Archive for March 31, 2011

AFRICA: Ivory Coast End Game

The Beginning of the End?

The months-long stand-off between two men who claim to be the duly elected president of the West African nation of Ivory Coast appears to be drawing to a fast-moving and violent conclusion.

CIA World Factbook

Heavy fighting has broken out in the largest city, Abijan, between forces loyal to Laurent Gbagbo, the sitting president and Alasane Ouattara, a former prime minister whose election is recognized by the United Nations, the United States, the European Union, the African Union and neighboring African countries, the BBC reports.

The two men have traded charges that the other was using mercenaries and their supporters have clashed repeatedly since the Ivory Coast’s electoral commission declared Ouattara the winner. The U.N. says violence has claimed more than 400 lives, causing nearly 1 million people to flee the country, many to neighboring Liberia, the New York Times reports.

The BBC says Ouattara’s forces have made lightning advances since Monday, moving from their base in the predominantly-Muslim northern half of the country. On Wednesday (March 30) they captured Ivory Coast’s capital, Yamoussoukro, and the key port of San Pedro, from which the country’s important cocoa crop is shipped.

CIA World Factbook

Ouattara has closed the country’s land and sea borders and ordered a nighttime curfew in Abijan until Sunday. The UN said thousands of soldiers and police, including several high-level officers, have reportedly deserted Gbagbo’s cause, the BBC reported. The head of the army has sought refuge with his family at the residence of the South African ambassador, the Voice of America said.

The BBC has a photo slideshow of recent conditions in Ivory Coast.

(Click on the image to enlarge the map)

March 31, 2011 at 11:51 pm Leave a comment

CYBERSECURITY: Straddling the Jurisdictional Divide

Whose Cyberspace Is It?

Maritime Operations Center in Allied Command Headquarters, Naples, Italy. (U.S. Navy photo)

When folks at the Pentagon dreamed up the idea of Cyber Command – a Defense Department entity that would protect U.S. military information networks from cyberspace attacks – one of the issues raised was: Just how much of cyberspace is the new command going to protect?

Cyber Command was activated last year, but after testimony at a Senate hearing this week it appears the question of how wide-ranging the command’s  mission will be is not completely resolved.

At issue: can, or should, the Department of Defense (DoD), be responsible for protecting all of U.S. cyberspace, most of which — like the electric grid, telephone networks and U.S. financial markets — is in the private sector.

While some say the Pentagon should have that responsibility – after all the grid and communications are vital to national security — current federal law bars the military from acting like a policeman on U.S. soil, except in emergencies like an insurrection. Federal privacy laws are also confusing about how far the military can go in securing cyberspace.

Air Force Gen. Robert Kehler, the head of U.S. Strategic Command (STRATCOM) – which oversees Cyber Command – says he still doesn’t have all the legal authorityhe needs. However,  Kehler told Sen. John McCain he was working on it – in conjunction with the Department of Homeland Security (DHS).

DHS is the lead agency when it comes to safeguarding critical U.S. infrastructure — including civilian government computer systems. It also is responsible for coordinating the defense of industry information networks with the private sector. “So there are limits to what DoD can do today,” Kehler told the Arizona senator.

McCain, who is the senior Republican on the Armed Services Committee, said he is “concerned that the Department of Defense lacks both the necessary legal authorities and the sufficient trained personnel to fully perform its critical role in the realm of cybersecurity.”

“A lot of us feel that is the new battleground of the 21st Century,” McCain said. In 2008, a U.S. military facility in the Middle East was hacked with a malicious code that could have allowed classified and unclassified data to be transferred. The year before, the information networks of Estonian government ministries, banks and media outlets were attacked. And cyberwarfare is believed to have brought down Syrian air defense systems, allowing Israeli jets to fly in undetected and destroy a suspected nuclear facility under construction. In 2010, Iran’s nuclear facilities were attacked by sophisticated malware, known as the Stuxnet worm.

McCain noted that the issue has been bouncing around among congressional committees from intelligence and armed services to homeland security. “And everybody’s got a different idea.”

Sen. Joe Lieberman, another Armed Services Committee member – who is also chairman of the Senate Homeland Security Committee – said it was time to break down the jurisdictional barriers. “We’re not adequately defended from cyber attack today,” said the Connecticut independent, adding that there was an “urgent need” to get beyond “classic Senate committee turf battles” and pass legislation this year clarifying authority for the protection of U.S. cyberspace.

The issue of authority was raised a few weeks ago at a House Armed Services Committee hearing when the head of Cyber Command, Army Gen. Keith Alexander, said “we do not have the capacity to do everything we need to accomplish.” To put it bluntly, he added, “We are very thin and a crisis would quickly stress our cyber forces.”

Meanwhile, Kehler said DoD has a pilot program with industry to explore what authorities are still needed. Sen. Carl Levin (D-Mich.) chair of the Armed Services Committee, said legislative efforts are being organized to ensure the department and other agencies “have all the authorities they need and that they work together to make sure there are no cracks in our defense.” Levin said one aim was to clarify not only who has protective authority but “responsibility for the response [to an attack] as well.”

 

March 31, 2011 at 3:07 pm Leave a comment


Posts

March 2011
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  

Categories


%d bloggers like this: