Showing posts with label counter terrorism. Show all posts
Showing posts with label counter terrorism. Show all posts

Monday, February 13, 2017

Border Security: When Security And Secrecy Legislation Collide

Strange how paranoia can link up with reality now and then. - Philip K. Dick

Sloppy language leads to sloppy thought, and sloppy thought to sloppy legislation. - Dick Cavett

The #1206 “fiction” series continues …


“Look, I simply cannot give up my phone for you”, Joe Salimi exclaimed in frustration, his heart rate increasing quickly.

“Sir, if you do not turn over your laptop and your mobile device, I cannot allow you to enter the country”, the border services agent said firmly but politely.

“I don’t understand this”, Joe said, “My devices have extremely sensitive information on them and I don’t think you have the security classification necessary to look at them.  I’m a Pentagon contractor for bloody sake.”

“My orders are clear, sir”, replied the border services agent calmly, “I have the right to inspect all electronic devices in the possession of people entering the country, I have the right to retain possession of those devices for as long as I see fit and I have the right to deny entry to anyone who does not comply with my request.”

“Well, can I at least call my boss to ask him about it?”, Joe asked.

“No, sir”, replied the border services agent, “No calls are permitted in this area and it wouldn’t matter what your boss said anyway as he doesn’t have jurisdiction in this matter.”

Joe shook his head in frustration, sighed and then passed the border services agent his cell phone and laptop.

The border services agent thanked him and passed the devices to a colleague who connected them to a laptop.

An hour later, Joe was welcomed home by the border services agent and allowed to enter the country with his cell phone and laptop.


Three Months Later

A group of angry, desperate men sat around a boardroom table.

At the head of the table, the leader of the room could not contain his anger.

“I don’t give a rat’s behind how it happened”, he expostulated, “We have traced the leak of highly classified information back to Joe’s laptop and I want his ass on a platter.”

“I’ve spoken to Joe repeatedly”, Joe’s manager responded, “And he claims that his devices have never been out of his possession.  We have inspected his devices and have not found any instance of compromise on any of them.  We have rerun his background checks and he is completely clean.  So Joe and frankly, all of us, are at a complete loss as to how information known only to his group could have been obtained by someone else.”

“Just f’ing great”, the leader exploded, “How in the hell am I going to explain this to the President?”

There were shrugs around the table as no one claimed to have an answer.

“There is one other thing”, someone offered from the back of the room, “Well, actually two more things.”

“Oh?”, asked the leader in an exasperated tone, “What now?”

“Well”, the person in the back of the room began, “We believe the information has made it to the Chinese through North Korea, likely originating from Iran.  And …..”

The person paused for a moment before the leader yelled, “And?”

“Well”, the person said hesitatingly, “The press has found out.”

The room exploded in arguments as the reality of their situation crashed down upon them.


Somewhere in the Middle East

In a hot, stuffy room somewhere in the Middle East, three men discussed the events of the day.

“So where are we?”, their leader asked.

“Well”, began the taller of his colleagues, “In an effort to secure the border, American authorities still require people entering the country to turn over their electronic devices for inspection.  Our brothers inside their border security service have been able to glean quite a bit of information as a result, information that commands quite good money on the black market.  Russia, China and North Korea are paying a lot of money from what we have been able to obtain so far. Beyond classified information there is also sensitive business information of interest to business competitors around the world.”

“Very good”, their leader replied.

“Yes and no”, the shorter of the colleagues responded, “There is talk that their legislation will be amended such that people of a certain security level or higher will soon be exempt from this search.”

“Oh great”, the taller of the colleagues responded, “Our sources of information will dry up when this happens.”

“Not so”, replied the shorter man, “Once this happens, our brothers within those higher security ranks will then be able to pass through border services without being checked, which in turn will enable us to get information in and out of the country undetected.  That is is ultimately our hope in the first place.”

“So you see”, replied the leader, “Either way we win. Rather than sit down and build a comprehensive strategy to defeat us, the Americans have proceeded from one knee-jerk response to another, each one creating loopholes for us as a result of a lack of careful consideration on their part regarding the situation at-hand.  Their citizens continue to be burdened as a result and continue to grow more and more agitated with their government, with larger scale unrest an ever increasing possibility.  At the same time, their country bleeds money in an effort to stop us.  We are still winning.”

The other two men nodded silently in agreement.

To be continued.


© 2017 – Harry Tucker – All Rights Reserved

Blog Post Background / Supporting Data

This musing was sparked by a news item over the weekend where a NASA employee with a high security clearance was forced to reveal the contents of his mobile device to a border services agent with a lower security clearance rating.  The story is here - Border Agent Demands NASA Scientist Unlock Phone Before Entering the Country.

While it could be argued that even with a lower security clearance, border service agents are completely secure, they are in fact only human beings and they themselves can be compromised as noted here (using TSA in this example, but the example stands as a warning) - TSA Fails to ID 73 Airport Employees With Links to Terrorism.

Human beings are always the weakest link and no amount of vetting is perfect nor is incessant legislation a solution.

The more layers of security and legislation we layer onto border security, the more complexity and loopholes we create.

In the end, we will spend billions of dollars more on security and the need for ever-diminishing privacy will continue to prevail.  The ideas of perfect security and total freedom / privacy cannot co-exist, after all.  One has to defer to the other at some point – the one that loses is determined by which of the two we deem to be the highest priority.

And when highly classified material is exposed, who do we blame – the person who had it in their possession when it was obtained or the legislators who created the complexity that allowed the compromise to take place?

Securing our national borders is critical.

Securing classified data is equally critical.

And just as security and freedom / privacy dance for priority in a complex dichotomy, so too does securing our borders and our classified data.

And with anything of this complexity, there is always someone out there waiting to exploit the loopholes.

As I said, human beings are always the weakest link.

When legislators understand this, perhaps they will take the time to look more strategically at things and take fewer knee-jerk reactions that technically don’t actually solve anything but which add additional burden on the average law-abiding citizen who has nothing to do with any of this.  Meanwhile, those whose behavior we are trying to predict and prevent still have an opportunity to execute their intention.

The tail is wagging the dog with this problem.

The big question is – what is the alternative?

And does it serve to someone’s advantage to actually NOT solve this problem while promoting the problem as larger than it really is?

After all, in the last ten years, over 280,000 Americans have died through gun violence but guns are not banned.

Over 300,000 Americans have died in the last ten years in motor vehicle accidents but motor vehicles are not banned.

Over 4.5 million Americans have died in the last ten years from smoking-related illness but cigarettes are not banned.

Meanwhile, foreign-born terrorists accounted for 3,024 deaths on American soil from 1975 through 2015. But 2,983 of those deaths came on 9/11 alone, with the remaining 41 deaths resulting from terrorism on US soil in that 40-year period.

All that being said, the latter attracts a lot of time, energy and money to prevent.

Why?

I don’t know what the answer is.

Do you?

Series Origin

This series, a departure from my usual musings, is inspired as a result of conversations with former senior advisors to multiple Presidents of the United States, senior officers in the US Military and other interesting folks as well as my own professional background as a Wall St. / Fortune 25 strategy advisor and large-scale technology architect.

While this musing is just “fiction” (note the quotes) and a departure from my musings on technology, strategy, politics and society, as a strategy guy, I do everything for a reason and with a measurable outcome in mind. :-)

This “fictional” musing is a continuation of the #1206 series noted here.

Sunday, March 9, 2014

Malaysian Airlines–When Will We Get Serious About Intelligence?

The human spy, in terms of the American espionage effort, had never been terribly pertinent. - Aldrich Ames

As the world awaits an update on the status of the Malaysian Airlines flight that has gone missing, much of the media has become gripped by the news that two of the passengers on the flight were using passports that were stolen at different times – one from an Austrian citizen and one from an Italian.

The news, whether related to the disappearance of the flight or not, is complicated by the statistical improbability that the two stolen passports would be on the same flight.

Add to this the seemingly unusual event that the airline tickets for the two passengers were purchased together implies that the two travelers were known to each other and therefore the statistical improbability of the two stolen passports traveling together transforms into a statistic probability.

And finally, Interpol revealed today that both passports were noted in their database as stolen but since airlines rarely check passenger passports against this database prior to boarding (according to Interpol and other aviation sources), the success rate of using a stolen passport to get on an aircraft anywhere in the world seems fairly high. <<On a side note, I am reminded of the Air Canada flight a couple of years ago where a senior citizen was denied the right to board an aircraft because her passport had expired while she was on vacation.  She was clearly a threat, wasn’t she?>>

All that being said, we must acknowledge that whether the passport incident is related to the loss of the Malaysian Airlines flight or not remains unclear and is pure conjecture by a sensationalist-focused media.

And meanwhile in the Ukraine

Despite having tapped almost every land line, email, cell phone, public conversation, social media platform and McDonald’s Happy Meal box, events in the Ukraine have allegedly caught the world by surprise.  While the events have calmed down somewhat, there was a 24-48 hour window where we may have come closer to a larger “international event” than people realize despite the gigantic intel engine that can proudly predict what each of us will have for breakfast tomorrow.

All of this makes me wonder how serious we really are about security and how effective the billions we are spending really are.

Assessing the ROI of Intel Collection

We now know that in the days and weeks leading up to 9/11, we had the intel to predict and possibly prevent the event but we had a collision of too many people holding onto too many disconnected bits of information, either wilfully not sharing it because of “specific agency ego” or sharing it but needing the right people to connect the dots.

The Christmas Bomber attempted to blow up a flight headed into Detroit on Christmas Day, 2009, by igniting plastic explosives hidden in his underwear and was foiled when his sweat-laden underwear would not ignite.  Then Homeland Security Secretary Napolitano claimed that it was the work of the intel agencies that had prevented the attack when in fact, the passengers owe their Life to the likelihood that the only difference between a controlled landing and an explosive one was that the nervous bomber had sweated himself into failure.

Don’t forget that the Shoe Bomber also flubbed his mission, easily circumventing our security procedures at the time.

And we haven’t figured out yet how to deal with explosives surgically implanted inside terrorists.

In the case of the stolen passports on the Malaysian Airlines flight today, we know that Al Qaeda routinely uses stolen passports to hide their identity and yet we don’t screen passports to determine whether they are authentic or not, even though the technology to do so is relatively simple to implement.  It’s such a mundane, simple thing to check that it seems almost pathetic that our great counter-terrorism engine could be circumvented by such a simple act as offering a stolen passport.  Meanwhile, it took us a long time to be allowed to bring nail clippers, the notorious WMDs that they are, on board an aircraft again.

The Bottom Line

We spend billions on intel and counter terrorism and while we have many claims from the intel industry that the money is well spent and has prevented many incidents, we still have too many significant events happening while the probability of future events is a lot higher than people realize.

It makes me wonder:

  1. Despite the billions that we spend, why do we always seem to be a step behind many of these people who have almost no budget?
  2. Are we so focused on the potential for complex problems that we fail to see the relatively simple approaches that some of these terrorists use?
  3. Do our laws complicate the work of law enforcement, forcing them to tiptoe around our rights so much that it creates loopholes that terrorists can exploit?
  4. Is our ego so great that we assume that lots of money and technology can always beat someone who is insanely (and I use that word literally) passionate about achieving some goal in as simple a form as possible while at the same time being relatively uneducated (at least as we perceive them to be)?

And finally there is this question:

How can we do better before something really catastrophic undermines all of us?  Think of the Ukraine situation rapidly developing into something else by accident.

Security agencies are forced to run the gauntlet between honoring our rights and freedoms and protecting us against terror attack.  Their efforts are complicated by a select few who use the power they have to their advantage (think of J. Edgar Hoover’s abuse of power).

I wonder if this gauntlet (almost a no-win for the intel industry), coupled with ego, some scattered instances of corruption and black budgets that have lost sight of their real goals, have created a scenario where money that could be spent on other things will be wasted while events that threaten us personally or internationally will happen anyway.

If that’s the case, what’s the point? 

Maybe all of this “stuff” about security and counter-terrorism is just a charade and serves a different purpose, serving a different intention and a different master that we are not aware of.

But that’s all conspiracy stuff, isn’t it?

Or is it?

I’m not a conspiracy person but as a strategy person, what I see does not add up.  The dots are not connecting predictably or intelligently, with a missing element clearly present that prevents those dots from connecting cohesively.

Understanding that missing element and the person or persons who own it or influence it matters … if we have the courage, the ability and the will to seek the answer.

Meanwhile, for the record, I will be having corn flakes tomorrow morning, but somebody already knew that, didn’t they?

And yet we can’t do better where it matters.

It makes me wonder why.

How about you?

In service and servanthood,

Harry

PS On a related but unrelated note, the widow of a pilot lost on 9/11 has recently revealed that the cockpit of a commercial aircraft can still be compromised in less than 5 seconds and aviation sources have revealed that they believe that potential terrorists appear to be rehearsing on US commercial flights for some type of event.

Given that, here is an important call to action for you.

When the next event happens (and it will), you must act surprised and outraged because oftentimes it seems that that’s what we do best despite data to the contrary.

We can and should do better.

It provides interesting insight into the human experience as to why we do not.

As for today, let us keep the families of those lost in our thoughts and prayers, that they may find strength during this time of difficulty.

And toss in an extra prayer for the rest of us, that we may find the strength and courage to create a world that honors our potential.