORFOR JOURNALISTSJOURNALISTS LIVELIVE NEWSNEWS Front cover picture: A press photographer in a cloud of teargas during a riot in Lima, Peru, in May 2000. Photo: AP / Martin Mejia Title page picture (right) A newspaper vendor waits for customers in Abidjan, Ivory Coast, one of many countries where media have been put under threat. In November 2002, an emergency aid programme was launched by the IFJ, the Communication Assistance Foundation, International Media Support and Media Assistance International, working with the Union Nationale des Journalistes de Côte d'Ivoire (UNJCI) and the West Africa Journalists Association. The programme included training on safety and conflict reporting. Photo: AP / Clement Ntaye. LIVE NEWS A SURVIVAL GUIDE FOR JOURNALISTS Written and produced for the IFJ by Peter McIntyre Published by the International Federation of Journalists, Brussels March 2003 With the support of the European Initiative for Democracy and Human Rights. (i) Live News — A survival guide for journalists Published by the International Federation of Journalists March 2003. © International Federation of Journalists International Press Centre Residence Palace Rue de la Loi 155 B-1040 Brussels, Belgium ✆ +32 2 235 2200 http://www.ifj.org Editor in Chief Aidan White, General Secretary, IFJ Managing Editor Sarah de Jong, Human Rights Officer, IFJ [email protected] Projects Director Oliver Money-Kyrle Written and designed by Peter McIntyre, Oxford, UK [email protected] Acknowledgments The IFJ would like to thank: Associated Press Photos and Reuters, who donated the use of photos; AKE Ltd, Hereford, UK, for advice, information, facilities, and support; Mark Brayne (Dart Centre Europe) for advice on post trauma stress; Rodney Pinder, for comments on the drafts; All the journalists who contributed to, or were interviewed for, this book. -
U.S. Military Engagement in the Broader Middle East
U.S. MILITARY ENGAGEMENT IN THE BROADER MIDDLE EAST JAMES F. JEFFREY MICHAEL EISENSTADT U.S. MILITARY ENGAGEMENT IN THE BROADER MIDDLE EAST JAMES F. JEFFREY MICHAEL EISENSTADT THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY WWW.WASHINGTONINSTITUTE.ORG The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. Policy Focus 143, April 2016 All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing fromthe publisher. ©2016 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1111 19th Street NW, Suite 500 Washington, DC 20036 Design: 1000colors Photo: An F-16 from the Egyptian Air Force prepares to make contact with a KC-135 from the 336th ARS during in-flight refueling training. (USAF photo by Staff Sgt. Amy Abbott) Contents Acknowledgments V I. HISTORICAL OVERVIEW OF U.S. MILITARY OPERATIONS 1 James F. Jeffrey 1. Introduction to Part I 3 2. Basic Principles 5 3. U.S. Strategy in the Middle East 8 4. U.S. Military Engagement 19 5. Conclusion 37 Notes, Part I 39 II. RETHINKING U.S. MILITARY STRATEGY 47 Michael Eisenstadt 6. Introduction to Part II 49 7. American Sisyphus: Impact of the Middle Eastern Operational Environment 52 8. Disjointed Strategy: Aligning Ways, Means, and Ends 58 9. -
A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College
Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2015 A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College Recommended Citation Brockmann, Andrew, "A Plausibly Deniable Encryption Scheme for Personal Data Storage" (2015). HMC Senior Theses. 88. https://scholarship.claremont.edu/hmc_theses/88 This Open Access Senior Thesis is brought to you for free and open access by the HMC Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in HMC Senior Theses by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Talithia D. Williams, Advisor Arthur T. Benjamin, Reader Department of Mathematics May, 2015 Copyright © 2015 Andrew Brockmann. The author grants Harvey Mudd College and the Claremont Colleges Library the nonexclusive right to make this work available for noncommercial, educational pur- poses, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Abstract Even if an encryption algorithm is mathematically strong, humans in- evitably make for a weak link in most security protocols. A sufficiently threatening adversary will typically be able to force people to reveal their encrypted data. Methods of deniable encryption seek to mend this vulnerability by al- lowing for decryption to alternate data which is plausible but not sensitive. Existing schemes which allow for deniable encryption are best suited for use by parties who wish to communicate with one another. -
Egypt's Complicity in Torture and Extraordinary Renditions Nirmala Pillay* 1. Introduction Robert Baer, a Cia Agent, Exempl
CHAPTER TWELVE Egypt’s COMPLICITY IN TORTURE AND EXTRAORDINARY RENDITIONS Nirmala Pillay* 1. Introduction Robert Baer, a CIA agent, exemplified the importance of the Mubarak gov- ernment for US intelligence when he observed that “If you want serious interrogation you send a prisoner to Jordan, if you want them to be tor- tured, you send them to Syria. If you want someone to disappear . never to see them again . you send them to Egypt.”1 Hosni Mubarak enjoyed close ties with Western countries enabling the US, Canada, Britain, and Sweden to deport terrorist suspects to a regime that specialised in inter- rogation methods prohibited by international law. This chapter examines the implications of the fall of the Egyptian regime of Hosni Mubarak for the prohibition against torture, a jus cogens norm of international law. Torture theorist Darius Rejali argued in a major study, published in 1997, that torture was never really eliminated from democratic countries, so a change of regime in Egypt in favour of a demo- cratic form of governance is no guarantee that torture, an entrenched part of the Egyptian security regime, will necessarily abate. Rejali’s thesis is probed in the light of the revelations of extraordinary renditions of terror- ist suspects to Egypt and the implications of the Egyptian revolution for US and Egyptian collaboration in the “war on terror.” Extraordinary rendition is the practice of transferring terrorist sus- pects, “with the involvement of the US or its agents, to a foreign State in circumstances that make it more likely than not that the individual will be subjected to torture or cruel, inhuman, or degrading treatment.”2 This * School of Law, Liverpool John Moores University, UK. -
Mobihydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices?
MobiHydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices? Xingjie Yuy;z;\, Bo Chen], Zhan Wangy;z;??, Bing Changy;z;\, Wen Tao Zhuz;y, and Jiwu Jingy;z y State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, CHINA z Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, CHINA \ University of Chinese Academy of Sciences, CHINA ] Department of Computer Science, Stony Brook University, USA Email: [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Nowadays, smartphones have started being used as a tool to collect and spread po- litically sensitive or activism information. The exposure of the possession of such sensitive data shall pose a risk in severely threatening the life safety of the device owner. For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitigate such risk. In this work, we present MobiHydra, a pragmatic plausibly deniable encryption (PDE) scheme featuring multi-level deniability on mobile devices, to circumvent the coercive attack. MobiHydra is pragmatic in that it remarkably supports hiding opportunistic data without necessarily rebooting the device. In addition, MobiHydra favourably mitigates the so-called booting-time defect, which is a whistle-blower to expose the usage of PDE in previous solutions. We implement a prototype for MobiHydra on Google Nexus S. The evaluation results demonstrate that MobiHydra introduces very low overhead compared with other PDE solutions for mobile devices. -
The Rhetoric of US-Saudi Diplomacy in the Post-911 Period
University of Montana ScholarWorks at University of Montana Graduate Student Theses, Dissertations, & Professional Papers Graduate School 2005 War on Terror Middle-East peace and a drive around the ranch: The rhetoric of US-Saudi diplomacy in the post-911 period J. Robert Harper The University of Montana Follow this and additional works at: https://scholarworks.umt.edu/etd Let us know how access to this document benefits ou.y Recommended Citation Harper, J. Robert, "War on Terror Middle-East peace and a drive around the ranch: The rhetoric of US-Saudi diplomacy in the post-911 period" (2005). Graduate Student Theses, Dissertations, & Professional Papers. 5193. https://scholarworks.umt.edu/etd/5193 This Thesis is brought to you for free and open access by the Graduate School at ScholarWorks at University of Montana. It has been accepted for inclusion in Graduate Student Theses, Dissertations, & Professional Papers by an authorized administrator of ScholarWorks at University of Montana. For more information, please contact [email protected]. Maureen and Mike MANSFIELD LIBRARY The University o f Momttamia Permission is granted by the author to reproduce this material in its entirety, provided that this material is used for scholarly purposes and is properly cited in published works and reports. **Please check "Yes" or "No" and provide signature** Yes, I grant permission No, I do not grant permission Author's Signature: D ate: Any copying for commercial purposes or financial gain may be undertaken only with the author's explicit consent. 8/98 The War on Terror, Middle-East Peace, and a Drive around the Ranch: the Rhetoric of US-Saudi Diplomacy in the Post-911 Period By J. -
The Spectacle of the False-Flag
The Spectacle of the False-Flag THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS FROM JFK TO WATERGATE Eric Wilson THE SPECTACLE OF THE FALSE-FLAG: PARAPOLITICS from JFK to WATERGATE Eric Wilson, Monash University 2015 http://creativecommons.org/licenses/by-nc-nd/4.0/ This work is Open Access, which means that you are free to copy, distribute, display, and perform the work as long as you clearly attribute the work to the author, that you do not use this work for commercial gain in any form whatsoever, and that you in no way, alter, transform, or build upon the work outside of its normal use in academic scholarship without express permission of the author and the publisher of this volume. For any reuse or distribution, you must make clear to others the license terms of this work. First published in 2015 by Thought | Crimes an imprint of punctumbooks.com ISBN-13: 978-0988234055 ISBN-10: 098823405X and the full book is available for download via our Open Monograph Press website (a Public Knowledge Project) at: www.thoughtcrimespress.org a project of the Critical Criminology Working Group, publishers of the Open Access Journal: Radical Criminology: journal.radicalcriminology.org Contact: Jeff Shantz (Editor), Dept. of Criminology, KPU 12666 72 Ave. Surrey, BC V3W 2M8 [ + design & open format publishing: pj lilley ] I dedicate this book to my Mother, who watched over me as I slept through the spectacle in Dallas on November 22, 1963 and who was there to celebrate my birthday with me during the spectacle at the Watergate Hotel on June 17, 1972 Contents Editor©s Preface ................................................................ -
STANNASHELLBRAZEEL Bachelor of Science Oklahoma State University Stillwater, Oklahoma 2003
TIIE AL QAEDA TERRORIST TWORK: PRE 9/11 CONDITIONS, POST 9111 RESPONSES By STANNASHELLBRAZEEL Bachelor of Science Oklahoma State University Stillwater, Oklahoma 2003 Submitted to the Faculty of the Graduate College of the Oklahoma tate University in partial fulfillment of the requirements for the degree of MASTER OF SClENe December, 2003 THE AL QAEDA TERRORIST NETWORK: PRE 9/11 CONDITIONS, POST 9/11 RESPONSES 11 ACKNOWLEDGEMENTS This thesis was created out of an interest to understand terrorism as it has evolved throughout history and will continue to do so as time probrresses. My hope is that this work can benefit the field ofterrorism study as events unfold in the future. I am eternally grateful to Dr. Hynson for his invaluable expertise, time, and support. I also want to thank my other committee members: Dr. Cross and Dr. Thrasher, each ofwhom gave me critical feedback to develop a solid thesis. I would like to thank Donna Birchler for all of her assistance. Her tireless devotion to students does not go unnoticed or unappreciated. And I would like to thank: the administration and faculty of the School of International Studies for their unrelenting challenges to the students to make a significant contribution to the world. A very personal thanks goes out to an of my family for believing in me. To my parents, Scott and Ivanna, I would like to thank: you for instilling in me the value of hard work, dedication, and the tenacity to never settle for anything less than achieving all of my goals. Finally, I am indebted to my husband Brandon for his pati.ence, reassurance, and encouragement throughout the whole process. -
One Huge US Jail'
http://www.guardian.co.uk/afghanistan/story/0,1284,1440836,00.html, 'One huge US jail' Afghanistan is the hub of a global network of detention centres, the frontline in America's 'war on terror', where arrest can be random and allegations of torture commonplace. Adrian Levy and Cathy Scott-Clark investigate on the ground and talk to former prisoners Saturday March 19, 2005 The Guardian Kabul was a grim, monastic place in the days of the Taliban; today it's a chaotic gathering point for every kind of prospector and carpetbagger. Foreign bidders vying for billions of dollars of telecoms, irrigation and construction contracts have sparked a property boom that has forced up rental prices in the Afghan capital to match those in London, Tokyo and Manhattan. Four years ago, the Ministry of Vice and Virtue in Kabul was a tool of the Taliban inquisition, a drab office building where heretics were locked up for such crimes as humming a popular love song. Now it's owned by an American entrepreneur who hopes its bitter associations won't scare away his new friends. Outside Kabul, Afghanistan is bleaker, its provinces more inaccessible and lawless, than it was under the Taliban. If anyone leaves town, they do so in convoys. Afghanistan is a place where it is easy for people to disappear and perilous for anyone to investigate their fate. Even a seasoned aid agency such as Médécins Sans Frontières was forced to quit after five staff members were murdered last June. Only the 17,000-strong US forces, with their all-terrain Humvees and Apache attack helicopters, have the run of the land, and they have used the haze of fear and uncertainty that has engulfed the country to advance a draconian phase in the war against terror. -
The CIA and Covert Operations: to Disclose Or Not to Disclose - That Is the Question, 17 BYU J
Brigham Young University Journal of Public Law Volume 17 | Issue 1 Article 3 5-1-2002 The IC A and Covert Operations: To Disclose or Not to Disclose - That is the Question Marcus Eyth Follow this and additional works at: https://digitalcommons.law.byu.edu/jpl Part of the National Security Law Commons Recommended Citation Marcus Eyth, The CIA and Covert Operations: To Disclose or Not to Disclose - That is the Question, 17 BYU J. Pub. L. 45 (2002). Available at: https://digitalcommons.law.byu.edu/jpl/vol17/iss1/3 This Article is brought to you for free and open access by BYU Law Digital Commons. It has been accepted for inclusion in Brigham Young University Journal of Public Law by an authorized editor of BYU Law Digital Commons. For more information, please contact [email protected]. EYTH-MACRO 2/5/2003 9:49 AM The CIA and Covert Operations: To Disclose or Not to Disclose – That is the Question Marcus Eyth* I. INTRODUCTION When the president does it, that means it is not illegal.1 President Richard M. Nixon If Mr. Nixon’s statement were unconditionally true, many United States citizens would presumably find the very pillars upon which the United States was founded to have been significantly shaken, and some might even consider a permanent move to another country. With respect to the implications this statement has upon the president’s discretion in conducting covert operations without first consulting Congress, some scholars would opt to reach for pen and paper.2 The issue of whether Congress and the executive branch must share the power to authorize and conduct covert activities, or whether it may be unilaterally exercised by the CIA, under the direction of the National Security Council (NSC), has become ripe for critique since Congress took significant steps to reign-in the discretion of the executive which for nearly two centuries enjoyed virtually carte blanche authority in this area. -
A Husband-And-Wife True- Life Spy Story Pdf, Epub, Ebook
COMPANY WE KEEP: A HUSBAND-AND-WIFE TRUE- LIFE SPY STORY PDF, EPUB, EBOOK Robert Baer,Dayna Baer | 320 pages | 03 Jun 2012 | Broadway Books (A Division of Bantam Doubleday Dell Publishing Group Inc) | 9780307588159 | English | New York, United States Company We Keep: A Husband-and-Wife True-Life Spy Story PDF Book More specifics on date and location would have helped, but the book had to be vetted by the CIA, and that probably accounts for the missing information, as well as the disjointedness. It's filled with ground truth, tradecraft and operational details When's the sequel? Original Title. This book gives you some idea of what life is like in the CIA. Biography Memoir. Their marriages end, Ro This was a fantastic read! It was a little less exciting than I was expecting, but I imagine that the real life of a CIA agent is often less glamorous than it is in the movies. After the married and left the CIA the story was more about their personal lives - should we get a dog? Be the first to write a review About this product. It seems that the idea of moving pieces around the board, along with the adventure and risk, appealed to him. It was very insightful into what hell our CIA is put through. Nothing we did made any difference at all in the world but our family relationships were destroyed by our absences. I thought this one was fascinating. Robert Baer , Dayna Baer. Unfortunately the book is superficial and just terrible. Friend Reviews. There is probably some mundane reason but I don't know it.