NATO CIMIC: The Role of Iran in Afghanistan’s Reconstruction & Development

NATO Civ-Mil Ctr
0Shares
Farsi Language Zones
Farsi / Dari Language Zones

PDF (10 Pages):  20130816 NATO CIMIC Iran_Reconstruction_Afghanistan

This report provides a broad overview of the contribution of the Islamic Republic of Iran to reconstruction and development in Afghanistan since the fall of the Taliban. It complements previous CFC reports discussing the role of China, India and Pakistan in Afghanistan’s reconstruction, development and exploitation of natural resources. Related information is available at www.cimicweb.org.

Iran has been an active player in Afghanistan‟s reconstruction and development since the fall of the Taliban in 2001, with the Afghan government frequently lauding Iran for its assistance to the country. For instance, in June 2013, Afghan Foreign Ministry spokesman Janan Mosazai praised Iran as “a very good neighbour”, while stressing a need for expansion of ties and cooperation between the two countries. Similarly, in February 2013, Afghan Foreign Minister Zalmai Rassoul hailed Iran‟s positive role in the reconstruction of Afghanistan.  While this report primarily focuses on reconstruction and development – related projects, it is useful to situate these within a broader context of Iran‟s regional economic objectives and its foreign policy toward Afghanistan.  As noted by Ellen Laipson of the Stimson Center, Iran would prefer to see Afghanistan
emerge from decades of conflict as “a more reliable trading partner, transit route, and competent state that can [reduce] the flow of drugs and refugees across its border, [as well as ] prevent non-state actors from operating on its territory”.   These factors, among others, have guided Iran‟s reconstruction and development efforts in the country.

Robin Good: What Is Curation and Why It’s Important

Education
0Shares
Robin Good
Robin Good

What Is Curation and Why It's Important for Learning and Work: A Basic Introduction

Martin Couzins and Sam Burrogh introduce in simple words the importance of curation and its relationship with their story and work. How do we get to the information that is really useful? How do we get to it quickly? A good introduction for beginners. 7/10 Original video Check also the related article.

Berto Jongman: CIA Closes Declassification of History Unit

Corruption, Government, Idiocy
0Shares
Berto Jongman
Berto Jongman

CIA closes office that declassifies historical materials

The Historical Collections Division is the latest casualty of sequester cuts. The office handling Freedom of Information Act requests will take over the work.

WASHINGTON — The budget ax has fallen on a CIA office that focused on declassifying historical materials, a move scholars say will mean fewer public disclosures about long-buried intelligence secrets and scandals.

The Historical Collections Division, which has declassified documents on top Soviet spies, a secret CIA airline in the Vietnam War, the Cuban missile crisis and other major operations, has been disbanded. The office that handles Freedom of Information Act requests will take over the work.

Read full article.

Berto Jongman: UMD Tool Predicts Terrorist Leadership Backfill

IO Tools
0Shares
Berto Jongman
Berto Jongman

UMD Tool Predicts Leadership of Terrorist Networks

Contacts: Lee Tune 301-405-4679

COLLEGE PARK, Md. – The loss of a terrorist or criminal network's leader—whether through imprisonment, change of allegiance or death—can create a vacuum in which subordinates jockey for position or splinter into factions.

Rather than wait to see how these scenarios play out, U.S. intelligence analysts could soon have a new tool to help predict who might rise to the top of a terrorist or criminal network, and whether the redefined organization has an increased ability to carry out its activities.

A University of Maryland research team developed this analytics tool, known as STONE (Shaping Terrorist Organizational Network Efficacy), “to minimize the impact of these organizations,” says V.S. Subrahmanian, a professor of computer science who is leading the UMD effort.

The UMD team has used open-source data to hypothetically test the software platform on four known terrorist organizations: al-Qaeda, Hamas, Hezbollah and Lashkar-e-Taiba, perpetrators of the November 2008 attack on Mumbai, India.

Continue reading “Berto Jongman: UMD Tool Predicts Terrorist Leadership Backfill”

Berto Jongman: Cyber-Risk

IO Impotency
0Shares
Berto Jongman
Berto Jongman

Key Metrics for Risk-Based Security Management

Tripwire has released the results of an extensive study focused on the state of risk-based security management with the Ponemon Institute.

The study examined the key risk-based security metrics IT security managers used most frequently to gauge the effectiveness of their organizations’ overall security efforts.

Top Metrics included: time taken to patch, policy violations, uninfected endpoints, data breaches, reduction in the cost of security, end users training, and reduction in unplanned system downtime.

The survey respondents included 749 US and 571 UK professionals in the following areas: IT security, IT operations, IT risk management, business operations, compliance/internal audit and enterprise risk management.

In the compliance arena, leading metrics included mean time-to-patch (49 percent), policy violations (33 percent), and reduction in audit findings and repeat findings (27 percent).

The study also found that only 19 percent of respondents viewed the number of records or files detected as compliance infractions, and only 16 percent identified reduction in expired certificates — including SSL and SSH keys — as an effective metric.

Read full article.

See Also:

Cyber Security Ranked Third in Lloyd’s of London Risk Index

Berto Jongman: Syria False Flags & Mystery Munitions, Blowback To UK

04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, Government, IO Deeds of War, Military
0Shares
Berto Jongman
Berto Jongman

US-Trained Rebels Moved Towards Damascus Days Before ‘Chemical Attack’

Lawmakers who opposed arming FSA militants “reconsider intervention”

Paul Joseph Watson, Infowars.com, August 23, 2013

300 handpicked rebel militants trained by the US, Israel and Jordan entered Syria and began advancing towards Damascus in the days before an alleged chemical weapons attack, the French newspaper Le Figaro is reporting.

“The rebels were trained for several months in a training camp on the Jordanian-Syrian border by CIA operatives, as well as Jordanian and Israeli commandos,” reports the Jerusalem Post.

Read full article.

See Also:

Mystery Munitions Video

How Might Syria Come Back to the UK?

John Maguire: James Corbett on the Syrian Cover Story

07 Other Atrocities, Government, IO Deeds of War, Media, Military
0Shares
John Maguire
John Maguire

Description: In this exclusive clip from the forthcoming edition of the Jack Blood Podcast, James Corbett and Jack Blood dissect the latest reports of a chemical weapons attack in Syria, occurring just two days after a UN chemical weapons team arrived in the country. James goes over the history of false flag chemical provocations in the country and the reasons why we should doubt the quickly-forming official narrative that this attack was perpetrated by Assad's military. Listen to the Jack Blood podcast at DeadlineLive.info.

http://youtu.be/bSAMT5Pe15k

See Also:

NIGHTWATCH: Syrian Chemical Attack? “No Fucking Way, Jose.”