menu

Contributor:

Security Debrief

Increase in C-TPAT Enforcement — and Enforcement Costs

As C-TPAT has matured, Customs and Border Protection’s emphasis on compliance is sensible, and CBP is to be commended for ensuring that the program is a real security program and not merely a “paper program.” But CBP also must be careful to ensure that suspension and revocation decisions are made consistently across C-TPAT membership and that decisions are made in a timely way and in accordance with transparent procedures. There is anecdotal information that consistency and transparency are not yet hallmarks of CBP’s compliance efforts.

Presidential Elections in Egypt and the "Arab Spring"

When looking at the developments of the last year and a half in the Middle East, it seems quite clear that the media was too quick to coin the term “Arab Spring” to describe the popular unrest and overthrow of regimes in significant parts of the Arab World. It would be more appropriate to refer to what is happening in the region as the “Islamist Spring” because it is creating unprecedented opportunities for Islamist political movements to finally grasp the reins of power, such as with the elections in Egypt. All of this, of course, has implications for the region and the United States.

Protesting is Cool This Summer

Protesting – an activity long-dismissed as something belonging to (to quote some of the less complementary phrases) “the tree-hugging, sandal wearing hippy types” – is enjoying a resurgence in popularity, and with that resurgence is a dramatic increase in effectiveness. Protesting is cool again. Direct actions are not only cool, they’re seen by many young people as something that is not only legitimate, it’s required. Taken together, the conclusion can only be that there is likely to be an increase in direct action this summer.

The War of 1812 Redux – Using National Security Tools to Protect the Private Sector

By Rob Strayer
Two hundred years ago today, the United States declared war against Great Britain, beginning the War of 1812. At that time, the British Navy was the aggressor, boarding U.S. commercial vessels. Today, the United States faces a digital threat to its national security and commercial interests. Like their nineteenth century counterparts conducting flagrant piracy on the high seas, cyber attackers openly and notoriously exploit U.S. commercial networks. How does the United States develop a national cyber security policy that is tailored to the problems that private sector companies face (avoiding the mistakes of 1812)?

Protect Sources and Methods – The Threats from Intel Leaks

Like many Americans, I am concerned about the major intelligence leaks that have taken place over the past weeks and months. It i disturbing to see this kind of activity, particularly in time of war. The unmasking of Dr. Skakil Afridi, who helped bring Bin Laden down in Pakistan, and the significant reporting of the intricacies of cyber attacks against Iran’s nuclear program, makes me cringe.

Finding the Balance: U.S. Security Interests and the Arab Awakening

The Arab uprisings created significant opportunities to counter radical Islamist propaganda and leverage financial tools against violently repressive regimes. Yet, they have also strained the intelligence community’s resources, forcing agencies to shift personnel and reprioritize their collection and analysis efforts. The Washington Institute’s new compendium, “Finding the Balance: U.S. Security Interests and the Arab Awakening,” delves into these issues in depth.

Leveling the Playing Field – Accelerating Counter-Terror Tech Procurement

While the United States successfully thwarted another attempted bombing of a domestic inbound aircraft by al Qaeda in the Arabian Peninsula, the disrupted plot should tell Americans two important things: our intelligence and security agencies are doing excellent work, and continued vigilance is the price of security. We need every available tool to combat and protect against terrorists, and this means speeding up the rate at which America procures and implements counter-terrorism technology.

The Iranian Security Threat in the Western Hemisphere: Learning from Past Experience

Director of National Intelligence James Clapper Jr. has noted some Iranian officials are now more willing to conduct an attack in the United States. Iran’s aggressive posture toward the United States, which suggests a heightened intent to target the homeland, is made all the more acute given Iran’s massive diplomatic presence in the Western Hemisphere.

Another Win for the Good Guys – Let's Not Get Too Comfortable

The prevention of a bombing attack on an inbound passenger airliner this week was a great piece of work by the Intelligence Community. Since 9/11, there have been numerous attempts at attacking the homeland from both within the country and from without. All have failed. I have read a lot of the news stories reporting on this – each day, more operational details leak out. Coming from the intelligence world, I am dumbfounded by “anonymous sources” reporting the details of the operation to the press. Does anybody even try to protect sensitive sources and methods anymore?