A freedom of spirit, tempered by thoughtful reflection, is evident in the oeuvre of Lebanese artist couple Joana Hadjithomas and Khalil Joreige. I meet them in Dubai before the vernissage of their gallery show Lebanese Rocket Society and the unveiling of their Art Dubai video installation A Letter Can Always Reach its Destination. Skepticism over the truthfulness of images continues to inform their work, in what they describe as an archaeology of their observations.
Read MoreWomen with Wings | MediaGlobal News
UNITED NATIONS - Walking into the United Nations on International Women’s Day, the positive energy was palpable. A conference on “The Role of Business in Empowering Women” spawned a gathering of a geographically and experientially diverse individuals eager to advance financial inclusion, transparent corporate supply chains, and economic opportunities for women.
Read More“Don’t use the internet as a f***ing condiment”: Net Art at Art Dubai →
DUBAI - At (It’s Not) Net Art 2: Emancipate the Medium!, one panel at Art Dubai’s Global Art Forum, heated debates began over nearly every aspect of the medium, from its formal qualities to its politicization and the notion that it is inherently radical. This argumentativeness is perhaps unsurprising given that the medium lacks a strict definition.
Read MoreArt and Media, Guernica and Tahrir Square: Observations from Art Dubai | Art F City →
This year’s Global Art Forum, an annual discourse on contemporary art under the aegis of Art Dubai, explores the theme “the Medium of the Media”. The event takes place on the rough anniversary of uprisings that spread across the Middle East, making it inevitable that panelists focused on where art fits into a landscape marked by tweets from Tahrir Square and the real-time dissemination of images of Qaddafi's corpse.
Read MoreSustainable Development for the “Energy Poor”
In the theater of environmental preservation, increasing the global poor’s access to energy is usually cast as a necessary evil because it comes at the expense of the environment. Yet, given the direct correlation between adequate access to energy and poverty indicators such as life expectancy, infant mortality, and literacy rates, reducing poverty necessitates connecting the 1.6 billion people currently categorized by the International Energy Agency (IEA) as “energy poor” to some source of power.
Read MoreAfghan Cultural Heritage Spurs Urban Renewal | MediaGlobal News
UNITED NATIONS - Often overlooked amidst this chaos that is Afghanistan is the country's cultural vibrancy, a legacy of its rich ancient civilization at the crossroads of various Greek, Indian, Persian, and central Asian empires. One organization is striving to harness Afghanistan’s artistic traditions in order to spur sustainable development.
Read MoreBusiness Perspective on Sustainable Growth | MediaGlobal News
New York - In just over four months from now heads of state will convene in Brazil for the United Nations Conference on Sustainable Development, called Rio+20 in reference to the city where the first such conference took place 20 years ago. Rio+20 will focus on promoting a green economy in the context of sustainable developmentand poverty eradication and the institutional framework for sustainable development.
Read MoreMaurice Benayoun Occupies Wall Screens
NEW YORK - Enigmatic and in constant flux, human emotions are not easily grasped, let alone quantified. Yet, the French new-media artist Maurice Benayoun endeavors to do precisely that for the sake of opening new ways of thinking about the world. He tracks worldwide emotional trends and catapults them into the spotlight, juxtaposing real human feelings with the monster known as the global financial system. It results in two related artworks, Occupy Wall Screens and Emotion Forecast, presented by Streaming Museum at Big Screen Plaza, a public space located at 851 Avenue of the Americas in Manhattan (on view at Big Screen Plaza through February 29th and permanently at StreamingMuseum.org).
Think of these artworks as the visual embodiment of everything the recent global economic crisis has taught us: unfettered pursuit of financial gain by elite members of society often comes at the expense of human suffering borne disproportionately by the majority with little responsibility for creating the mess. Now we can actually see the emotions this phenomenon is stirring, expressed by Mr. Benayoun as colorful world maps and tickers flashing across a giant LED screen.
“It is my way of offering another perspective, to help people understand what is going on,” explains Mr. Benayoun.
If this sounds familiar in light of the Occupy Movement, you are following Mr. Benayoun’s line of thinking. Inspired by the movement, his Occupy Wall Screens displays in real time the stock valuation readouts of major financial institutions next to emotional currents emanating from Occupy sites around the world. Playing on familiar visual symbols from the financial world such as stock tickers and Bloomberg-style news programs, Occupy Wall Screens portrays the quotidian in a new light.
“For me,” explains Mr. Benayoun, “this is the beginning of something that can extend the actual Occupy Movement to other realms. I encourage people to think more about how to occupy not only this wall screen, but the global media because that is how we can really start to change the world.”
In the same vein, the related artwork Emotion Forecasts relies on a free software program to accumulate data from the web using algorithm searches for sixty-four emotions from 3,213 cities. In other words, it counts how many times people in a certain geographic area use words like “happy” or “fear” on Facebook etc. At the same time every day, the software analyzes a snapshot of the collected data and calculates predictions about how the world will feel over the next two days. Reminiscent of weather forecasts, the data is presented visually by superimposing the emotions, written out in words, and their corresponding figures, over a world map.
While Mr. Benayoun makes no pretense about his works being scientifically accurate, he believes that “the internet is the world’s nervous system and we are the nerve endings.” As such, these exhibitions constitute “symbolic attempts to take the human factor into account.”
These exhibitions present the latest incarnations of the Mechanics of Emotion, Mr. Benayoun’s ongoing series comprising over twenty multimedia artworks that render statistics on human emotions into visual art.
Underlying Mechanics of Emotion is Mr. Benayoun’s notion of critical fusion: blurring the boundaries between fiction and reality in order to “see the world in a more creative way, but also in a more critical way.” In Occupy Wall Screens and Emotions Forecast it is achieved by “juxtaposing quantified emotions with stock values, placing them face to face in one work, which for me is the key to the whole series Mechanics of Emotion. He believes that inserting doses of fiction into reality has the potential to make society more understandable.
Technology is a crucial component of critical fusion, but to Mr. Benayoun it is merely a means to reach a higher plane of understanding rather than an end in itself. He explains, “I rely on technology as a tool that shares images and sounds, putting people in touch. It helps me connect with others and to understand and deal with the world.”
Mr. Benayoun likes to say that if he had the power to dictate changes to the financial system, he would impose a twenty-four hour delay on all trades to allow time for passions to cool enough to let reason dictate the appropriate move. “What is the harm of waiting a little bit to give people time to consider the consequences?” he asks rhetorically. Alas, his influence is unlikely to extend over Wall Street so directly. Nevertheless, his critical fusion – inserting a dose of fiction into a very real social movement stirring new debates on income inequality – has activist undertones.
Does Mr. Benayoun consider himself an activist? “I am an artist using art to act on the world, maybe to help changing it, at least a little bit,” he says, hesitating to use the term “activist” because it can mean just about anything these days. Still, he clearly believes art plays a role in shaping society: “If it is also unconventional, not only in the shape it takes but also in its intention, then art can come close to achieving what the historical activism set out to do.”
Published online by Artlog Magazine February 10, 2012
Humble Museum Aims for Rebirth | The New York Times →
CAIRO - A diamond in the rough, the Egyptian Museum of Modern Art houses works by more than 1,500 Egyptian artists, mostly from the middle and late 20th century, includingthe internationally renowned painters Mahmoud Said and Abdel Hadi Al-Gazzar and the sculptorMahmoud Moukhtar.
Read MoreEmeric Lhuisset: Artist as Barometer?
PARIS - Artists are known for their ability to grasp the currents of ideas, frustrations, and desires flowing through society. Art that reflects on these dominant thoughts and emotions helps the rest of us process what is going on around us and contribute to the public discourse.
So then, might contemporary art sometimes provide political stakeholders and decision-makers valuable insights into the societies they seek to manage?
Émeric Lhuisset thinks so.
Meeting in the courtyard of his alma mater, l’Ecole Nationale Superieure des Beaux Arts de Paris, the 28-year old artist mused over the links between art and geopolitics:
I constantly wonder about the extent to which an artist can make an impact on wars and other important events. I like to think they can help solve conflicts, but I am not convinced. Still, art is powerful. It struck me when the UN covered the tapestry of Picasso’s Guernica when Collin Powell addressed the Security Council seeking authorization for the United States to enter Iraq.
Émeric compares himself to a journalist who tells a story through images instead of words. Through “a mixture of drawing, photography, and investigation,” he explores themes such as conflict and its representation, the boundary between real and virtual, the media, and the idea of controlling individuals. He plays with the codes of the photojournalism because the “ambiguity makes the audience reflect more deeply on what they see.”
For example, he shot the photographic series War Pictures (2010) in formats typically used in reporting, to communicate a sense of urgency vis-à-vis the Afghan war scene. Yet despite depicting “real” soldiers who have actually fought for the Afghan government in scenes resembling the ones recreated in the series, the photographs do not document an actual war. By carefully staging each scene, Émeric transforms the soldier into an actor playing a version of himself. Every detail -- from the lace covering the toy kalashnikov alluding to an old Afghan tradition of decorating pistols, to the compositions that reference battle-scene paintings of the Franco-Prussian war of 1870-71 by Eduard Detaille -- adds layers of ambiguity between real and fake and blurs the lines between reporting and art.
Like a journalist, Émeric researches and analyzes his subject’s historical background and does investigative fieldwork to inform his artwork.
Driven by a desire to “witness places where others dare not go,” such fieldwork has taken him from tribal areas of rural Pakistan, to FARC controlled zones in Colombia, where he eventually earned FARC’s trust enough for them to show him, and even allow him to photograph, their weapon stash. He has also worked in the Brazilian Amazon, Siberia, Cambodia, and Israel/Palestine.
When asked what compels him to return again and again to conflict zones or otherwise troubled areas to pursue his art, Émeric explains that as a child he loved history, geography, sports, and art. “When you mix them all together, you basically get what I do now.” For Émeric, living amidst violent conflict provides an addictive adrenaline rush that unleashes his creativity through its “simultaneous attraction and repulsion.”
Immersing himself in conflict zones also brings Émeric closer to understanding the issues at hand in a given country. Accordingly, he can avoid the common pitfall of “subconsciously looking for images and stories that reinforce preconceived notions about places like Iraq”.
For instance, Émeric spent time in Iraq in 2010 to observe the reconstruction process. There, he was struck by the diffusion of the American lifestyle that began permeating the country in aftermath of the 2003 U.S.-led invasion. This observation led him to think about the consequences of American influence and spawned the photographic series “American suburb” (2010), which exploits viewers’ tendency to perceive images in the context of the familiar. A close examination of the photographs reveals that the newly constructed suburban residential enclave is located not in Texas or Arizona, as the architecture and landscaping might suggest, but within a militarily secured zone in Iraq.
Are the photographs a political statement? Émeric denies any sort of activist agenda. “Ultimately, each viewer draws what she wants from my work according to her beliefs, experience, and ‘personal mythology”.
Jean-Baptiste Chantoiseau draws the same conclusion about Émeric’s work in essay entitled Touched by the Image: Traps and Raptures in the Photographs of Émeric Lhuisset:
The works that emerge from these projects attract attention: they are conceived to emanate an immediate plastic beauty. The lights, contrast, and staging, seduce the viewer at first sight and hide the inner workings of creation that are never exhibited as such. It is therefore necessary to search, to unearth the image in order to read the layouts, rhythms, and compositions that give these works their strength and authenticity. Seduction has a price: these images charm in order to better challenge the viewer, leading him to reflect on his own place and role.
Yet, even without a political agenda, Émeric perceives links between art and geopolitics. Struggling to define that relationship, he grapples with questions such as: Is it conceivable that analysis of contemporary art could shed light on the major geopolitical trends of the future? Can artists play a role as barometers in our societies? What links exist between two disciplines that are similar in certain respects, but that nevertheless seem to ignore one another?
With these questions in mind, he recently launched a collaborative project with the Afghan-American artist Aman Mojadidi, who served as director of culture and heritage at Turquoise Mountain, a non-profit cultural organization in Kabul, where Émeric completed a residency.
The two artists created “Kandahar: Furniture for Belligerents” (2010), which encourages us to reevaluate the meaning of everyday objects. Considering that within certain contexts in Afghanistan, kalashnikovs are banal, carried around with the same indifference that Europeans confer to carrying a mobile phone, the artists thought about how to imbue them with a utility beyond their function as weapons. The result is a line of chairs named after the province of Kandahar (like Ikea names its seating after Swedish provinces), made with technical assistance from the designer Pierre-François Dubois. “After all, Kalashnikovs are heavy and cumbersome,” explains Émeric, and “combatants in a war zone spend 97% of their time waiting around and only 3% fighting, so they need somewhere to sit”. The beauty of the design, at least in the eyes of a combatant, lies in the ease with which he can slide the kalashnikovs out of the chair to employ them on a dime as weapons.
Exhibited by Galerie Zeitgeist at Slick Art Fair in 2010, “Kandahar: Furniture for Belligerents” proved quite amusing for visitors. Yet, while Parisians might perceive irony in the installation, Émeric points out that an Afghan warlord would likely view the chair as a purely functional object. “The fact of being a combatant doesn’t negate one’s need to sit down.”
To test this hypothesis, Émeric and Aman plan to sell the chairs (weapons not included) at the Mandayi bazaar in Kabul. To Émeric’s delight, they have already piqued the interest of Kurdish-Iranian rebels, who he encountered sitting on the ground on a recent visit to Iraq. “I’ve got a solution for you,” he told them, presenting the chair. The rebels’ reacted positively as they watched him demonstrate how to assemble it. “Thank you for thinking of us and our comfort,” they told Émeric, who had not previously considered the project from that perspective. The response struck Émeric as very human, an attribute we rarely associate with combatants, whom we rather demonize or heroize.
Does Émeric ever worry about aiding and abetting one side of the conflict over the other? No. “I’m not selling weapons, but a chair. I don’t care whether it’s used by pro or anti-government combatants or by civilians.”
“Kandahar: Furniture for Belligerents” may raise more questions than it resolves regarding the connection between art and geopolitics, but it nonetheless furthers conversation on the topic. Like all art, at best it enables viewers to derive new meaning from familiar subjects and surroundings and thus stimulates new ideas. As Émeric knows, this is precisely what we need to extract ourselves from seemingly intractable conflicts.
We are reminded by the beautiful book Beyond Babylon: Art, Trade, and Diplomacy in the Second Millennium B.C. (Metropolitan Museum of Art) that civilizations have long been adept at recognizing and exploiting the confluence of the arts, economics, and politics. Yet, this holistic approach has fallen out of favor. Emeric’s oeuvre and philosophy reminds us the symbiosis that exists across disciplines, which has great potential to contribute to problem solving on issues across the board from security to the environment to human rights. Perhaps in the near future cross-disciplinary exchanges, such as the dialogue Emeric advocates between policy makers, scholars, and artists, will reemerge as the norm. This alone won’t end conflict, but it might generate enough new ideas to put us on a better path. Given the dismal results of current standard practices, it certainly seems worth a try.
A version of this article appeared on the Streaming Museum website in December 2010 under the essay series "Art - A Seductive Tool of Diplomacy" and on Mon Figaro a French-language version of this article was published by the winter 2012 edition of Art&.
Refashioning Egypt's Iconic Visual Symbols | The International New York Times →
CAIRO — Mud-brick houses are hardly the first image that comes to mind when one thinks of luxury jewelry, but they are precisely what Azza Fahmy reinterpreted as silver and gold brooches for her debut jewelry collection, “Houses of the Nile,” in the early 1980s. Refashioning the iconic visual symbols of her native Egypt into contemporary jewelry designs has become Ms. Fahmy’s trademark.
Read MoreEMERIC LHUISSET: ARTISTE COMME BAROMÈTRE GÉOPOLITIQUE? →
La relation entre art & géopolitique est au coeur e la réflexion de l'artiste Emeric Lhuisset. Homme de terrain, explorateur, et aventurier, il se joue de tous les défis.
Read MoreShould India Join the NPT as a Nuclear Weapon State?
The Nonproliferation Treaty (NPT) aims to prevent the spread of nuclear weapons. Based on the three pillars of nonproliferation, disarmament, and the right of peaceful use ofnuclear technology, the Treaty has become the cornerstone of the nonproliferation regime. The NPT entered into force in 1970 and has been ratified by 189 states, five of which it recognizes as nuclear weapon states (NWS): United States, Russia, United Kingdom, France, and China. In the interest of international security, it prohibits any state that did not already possess nuclear weapons by 1968 from acquiring them. Yet, India, Israel, and Pakistan—who never signed the NPT—are known to have acquired nuclear weapons since 1968. Meanwhile, North Korea withdrew from the NPT in 2003 to pursue its weapons program and Iran, while in apparent compliance with NPT regulations, is widely believed to be pursuing a clandestine weapons program.
Of these outlier states, India presents a special case because it has voluntarily adhered to many of the NPT’s rules and has proven itself a responsible nuclear weapon state, though is not an NPT signatory. Driven by apprehension of a rising China and tension with Pakistan, India tested its first “peaceful nuclear explosion” in 1974, prompting the U.S. creation of the Nuclear Suppliers Group, which aims to control nuclear technology exports. In 1998, India tested its first nuclear weapon, for which it received punishment from the U.S. in the form of sanctions. India has refused to sign the NPT on the grounds that it is biased in favor of the five recognized NWS, yet has a no-first use policy, follows a doctrine of credible minimal deterrence, and appears to share the NPT’s commitment to nonproliferation. In 2009, India began to hint for the first time that it was open to the possibility of joining the NPT, but under the condition that it do so as a NWS.
India’s change of position follows the 2008 enactment of the U.S.-India Civil Nuclear Cooperation, an agreement granting India the right to buy American dual-use nuclear technology—a privilege normally reserved for NPT parties. In exchange, India agrees to meet the following conditions: allow International Atomic Energy Association (IAEA) inspectors to access its civilian nuclear program and sign an Additional Protocol granting the IAEA the right to conduct more intrusive inspections; continue its moratorium on testing nuclear weapons; enhance the security of its nuclear arsenals; and work toward negotiating a Fissile Material Cut-off Treaty with the U.S. The deal, a dramatic departure from existing U.S. policy not to share nuclear technology with India in accordance with NPT provisions, solidified the strategic partnership between the U.S. and India, serving their mutual interest in countering China’s rise. However, it sparked controversy within United States policy circles because of such issues as the deal’s questionable legality.
Besides the U.S. and India, other major stakeholders in the decision over whether to allow India to accede to the NPT as a NWS include the key regional actors China, Pakistan, and Iran, as well as the four other recognized NWS, whose approval would be required to amend the Treaty. Considering India is already a nuclear-armed power, neither China nor Russia face additional strategic risks from allowing India to join the NPT as NWS. On the contrary, it could even improve their bilateral relations as India’s influence grows. France and the United Kingdom, having signed their own technology sharing deals with India following the U.S. example, are likely to support the decision if the U.S. endorses it. As a state widely suspected of secretly building a nuclear weapons program in defiance of NPT regulations, Iran already presents a conundrum for the U.S., which India’s accession to the NPT risks exacerbating. Such a move potentially plays into Iranian hands, legitimizing their longstanding claims that the international regime is hypocritical and biased against Iran. At the very least, this could further galvanize domestic support for Iran’s nuclear program. Finally, the decision might have adverse consequences with respect to relations with Pakistan, as further described below.
Current U.S. Position
In November 2009 President Obama sponsored United Nations Security Council Resolution 1887 calling for stricter international controls on nuclear weapons proliferation, the universalization of the NPT, and adherence to its norms by non-parties. The resolution targeted Iran and North Korea, yet it also mounts pressure on India to accept placing all of its nuclear facilities under international safeguards (currently India only grants the IAEA access to its civil nuclear facilities). Thus, the resolution is at odds with the U.S.’ tacit recognition of India as a democratic, responsible, nuclear power as implied by the U.S.-India Civil Nuclear Cooperation Agreement. Since reconciling these policies seems unfeasible, the U.S. must choose whether to openly advocate for India’s international recognition as a legitimate NWS or push India to abandon its weapons program in order to join the NPT as a non-nuclear weapons state (NNWS). This decision will likely determine the European and Japanese response to the India question as well.
Policy options
The United States has three major options concerning its policy toward India’s stated desire to accede to the NPT as a NWS. These options present the most viable paths for pursuing U.S. strategic goals, yet all three options risk jeopardizing certain U.S. interests.
Option 1: Endorse India’s move to join as NWS
Legal mechanisms exist to integrate non-signatory states into the NPT in a manner that recognizes their nuclear weapons. Under Article VII of the Treaty, an amendment conference can be called with the support of one-third of the NPT signatories. Politically, however, this would be difficult to carry out as amendments require ratification by national governments, which could be a slow and cumbersome process. Nonetheless, the United States could use its diplomatic influence to garner support for India’s accession and eventually propose an amendment conference.
Pros
Balancing idealism with pragmatism is the best way to further nonproliferation and disarmament. Indisputably, India possesses nuclear weapons. Despite having acquired these weapons illegally, India is widely accepted as a responsible member of the International Community and is currently seeking a greater role in global affairs (as evidenced by its desire to gain a permanent seat on the UN Security Council). Given the threats it perceives from China and Pakistan, it is inconceivable for India to follow South Africa, Brazil, Egypt, and Japan in abandoning its nuclear weapons program. Therefore, convincing India to join the NPT as a NNWS is an unrealistic goal. That leaves the United States with a choice between accepting the facts and letting India join under less-than-ideal conditions or leaving this strategically important partner out of the NPT framework all together. In negotiating the civil nuclear cooperation agreement, the U.S. already assessed that India’s nuclear capabilities do not pose a threat. Furthermore, the agreement already signals tacit support for India to be recognized as a nuclear weapon state. Given this situation, endorsing India as the sixth recognized NWS is the only choice that reinforces the United States’ commitment to the NPT while simultaneously acknowledging that realizing the lofty goals of nonproliferation and disarmament will take patience and compromises. In adopting this approach, the U.S. can make clear that it is ready to work with nuclear states to find pragmatic solutions to proliferation risks and issues of international nuclear oversight. Ultimately this option demonstrates the continued relevance of the NPT and creates a new, more realistic starting point for a moving toward a nuclear weapons-free world, albeit via a tortuous path.
India’s nuclear weapons pose no threat to U.S. interests or to international peace and security. Having proven itself a responsible member of the international community, there is no inherent reason why India should not be recognized as a nuclear weapon state. In accordance with international norms, India has a doctrine of no first-use. In contrast to some recognized NWS that have large nuclear weapon stockpiles, India’s limited arsenal is proportional to its goal of deterrence. Unlike China and Pakistan,India has never attempted to proliferate nuclear weapons. Arguably, the post-1968 date of its nuclear testing, a mere technicality, is the only reason why India is not already the sixth recognized nuclear weapon state.
Adapt the NPT to accommodate responsible nuclear powers, or risk it loosing relevance. As long as India remains outside the NPT framework, there is no guarantee that they will not reverse their present acceptable policies. Only binding NPT regulations ensures that they will continue to respect international norms. Considering U.S. heightened awareness of proliferation risks, regulating nuclear weapon states is more important than ever. Therefore, universalizing the NPT, even if it entails compromising the international prohibition on recognizing additional nuclear weapons states, is the best way to strengthen the nonproliferation and disarmament regime. The NPT is the only existing truly international mechanism for regulating nuclear activity, so it is better to adapt the system to accommodate responsible emerging powers rather than driving such states to operate outside the system. Importantly, opposing India’s desire to join the NPT as a NWS on the basis of Resolution 1887 or narrow national interests will do nothing to strengthen the NPT.[1]
Prevent nuclear commerce between India and a rogue state or non-state actor. The U.S. should ensure that India is bound by the same obligations as other states in the nonproliferation regime in order facilitate its national security priority of keeping nuclear power and knowhow out of the wrong hands.
Cons
Setting a dangerous precedent: what about Israel and Pakistan? If we amend the NPT to accommodate India, surely Israel, who is openly suspicious of its neighbors, and Pakistan, whose intentions are unclear, will demand similar treatment. Given the undergoing regime changes in the Middle East, official recognition of Israel as a nuclear weapon state could derail the burgeoning democratic movements and spark a regional arms race. Similarly, refusing Pakistani demands for recognition as a NWS risks dis-incentivizing the government to cooperate with the U.S. on rooting out the Taliban, stabilizing Afghanistan, and counterterrorism. Likewise, opening the Pakistani market for nuclear technology could further undermine the nonproliferation norm. Additionally, either situation could also drive Iran to withdraw from the NPT in the hopes of rejoining in the future as a NWS. Even among states who have proven themselves responsible on nuclear matters, special treatment for India might give rise to the perception that states outside the framework are treated better than those who purport to follow its rules. As a consequence, Argentina, South Korea, Japan, Brazil and other NNWS capable of producing weapons, might rethink their nuclear policies if they no longer fear negative consequences.
Disturbing delicate power balances. To the discontent of the U.S., China is preparing to build Pakistan two nuclear reactors on the grounds that such a deal differs little from the U.S.-India Civil Nuclear Cooperation Agreement[2]. U.S. advocacy of India becoming a legitimate nuclear weapon state could prompt China to extend its nuclear support to Pakistan as a counter-measure. Therefore, this option risks raising tensions between the U.S. and China at a critical moment in the transition from a unipolar world order dominated by the U.S. to a multipolar international society over which China has increasing influence. In the worst-case scenario it may cause the long-feared arms race between India and Pakistan to materialize, jeopardizing regional stability in South Asia.
Risks eroding NPT norms. The nonproliferation regime was designed to convince states that there is no great value in possessing nuclear weapons. Bending and /or amending the NPT rules to accommodate India undermines the whole treaty, and consequently the whole nonproliferation regime. While the NPT has not completely prevented nuclear weapons proliferation, it has been rather successful in persuading states to respect international norms. It works because it lays out clear rules whose adherence is internationally monitored. While letting India join the club of nuclear states might not pose any intrinsic security threats, accepting its refusal to abandon its nuclear weapons shows weakness. India’s demand to be recognized as a nuclear weapon state proves the regime is failing to dissuade states that it is in their interest to obtain nuclear weapons. In light of the lack of strong enforcement and accountability mechanisms, letting India join the NPT as a NWS could discourage other states from working to reach agreements for the next nuclear review conference in 2015.
Politically improbable. There are various ways to amend the NPT to accommodate India, but each of them presents complexities. One proposal calls for revising the 1968 cut-off date for nuclear weapon state status, yet no consensus has been reached in selecting the new cut-off date. Since India considers its 1974 test a “peaceful nuclear explosion,” the incident does not technically count as a nuclear weapon test. Accordingly, the NPT would have to accept 1998 as the new cut-off date, which would also make Pakistan eligible for accession as a NWS. Even if this were acceptable to the U.S., a majority of all NPT states, including all five nuclear-weapon states and all other parties which are then-members of the IAEA Board of Governors, must approve any amendment to the NPT. It is highly unlikely that the U.S. can persuade the requisite 82 countries (out of 163 parties to the Treaty) to ratify an amendment on India’s behalf. Furthermore, the extension amendment would only apply to the states which actually ratified it, leaving the question of India’s status as a legal NWS less than fully resolved.
Option 2: Pressure India to join as a NNWS
For better or for worse, the NPT is the cornerstone of our current nonproliferation regime and the U.S. should uphold its rules (and therefore only let India join as a NNWS) in the interest of preventing proliferation to new states and non-state actors, which pose grave security risks.
Pros
Security Council Resolution 1887 calls on all parties not signatories of the NPT to accede as non-nuclear weapons states. Universal ratification of the NPT under its current provisions would greatly strengthen its ability to regulate nuclear-related issues. Not only would universalization bring all states within the binding legal framework, it would also symbolize unanimous commitment to nonproliferation and disarmament. Such symbolism would carry a significant moral weight, reinforcing the nonproliferation regime’s legitimacy. As the only state to have ever employed a nuclear weapon, the U.S. should assume leadership on strengthening the NPT. This entails enforcing the existent rules, which currently deny India (and Pakistan and Israel) the possibility to accede to the NPT as anything other than a non-nuclear state. U.S. pressure on Egypt, Brazil, and Argentina convinced them to give up their nuclear weapons so there is reason to believe it could also be effective on India, especially given the leverage over India afforded to the U.S. by their nuclear agreement.
Help India set a positive example. If India abandons its nuclear weapons program,Pakistan might be persuaded to follow suit, since their own program was conceived as a reaction to perceived Indian aggression. This would directly benefit U.S. interests by freeing up more Pakistani attention and resources for use in counterterrorism and management of the Taliban, which would benefit U.S. efforts to stabilize Afghanistan.
Cons
Calling on India again and again to join as a NNWS is not only futile, but counter-productive. Repeated calls for India, Israel, and Pakistan to accede to the NPT as NNWS have proven ineffective. The hollow tradition of simply exhorting these countries to reconsider their position should be replaced with concrete actions to engage these states in nonproliferation and disarmament measures through any means possible. This includes letting them join the NPT under less-than-ideal conditions.
Do not distract attention away from states that pose nuclear threats. Pressuring India to abandon its nuclear weapons program should not be a U.S. priority while it faces far greater risks of nuclear proliferation and insecurity from countries that are defying NPT obligations or operating outside the framework of the treaty in a manner less responsible than India. In other words, it should concentrate on trying to bring the nuclear activity of Iran, Pakistan, and North Korea under international regulation instead of India, whose activity is much less threatening.
Do not be hypocritical. The recognized NWS are sending mixed messages while exhorting India, Israel, and Pakistan to abort their programs even while justifying their own possession of nuclear weapons in terms of security. This hypocrisy undermines the goals of disarmament and nonproliferation and delegitimizes the U.S. as leader of the nonproliferation regime.
Option 3: Maintain status quo
It is naive to expect the desired outcome from either pressuring India to join the NPT as a NNWS or amending the Treaty to allow them to join as a NWS. At the same time, India’s nuclear weapons — whether or not they are officially recognized — do not pose any major threat to U.S. security or regional interests. Therefore, the United States has the option to forego options 1 and 2, effectively maintaining the status quo.
Pros
Focus on the existing strategic partnership. Through initiating a strategic partnership and enacting the U.S.-India Civil Nuclear Cooperation bill, the U.S. is already managing India’s nuclear capabilities. It should use this bilateral framework to ensure that India continues not to pose a threat to U.S. Interests. As victims of major terrorist attacks, India and the United States have a shared interest in succeeding in the fight against al-Qaeda and its operational and ideological affiliates. Neither pressuring India to join the NPT as a NNWS nor expending the diplomatic capital necessary to lobby for India’s right to enjoy the status of a recognized NWS has much effect on these shared interests. In contrast, continued focus on bilateral cooperation does serve these interests while simultaneously strengthening the nonproliferation regime, albeit outside an international framework.
Find alternative ways to bring India into the international nonproliferation regime. There are ways to bring India closer to the NPT by re-conceiving certain aspects of it, short of formally amending it. For example, NPT members could create a special protocol allowing India, Pakistan, and Israel to function as if they were NWS without technically allowing them to join. In this case, they would retain their existing safeguard arrangements. Another option would be to create a new category within the NPT such as “states with nuclear weapons” or states with “advanced nuclear technological capabilities.”[3] Following the precedents set by the IAEA Board of Governors, this category would comprise states who meet certain benchmarks with regards to nonproliferation.[4]
The lesser of all evils. Both of the other two options are outlined above are too risky: Amending the treaty to accommodate India might give rise to pressure from Pakistan and Israel to join. Meanwhile it would appear unfair to NNWS who have obeyed the rules. On the other hand, trying to force India to join as a NNWS might make them less cooperative and induce them to try and push their weapons program underground, which would undermine the NPT in a manner worse than amending it. This would undo decades of U.S. efforts to increase transparency and promote trust on nuclear issues.
Cons
India’s outsider status is one of the main issues that puts the NPT in crisis, so resolving it would go along way in strengthening the Treaty. Attempts to sidestep the issue of whether India should join the NPT as a NWS or a NNWS ignore the elephant in room.India’s nuclear weapons will not vanish on their own nor will the rest of the world easily accept them, so ignoring the situation only risks the problem resurfacing at a later time. Currently, by proposing resolution 1887 openly calling for NPT universalization while selling dual-use technology to India, the U.S. is sending mixed messages about its commitment to the NPT. Leaving these contradictory positions un-reconciled is dangerous. Clearly, nonproliferation is a vital interest for the U.S. so it should do everything possible to strengthen the international norms regulating nuclear activity. In the absence of any viable alternative to the NPT, this requires acting in accordance with NPT obligations as an example for other states to emulate. Maintaining the status quo provides no solution to the problem of needing India to adhere to binding international nuclear regulations. Rather, it simply defers making the necessary decision to a later time. The earlier the U.S. seeks a solution, the sooner it can make progress toward reaching its nonproliferation goals. Decisive action on this matter enhances the perception that the U.S. is capable of working with outlier countries to find mutually agreeable solutions.
Recommendation
The possession of nuclear weapons by non-parties, the inability to profoundly regulate Iran’s nuclear activities, and the fact that North Korea has withdrawn, signal that the NPT is in crisis. In the absence of a viable multilateral alternative to the NPT framework, the United States should strive to make the existing system more effective. Welcoming India into the NPT as a NWS would increase transparency regarding India’s nuclear activities, an important step in assuaging the fears of neighboring Pakistan. Although the counter-argument outlining the risks that India’s accession entails is compelling, it is outweighed by several factors. Firstly, India’s circumstances are truly unique. With its limited nuclear arsenal for deterrence, and exemplary track record of responsible behavior, India is the only non-party who merits NPT admission as a nuclear weapons state. Secondly, if the U.S. were to propose an amendment conference and take pains to explain to the world why this exception makes strategic sense, it would revitalize a stagnant NTP and restore faith in our collective commitment to nonproliferation. “Indian participation in the NPT will not, by itself, eliminate the problems the NPT now confronts, especially those caused by North Korea, Iran, and the potential of nuclear terrorism. But, with India supporting the regime, the world would finally have all nuclear-armed great powers committed to the same rules – an unprecedented convergence that could reinvigorate non-proliferation politics in a manner more meaningful than the distant vision of a world without nuclear weapons.”[5] In the end, India joining the NPT would mark an important step in bringing the world closer to a universal system pragmatic enough to handle the complicated realities while furthering the long-term goals of nonproliferation and disarmament. Accordingly, the United States should openly support India’s efforts to become the sixth officially recognized NWS and facilitate the NPT accession process.
Cairo's Two Nights on the Town | The International New York Times →
CAIRO — While thousands of Egyptians gathered in Tahrir Square last month to demand that the government release the blogger and activist Alaa Abdel Fattah from prison, Cairo’s fashion-forward crowd ventured onto the streets for a different reason: to shop.
Read MoreCounterterrorism Technology: Broadening the Scope of Security Technology
Introduction
Ubiquitous and unpredictable, the threat of a terrorist attack hovers over society like an ominous rain cloud. In the post 9/11 context, a perceived need to actively confront this threat dominates the security discourse in the United States and around the world. Yet, the vastness and amorphous nature of the threat poses great challenges to governments, who bear the primary responsibility for keeping their citizens safe. The problem lies in the potential for virtually anything to become a target. The impossibility of protecting every airport, bridge, water supply center, and other piece of critical infrastructure has given rise to a system of risk management whereby authorities attribute a level of dangerousness to a wide spectrum of potential risks and treat each one accordingly. The idea is to mitigate risk by employing security technologies within new frameworks that seek to manage the underlying uncertainty.
While no universal definition of security technologies exists, the term was introduced in 1978 by the French philosopher Foucault and may be understood as an assemblage[1] of commercially available technologies that seek to predict and preempt possible future risks.[2] Such technologies generally share certain characteristics. For example, they are open, interactive structures, often hybrid, that have multiple uses and integrate easily with technologies from other sectors. The development of security technologies facilitated the shift in focus from locating bombs and other potentially dangerous objects to trying to read peoples’ intentions in order to determine whether or not they pose a risk. In the process, issues of identity, travel documents, the Internet, and other aspects of daily life which previously had nothing to do with the security field have become instrumental to counterterrorism as part of the expanded notion of security. Created in the aftermath of 9/11, the Department of Homeland Security (DHS) embodies this trend. With its mission to “prevent and deter terrorist attacks and protect against…threats…” DHS explicitly draws terrorism into the realm of security where as it had previously fallen under the category of international crime. This gave rise to new global security norms that dramatically altered many aspects of daily life for most people around the world.
Technological advancements opened new possibilities in the realms of surveillance, identity management and border control, which emerged as the key areas of counterterrorism after 9/11. This paper therefore seeks to explore the impact of security technologies on counterterrorism and on society as a whole as the struggle to deal with uncertainty expands the scope of security. Part I describes security technologies as they are employed in counterterrorism, including the role of the Internet in tracing terrorist activity. Part II looks more broadly at new approaches of managing populations and their transnational movements through identity and border management spawned by the trend toward risk management. Finally, Part III assesses the effectiveness of counterterrorism technologies and considers their ethical implications.
Part I: Security technologies employed in the fight against terrorism
Security technologies’ main tasks are to predict and control probable future risks, to manage uncertainty, and to facilitate predictive intelligence. Developed by the United States in the early 1980s, security technologies were initially relics of the Vietnam War redeployed to intercept drug smugglers along the U.S.-Mexican border.[3] Since 9/11 three areas of security have emerged as key aspects of the fight against terrorism: identity management, border management, and predictive intelligence. Each of these comprises assemblages of security technologies, some of which were developed by other sectors. For example, biometrics, DNA, and cameras all “spun in” to the security sector from civilian R&D, while others such as GPS “spun-off” the defense industry to security.[4] In light of security technologies’ multiple uses, rather than focusing on individual technologies, it is helpful to consider them as parts of a multi-layered system.[5]
Surveillance technologies
Historically, only select groups of people, such as prisoners for example, were routinely surveilled. Yet, ever since closed circuit television (CCTV) emerged as a tool for crime prevention in the 1970s, progressively advanced surveillant technologies have become omnipresent. Surveillance technologies include cameras, satellite, facial recognition systems, motion sensors, and border surveillance robots. Today, third generation CCTVs capture the image of an average urban dweller approximately every five minutes.[6] Kevin Haggerty and Richard Ericson explain that increased societal monitoring stems from the convergence of “what were once discrete surveillance systems.”[7] The result is surveillance technologies assemblages. The “assemblage operates by abstracting human bodies from their territorial settings and separating them into a series of flows. These flows are then reassembled into distinct ‘data-doubles,’ which can be scrutinized and targeted for intervention.”[8] For example, facial recognition uses algorithms (automatic step-by-step instructions) to transform an image captured by a surveillance camera (or any other tool) into data that can be matched against digitized facial images stored in a database.[9]Such tools enable security authorities to identify individuals in a crowd as known terrorists and to observe suspicious behavior. Haggerty and Ericson go on to explain that surveillance is expanding rhizomatically (as opposed to hierarchically). In other words, modern societies are constantly surveilled not by an Orwellian “big brother’ figure, but rather by myriad “small brothers”[10] such as the government, private corporations, organizations, and, thanks to social networking, even our Facebook friends.
Drones equipped with surveillance cameras and weapons to carry out reconnaissance and/or targeted killings of suspected terrorists exemplify how surveillance technology can be used in counterterrorism intelligence. For example, in September 2011 a drone targeted and killed Anwar al Awlaki (who inspired the Fort Hood shooter and the Detroit “underwear bomber”) in Yemen. Though highly controversial, this method is increasingly commonplace in the context of the “War on Terror,” blurring the line between surveillance and acts of war. Drones are also used in law enforcement and border management.
Dataveillance and the role of the internet
Dataveillance, as defined by Webster’s New Millenium Dictionary, is “the surveillance of a person’s activities by studying the data trail created by actions such as credit card purchases, mobile phone calls, and internet use.” Tracing internet activity plays an especially important role in counterterrorism. Web harvesting, the process of gathering and organizing unstructured information on the web, allows authorities to rank websites according to their relevance to terrorism and then to use Google’s back-link search tool to discover new terrorist websites. Then, by pairing terrorist websites and analyzing the links between them, authorities can learn about the relations between different known terrorist groups as well as uncover hidden Web communities.[11] Known as link analysis, this process reveals clusters highlighting communication patterns between various actors connected to these terrorist sites.
Data mining
Data mining uses statistical models, algorithms, and cluster analysis to transform information such as credit card purchases, travel history, and internet activity into electronically processed data with the aim of targeting suspects and profiling risks more precisely. Increasingly relied upon by both the public and private sectors, it has also become a tool of counterterrorism, and more specifically of predictive intelligence. In this regard, data mining enables Homeland Security officials to identify factors that are likely to indicate great risk, such as whether the person belongs to an extremist group or has ever bought explosives. By assigning these factors a higher weight than slightly less relevant factors such as the individual-in-question’s travel patterns, or internet activity, a formula can be calculated to predict whether the person is likely to be a terrorist. Data mining, in essence, is a predictive analysis technique that helps authorities deal with uncertainty.
Identification technologies
Given that non-state actors, such as terrorists, have eclipsed state aggressors as the greatest threat to global security, identifying and authenticating individuals as they move across borders has become incredibly important. Consequently, identification technologies such as biometrics, DNA, and semantic behaviorism (so-called ‘soft biometrics‘) have proliferated. Identification technologies are devices or interrelated systems that collect, process, store, compare/match, and disseminate information to identify individuals and authenticate their identity. They rely on computerized databases, contact-less smart cards, and radio-frequency identification (RFID) waves to process the information.[12]
Biometric identifiers are optimal because, “The biometrical representation of the body de-links it from consciousness and subjectivity making it a readable text composed of signs and codes. At the same time it operates like an anatomist or physiologist revealing the possible pathologies that it contains.”[13] As such biometrics have become standard in travel document and other uses such as in gaining access to highly restricted areas or information, replacing traditional passwords and badges. The face has emerged as the preferred biometric identifier for several reasons. Firstly, the face has long been used to identify people unofficially. Moreover, since individuals are required to submit photographs of their face to obtain driver’s licenses, employment and school ID cards, and a myriad of others, it is relatively easy to build a comprehensive database of citizens’ portraits. It has been reported that facial recognition was used to authenticate bin Laden prior to killing him.[14]
Based on the assumption that “the body doesn’t lie,” the International Civil Aviation Organization (ICAO) introduced biometric passports and visas as the second generation interoperable travel documents. They feature a chip storing all relevant passenger information and use facial recognition (fingerprints and/or iris patterns are optional additional biometric identifiers) to authenticate travelers’ citizenship. Biometric passports are believed to be the most secure type of identity documents because they are protected by three layers of security: a digital signature proves the encoded data is genuine and shows which country has issued the passport; Basic Access Control protects against unauthorized readings (“skimming”); and Public Key Infrastructure (PKI) is a digital encryption technology, which shows any change, addition or deletion on the passport chip.[15] Accordingly, biometric passports not only make it more difficult for terrorists to forge their identities, but also facilitate the sharing of real-time information about passengers as they attempt to cross international borders. As such, they enhance international cooperation bestowing confidence in the integrity of travel documents issued by other states.
Part II: Moving toward risk management
The tragic events of 9/11 made clear that risk is inherent in today’s globalized world. A risk-based approach to security recognizes the impossibility of addressing all risks equally. Rather, it understands risk as a function of likelihood (threat or vulnerability) multiplied by consequences, such as the destruction of people, facilities, and financial loss. Accordingly, this approach assess the extent of the risk posed by a possible scenario by using mathematical logic and scientific method to calculate the probability of that scenario becoming real[16] Managing risk involves reallocating security resources more efficiently by focusing more on the risks with the greatest chance of being actualized. Doing so involves assigning a weight to as many potential risks as possible. Thus, not only is the domain of security expanding to include more issues, the way these issues are approached are also undergoing transformation.
Identity management
Until recently, an individual’s identity was considered a personal matter, but in light of the fight against terrorism, it has morphed into a security issue relying on a broad range of technologies. Defined as, “the use of personal information in order to adequately identify an individual who is trying to access your products or services,”[17] identity management is a tool to help individuals protect their personal information from being shared across databases. Yet, while it was initially conceived by Microsoft, the concept of identity management has taken off in the security field and is also used in counterterrorism. This transition began with governments seeking to develop interrelated systems to collect, process, store, match, and disseminate information about individuals. The next phase involved a shift in focus from authentication to identification. In other words, instead of merely verifying the individual is in fact who he or she claims to be, authorities search for individuals in security databases to cross check them against no-fly or no-access lists. Businesses also capitalize on the user-centric nature of identity management, using it to streamline their customers’ online purchasing experience. Thus, for the first time, individuals voluntarily entered into the identity-management system, by, for example, creating password protected profiles at their favorite online stores to store their address and credit card information for more convenient shopping. As a by-product of the gradual shift to identity management, the notion of separating people into a categories of “riskiness” (with respect to security, finances, and other aspects of life) has become a social norm as well as a security one.
With respect to counterterrorism, preventing identity fraud is paramount because a terrorist who successfully poses as someone else may gain access to potentially dangerous information or material with little chance of detection. According to the 2004 9/11 Commission report, at least two of the terrorists entered the U.S. with fraudulent passports. In an effort to prevent something like this from recurring, DHS relies on the identification technologies described in Part I to manage identities. Additionally, DHS collects Passenger Name Record (PNR) data from airlines and runs it through the Automated Target System, which generates a risk assessment score for all passengers.
Border management
Border management is closely linked to identity management. Prompted by 9/11, today’s “smart borders” are understood as zones of activity that facilitate flow of goods and people while filtering out objects or individuals that pose a threat. Borders are no longer tied to a specific geographic area, since U.S. border control authorities “deputized airline agents to inspect documents of U.S. – bound passengers”[18] before they have left their country of origin. The screening process employs technologies ranging from surveillance cameras at airports and along a country’s physical border to biometric passports. In the United States, this task falls to the DHS, who is responsible for increasing transportation and border security, minimizing the risk of future terrorist attacks, and emergency preparedness. The enormity of the task of intercepting terrorists at over 300 ports of entry and along the Canadian and Mexican borders coupled with budget constraints necessitates efficiency. Thus, they rely on border management to balance the competing, but not conflicting, aims of facilitating economic activity with expedited clearance of low-risk people and goods and enhancing security by intercepting risky people or goods before they enter the territory of their destination.[19]
In airport security, the focus on locating “bad” objects by screening baggage is gradually being replaced by a focus on identifying people who warrant additional scrutiny. In January 2005 the DHS launched the U.S.-Visit program, designed as “end-to-end management of processes and data on foreign nationals [coming] to the United States covering their interactions with U.S. officials before they enter, when they enter, while they are in the U.S. and when they exit.”[20] Mandating biometric visas, DHS checks the biometric information of all non-immigrant visitors to the U.S. against watch lists before entry.[21] Many countries have implemented systems that assign their own citizens to a category of risk and treats them and their belongings accordingly. Travelers about whom all relevant information is known are deemed more trustworthy and therefore benefit from an expedited screening process. Not only does this permit authorities to spend less than the $10/person average, it also reduces the “hassle factor” for frequent travelers.[22] At the other end of the spectrum, travelers who are suspected to pose a risk (as determined by a lack of information about them and/or certain questionable behaviors such as buying airline tickets in cash and frequent travel to the Middle East) face additional screenings and their baggage is subjected to the slower, more expensive, yet more accurate machines. Passengers falling somewhere in between these two extreme categories face an average level of scrutiny, costing the average $10 / person, resulting in an experience largely the same as that faced by all international travelers departing from American airports today. Thus, border-management generates new security language and produces typologies of objects according to the calculus of risk.
Predictive intelligence
Historically, intelligence entailed collecting information in secret and analyzing and disseminating that information to decision-makers in order to counter potential threats. Today, sensors, cameras, and communication technologies facilitate information gathering and processing in real-time, which has the concept of intelligence to include business and strategic intelligence, information and data processing. It is a form of knowledge building. This expansion results in a shift toward predictive intelligence, which includes everything mentioned above plus data management and behavioral analysis to anticipate possible terrorist attacks. Since terrorist threats can come from anywhere, rather than focusing on well-defined targets, predictive intelligence relies on data mining to gather information about nearly everyone’s private lives. Ideally, trends and patterns, frequency, and probability provide information to make an intelligent prediction, but when key details are missing, intelligence focuses on risk assessment.[23] Predictive intelligence is essential to counterterrorism because it reduces the chances of being caught by surprise. Its task is not only to collect information, but also to interpret that information correctly in order to warn policymakers in time to react before the attack occurs. This task is extremely difficult and the intelligence community is not always successful, yet predictive intelligence played an integral part in locating and capturing 9/ll mastermind Osama Bin Laden, previously the United States’ most wanted terrorist.
Part III: Assessing the broader impact of counterterrorism technologies
The move toward identity and border management, ICAO norms regulating travel documents, the widespread adoption of biometric identifiers, advances in surveillance technology, and means of tracing online activity were all driven by a belief that these measures enhance society’s security. Arguably, we are more secure today than we were on September 10, 2001, in part because these measures have raised our collective awareness of the threat. Yet, technology offers no panacea for security risks. Problems exist at nearly every level of security technologies from technical errors to philosophical concerns over privacy issues. In the post-9/11 era, all individuals are subject to technological identification and surveillance.
Technological weaknesses and ways to fool the system
Security technologies do not always work as designed. In some cases, technical errors produce mistaken results. For example, machines, occasionally “read” the travel document of someone standing near the person whose identity is supposed to be authenticated. In other cases, the technology works as intended, yet terrorists find ways to fool the system at either the authentication or verification step. Patrick O’Neil, a computer scientist and expert on databases, cites the example of Ahmed Ressam, an Algerian political asylum detained in 1999 at the U.S.-Canadian border with bomb materials and plans to attack the Los Angeles airport. Ressam had obtained a legitimate Canadian passport by providing a false name on a stolen blank birth certificate. (He was only caught because he was acting suspiciously at the border). Even if the passport had included biometric identifiers, the data would have matched perfectly. In other words, Ressam successfully circumvented authentication. Likewise, the effectiveness of the verification step depends on the completeness of reference database. In other words, if the watch list did not include Ressam’s name (and false name) the system could not have caught him. Finally, as any James Bond fan knows, fingerprint replicas (and nowadays also high-quality iris and retinal scans) can fool the biometric system.[24]
Universal access
The main distinction between security and defense technologies is that the former are commercially available, while the later are not. Accordingly, many of the security technologies described above are also available to terrorists, who have become quite adept at using them to their own advantage. Open and universally accessible, the Internet is an incredibly useful tool for “good” and “bad” people alike. The Internet also offers a wealth of information of interest to terrorists from bomb-making to ideological postings inciting violence. Moreover, terrorists use the same tools as DHS (link analysis, encryption techniques etc) to track who is tracking them. Additionally, like many successful businesses and savvy political campaigns, terrorist networks rely on the Internet to gather followers and communicate with adherents. For example, al-Qaeda has grown quite adept at creating a strong online presence through their own websites as well through mainstream social media networks such as Facebook and Twitter. Contrary to an instinctive impulse that warns us to deny terrorists the use of such an important tool, security authorities welcome the online presence of terrorists because they can learn a great deal about them through keeping track of their postings.[25]
Strategic weaknesses
The technolgoization of security has transformed formally disparate security structures into a highly interconnected system. Today, many aspects of security depend on computerized databases that allow information to be shared in real-time. The advantages of this system have been outlined above. Yet, it is equally important to be aware of the risks posed by the centralization of security. First of all, the setup risks a complete system shutdown if any part of it becomes subject to an attack or technical error. O’Neil uses the example of biometrics to highlight the vulnerability of centralized systems, stating “Rather than making the system more secure, this new layer of complexity will in fact construct new possibilities to weaponize the complex system of modern societies.”[26] O’Neil basis his argument on Chalres Perrow’s complex organization theory, which defines organizations comprised of independent parts as linear and those comprised of highly interdependent parts, as complex. Perrow further distinguishes loosely coupled organizations from tightly coupled ones, which are more interconnected. In sum, a tightly coupled complex organization is the most likely target of a terrorist attack, because its high degree of interconnectedness increases its vulnerability to complete system-wide disruption. For terrorists seeking to wreak maximum havoc and instill fear into society, tightly coupled complex organizations such as critical infrastructure, biometric databases, and airport control systems are natural targets. “Even if increased security could prevent attacks on high-value like targets like the Twin Towers, it would run the risk of simply pushing terrorists to softer targets.[27]
Cost
The Department of Homeland Security has spent over $1 trillion dollars since 9/11 to prevent terrorist attacks.[28] According to a new academic paper by John Mueller and Mark Stuart, “to be deemed cost-effective, [the increased expenditures] would have to deter, prevent, foil, or protect against 1,667 otherwise successful Times Square type attacks per year, or more than four per day.”[29] In the wake of the global financial crisis and the United States debt crisis, it is questionable whether such counterterrorism spending can be maintained.
Ethical issues
Concerns over the right to privacy abound because biometric identity documents enable the system to stealthily distinguish between “risky” and “non-risky” people, which goes beyond their explicit purpose of authentication.[30] Likewise, algorithms used by the U.S.-Visit program are likely to invisibly flag a traveler with family in Pakistan and a history of traveling there as risky, which gives rise to concerns over racial, religious, and ethnic profiling.[31] Pervasive surveillance of ordinary citizens also sparks societal malaise. The controversy that recently erupted over news that Apple iPhones have been storing personal information signals the publics’ discomfort with constant surveillance and monitoring, even by private companies. This is also exemplified by U.S. reluctance to adopt the risk-based approach at domestic airports, which stems from the inherent American notion that all citizens are equal and are protected by the constitution from discrimination based on personal history (which is necessary to create a registered traveler program, for example).[32] While all security technologies go through a period of debate during which society gets accustomed to the idea, it remains to be seen just how far the public will accept being surveilled and having their data stored by the government in the name of security and fighting terrorism.
Terrorism truly poses a grave threat, but statistically it kills fewer people annually than car accidents. So how does one justify the dedication of so much of attention and resources, not to mention compromises on civil liberties, to this issue? In reality, only a tiny percentage of those implicated by the security technologies used in counterterrorism pose a risk to society. The vast majority of those surveilled, biometrically identified, and subjected to scrutiny at border crossings are law-abiding citizens who seek to cause no harm. Meanwhile, as security technologies advance, they become progressively silent.[33] As a result, individuals are increasingly oblivious to the fact that they are being tracked. Accordingly, one may wonder whether it is appropriate to gather and store so much information about ordinary people.
Conclusion
Born out of a teleological society whose faith in progress is unshakable, the technologization of security is largely perceived as a positive development. Technology is an incredible tool that changes society profoundly. When applied to security, technology empowers law enforcement and government authorities to assess situations, identify potential risks, and counter threats in ways that were unimaginable only a decade ago. Biometric travel documents and the new concepts of identity and border managements have revolutionized international travel with the goals of preventing identity fraud, enhancing airport security, and filtering out dangerous people and objects, all while facilitating trans-border commerce and travel by low-risk passengers. As we have seen, today surveillance and dataviellance constitute the primary layers of global intelligence systems. However, they are not fool-proof. To deal with the uncertainty that characterizes today’s globalized world, security authorities should accept it, rather than try to reduce it as prescribed by traditional scientific methods. They should focus on building knowledge networks that expand and interconnect rhizomatically. By replacing the traditional concepts of identity and border control with more integrated approaches, we are moving toward a system of risk management. As we learn from past short-sightedness which led to the failure to prevent 9/11, we are struggling to cope with the complexity and ambiguity of contemporary threats. Moving forward, technology will play an increasingly vital part in helping us see through the complexity and ambiguity of these threats and in some cases prevent terrorist attacks from occurring.
Musings on the Anniversary of the Decade
For it isn’t enough to talk about peace. One must believe in it. And it isn’t enough to believe in it. One must work at it.
- Eleanor Roosevelt (1884-1962)
On September 11, 2001a personal tragedy was unfolding in my life, eclipsing the national — or rather global — one that knocked the wind out of everyone around me. I too was shocked and horrified by the acts of terror, yet, having already reached my capacity for absorbing grief, I avoided internalizing these events. College-bound and intent on studying international relations, I strove to process them intellectually instead. I grappled with the fundamental questions that always seem to present themselves during tragedies through courses on security, on political philosophy, and on the state of crisis in which our peaceful, democratic, human rights- championing society finds itself in a post Abu Ghraib world. Indeed throughout my undergraduate and graduate studies, which have filled the better part of the intervening decade, the events of September 11th and their geopolitical implications never strayed far from the center of the conversation.
Over the past week however, some of the more thoughtful commemorative articles, photo-essays, and reflections that currently flood the media have provoked in me an emotional processing of that tragic day. I cried over the attacks for the first time while reading New York Magazine’s dedicated issue, which I find particularly touching precisely because it avoids sentimental editorializing, letting the facts — significant and mundane alike – speak for themselves. Based out of the country as I am, I felt acutely homesick for New York, while simultaneously closer than ever to it.
I’ve never really understood why our society places such high significance on dates – after all, we don’t miss the departed any less on the days that don’t mark an anniversary. Nonetheless, taking a step back occasionally to asses how life has changed, or not, in the aftermath of milestone events can be fruitful. Thus, in so far as they invite contemplation, I appreciate the outpouring of remembrances that swarm the media and blogosphere.
Judging from these commemorations, many of us seem to perceive the decade that has unfolded since al-Qaeda hurled commercial airplanes into the Twin Towers, the Pentagon, and a Pennsylvanian field along a continuum of two dominant narratives: desperation anddemise on one hand and revelation and regeneration on the other. The doomsayers’ case is certainly persuasive in light of the two frightful American-led wars in the Middle East, bloody conflicts in the Democratic Republic of the Congo and in Sudan, rampant religious and sectarian strife in some regions. As if that weren’t bad enough, we’ve also faced a global financial crisis that has pushed many into poverty, dirty politics, repression of civil liberties and human rights by democratic and authoritarian regimes alike, and devastating natural disasters possibly caused by climate change. It is enough to plunge any reasonable person into depression. And, while 9/11 did not set all of these ugly truths into motion, understandably, some see that day as a turning point that irrevocably spoiled the peace and prosperity – or at least the illusion thereof – that we took for granted around the turn of the 21st century.
Still, the other, more positive narrative is a no less accurate account of life after 9/11. As we know, the initial “we’re all in this together” spirit and demonstrative support quickly faded as repeated American policy blunders tried our allies’ patience abroad and fueled partisan bickering at home. But, the sentiment behind Le Monde’s September 12th headline, “Nous sommes tous américains,” still means something in the context of freedom (in the true sense of the word, not as it pertains to fries nor as it is defined by the flag-pin wearing, intolerant among us) versus fear and submission. If it didn’t, how would one explain the phenomenon taking place across Arab countries. To be clear, I am not suggesting that the “Arab Spring” has any direct relationship to September 11th and the events that stemmed from it. Nor am I implying that these developments will necessarily beget positive outcomes. I merely understand it as a sign that the promise of life, liberty, and the pursuit of happiness still resonates with human beings everywhere.
Within the United States, for every account of a loathsome, Islamophobic hate-crime directed at American Muslims, there is a counter-example of interfaith dialogue initiatives and gestures of solidarity. Many courageously refused to let minority extremists taint the image of mainstream, peaceful Islam. Betsy Wiggins from Syracuse, for one, called the local mosque and invited a Muslim woman she did not know over for coffee to start a dialogue in the days after 9/11 (see NYT article). Gestures like these, no matter their size, are significant. So, among the heroes of 9/11 we can count the Betsy Wiggins’ of the world and applaud them for seeking solace through knowledge and dialogue rather than succumbing to the human, but nonetheless dangerous temptation to avenge suffering.
In this yearning to understand, rather than blindly reject “the other” lies the key to digging our way out of the darkness of 9/11. Though still underway, this process has already fueled resilience on every level from personal to global. The goal is not to return to the way things used to be, but to arrive at something better. Wouldn’t that be the best way to ensure that those who perished on that day did not do so in vain?
Far from novel, the notion that respect and tolerance for opposing viewpoints and unfamiliar ideas underlies the spirit of the United Nations. A body assembled from the ashes of the Second World War, it set out prove that no ideology, or thirst for power, or anything else that has historically sparked wars is worth repeating the mistakes of the past. For all the justified criticism of the UN, the fact that it exists at all is remarkable. Even its harshest critics, hailing from the proverbial “non-West” generally clamor to change it from within by attaining a permanent seat on the Security Council, rather than turning their backs on the institution.
How much of a positive impact does the UN have on the world today? It is difficult to asses in part because the answer is quite subjective. Certainly, it has failed at it’s main goal of preventing war and even genocide, has been marred by politics, and is seen by some as ineffective at best, if not counterproductive in its efforts to maintain international peace and security. But, try for a moment to imagine a world without the UN and its well-intended projects and agencies from the Universal Declaration of Human Rights to the World Health Organization. We would certainly be no better off without them. At least the UN has forced the world to acknowledge its worst deficiencies in caring for its people. Indeed, those of us who came of age long after the UN was firmly established take for granted the ideas articulated in its charter, so engrained have they become in our consciousness.
For emphasis, it is worth revisiting the preamble of the charter here:
WE THE PEOPLES OF THE UNITED NATIONS DETERMINED
1. to save succeeding generations from the scourge of war, which twice in our lifetime has brought untold sorrow to mankind, and
2. to reaffirm faith in fundamental human rights, in the dignity and worth of the human person, in the equal rights of men and women and of nations large and small, and
3. to establish conditions under which justice and respect for the obligations arising from treaties and other sources of international law can be maintained, and
4. to promote social progress and better standards of life in larger freedom,
AND FOR THESE ENDS
1. to practice tolerance and live together in peace with one another as good neighbors, and
2. to unite our strength to maintain international peace and security, and
3. to ensure, by the acceptance of principles and the institution of methods, that armed force shall not be used, save in the common interest, and
4. to employ international machinery for the promotion of the economic and social advancement of all peoples,
HAVE RESOLVED TO COMBINE OUR EFFORTS TO ACCOMPLISH THESE AIMS.
How do we accomplish these aims? Through treaties and peacekeeping missions surely. But also by building tolerance through dialogue, the arts, sports – cross-cultural contact of any kind.
Eleanor Roosevelt, an early delegate to the UN General Assembly, one of the key authors of the Universal Declaration of Human rights, and founder of the UN Association of the United States, leaves behind a wealth insight regarding how to recover from a violent past. Among her notable sayings is: “You gain strength, courage, and confidence by every experience in which you really stop to look fear in the face. You must do the thing which you think you cannot do.”
Isn’t that what the rescue workers who risked their lives to help others did? Isn’t that what every New Yorker does each time she gazes at the altered skyline still confident in her city’s future? Isn’t that what we all do when we resolve to contribute to national regeneration?
And so, as we struggle to process the preceding decade, which no one saw coming, we are inevitably sorting through a mixed bag. Of course the bag is mixed. Only a hollywood screenwriter could write us an ending wherein Lady Liberty sails off into the sunset after having vanquished Evil (although the capture of Bin Laden within six months of the 10th anniversary comes rather close in some ways). Likewise, only the darkest fiction writer would dare signify September 11th as the beginning of the end.
Writing in the International Herald Tribune, Edward Rothstein remarked that many of our public remembrances have an apologetic tone or are even characterized by self-blame (see NYT article). Perhaps he is right to suggest that we ought not to feel obliged to conceal our grief and our lingering fears under a stoic facade by shifting the conversation from scary Islamic extremists to regret over all human suffering, regardless of cause. Yet, the White House talking points that Rothstein ridicules for over-prescribing humility with regards to commemorations, set a refreshingly nuanced and thoughtful tone.
September 11th knocked us out of the saddle. We fumbled around a while before we started to regain our footing. Some of our reactions were, in hindsight, self-destructive, steering us further from our desired path. But, the 10th anniversary does not mark the end of the story. Disagreements over how best to move forward still linger. Who knows when we will regain the confidence we need to win the competition against violent hatred. But we can still get back in saddle, if we so choose. Some might even argue we already have. And that, as any equestrian knows, is half the battle.
Published on the Streaming Museum website on September 11, 2011.
Base Commune
Paris June 2011
Base Commune at the Alexis Renard gallery in Paris brings together the graceful artworks of four young graduates of the Lahore National College of Art, whose contemporary creations are rooted in traditional miniature painting.
The exhibition was curated by Mannan Ibrahim Chaudry, the founder of Moulin de l’Est, a Paris-based organization that promotes exchanges between Indo-Pakistani and European artists. The works vary in style, from Isbah Afzal’s delicate watercolor renderings of textiles to the human hair woven into geometric patterns by Rehana Mangi. Reinterpreting the miniaturist tradition through sculpture, Noor Ali Chagani explores the human instinct to enclose themselves in private spaces by building walls out of miniature handmade bricks
Despite the diversity of the works in the show, a distinct aesthetic stemming from the miniaturists’ precision and attention to detail serves as a cohesive thread running through the exhibition. Many of the works consist of ink and watercolors on wasli, a type of paper traditionally used for painting miniatures that was devised in 10th century India. Shades of orange, red, deep pink, and warm brown dominate the artists’ palates.
“It’s not that these colors are traditionally used in miniatures per se,” explained the artist Aisha Abid Hussain, whose works in the show, “Rather, I think the tendency to use warm colors stems from our Asian surroundings where everything is bright. If I lived in Paris, I would probably paint in blue and gray.”
Abid Hussain meticulously transcribes texts taken from her personal diaries in tiny letters to form beautiful abstract forms. Coffee spilled just-so over the wasli adds an organic element to some pieces and exemplifies her enthusiasm for working with various media.
Like all the work on view, Abid Hussain’s is the result of a long thought process and a great deal of patience, but the final product has a spontaneous and even ephemeral feel.