Fearing for their safety as armed protesters gathered in the Nevada back country, federal officials on Saturday suddenly ended a controversial effort to seize hundreds of cattle that a rancher has kept illegally on public land.
The cattle ranch’s owner, Cliven Bundy, and hundreds of armed supporters had threatened to forcefully keep Bureau of Land Management employees from rounding up the approximately 900 cattle. Nearly 400 of the cattle had been seized during the past week. They were being held nearby and could be sent to Utah, authorities said.
Senior Associate Democracy and Rule of Law Program South Asia Program, Carnegie Endowment for International Peace
Defense One, 6 April 2014
As popular uprisings keep toppling governments like bowling pins, the latest round has morphed into a great power face-off — with Russia and the West glowering at each other across a divided Ukraine. Thailand, a key United States military friend in Southeast Asia, could be next on the list. Thousands of protests rock Chinese provinces each month, worrying President Xi Jinping’s still-green administration. The Egyptian and Syrian revolutions have spun off into bloody and widening strife, while extremist insurgencies in Afghanistan, Nigeria and the Philippines stubbornly challenge state stability.
What links these far-flung events, most of them high on the U.S. list of security priorities? Corruption. Not garden-variety corruption, the kind that exists everywhere. Acute and systemic corruption has taken hold in these countries. And it is driving indignant populations, who are networked and communicating as never before, to extremes. Around the world, pervasive corruption drives a list of other security risks too, such as terrorist facilitation; traffic in weapons or drugs; nuclear proliferation; theft of intellectual property; fractured financial systems; and governments that are enmeshed with transnational criminal superpowers. And yet, U.S. military and intelligence officials seem blind to both the character and the security implications of this type of corruption. Like an odorless gas, it fuels all these dangers without attracting much policy response inside or outside of Foggy Bottom.
It’s time to start paying attention. For, if military and civilian strategists agree on anything these days, it’s the need to reduce U.S. reliance on military responses to overseas crises. But to get there, containing military spending or constraining our forces’ missions won’t be enough. For starters, U.S. national security leaders urgently need a better grasp of the factors that build these crises. Then they must design and implement more precise and effective interactions with those factors upstream, before crises develop.
Acute corruption, in other words, can no longer be seen as just a nuisance or a “values issue” to be handed off for technical programming to the U.S. Agency for International Development. Even less should it be considered a factor of stability, as some maintain. Corruption is a problem that must be mainstreamed into national security decision-making. For military leaders, that means tasking intelligence collectors and analysts with new questions. It means better tailoring the terms of military assistance and the tenor of military-to-military relationships. And it means changing the ways that forward-deployed units gain access to territory and partner with locals once there.
Plagued by poor infrastructure, climate denialism, and a patchwork of unregulated fracking wells and nuclear waste sites, the U.S. is poised to topple itself with self-inflicted wounds.
The U.S. security complex is up in arms about cyberhackers and foreign terrorists targeting America’s vulnerable infrastructure. Think tank reports have highlighted the chinks in homeland security represented by unsecured ports, dams, and power plants. We’ve been bombarded by stories about outdated software that is subject to hacking and the vulnerability of our communities to bioterrorism. Reports such as the Heritage Foundation’s “Microbes and Mass Casualties: Defending America Against Bioterrorism” describe a United States that could be brought to its knees by its adversaries unless significant investments are made in “hardening” these targets.
But the greatest dangers for the United States do not lurk in terrorist cells in the mountains surrounding Kandahar that are planning on assaults on American targets. Rather, our vulnerabilities are homegrown. The United States plays host to thousands of nuclear weapons, toxic chemical dumps, radioactive waste storage facilities, complex pipelines and refineries, offshore oil rigs, and many other potentially dangerous facilities that require constant maintenance and highly trained and motivated experts to keep them running safely.
Malaysian government continues to backtrack after initial evidence in case of missing flight is proven false
MALAYSIA (INTELLIHUB) — Malaysian officials told relatives of passengers from missing Malaysia Airlines flight MH370 that there was sealed evidence, which will not be made public. The sealed evidence reportedly includes air traffic control radio transcript, radar data and airport security recordings.
Family members of the missing passengers are becoming increasingly frustrated and impatient with the treatment that they are receiving from investigators. Many are now casting doubt on the initial report that the plane crashed into the Indian Ocean, killing everyone on board. Family members are suggesting that the Malaysian government prematurely announced that the plane had crashed, acting on faulty evidence.
“We demand you retract announcement that MH370 ended in south Indian Ocean and continue search-and-rescue operations,” one relative said at a briefing earlier this week.
The premature announcement of the crash was sent through a text message to relatives, on behalf of the Malaysian government, nearly a week ago. Since then it was discovered that the object they had found in the ocean was not wreckage, but random unidentified “junk”.
I know that the article “Sinkhole of Bureaucracy” is an example of a single case example. Nevertheless, the write up tickled my funny bone. With fancy technology, USA.gov, and the hyper modern content processing systems used in many Federal agencies, reality is stranger than science fiction.
This passage snagged my attention:
inside the caverns of an old Pennsylvania limestone mine, there are 600 employees of the Office of Personnel Management. Their task is nothing top-secret. It is to process the retirement papers of the government’s own workers. But that system has a spectacular flaw. It still must be done entirely by hand, and almost entirely on paper.
One of President Obama’s advisors is quote as describing the manual operation as “that crazy cave.”
In Crimea, Russia May Have Gotten a Jump on West by Evading U.S. Eavesdropping
EXTRACTS:
U.S. military satellites spied Russian troops amassing within striking distance of Crimea last month. But intelligence analysts were surprised because they hadn't intercepted any telltale communications where Russian leaders, military commanders or soldiers discussed plans to invade.