Military: NO RoE’s vs. Pentagon vs. White House

U.S. Forces Tied by Old Rules in Afghanistan

Lake, Bloomberg:Current and former U.S. military officials tell me that the U.S. and NATO mission in Afghanistan is almost entirely focused on the re-emergence of al Qaeda and that strikes against Islamic State leaders are scarce.

Afghan news media reported one such strike over the weekend in the province of Nangarhar.  In July U.S. airstrikes reportedly killed Hafez Saeed, an Islamic State leader in what the group has called its Khoresan Province. But U.S. officials tell me the rules of engagement in Afghanistan are highly restrictive.

“There are real restrictions about what they can do against the ISIS presence in Afghanistan,” Mac Thornberry, the chairman of the House Armed Services Committee, told me about the rules of engagement for U.S. forces in Afghanistan.

Thornberry said that the rules of engagement, combined with what he called micro-management from the White House, have led military officers to tell him they have to go through several unnecessary and burdensome hoops before firing at the enemy. More here.

More from Thornberry:

WASHINGTON ~ DefenseNews — US House Armed Services Chairman Rep. Mac Thornberry outlined his plans in the coming year to focus on the Pentagon’s strategy to maintain American dominance for the next 25 years, cyber, nuclear modernization and special operations.

“Our committee has spent more time over the last year on the issue of our eroding technological superiority than it has spent on any other issue,” the Texas Republican told an audience at the National Press Club today.

The chairman said while he applauded the Pentagon’s efforts “no one should be under the illusion that a handful of technology breakthroughs, even if they come, are going to guarantee our dominant position for many years ahead.” Technology changes too quickly, information moves too fast and the threats are too diverse. Therefore, “bigger change is required,” he added.

On cyber as a new domain in warfare, Thornberry acknowledged that technology is not the primary problem that needs to be solved to operate effectively in such a domain.

“Organizations, people are the most fruitful things,” he said. “We have to be able to fight and win in cyberspace so the committee is pushing issues related to people, organization, rules of engagement in that domain to try to make sure we close the gap between the threat and the policies we now have to deploy.”

Thornberry said “it may seem a little bit odd” to have nuclear deterrence listed as a priority. “But as events over the last week have shown nuclear know-how is spreading. Our own nuclear deterrent is the foundation for all our other defense efforts.”

Last week, North Korea claimed it successfully tested a hydrogen bomb. The US and its allies are working to determine within weeks whether North Korea’s nuclear test did in fact involve a hydrogen bomb or a far less powerful atomic bomb.

But while North Korea works to boost the capability of its weapons and Russia continues to advance its nuclear technology, “unfortunately our warheads and our delivery systems have all been neglected and are all aging out at about the same time,” Thornberry said.

“We have to put the resources, which studies show would never be more than 5 percent of the total defense budget, but we have to put the resources as well as the focused effort and the willpower into making sure that we have a nuclear deterrent that will continue to protect this country in the future,” he said, “not just a nuclear deterrent that was designed for a different age.”

Thornberry said he’d focus on how to best use special operations forces in the future.

“The world, including our enemies, has gotten a pretty good look at the enormous capability that our special operations forces brings,” he said.

Special operations forces have deployed most recently to Syria as part of a major overhaul of the US government’s strategy against the Islamic State group last November. President Barack Obama authorized the deployment of fewer than 50 special operations troops to northern Syria.

Also signaling the important role special operations will play in the Middle East in the coming years, it has been reported that Obama plans to tap Special Operations Command head Army Gen. Joseph Votel as the next leader for US Central Command.

“I have no doubt that we will continue to rely on them heavily in the future but there is a temptation, and we’ve seen it in other nations, to use SOF forces for everything,” Thornberry said, likening the use of such forces to “taking a sharp knife and raking it across the concrete. You keep doing that and it’s not so sharp anymore.”

The committee, Thornberry said, “will be both supportive but also protective of our SOF capabilities because some of them are absolutely vital for the security of our nation.”

One way the US Special Operations Forces excel, Thornberry noted, is its ability to work with other security forces.

“We will also be examining ways to help strengthen that capability because obviously we will be doing more of that in the future,” he said.

Thornberry, who pushed through many acquisition reform policies in his first year as HASC chairman, said he would build upon his efforts in acquisition reform this year.

The plan, he said, is to introduce a stand-alone bill on reform, most likely in late March. Following the release of the bill, feedback will be solicited and comments will be taken into account, according to Thornberry. Then the reform provisions will be folded into the fiscal 2017 defense authorization bill.

“One goal I have this year is to encourage more experimentation and prototyping,” Thornberry added.  Experimentation is at the heart of all successful military innovations, he said.

Fostering more experimentation will help ensure that technology is mature before the start of production thus reducing the odds of running over budget during a program of record to try to get the technology right, which can often end in a canceled program.

Thornberry acknowledged that today it’s hard to get money for experimentation without it being attached to a program of record.

“Programs of record seems to be sacrosanct because once they get started they hardly ever get stopped. I want to look for ways to foster experimentation and  prototyping both in developing technology and in their application and ensure that only mature technology goes into production,” he said.

“To do that a cultural shift is needed not only at DoD but within Congress. We have to accept regular small failures in order to have greater successes.”

 

 

 

 

POTUS in 2016, No Lame Duck, Cure Cancer?

What about what Barack Obama said at the 2015 State of the Union? Fact checking:

#LastSOTU FACT CHECK: A Disastrous Foreign PolicyJanuary 12, 2016|Speaker Ryan Press Office

State of the Union: President Obama pushes for cancer cure

 CBS: |In his final State of the Union address, President Obama announced a new national effort to find a cure for cancer and put Vice President Joe Biden, who lost his son to the disease, “in charge of Mission Control.”

State of the Union 2016 ~ Mr. Speaker, Mr. Vice President, Members of Congress, my fellow Americans:

Tonight marks the eighth year I’ve come here to report on the State of the Union. And for this final one, I’m going to try to make it shorter. I know some of you are antsy to get back to Iowa.

I also understand that because it’s an election season, expectations for what we’ll achieve this year are low. Still, Mr. Speaker, I appreciate the constructive approach you and the other leaders took at the end of last year to pass a budget and make tax cuts permanent for working families. So I hope we can work together this year on bipartisan priorities like criminal justice reform, and helping people who are battling prescription drug abuse. We just might surprise the cynics again.

But tonight, I want to go easy on the traditional list of proposals for the year ahead. Don’t worry, I’ve got plenty, from helping students learn to write computer code to personalizing medical treatments for patients. And I’ll keep pushing for progress on the work that still needs doing. Fixing a broken immigration system. Protecting our kids from gun violence. Equal pay for equal work, paid leave, raising the minimum wage. All these things still matter to hardworking families; they are still the right thing to do; and I will not let up until they get done.

Who attended as the First Lady, Michelle Obama’s guests? Click here to find out. The DNC Chairwoman, Debbie Wasserman Schultz instructed several in Congress to bring a Muslim along as a guest and they did. A few of them were associated with terrorism.

The we have retired Army Colonel Allen West as he wrote his summary on the SOTU.

Townhall:  My assessment is that Obama spoke much about nothing that is pertinent to where we find ourselves today in America. His defined policy objectives were criminal justice reform, heroin abuse, our immigration system (meaning amnesty for illegals), gun violence, equal pay, paid leave, and raising the minimum wage.

President Obama talked about giving everyone a “fair shot” at opportunity in a new economy. First of all, who defines what a “fair shot” is? It appears that this is just more coded language for government-guaranteed equality of outcomes. The “every kid gets a trophy mentality” is not what America is about. That ideology is what gave us Carter’s Community Reinvestment Act, and eventually, the financial crisis and meltdown. Government decided that it was their mandate to give a “fair shot” to everyone who wanted to buy a home, and it did not end well. Government works best when it creates the policies that advance individual sovereignty so individuals may pursue their own defined dreams, the pursuit of happiness. Anything else, as we have seen and as President Obama champions, is antithetical to who we are.

Somehow, President Obama failed to address the 40-year low workforce participation rate and the fact that more Americans have been dropped from the workforce under his “fair shot” policies. Obama said nothing about a national debt that threatens the future of America. The poverty and food stamp rolls have exploded in these past seven years. That is not the best of America. It is certainly not the best that we can do. We must grow this economy and we can do so, along with reforming government spending, and eliminating crony capitalism and corporate welfare.

Obama’s vision of the future is centered on an ideological agenda that puts in peril the hopes and aspirations of our children and grandchildren. They will have less economic freedom and certainly less liberty if the Islamic terrorists prevail.

I have additional concerns from President Obama’s final SOTU address. First of all, if our military was so very strong then why did we have 10 U.S. Navy Sailors detained by the Iranians because the engines on two riverine assault boats malfunctioned? That makes no real sense to me. Nor have we taken care of our Veterans. I wear a ring on my salute hand trigger finger to remind me about the 22 Veterans a day who are committing suicide in America. While we know there are problems in our VA system, no major reform has been made and many perpetrators of this heinous wrong still hold their positions.

Obama said nothing about the Taliban’s resurgence and their hold on more territory than any time since 2001. It was just last week that the Taliban had an American Special Forces team trapped in Helmand province, yet Obama cannot bring himself to refer to this as “combat.” Obama’s own former acting CIA Director Mike Morrell testified Tuesday during a House Armed Services Committee that ISIS affiliations have grown far more Al Qaeda’s and that they comprise a legitimate strategic threat to the world and our homeland. There was no mention of ISIS’ most recent attacks in Baghdad and Istanbul. Again, Obama just could not bring himself to say Islamic terrorists or jihadists. In Obama’s mind, they are just “killers and fanatics,” and shutting down GITMO will reduce their recruiting efforts. No, Mr. President, your fecklessness and exhibited weakness emboldens ISIS and their allies which are growing from Boko Haram in Nigeria to Abu Sayyaf in the Philippines. Obama asked for Congress to vote on an Authorization for Use of Military Force (AUMF) but first we need a strategic plan to defeat ISIS. He could have articulated that but chose more lofty rhetoric and lecturing instead.

Russia has expanded and is in Crimea, Ukraine and Syria. China is building manmade islands by destroying reef systems and landing planes on these islands. Where are the environmentalists? China is also about to open up its first military base in Africa in Djibouti, as we have announced we are departing. The Iranian nuclear deal is a failure and has only served to empower and fund the number one state sponsor of Islamic terrorism. Iran is now exploiting their new-found strength and becoming a regional hegemony. Hence, the very open schism between Iran and Saudi Arabia.

President Obama talks about “protecting the American people” yet we had the biggest Islamic terrorist attack since 9-11 on his watch, San Bernardino. Before that it was Ft. Hood. And in the U.S., the enemy attacks our men and women in uniform with impunity, such as at the Naval Reserve Support Facility in Chattanooga. In the last week, we have arrested former refugee ISIS supporters in Sacramento and Houston. And who can forget the video of the horrific attempt to assassinate Philadelphia Police Officer Hartnett by an admitted Islamic jihadist. The American people are kind and willing to open up our arms to embrace those fleeing persecution, such as the Assyrians, Chaldeans, Coptics, and Yazidis, but those were not mentioned by President Obama. What the American people will not allow is what is happening in Germany and the rest of Europe. We will not allow a war on our women, as we are seeing there due to a clash of civilizational values, principles, and morals.

I can only wish that President Obama saw the enemy for who it is, and not the ideologically driven “threat” of climate change. Please read his entire response here.

The Islamic State vs. al-Qaeda

The Islamic State vs. al-Qaeda: The War within the Jihadist Movement

WotR: The post-Arab Spring period has seen extraordinary growth in the global jihadist movement. In addition to the Islamic State seizing a vast swathe of territory spanning Syria and Iraq and al-Qaeda establishing itself as a potent military force in the Syrian civil war, instability and unfulfilled expectations in numerous countries — including Egypt, Libya, Mali, Tunisia, and Yemen — have presented jihadists with unprecedented opportunities.

But even as the jihadist movement experiences rapid growth, it has also endured unprecedented internal turmoil. The Islamic State’s emergence marks the first time that leadership over the global jihadist movement has been seriously contested. Since that group’s expulsion from the al-Qaeda network in February 2014, a fierce competition between the Islamic State and al-Qaeda has defined the militant landscape. The United States has an opportunity to exploit and aggravate fissures within the jihadist community, but to do so successfully, it is essential to understand the differences in the modus operandi of these two rival jihadist groups.

Two Models of Revolutionary Warfare

Though al-Qaeda and the Islamic State share the same ultimate goal — establishing a global caliphate ruled by an austere version of sharia (Islamic law) — each group maintains a distinct approach to revolutionary warfare. Al-Qaeda has come to favor covert expansion, unacknowledged affiliates, and a relatively quiet organizational strategy designed to carefully build a larger base of support before engaging in open warfare with its foes. By contrast, the Islamic State believes that the time for a broader military confrontation has already arrived, and has loudly disseminated its propaganda to rally as many soldiers as possible to its cause. The group combines shocking violence with an effective propaganda apparatus in an effort to quickly build its base of support.

The Maoist and focoist schools of revolutionary thought provide a useful framework for understanding these groups’ differing strategies. Al-Qaeda exhibits a revolutionary strategy that is both implicitly and explicitly based on the works of Mao Tse-tung, while the Islamic State’s approach is more consonant with the focoist writings of Ernesto “Che” Guevara and Régis Debray.

Interestingly, in 2010 Kenneth Payne published an article in Studies in Conflict & Terrorism arguing that al-Qaeda’s strategy was focoist in nature, based on a review of the group’s strategic literature and operations. Though al-Qaeda has exhibited both Maoist and focoist strands of thought, the fact that Payne’s argument was published in 2010 is significant: He wrote just on the cusp of the “Arab Spring” revolutions, which, as this article details, provided al-Qaeda the opportunity to make its Maoist-style turn that focused on the population more apparent. Ryan Evans’s argument, which was published in the CTC Sentinel the same year as Payne’s piece, has held up better over time. Evans discerned a shift in strategy between the efforts of al-Qaeda in Iraq (AQI) and the later campaign of al-Qaeda in the Arabian Peninsula (AQAP), and argued that AQAP’s more population-centric approach was forged by the group’s failures in Iraq. He noted that the shift in strategy in Yemen may herald “a larger turn for al-Qaeda globally toward a more Maoist attitude.”

Mao’s theory of revolution is rooted in the primacy of politics over warfare. In Mao’s view, a steadfast political foundation is necessary to allow guerrilla forces to create bases for logistics and operations and slowly build strength and momentum for the final conventional stage of warfare. Thus, according to Mao, before guerilla forces can initiate military action, they must first focus on “arousing and organizing the people,” and “achieving internal unification politically.” This stage is followed seamlessly by a stage of progressive expansion, followed by a third and final stage of decision — the destruction of the enemy.

Maoist revolutionaries continue to emphasize the political stage of organization and consolidation even as they pursue progressive expansion. Consistent with Maoist theory, al-Qaeda and its affiliates have focused on maintaining and expanding the group’s political support. Even in areas where al-Qaeda has engaged in open warfare, it has been somewhat restrained in its approach to civilian populations since the initiation of AQAP’s campaign in 2009 that Ryan Evans noted was a departure from the group’s Iraq model of insurgency. Thereafter, the group has adopted a phased implementation of its hardline version of sharia where it enjoys control or significant influence. The only one of al-Qaeda’s branches that explicitly did not fit this new model was AQI, which later was expelled from al-Qaeda’s network and adopted the new moniker of the Islamic State. (Al-Qaeda’s approach toward civilian populations can only be considered “restrained” in very relative terms, juxtaposed with the more oppressive and publicly violent tactics of the Islamic State, and al-Qaeda’s own previous approach.) Al-Qaeda’s adherence to a largely Maoist framework was shaped by its experience of being hunted by the United States and its allies for a decade and a half, and — as Evans argued — particularly by the defeat of its Iraqi affiliate. Al-Qaeda’s use of Maoist strategy is designed to be low-risk and to yield long-term results.

The focoist approach to revolutionary war contrasts sharply with the Maoist approach. First used successfully in Cuba in the early 1950s, focoism holds that the political foundation necessary for revolution can be crafted through violence. Guevara essentially flipped Mao’s theory by arguing that the use of violence against the state would inspire the peasants to rise up. Unlike Mao’s strategy, focoism accepts great risks in order to inspire support. The Islamic State has in many ways followed the focoist model; it believes in the power of violence to forge the political opinions of the Muslim masses. The Islamic State views al-Qaeda’s more deliberate approach as too slow. It appears happy to win today and lose tomorrow, as long as today’s win creates a large enough subject for propaganda.

This framework of Maoist versus focoist models of revolutionary warfare should not be seen as a complete explanation for either al-Qaeda or the Islamic State’s behavior. Neither group is perfectly Maoist or focoist, but using these models provides a useful paradigm for interpreting the strategic competition between the groups.

Al-Qaeda’s Population-Centric Approach

Al-Qaeda has taken advantage of two major opportunities driven by the unsuccessful revolution in Syria and the successful revolutions in Tunisia, Egypt, and Libya. The first opportunity is that the regional upheaval created a growth environment for jihadism, and al-Qaeda has established a significant presence in places where it had previously been suppressed. The second opportunity is that as al-Qaeda expanded into new areas, it perceived an opening to repair its global image that had been badly damaged by AQI. Al-Qaeda has implemented a population-centric approach to increase its base of popular support by employing gradualism and cooperation with local actors. Al-Qaeda has also made use of popular front groups in its expansion. This is intended to reduce the organization’s exposure to counterinsurgent forces, including the United States and the Middle East’s Sunni regimes, and to avoid frightening or alienating local populations.

Popular support has become essential to al-Qaeda. While the group once conceptualized itself as exclusively a vanguard movement, it has come to view itself in recent years as a popular movement that needs the support or acquiescence of the populace. This transformation had begun prior to the Arab Spring. In 2005, then al-Qaeda deputy emir Ayman al-Zawahiri explained in a letter to Abu Musab al-Zarqawi, AQI’s reckless emir, that “the strongest weapon which the mujahedeen enjoy … is popular support from the Muslim masses in Iraq, and the surrounding Muslim countries. So, we must maintain this support as best we can, and we should strive to increase it.” As previously noted, AQAP’s approach in its first year of operations reflected this paradigm. But the transformation of al-Qaeda into a more broad-based movement was supercharged by the Arab Spring, which provided a critical opening for jihadism.

In the wake of those revolutions, al-Qaeda’s senior leadership pushed hard to regain the trust and support of local populations and avoid the mistakes that marred AQI’s Iraq campaign. In an undated letter that al-Qaeda’s masul aqalim (head of regions) Atiyah Abd al-Rahman wrote to Nasir al-Wuhayshi, AQAP’s emir, he noted that “the people’s support to the mujahedin is as important as the water for fish,” referencing Mao’s famous adage that “the guerrilla must move amongst the people as a fish swims in the sea.” Wuhayshi in turn transmitted a similar message to the leadership of al-Qaeda in the Islamic Maghreb, illustrating al-Qaeda’s coordinated efforts.

The most significant example of these changes came in September 2013, when Zawahiri, who became al-Qaeda’s emir following Osama bin Laden’s death in May 2011, released a document entitled “General Guidelines for Jihad” that made public al-Qaeda’s new population-centric approach. Zawahiri instructed affiliates to avoid conflict with Middle Eastern governments when possible, asserting that conflict with local regimes would distract from efforts to build bases of support. Zawahiri also instructed affiliates to minimize violent conflict with Shia and non-Muslim populations, and to abstain from attacks that could result in Muslim civilian casualties. Consonant with these changes to al-Qaeda’s operations, the organization has also launched a “rebranding” campaign (a subject we have addressed previously at War on the Rocks) designed to present the group as a more reasonable — and perhaps controllable — alternative to the Islamic State, and as a potential bulwark against Iranian encroachment.

Al-Qaeda’s strategy of covert expansion — its use of front groups and its embrace of a relatively low-key public profile — is another critical element in the group’s post-Arab Spring approach. In a letter recovered from his Abbottabad compound, bin Laden explained the rationale for preferring a low profile. He noted that when a branch’s affiliation with al-Qaeda “becomes declared and out in the open,” the group’s enemies escalate their attacks on it.

Al-Qaeda’s efforts in Tunisia exemplified its early post-Arab Spring strategy. Its expansion was spearheaded by a front organization called Ansar al-Sharia in Tunisia (AST). Several high-profile salafi jihadists who had been released from prison when the regime of dictator Zine El Abidine Ben Ali was overthrown established the group. AST initially focused its resources on dawa (evangelism) by organizing dawa events, holding public protests, and dominating physical spaces near places of worship. AST also provided services, including food, clothing, and medical care, to impoverished communities, and developed a social media apparatus to publicize its dawa activities.

AST’s emphasis on dawa was characteristic of al-Qaeda’s early post-Arab Spring strategy. The group’s ideologues understood that they would have unprecedented opportunities to disseminate salafi jihadist ideology to the public. While the old dictators placed strict restrictions on religious expression, strategists foresaw fewer restrictions in post-autocratic environments. This strategic logic was expressed by Atiyah, who in February 2011 exhorted jihadists in post-revolutionary states to “spring into action and initiate or increase their preaching, education, reformation and revitalization in light of the freedom and opportunities now available in this post revolution era.”

As AST’s dawa gained traction, the group also began to engage in hisba violence targeting those who violated salafist religious norms. AST was initially methodical in its use of violence, striking targets such as prostitutes and establishments that served alcohol — which would be widely considered acceptable by those inclined toward religious fundamentalism. Moreover, AST refrained from claiming responsibility for these hisba attacks, creating the perception that this violence was organic to the Tunisian people. Through this approach, AST ensured that its use of violence did not cross a line that would provoke a government crackdown.

As it became more entrenched, AST eventually embraced jihadist violence, first facilitating Tunisians’ travel to foreign battlefields like Syria, Libya and Mali before eventually turning its guns against the Tunisian state. AST members were implicated in the 2013 assassinations of secularist politicians Chokri Belaïd and Mohammed Brahmi. Less than a week after Brahmi’s July 2013 death, a jihadist ambush in Jebel el-Chaambi killed eight Tunisian soldiers, five of whom had their throats slit. These bloody incidents constituted a point of no return, and in August 2013 the government designated AST a terrorist organization and cracked down on the group.

It is not clear that AST’s leadership wanted the group’s violence to escalate so quickly. Indeed, it seems the group had not progressed far enough through Mao’s stages of revolutionary warfare by July 2013 to justify the initiation of open warfare. AST gave its local branches considerable autonomy, which may have contributed to violence escalating faster than the leadership wanted or anticipated. Despite this, al-Qaeda’s blueprint for Tunisia nonetheless demonstrates how its plans for the post-Arab Spring environment followed Maoist insurgent principles.

The Islamic State’s Bold, Boisterous Growth Model

The Islamic State’s strategy for supplanting al-Qaeda centers on two techniques. First, the group sought to portray al-Qaeda’s slower and more deliberate strategy as weakness and indecisiveness. Second, the Islamic State appealed to al-Qaeda’s affiliates by emphasizing its momentum and expansion with the aim of poaching groups, members, and potential recruits. In essence, the Islamic State’s approach is the opposite of al-Qaeda’s: While al-Qaeda has sought to minimize the amount of attention it receives in order to reduce its exposure to counterinsurgents, the Islamic State constantly seeks the spotlight, and touts its victories (real or invented) at every opportunity. The Islamic State is trying to transform al-Qaeda’s strategic methods into weaknesses.

One way the Islamic State has tried to distinguish itself from al-Qaeda is its approach to governance, particularly its implementation of sharia. The Islamic State’s ability to impose governance where it enjoys military power is essential to the caliphate’s legitimacy. Following its capture of territory in Iraq and Syria, the organization quickly set up governance structures and showcased its efforts to provide social services to local populations. Rather than building public support prior to fully enforcing its austere version of sharia, the Islamic State quickly implemented hudud punishments (sharia-prescribed corporal punishment). As such, coercive violence is a major component of the Islamic State’s governance. The organization has thrown people suspected of being gay off of roofs, beheaded those it deems traitors or apostates, cut off the hands of thieves, and stoned to death women accused of adultery.

By contrast, al-Qaeda and its affiliates have chosen a slower, more methodical imposition of sharia. The group’s guidelines emphasize a somewhat pragmatic approach aimed at winning over the population. Al-Qaeda leaders have instructed affiliates to tailor the implementation of sharia to local conditions, taking into consideration local customs and religious practices, and to implement sharia flexibly in its initial phases, forgiving minor transgressions during that period. Al-Qaeda’s gradualist approach has been on display in Syria, where its affiliate Jabhat al-Nusra has repealed bans on cigarette smoking, and has made public displays of punishing fighters who unjustly harm local residents. This approach should not be mistaken for moderation on Nusra’s part — there are compelling reports of the group’s continuing extremism, especially in its treatment of religious minorities — but Nusra has done a masterful job of concealing its atrocities and maintaining its local image as a populist entity.

Al-Qaeda’s population-centric approach has been a major target of derision for the Islamic State, which accuses al-Qaeda of abandoning true Islamic principles by giving “preference to popularity and rationalization.”

Overt and Covert Expansion

Military strategy is another area where the Islamic State and al-Qaeda differ. The Islamic State employs an aggressive approach to territorial conquest. The group’s willingness to employ force-on-force warfare enabled it to take major territory quickly: Overall, this tactic has borne fruit for the organization, but has also increased the Islamic State’s rate of attrition. As the Islamic State has experienced military setbacks, it has moved toward greater use of irregular warfare, a strategic shift that illustrates the group’s capacity for adaptation.

The Islamic State’s hybrid warfare strategy does not necessarily distinguish it from al-Qaeda, which has employed similar tactics in some theaters. What makes the Islamic State unique is the way it showcases its military operations, using virtually all of them as propaganda pieces. While one function of the Islamic State’s military actions is to showcase the group’s strength, al-Qaeda has systematically sought to conceal the size of its network and downplay its capabilities. The group has masked its involvement in emerging theatres of conflict and established covert relationships with unacknowledged affiliate organizations like AST.

Consequently, many analysts underestimate al-Qaeda’s strength, and counterinsurgent forces have allowed al-Qaeda front groups to thrive in some theaters. Concealing affiliates’ relationships with al-Qaeda allows these groups to gain public support and attract resources from individuals and entities that might otherwise be wary of assisting an overt al-Qaeda entity.

Al-Qaeda’s military approach and preference for more covert activities is shaped by its patient worldview. Ostentatious, tactical victories that expose the network to attack and undermine its long-term prospects are of little value to the organization from a strategic perspective. In an article published in al-Qaeda’s online magazine Resurgence, jihadist strategist Abu Ubaydah al-Maqdisi explained the rationale behind this policy of restraint:

A guerilla force may possess the capacity of inflicting huge blows on the enemy, but it may be better for it to restrain from doing so in situations when the reaction of the enemy may be overwhelming.

Essentially, al-Qaeda’s senior leadership wants the organization to slowly develop its capabilities and resources in preparation for a longer campaign. At the same time, al-Qaeda leadership instructs its affiliates to begin destabilizing state regimes. This two-pronged strategy of enhancing its capabilities and destabilizing enemy regimes positions al-Qaeda to capitalize on state weakness and collapse in the long term.

A New Jihadist Era

The Islamic State’s rise has reshaped the global jihadist landscape, which for nearly two decades was dominated by al-Qaeda. With the Islamic State seizing the world’s attention, the age of unipolarity within the jihadist movement is over, replaced by intense internal conflict. Each group is firm in the belief that its organizational model is superior to that of its opponent.

The transnational jihadist movement is likely to be shaped in the coming years by this competition. It is essential that the United States understand the two groups’ strategies and pay close attention as their approaches continue to evolve. The United States has tremendous opportunities to exploit the cleavages between the Islamic State and al-Qaeda. But if we fail to understand the two organizations’ strengths, weaknesses, and strategic and tactical postures, the jihadist movement may emerge from this period of competition stronger than before.

Daveed Gartenstein-Ross is a senior fellow at the Foundation for Defense of Democracies (FDD) and the chief executive officer of Valens Global, a consulting firm that focuses on violent non-state actors. Nathaniel Barr is the research manager at Valens Global, where Bridget Moreng is an analyst. This article was adapted from their report (co-authored with War on the Rocks senior editor Jason Fritz) Islamic State vs. Al-Qaeda: Strategic Dimensions of a Patricidal Conflict, which was published by the New America Foundation in December 2015.

Hagel: Obama Squandered 5 Years, ISIS Prevails

It was always after a top ranking administration official leaves their post that larger truths are told. There was no love loss between the White House and the Pentagon when it came to previous defense secretaries under Barack Obama and this is especially the case with regard to former Secretary Chuck Hagel. It appears most of the division was born out of Hagel slowing walking approvals on transfers of Gitmo detainees. Yet there is more, where Hagel’s true message is to the next president: “Listen to the military”, which fundamentally says the Obama administration DID have real disdain for military leadership.

DefenseNews: WASHINGTON — Former Secretary of Defense Chuck Hagel said he believes the government of Iraq “squandered” the five-year stretch from 2008 to 2013, paving the way for the rise of the Islamic State group and the chaos of the last two years.

Speaking Monday in Washington, Hagel, who served in that role from 2013 to 2015, also hinted at dissatisfaction with how the Obama administration dealt with the Pentagon during his tenure, indicating that future administrations should lean more on the opinions of the uniformed personnel when weighing foreign policy decisions.

Asked to reflect on the situation in Iraq, Hagel showed disappointment and frustration with what happened once the US President George W. Bush signed a Status of Forces Agreement with Iraq in December 2008, which set off the clock for US forces to leave Iraq in the hands of the local government of Prime Minister Nouri al-Maliki.

“We couldn’t run that government, we should have never tried, couldn’t impose our values,” Hagel said. “But I think the Iraqi leadership of that country so squandered five years, that allowed to happen what happened over the last two years.

“The breakdown in the Sunni-Shia relationship, the breakdown of the Shia-Kurd relationship, [the] prime minister did not fulfill any of the constitutional requirements and the promises he had made to bring Iraq together,” Hagel continued. “I don’t blame all that on him – there were forces that were probably bigger than he was able to deal with – but in my opinion, that’s what happened in Iraq. The five years were squandered, were wasted, and that’s what’s led to so much of the turmoil, the trouble, the chaos, the slaughter and the killing in Iraq today.”

Asked about the legacy of President Barack Obama on the eve of his final State of the Union speech, Hagel demurred, saying it was “nonsense” to judge Obama until years down the road, let alone before his administration has ended.

However, Hagel indicated dissatisfaction with the way the Obama administration has handled the Pentagon.

During the roundtable event hosted by the National Committee on US-China Relations, Hagel urged politicians to lean more on the advice of top DoD officials.

“I would say as someone who has walked on both sides of the street, the political side and the administration side, politicians have to listen more to our military,” Hagel said. “And I don’t mean changing the Constitution. I mean listen to our military. They get it better than most politicians on things like this. And some of the finest statesmen I’ve ever met in my life are in military uniform.”

Asked later what his biggest advice for the next president would be when dealing with the Pacific, Hagel limited his response to one word: “Listen.”

The comments come weeks after Hagel told Foreign Policy magazine that the Pentagon was hamstrung by interference from the Obama White House. Hagel is long-believed to have butted heads with National Security Adviser Susan Rice, something he did not dispel in that interview.

Asked Monday if he felt advice from the Pentagon had been ignored to the detriment of the Obama presidency, Hagel did not change his tune.

“Well, I’ve made some comments on this and I think the comment I made here, I’ll let that stand,” he said.

Your Threat Score, Yup, Yours

The new way police are surveilling you: Calculating your threat ‘score’

While officers raced to a recent 911 call about a man threatening his ex-girlfriend, a police operator in headquarters consulted software that scored the suspect’s potential for violence the way a bank might run a credit report.

The program scoured billions of data points, including arrest reports, property records, commercial databases, deep Web searches and the man’s social- media postings. It calculated his threat level as the highest of three color-coded scores: a bright red warning.

The man had a firearm conviction and gang associations, so out of caution police called a negotiator. The suspect surrendered, and police said the intelligence helped them make the right call — it turned out he had a gun.

As a national debate has played out over mass surveillance by the National Security Agency, a new generation of technology such as the Beware software being used in Fresno has given local law enforcement officers unprecedented power to peer into the lives of citizens.

Police officials say such tools can provide critical information that can help uncover terrorists or thwart mass shootings, ensure the safety of officers and the public, find suspects, and crack open cases. They say that last year’s attacks in Paris and San Bernardino, Calif., have only underscored the need for such measures.

But the powerful systems also have become flash points for civil libertarians and activists, who say they represent a troubling intrusion on privacy, have been deployed with little public oversight and have potential for abuse or error. Some say laws are needed to protect the public.

In many instances, people have been unaware that the police around them are sweeping up information, and that has spawned controversy. Planes outfitted with cameras filmed protests and unrest in Baltimore and Ferguson, Mo. For years, dozens of departments used devices that can hoover up all cellphone data in an area without search warrants. Authorities in Oregon are facing a federal probe after using social media-monitoring software to keep tabs on Black Lives Matter hashtags.

“This is something that’s been building since September 11,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation. “First funding went to the military to develop this technology, and now it has come back to domestic law enforcement. It’s the perfect storm of cheaper and easier-to-use technologies and money from state and federal governments to purchase it.”

Few departments will discuss how — or sometimes if — they are using these tools, but the Fresno police offered a rare glimpse inside a cutting-edge $600,000 nerve center, even as a debate raged in the city over its technology.

An arsenal of high-tech tools

Fresno’s Real Time Crime Center is the type of facility that has become the model for high-tech policing nationwide. Similar centers have opened in New York, Houston and Seattle over the past decade.

Fresno’s futuristic control room, which operates around the clock, sits deep in its headquarters and brings together a handful of technologies that allow the department to see, analyze and respond to incidents as they unfold across this city of more than 500,000 in the San Joaquin Valley.

On a recent Monday afternoon, the center was a hive of activity. The police radio crackled over loudspeakers — “subject armed with steel rod” — as five operators sat behind banks of screens dialing up a wealth of information to help units respond to the more than 1,200 911 calls the department receives every day.

On 57 monitors that cover the walls of the center, operators zoomed and panned an array of roughly 200 police cameras perched across the city. They could dial up 800 more feeds from the city’s schools and traffic cameras, and they soon hope to add 400 more streams from cameras worn on officers’ bodies and from thousands from local businesses that have surveillance systems.

The cameras were only one tool at the ready. Officers could trawl a private database that has recorded more than 2 billion scans of vehicle licenses plates and locations nationwide. If gunshots were fired, a system called ShotSpotter could triangulate the location using microphones strung around the city. Another program, called Media Sonar, crawled social media looking for illicit activity. Police used it to monitor individuals, threats to schools and hashtags related to gangs.

Fresno police said having the ability to access all that information in real time is crucial to solving crimes.

They recently used the cameras to track a robbery suspect as he fled a business and then jumped into a canal to hide. He was quickly apprehended.

The license plate database was instrumental in solving a September murder case, in which police had a description of a suspect’s vehicle and three numbers from the license plate.

But perhaps the most controversial and revealing technology is the threat-scoring software Beware. Fresno is one of the first departments in the nation to test the program.

As officers respond to calls, Beware automatically runs the address. The searches return the names of residents and scans them against a range of publicly available data to generate a color-coded threat level for each person or address: green, yellow or red.

Exactly how Beware calculates threat scores is something that its maker, Intrado, considers a trade secret, so it is unclear how much weight is given to a misdemeanor, felony or threatening comment on Facebook. However, the program flags issues and provides a report to the user.

In promotional materials, Intrado writes that Beware could reveal that the resident of a particular address was a war veteran suffering from post-traumatic stress disorder, had criminal convictions for assault and had posted worrisome messages about his battle experiences on social media. The “big data” that has transformed marketing and other industries has now come to law enforcement.

Fresno Police Chief Jerry Dyer said officers are often working on scant or even inaccurate information when they respond to calls, so Beware and the Real Time Crime Center give them a sense of what may be behind the next door.

“Our officers are expected to know the unknown and see the unseen,” Dyer said. “They are making split-second decisions based on limited facts. The more you can provide in terms of intelligence and video, the more safely you can respond to calls.”

But some in Fresno say the power and the sheer concentration of surveillance in the Real Time Crime Center is troubling. The concerns have been raised elsewhere as well — last year, Oakland city officials scaled back plans for such a center after residents protested, citing privacy concerns.

Rob Nabarro, a Fresno civil rights lawyer, said he is particularly concerned about Beware. He said outsourcing decisions about the threat posed by an individual to software is a problem waiting to happen.

Nabarro said the fact that only Intrado — not the police or the public — knows how Beware tallies its scores is disconcerting. He also worries that the system might mistakenly increase someone’s threat level by misinterpreting innocuous activity on social media, like criticizing the police, and trigger a heavier response by officers.

“It’s a very unrefined, gross technique,” Nabarro said of Beware’s color-coded levels. “A police call is something that can be very dangerous for a citizen.”

Dyer said such concerns are overblown, saying the scores don’t trigger a particular police response. He said operators use them as guides to delve more deeply into someone’s background, looking for information that might be relevant to an officer on scene. He said officers on the street never see the scores.

Still, Nabarro is not the only one worried.

The Fresno City Council called a hearing on Beware in November after constituents raised concerns. Once council member referred to a local media report saying that a woman’s threat level was elevated because she was tweeting about a card game titled “Rage,” which could be a keyword in Beware’s assessment of social media.

Councilman Clinton J. Olivier, a libertarian-leaning Republican, said Beware was like something out of a dystopian science fiction novel and asked Dyer a simple question: “Could you run my threat level now?”

Dyer agreed. The scan returned Olivier as a green, but his home came back as a yellow, possibly because of someone who previously lived at his address, a police official said.

“Even though it’s not me that’s the yellow guy, your officers are going to treat whoever comes out of that house in his boxer shorts as the yellow guy,” Olivier said. “That may not be fair to me.”

He added later: “[Beware] has failed right here with a council member as the example.”

An Intrado representative responded to an interview request seeking more information about how Beware works by sending a short statement. It read in part: “Beware works to quickly provide [officers] with commercially available, public information that may be relevant to the situation and may give them a greater level of awareness.”

Calls for ‘meaningful debate’

Similar debates over police surveillance have been playing out across the country, as new technologies have proliferated and law enforcement use has exploded.

The number of local police departments that employ some type of technological surveillance increased from 20 percent in 1997 to more than 90 percent in 2013, according to the latest information from the Bureau of Justice Statistics. The most common forms of surveillance are cameras and automated license plate readers, but the use of handheld biometric scanners, social media monitoring software, devices that collect cellphone data and drones is increasing.

Locally, the American Civil Liberties Union reports that police in the District, Baltimore, and Montgomery and Fairfax counties have cellphone-data collectors, called cell site simulators or StingRays. D.C. police are also using ShotSpotter and license plate readers.

The surveillance creates vast amounts of data, which is increasingly pooled in local, regional and national databases. The largest such project is the FBI’s $1 billion Next Generation Identification project, which is creating a trove of fingerprints, iris scans, data from facial recognition software and other sources that aid local departments in identifying suspects.

Law enforcement officials say such tools allow them to do more with less, and they have credited the technology with providing breaks in many cases. Virginia State Police found the man who killed a TV news crew during a live broadcast last year after his license plate was captured by a reader.

Cell site simulators, which mimic a cellphone tower and scoop up data on all cellphones in an area, have been instrumental in finding kidnappers, fugitives and people who are suicidal, law enforcement officials said.

But those benefits have sometimes come with a cost to privacy. Law enforcement used cell site simulators for years without getting a judge’s explicit consent. But following criticism by the ACLU and other groups, the Justice Department announced last September that it would require all federal agencies to get a search warrant.

The fact that public discussion of surveillance technologies is occurring after they are in use is backward, said Matt Cagle, an attorney for the ACLU of Northern California.

“We think that whenever these surveillance technologies are on the table, there needs to be a meaningful debate,” Cagle said. “There needs to be safeguards and oversight.”

After the contentious hearing before the Fresno City Council on Beware, Dyer said he now wants to make changes to address residents’ concerns. The police chief said he is working with Intrado to turn off Beware’s color-coded rating system and possibly the social media monitoring.

“There’s a balancing act,” Dyer said.