Lord of the Flies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Rebooting U.S. Security Cooperation in Iraq
Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study. -
The Atlantic Council and Bellingcat Are Guilty of War Propaganda. As
An essential dimension of humanitarian work is human rights investigations to identify violations and crimes. Human rights investigation organizations, in the digital age, are taking advantage of the growing prevalence of online citizen evidence and extractable data from what they often refer to as ‘open sources’ and social media TheThe AtlanticAtlantic CouncilCouncil andand BellingcatBellingcat areare guiltyguilty ofof warwar propaganda.propaganda. AsAs @ian56789@ian56789 wrotewrote toto mee in in a amessage: message: “The“The membersmembers ofof thethe AtlanticAtlantic CouncilCouncil andand DFRLabDFRLab shouldshould bebe indictedindicted asas accomplicesaccomplices toto WarWar Crimes,Crimes, forfor providingproviding actualactual materialmaterial supportsupport toto alal--QaedaQaeda terrorists,terrorists, andand forfor TreasonTreason (actively(actively supportingsupporting officialofficial enemiesenemies ofof thethe USUS && UK).UK). TheyThey shouldshould bebe spendingspending thethe restrest ofof theirtheir liveslives inin jailjail andand finedfined everyevery pennypenny they'vethey've got.”got.” AndAnd thosethose abusingabusing andand exploitingexploiting BanaBana alal--AbedAbed inin theirtheir ongoingongoing warwar propagandapropaganda shouldshould joinjoin themthem.. FromFrom https://www.rt.com/ophttps://www.rt.com/op--ed/431128ed/431128--banabana--alabedalabed--bellingcatbellingcat--atlanticatlantic--councilcouncil EvaEva Bartlett,Bartlett, JuneJune 29,29, 2018.2018. platforms. For the purpose of this discussion, we make use of the term ‘open source’ as it is specifically used by the organizations discussed here – we acknowledge that ‘open source’ as a term is often used in problematic ways in place of what is simply extractable, publicly available data – the term open source refers to accessible and editable software source code and in this paper’s context the term often misleadingly refers to datasets that have come at a high cost to the organization that procured them. -
The Annual Report of the Most Notable Human Rights Violations in Syria in 2019
The Annual Report of the Most Notable Human Rights Violations in Syria in 2019 A Destroyed State and Displaced People Thursday, January 23, 2020 1 snhr [email protected] www.sn4hr.org R200104 The Syrian Network for Human Rights (SNHR), founded in June 2011, is a non-governmental, independent group that is considered a primary source for the OHCHR on all death toll-related analyses in Syria. Contents I. Introduction II. Executive Summary III. Comparison between the Most Notable Patterns of Human Rights Violations in 2018 and 2019 IV. Major Events in 2019 V. Most Prominent Political and Military Events in 2019 VI. Road to Accountability; Failure to Hold the Syrian Regime Accountable Encouraged Countries in the World to Normalize Relationship with It VII. Shifts in Areas of Control in 2019 VIII. Report Details IX. Recommendations X. References I. Introduction The Syrian Network for Human Rights (SNHR), founded in June 2011, is a non-govern- mental, non-profit independent organization that primarily aims to document all violations in Syria, and periodically issues studies, research documents, and reports to expose the perpetrators of these violations as a first step to holding them accountable and protecting the rights of the victims. It should be noted that Office of the High Commissioner for Human Rights has relied, in all of its statistics, on the analysis of victims of the conflict in Syria, on the Syrian Network for Human Rights as a primary source, SNHR also collaborate with the Independent Inter- national Commission of Inquiry and have signed an agreement for sharing data with the Independent International and Impartial Mechanism, UNICEF, and other UN bodies, as well as international organizations such as the Organization for the Prohibition of Chemical Weapons. -
Security Council Distr.: General 27 January 2020
United Nations S/2020/70 Security Council Distr.: General 27 January 2020 Original: English Letter dated 27 January 2020 from the Panel of Experts on Yemen addressed to the President of the Security Council The members of the Panel of Experts on Yemen have the honour to transmit herewith the final report of the Panel, prepared in accordance with paragraph 6 of resolution 2456 (2019). The report was provided to the Security Council Committee established pursuant to resolution 2140 (2014) on 27 December 2019 and was considered by the Committee on 10 January 2020. We would appreciate it if the present letter and the report were brought to the attention of the members of the Security Council and issued as a document of the Council. (Signed) Dakshinie Ruwanthika Gunaratne Coordinator Panel of Experts on Yemen (Signed) Ahmed Himmiche Expert (Signed) Henry Thompson Expert (Signed) Marie-Louise Tougas Expert (Signed) Wolf-Christian Paes Expert 19-22391 (E) 070220 *1922391* S/2020/70 Final report of the Panel of Experts on Yemen Summary After more than five years of conflict, the humanitarian crisis in Yemen continues. The country’s many conflicts are interconnected and can no longer be separated by clear divisions between external and internal actors and events. Throughout 2019, the Houthis and the Government of Yemen made little headway towards either a political settlement or a conclusive military victory. In a continuation from 2018, the belligerents continued to practice economic warfare: using economic obstruction and financial tools as weapons to starve opponents of funds or materials. Profiteering from the conflict is endemic. -
MH17 - Potential Suspects and Witnesses from the 53Rd Anti-Aircraft Missile Brigade
MH17 - Potential Suspects and Witnesses from the 53rd Anti-Aircraft Missile Brigade A bell¿ngcat Investigation Table of Contents Introduction ...................................................................................................................................................................... 1 Section One: The 53rd Anti-Aircraft Missile Brigade ...................................................................................3 Section Two: Mobilization of the 53rd Anti-Aircraft Missile Brigade ................................................... 9 The 23-25 June 2014 Buk Convoy Vehicles ............................................................................................. 10 The 19-21 July 2014 Buk Convoy Vehicles .................................................................................................. 15 The 16 August 2014 Missile Transport ........................................................................................................ 17 Deployment of the 53rd Anti-Aircraft Missile Brigade in the Summer of 2014 ....................... 20 Section Three: Soldiers of the 53rd Anti-Aircraft Missile Brigade ...................................................... 23 Introduction .............................................................................................................................................................. 23 2nd Battalion of the 53rd Brigade in 2013 .................................................................................................... 26 3rd Battalion of the -
Key Player Identification in Underground Forums Over
Session: Long - Graph Nerual Network II CIKM ’19, November 3–7, 2019, Beijing, China Key Player Identification in Underground Forums over Atributed Heterogeneous Information Network Embedding Framework Yiming Zhang, Yujie Fan, Liang Zhao Chuan Shi Yanfang Ye∗ Department of IST School of CS Department of CDS, Case Western George Mason University Beijing University of Posts and Reserve University, OH, USA VA, USA Telecommunications, Beijing, China ABSTRACT ACM Reference Format: Online underground forums have been widely used by cybercrimi- Yiming Zhang, Yujie Fan, Yanfang Ye, Liang Zhao, and Chuan Shi. 2019. nals to exchange knowledge and trade in illicit products or services, Key Player Identifcation in Underground Forums over Attributed Hetero- geneous Information Network Embedding Framework. In which have played a central role in the cybercriminal ecosystem. In The 28th ACM order to combat the evolving cybercrimes, in this paper, we propose International Conference on Information and Knowledge Management (CIKM ’19), November 3–7, 2019, Beijing, China. ACM, New York, NY, USA, 10 pages. and develop an intelligent system named iDetective to automate https://doi.org/10.1145/3357384.3357876 the analysis of underground forums for the identifcation of key players (i.e., users who play the vital role in the value chain). In 1 INTRODUCTION iDetective, we frst introduce an attributed heterogeneous informa- tion network (AHIN) for user representation and use a meta-path As the Internet has become one of the most important drivers in the based approach to incorporate higher-level semantics to build up global economy (e.g., worldwide e-commerce sales reached over relatedness over users in underground forums; then we propose $2.3 trillion dollars in 2017 and its revenues are projected to grow to $4.88 trillion dollars in 2021 [31]), it also provides an open and Player2Vec to efciently learn node (i.e., user) representations in shared platform by dissolving the barriers so that everyone has AHIN for key player identifcation. -
Jamal Khashoggi's Tragic End Is a Wake-Up Call About the Dangers
Jamal Khashoggi's tragic end is a wake-up call about the dangers faced by dissidents in exile Such clandestine operations in violation of international law are not unique to Saudi Arabia Sreeram Chaulia · for CBC News Oct 23, 2018 This is a lesson about rising global impunity on the part of criminal dictatorships. Failure to stop this menace means that the arbitrary violence of authoritarian states will creep — indeed, will continue to creep — into the heart of democracies. (Lefteris Pitarakis/Associated Press) The tale of the murder of journalist Jamal Khashoggi is a global reminder of the ghastly, blood-soaked dynamic of vicious authoritarian regimes like that of Saudi Arabia. Despotic states with capable intelligence apparatuses hold deep grudges against dissidents, and they can go to any length to silence them no matter where they go and live in exile. The Firqat el-Nemr or "tiger squad" — a hit team of Saudi agents — is believed to be behind the savage murder of Khashoggi in Istanbul. The squad is said to have been expressly set up by Crown Prince Mohammed bin Salman to assassinate Saudi dissidents wherever they may reside. Indeed, there are reports of lesser-known instances where Saudi intelligence agents trapped and swooped up Saudi dissidents from France, Switzerland, Morocco and the United Arab Emirates. Poisoning of Kim Jong-nam Such clandestine operations in violation of international law are not unique to Saudi Arabia. In February 2017, the world witnessed the horrific killing of Kim Jong-nam, the half-brother of North Korea's tyrant Kim Jong-un, in Malaysia through a VX nerve agent poisoning. -
Supervised Discovery of Cybercrime Supply Chains
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains Rasika Bhalerao∗, Maxwell Aliapoulios∗, Ilia Shumailov†, Sadia Afroz‡, Damon McCoy∗ ∗ New York University, † University of Cambridge, ‡ International Computer Science Institute [email protected], [email protected], [email protected], [email protected], [email protected], Abstract—Understanding the sequences of processes needed expertise and connections. Machine learning has been used to perform a cybercrime is crucial for effective interventions. to automate some analysis of cybercrime forums, such as However, generating these supply chains currently requires time- identifying products that are bought and sold [26], however, consuming manual effort. We propose a method that leverages machine learning and graph-based analysis to efficiently extract using it to discover the trade relationship between products supply chains from cybercrime forums. Our supply chain de- has not been explored yet. tection algorithm can identify 33% and 42% relevant chains In this paper, we propose an approach to systematically within major English and Russian forums, respectively, showing identify relevant supply chains from cybercrime forums. Our improvements over the baselines of 11% and 5%, respectively. approach classifies the product category from a forum post, Our analysis of the supply chains demonstrates underlying connections between products and services that are potentially identifies the replies indicating that a user bought or sold the useful understanding and undermining the illicit activity of these product, then builds an interaction graph and uses a graph forums. For example, our extracted supply chains illuminate cash traversal algorithm to discover links between related product out and money laundering techniques and their importance to buying and subsequent selling posts. -
Measuring Cybercrime As a Service (Caas) Offerings in a Cybercrime Forum
Measuring Cybercrime as a Service (CaaS) Offerings in a Cybercrime Forum Ugur Akyazi Michel van Eeten Carlos H. Gañán Delft University of Technology Delft University of Technology Delft University of Technology [email protected] [email protected] [email protected] ABSTRACT could be purchased for around $200 and a month of SMS spoofing The emergence of Cybercrime-as-a-Service (CaaS) is a critical evo- for only $20. In addition to technical tools, it is also possible to hire lution in the cybercrime landscape. A key area of research on CaaS services, such as targeted account takeover [35]. The overall impact is where and how the supply of CaaS is being matched with demand. of CaaS is to make cybercrime more accessible to new criminals, Next to underground marketplaces and custom websites, cyber- as well as to support business models for advanced criminals via crime forums provide an important channel for CaaS suppliers to specialized business-to-business services [22]. attract customers. Our study presents the first comprehensive and A key area of research on CaaS is where and how the supply longitudinal analysis of types of CaaS supply and demand on a of these services is being matched with demand. This question is cybercrime forum. We develop a classifier to identify supply and critical for developing effective disruption strategies by law enforce- demand for each type and measure their relative prevalence and ment. Simply put: how do CaaS suppliers find their customers? One apply this to a dataset spanning 11 years of posts on Hack Forums, of the promises of CaaS is that it is accessible for new entrants, so one of the largest and oldest ongoing English-language cybercrime it cannot operate effectively within old and constrained model of forum on the surface web. -
Profile of a Prince Promise and Peril in Mohammed Bin Salman’S Vision 2030
BELFER CENTER PAPER Profile of a Prince Promise and Peril in Mohammed bin Salman’s Vision 2030 Karen Elliott House SENIOR FELLOW PAPER APRIL 2019 Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org Statements and views expressed in this report are solely those of the author and do not imply endorsement by Harvard University, the Harvard Kennedy School, or the Belfer Center for Science and International Affairs. Design and layout by Andrew Facini Cover photo: Fans react as they watch the “Greatest Royal Rumble” event in Jeddah, Saudi Arabia, Friday, April 27, 2018. (AP Photo/Amr Nabil) Copyright 2019, President and Fellows of Harvard College Printed in the United States of America BELFER CENTER PAPER Profile of a Prince Promise and Peril in Mohammed bin Salman’s Vision 2030 Karen Elliott House SENIOR FELLOW PAPER APRIL 2019 About the Author Karen Elliott House is a senior fellow at the Belfer Center and author of On Saudi Arabia: Its People, Past, Religion, Fault Lines—and Future, published by Knopf in 2012. During a 32-year career at The Wall Street Journal she served as diplomatic correspondent, foreign editor, and finally as publisher of the paper. She won a Pulitzer Prize for International Reporting in 1984 for her coverage of the Middle East. She is chairman of the RAND Corporation. Her earlier Belfer Center reports on Saudi Arabia, “Saudi Arabia in Transition: From Defense to Offense, But How to Score?” (June 2017), and “Uneasy Lies the Head that Wears a Crown” (April 2016) can be found at www.belfercenter.org. -
Hackers Gonna Hack: Investigating the Effect of Group Processes and Social Identities Within Online Hacking Communities
Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Thesis submitted for the degree of Doctor of Philosophy Bournemouth University October 2018 This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and due acknowledgement must always be made of the use of any material contained in, or derived from, this thesis. 1 2 Hackers gonna hack: Investigating the effect of group processes and social identities within online hacking communities Helen Thackray Abstract Hacking is an ethically and legally ambiguous area, often associated with cybercrime and cyberattacks. This investigation examines the human side of hacking and the merits of understanding this community. This includes group processes regarding: the identification and adoption of a social identity within hacking, and the variations this may cause in behaviour; trust within in the social identity group; the impact of breaches of trust within the community. It is believed that this research could lead to constructive developments for cybersecurity practices and individuals involved with hacking communities by identifying significant or influencing elements of the social identity and group process within these communities. For cybersecurity, the positive influence on individual security approaches after the hacker social identity adoption, and the subsequent in-group or out-group behaviours, could be adapted to improve security in the work place context. For individuals involved in the communities, an increase in the awareness of the potential influences from their adopted social identities and from other members could help those otherwise vulnerable to manipulation, such as new or younger members. -
Towards Automatic Discovery of Cybercrime Supply Chains
Towards Automatic Discovery of Cybercrime Supply Chains Rasika Bhalerao∗, Maxwell Aliapoulios∗, Ilia Shumailovy, Sadia Afrozz, Damon McCoy∗ ∗ New York University, y University of Cambridge, z International Computer Science Institute, [email protected], [email protected], [email protected], [email protected], [email protected], Abstract—Cybercrime forums enable modern criminal en- [28], [29], [38]. However, we as a community do not have trepreneurs to collaborate with other criminals into increasingly any systematic methods of identifying these supply chains that efficient and sophisticated criminal endeavors. Understanding the enable more sophisticated and streamlined attacks. Currently connections between different products and services can often illuminate effective interventions. However, generating this un- analysts often manually investigate cybercrime forums to derstanding of supply chains currently requires time-consuming understand these supply chains, which is a time-consuming manual effort. process [19]. In this paper, we propose a language-agnostic method to In this paper, we propose, implement, and evaluate a automatically extract supply chains from cybercrime forum posts framework to systematically identify relevant supply chains and replies. Our supply chain detection algorithm can identify 36% and 58% relevant chains within major English and Russian present in cybercrime forums. Our framework is composed of forums, respectively, showing improvements over the baselines of several components which include automated