CD Fails Again to Adopt a Program of Work

This is a pretty depressing account of the Conference on Disarmament’s most recent failure, in a long line of failures, to approve a program of work potentially leading to the negotiation of a new fissile material cut-off treaty. As in previous years, Pakistan is the lone holdout. And in a system that requires consensus, one is all that it takes to stop progress in its tracks (I can’t imagine running faculty meetings this way – they’re bad enough operating under a majority voting system! I was in a three-hour-long one on Monday).

I don’t have alot of deep thoughts about the CD, and I welcome others’ views. I do understand the general idea of moving forward only by consensus, in order to include all of the necessary players to make a resultant treaty worth having. But at some point doesn’t it become just patently obvious that some other mechanism needs to be employed to get to a new arms control treaty? It’s been 16 years now since any negotiations were conducted through the CD.

I mean, if treaties were only ever adopted when every country in the world endorsed them, we’d have precious few treaties. That may be desireable to some people, but it doesnt seem a good policy/practice to me. At some point, if a large majority of states can get on board with an agenda of work, it seems to me that it would be prudent to organize a conference outside of the CD forum in order to pursue the agenda. If Pakistan doesn’t sign the resulting treaty, that’s a shame but it shouldn’t be the cause of holding up the entire FMCT program.

And it would perhaps be good to remember that large, multilateral treaties (at least ones with universal obligations, unlike the NPT) tend over time to produce parallel customary international law, which would bind holdouts as well. This has been recognized to have occured in the cases of the 1982 Law of the Sea Convention and the 1969 Vienna Convention on the Law of Treaties, among others. 


ElBaradei Resigns as Egyptian VP

When I woke up this morning, I heard about the violent displacement of pro-Morsy demonstrators in Egypt by the military-led government. I have been opposed to the military coup in Egypt from the beginning, and today the violent crackdown on essentially peaceful protesters who were unwilling to recognize the resulting military-led government, really brought the situation to a new low. It was in that state of mind that I wrote the following Tweet at 10:02 am:

How can ElBaradei, Nobel Peace Prize winner, justify participation in an unlawful military coup turned violent, repressive government?

Mohamed Elbaradei was, of course, the longtime Director General of the IAEA, who was proven correct in his approach to claims about Iraqi WMD, and who generally was a voice for reason, prudence, and the rule of law during his tenure (having previously served as the Director of the IAEA Office of Legal Affairs).  These qualities and achievements led to his being awarded, jointly with the IAEA, the Nobel Peace Prize in 2005. ElBaradei is a man I have long respected.  And the fact that he had joined the interim government in Egypt as Vice President was something about which I was increasingly dismayed.

Imagine my happiness, then, when I heard just a couple of hours later, that ElBaradei had resigned from his government post in protest of the violence against Morsy supporters. In his resignation letter, he said that:

the beneficiaries of what happened today are those who call for violence, terrorism and the most extreme groups . . . As you know, I saw that there were peaceful ways to end this clash in society, there were proposed and acceptable solutions for beginnings that would take us to national consensus . . . It has become difficult for me to continue bearing responsibility for decisions that I do not agree with and whose consequences I fear. I cannot bear the responsibility for one drop of blood.

Now THAT is what I would expect from ElBaradei. Upon hearing the news, at 11:56am I Tweeted:

So glad to see that ElBaradei has resigned in protest of the gov’t’s violent crackdown on protesters!!! Respect restored!!!

I think ElBaradei has shown that his intentions all along were honorable, as is in complete harmony with his long-proven character. I don’t know all of the facts and considerations that led him to accept a post in the interim government, but I’m confident that he acted at all times in good faith, in furtherance of good principles, and in the best interests of the Egyptian people, as he perceived those principles and interests at the time. And now, in nobly standing up for similar good principles, he has fully restored any previously diminished respect that I have for him. I think he has made a powerful statement in today’s resignation – one that will have a significant effect on outside observers’ opinions of the interim government, due to his international stature.  I applaud his actions today, and I think in light of them, the interim government needs to do some serious reflection, and change its course.


New Blog – Atomic Reporters

I wanted to briefly mention the birth of a new blog called Atomic Reporters.  It describes itself as follows:

AR acts as an information broker improving journalistic understanding and coverage of nuclear issues. Policymakers themselves need to be better-informed as does the general public. The future of nuclear weapons, the safety of nuclear power, nuclear security, and concern about the soaring use of ionising radiation in medicine, for example, should be the focus of informed public debate. Better reporting would contribute to a more engaged public and more responsive policy.

I recommend it. It’s already got some very interesting material on it, including a link to a new Wilson Center report on Brazil’s clandestine nuclear program in the 1970’s-1980’s, which likely involved weapons-related activity, and the role China played in assisting this program.  Makes for very interesting reading, and helps to inform our understanding of other similar cases.

On August 6, the blog also covered several topics and then asked the following questions:

How are the Arms Control Lawyers holding up against the Arms Control Wonkers? There’s been something of an insurrection among arms-control theologians. Why are NPT and IAEA-CSA literalists cast as apologists? What lessons might be gleaned from the Brazilian experience of the 1970s to the Iran challenges of today? How does recognition of India as a de facto nuclear-weapons state affect the NPT? What utility would the NPT continue to serve were Pakistan to receive the same dispensation as India?

Those are darn good questions/observations. Especially the one about NPT/IAEA-CSA literalists being cast as apologists. I’d say that observation pretty much sums up my own situation. By insisting on a correct interpretation of these legal sources, according to well established legal principles, I am often cast as an apologist for the countries whose arguments these interpretations happen to support. It seems to be my particular burden to bear.


NSA Disclosures Derail Cyber “Star Wars” Defense Strategy?

In today’s New York Times, David Sanger published an article that the damage caused by Edward Snowden’s disclosures of NSA surveillance might have killed what Sanger calls “the equivalent of a ‘Star Wars’ defense for America’s computer networks, designed to intercept cyber attacks before they could cripple power plants, banks or financial markets.” More specifically:

Under this proposal, the government would latch into the giant “data pipes” that feed the largest Internet service providers in the United States, companies like A.T.&T. and Verizon. The huge volume of traffic that runs through those pipes, particularly e-mails, would be scanned for signs of anything from computer servers known for attacks on the United States or for stealing information from American companies. Other “metadata” would be inspected for evidence of malicious software.

Whether this idea would have matured and proceeded without leaks about NSA surveillance is not clear because opposition within the US government existed:

Top officials of the Department of Homeland Security, which is responsible for domestic defense of the Internet, complained that N.S.A. monitoring would overly militarize America’s approach to defending the Internet, rather than making sure users took the primary responsibility for protecting their systems.

The deputy secretary of defense, Ashton B. Carter, described in speeches over the past year an alternative vision in which the government would step in to defend America’s networks only as a last line of defense. He compares the Pentagon’s proper role in defending cyberattacks to its “Noble Eagle” operation, in which it intercepts aircraft that appear threatening only after efforts by the airlines to identify the passengers and by the Transportation Safety Administration to search passengers and luggage have failed.

The disclosures about NSA surveillance and its scale have, however, altered the nature of discourse in Washington, D.C. about this debate on US cyber defense in ways that make progress in this area, for the near future, potentially very, very difficult.


President Obama Announces Steps to Address Concerns About NSA Surveillance

Today, President Obama outlined steps his administration would take to address the controversial debate taking place concerning NSA surveillance activities disclosed by Edward Snowden. The New York Times reports that:

Mr. Obama announced the creation of a high-level task force of outside intelligence and civil liberties specialists to advise the government about how to balance security and privacy as computer technology makes it possible to gather ever more information about people’s private lives.

The president also threw his administration’s support behind a proposal to change the procedures of the secret court that approves electronic spying under the Foreign Intelligence Surveillance Act in order to make its deliberations more adversarial. The court, created in 1978, was initially envisioned to carry out a limited role of reviewing whether there was sufficient evidence to wiretap someone as a suspected foreign terrorist or spy.
. . .
The Obama administration is also planning to release a previously classified legal analysis explaining why the government believes it is lawful under a provision of the Patriot Act known as Section 215 for the N.S.A. to collect and store logs of every phone call dialed or received in the United States.

At the same time, the N.S.A. was expected to release a paper outlining its role and authorities, officials said. The six- to seven-page document was described as setting up a “foundation” to help people understand the legal framework for its activities. Next week, the agency will open a Web site designed to explain itself better to the public amid Mr. Snowden’s disclosures.

The “previously classified legal analysis” on the government’s interpretation of Section 215 is available now in a document entitled: Administration White Paper: Bulk Collection of Telephony Metadata Under Section 215 of the USA PATRIOT Act (August 9, 2013).

For the argument that the bulk telephony metadata program does not satisfy the requirements of Section 215, see this amicus brief filed with the US Supreme Court today by a group of professors expert in information privacy and surveillance law, a group that includes me. This amicus brief supports the petition filed in July with the Supreme Court by the Electronic Privacy Information Center against the bulk telephony metadata program.

Related to the President’s announcement, the NSA released a document today entitled The National Security Agency: Mission, Authorities, Oversight and Partnerships (August 9, 2013), which, among other things, describes NSA’s authorities to collect intelligence under Executive Order 12333 and the Foreign Intelligence Surveillance Act, including Section 702 of that Act (the legal basis for the PRISM program targeting non-US persons located outside the US).


It’s Baaack! The Biosecurity Controversy Over “Gain-of-Function” Research on Influenza Viruses Returns

On August 7th, a group of influenza scientists published online a letter in Nature in and Science in which they proposed conducting “gain-of-function” (GOF) research on the avian influenza A (H7N9) virus. GOF research is sometimes discussed as “dual use research of concern,” or DURC. I have posted on Arms Control Law, and published elsewhere, on developments in the biosecurity and public health controversy over GOF research on the highly pathogenic avian influenza A (H5N1) virus by Dutch researchers, led by Ron Fouchier from the Erasmus Medical Center, and American scientists, led by Yoshihiro Kawaoka from the University of Wisconsin-Madison. The announcement of the proposed GOF experiments on the H7N9 virus has brought the controversy back into the spotlight.

To recap, “gain-of-function” research involves scientific experiments that alter pathogens in ways that give them features or functions not presently found in the wild. In the H5N1 GOF research that sparked the worldwide controversy from late 2011 until early 2013, researchers manipulated the H5N1 virus so that it achieved transmissibility between mammals–a capability the virus had not readily demonstrated in nature. Generally speaking, an objective of GOF research on influenza viruses is to provide an earlier understanding of how the viruses might mutate in the wild and cause human pandemics, potentially giving scientists and public health experts more time to develop potential responses, such as alerting surveillance systems and preparing vaccine strategies.

Critics of the H5N1 GOF research worried about a number of problems, including whether (1) biosafety conditions in laboratories would be adequate to prevent accidents that could cause outbreaks, and (2) such experiments could threaten biosecurity by providing states, terrorists, or criminals with “blueprints” for making biological weapons. The controversy led to delayed publication of the H5N1 GOF research results, a voluntary moratorium on GOF research, and the development by the U.S. government of new, stricter rules and oversight processes for GOF research it funds.

Similar to the GOF H5N1 experiments, the proposed H7N9 GOF research includes, among other things, experiments “[t]o assess the pandemic potential of circulating [H7N9] strains and perform transmission studies to identify mutations and gene combinations that confer enhanced transmissibility in mammalian models (such as ferrets and guinea pigs).” Global health concerns about the H7N9 virus arose in spring 2013 when a worrying number of cases of humans infected by contact with birds occurred in China. As of early July, the mortality rate among humans infected with H7N9 was approximately 33%, making the virus a killer pathogen. To date, the H7N9 virus has not demonstrated serious human-to-human transmission, but the fear is that it might mutate and spread more readily in human populations. The proposed GOF experiments on the H7N9 virus are intended to give scientists and public health officials possible insights into how the virus might change into something more fearsome–and, thus, give them more time to prepare.

Critical reactions to the proposed H7N9 GOF research indicated that the biosecurity and public health controversy over GOF experiments has not subsided. A flavor of the criticism can be found in this story from Science:

“The scientific justification presented for doing this work is very flimsy, to put it mildly, and the claims that it will lead to anything useful are lightweight,” says Adel A. F. Mahmoud, an infectious disease specialist at Princeton University and the former president of Merck Vaccines. And the security precautions are “insufficient and amazingly lame,” says molecular biologist Richard Ebright of Rutgers University in Piscataway, New Jersey.

And from this story in The Scientist:

Simon Wain-Hobson, a virologist from the Pasteur Institute in France, was critical of the move. “Since when do scientists try to get manifestos into Nature and Science?” he asked. “If they were going to do the human genome or go after the Higgs boson, I could understand that, but this is extraordinarily focused. They are ramming gain-of-function experiments down our throats against debate, and it’s not scientific.”
. . .
Michael Osterholm, director of the Center for Infectious Disease Research and Policy (CIDRAP) at the University of Minnesota and a vocal critic of last year’s decision to publish the H5N1 research, added that the flu community still has not rigorously weighed the risks and benefits of gain-of-function studies. “I support doing them for basic research purposes, and I have always maintained that Yoshi [Kawaoka] and Ron [Fouchier] could do this work safely,” he said. “But my concern is that publishing their data would allow labs around the world, which won’t adhere to the same safety requirements, to do the same.”

Osterholm added that the signatories of today’s letter have overstated the benefits of gain-of-function research, including the potential for developing better vaccines and antiviral drugs, or improving surveillance measures. “We still do H5N1 surveillance in the same way a year later,” he said.

In terms of arms control and non-proliferation, the GOF controversy includes arguments about the BWC’s (ir)relevance to the challenge of balancing public health and biosecurity in scientific research. The BWC review conference in December 2011 occurred when the H5N1 GOF controversy was in full swing, but the BWC states parties did not address it in any serious way , despite much rhetoric about the BWC being a central forum for discussing biosecurity issues beyond the traditional focus on non-proliferation of biological weapons by states. The reticence of BWC states parties to address this controversy connected to a larger governance problem that emerged from the H5N1 GOF research episode–the inadequacy, or lack of, adequate national and international rules and processes to deal effectively with the pros and cons of GOF research.

The scientists proposing the H7N9 GOF research are seeking U.S. government funding, so the proposal will be subject to the heightened U.S. rules and procedures adopted after the H5N1 controversy. The H7N9 GOF experiments, if approved and funded by the U.S. government, will go forward under these rules. How the U.S. government handles these proposals under its new approach will be closely watched by the biosecurity, public health, and scientific communities around the world.


Nuclear Strategy Push-Back Against the “Cyber Industrial Complex”?

Greg Austin of the EastWest Institute published a piece in China-US Focus on August 6th in which he identifies possible push-back against the US government’s race to achieve “cyber superiority” and the emergence of “the American cyber industrial complex” from people in the US military knowledgeable about US nuclear weapons and strategy. He argues that disclosures by Edward Snowden reveal a “lack of restraint” in US cyber behavior and:

This lack of restraint is especially important because the command and control of strategic nuclear weapons is a potential target both of cyber espionage and offensive cyber operations. The argument here is not to suggest a similarity between the weapons themselves, but to identify correctly the very close relationship between cyber operations and nuclear weapons planning. Thus the lack of restraint in cyber weapons might arguably affect (destabilize) pre-existing agreements that constrain nuclear weapons deployment and possible use.

The cyber superiority of the United States . . . is now a cause of strategic instability between nuclear armed powers. . . . [I]n the long run, the most influential voice to end the American quest for cyber military superiority may come from its own armed forces. There are military figures in the United States who have had responsibility for nuclear weapons command and control systems and who, in private, counsel caution. They advocate the need to abandon the quest for cyber dominance and pursue a strategy of “mutual security” in cyber space – though that has yet to be defined. They cite military exercises where the Blue team gets little or no warning of Red team disruptive cyber attack on systems that might affect critical nuclear command and control or wider war mobilization functions. Strategic nuclear stability may be at risk because of uncertainty about innovations in cyber attack capability. This question is worth much more attention.

Cybersecurity literature contains references and analogies to nuclear weapons and nuclear strategy, including attempts to draw on the nuclear experience to address what some perceive as a cyber arms race. However, Austin is talking about something different–concern among experts that what is happening with US cyber policy, strategy, and capabilities threatens US nuclear strategy and stability. I do not know how prominent such strategic introspection actually is, or whether it deserves the level of deliberation Austin advocates.

In the most general terms, Austin seeks reassessment of what he and others believe is an insufficiently restrained American quest for superiority in military and intelligence cyber capabilities–not because of perceived threats to privacy and other civil liberties at home, but because this path might create strategic problems for US national security down the road, including in the context of nuclear weapons. For Austin, this reassessment should include more scrutiny of permitting one military officer to lead both NSA and US Cyber Command, a situation Austin provocatively describes as “an unprecedented alignment of Praetorian political power in any major democracy in modern political history.”

A unrestrained cyber industrial complex led by a cyber Praetorian guard potentially causing strategic nuclear instability? Well, now, the “national conversation” is getting more interesting by the day . . .


Paul Pillar: Iran’s Nuclear Legal Obligations

A very good piece by Paul Pillar out yesterday in The National Interest.  I’m pleased to see that he shares a number of the same views I’ve expressed, on some of the same topics I’ve covered recently, in my posts. I’ll go ahead and copy the whole thing here.

  Read the rest of this entry »


Myanmar Has a Clandestine Nuclear Weapons Program. And Nobody Cares.

This just came to my attention today. Read this story at Pro Publica, about some very important and alarming work that friend of ACL, and real life former weapons inspector Robert Kelley, has done on what he has concluded is a clandestine nuclear weapons program in Myanmar. Now, I am not in any way a technical guy. But I’ve gotten to know Bob, and he’s both the most qualified person to evaluate a nuclear weapons program, and the most independent, objective, and reserved technical person, that I know. So hearing Bob say this about Myanmar:

“I state this very clearly and strongly, this is a clandestine nuclear program”

makes me say, it’s time to listen up, people.  

I’m also confident that people like David Albright and Olli Heinonen, who have been so very concerned about possible nuclear weapons related activity in Iran, will be all over this situation too. After all, there is clearly enough evidence to convince Bob Kelley, and there are strong links to North Korea and therefore to regional proliferation implications. So on this case, the technical people can actually agree, and the international community can focus on effectively dealing with the problem, right?

Wrong.

Read what Heinonen and Albright have to say about Kelley’s conclusions in the Pro Publica piece.  When I read them, I was genuinely incredulous. Reading their critique of Bob’s analysis was just like reading someone else’s critique, word for word, about their analysis of Iran!  Listen to this: 

Other experts, including Olli Heinonen, the former deputy director of the IAEA, viewed the evidence as inconclusive. They said the equipment in the photos had other possible uses and that such serious charges should not rest on the testimony of a single defector . . .

“There is no smoking gun,” Heinonen said in an interview. “There is no one single piece which puts your mind at rest telling that this is solely for nuclear purposes and for nothing else.” . . .

Heinonen questioned this conclusion, saying both the glove box and bomb reactor could have other uses. He noted that the box appeared too small to easily accommodate the mixer typically used to combine magnesium and UF4. There were ways to overcome this deficiency, but they would be “cumbersome,” he said, suggesting that perhaps the box was made for another purpose.

“These pieces of equipment,” he said in an e-mail, “cannot be said with a high certainty to be for uranium metal production.” . . .

Albright said in an interview that he did not agree with Kelley’s findings. A close reading of the report, he said, suggests that Kelley assumed that Burma is attempting to make nuclear weapons and then looked at Win’s pictures “in a biased way ascribing nuclear purposes to them.” Albright said he believed each piece of equipment in the photos had alternate uses, some of which were non-nuclear. He noted that Win had no background in nuclear science or engineering.

“We learn the hard way,” said Albright. “This is what the whole thing was about with Iraqi WMD.”

“If you’re going to make accusations that a country has nuclear weapons program, you have to have credible evidence that that is true,” he said.

I swear these quotes literally make me laugh out loud. I’m not going to get into the technical aspects of the Myanmar case, or a comparison with the technical issues involved with the Iran case. I’ll let others do that. What I’m talking about is the overall attitude and approach of Heinonen and Albright in the Myanmar case, compared to the Iran case.  These are guys who think that every time there’s a wing added on to a building in Iran, it means there absolutely must be some nefarious new attempt to build a nuclear weapon going on in there. But in Myanmar’s case, their approach is: “Well, you know, all of this stuff could have other uses. We really can’t be sure. There’s no smoking gun here. It would be wrong of us to speculate. You need real, clear evidence to make such a very serious accusation. I’m sure everything’s fine.”

Albright even went so far as to write a letter to Senator Jim Webb, assuring him that there was “nothing to see here” in Myanmar, and saying Bob’s analysis is faulty. Read the letter here.   

There’s a Janus-like, two-facedness here that is just astounding to me, i.e. taking one approach to the Iran situation (incredibly hawkish), and then taking a completely different approach to the Myanmar situation (incredibly dovish), for no apparent reason. And an incredible complete lack of self-awareness of this fact as well.

So what’s the takeaway here? First, Bob’s assessment of Myanmar’s clandestine nuclear weapons program is serious business that deserves attention. I don’t know what should be done about it, but so far I’ve heard ear-splitting silence about it from the U.S. and E.U. and the U.N. Security Council.  That’s hard to reconcile in light of all the attention being paid to Iran.

Second, what explains Heinonen’s and Albright’s schizophrenia here? I am genuinely puzzled. Is it because Myanmar is not on the USG’s list of “places we want to demonize,” and Albright and Heinonen are dutifully following the prime directive (i.e. always follow Uncle Sam’s lead)? Or is it something else? Thoughts welcome.  


Getting Beyond the Benedict Arnold of the Cyber Age: Crafting Post-Snowden American Policy and Law

This past week brought more discomfort in the United States produced by Edward Snowden’s disclosures about NSA surveillance activities:

  • The House of Representatives narrowly defeated a proposal to restrict NSA authority to collect telephone metadata in the United States, a vote that caused intra-party clashes within both the Democratic and Republican parties;
  • Legislators in Congress grilled NSA officials on the NSA’s collection of telephone metadata within the US, producing testimony that only heightened congressional concerns about the executive branch’s metadata surveillance activities and their legal justification;
  • The NSA released previously classified documents related to the now infamous Verizon Order leaked by Snowden, an effort at transparency that, apparently, did not make anything more transparent;
  • Courtesy of Snowden, The Guardian revealed another NSA program, called XKeyscore, which caused another round of national and international controversy about US surveillance policies and practices; and
  • The Russian government granted Snowden asylum for one year, allowing him to leave his limbo-laden life at the Moscow airport, a development that perhaps guarantees Snowden’s place in history (and not Bradley Manning) as the Benedict Arnold of the cyber age and made already fraying US-Russian relations worse.

To have Congress close to over-turning a key law passed after 9/11, to deepen tensions between the legislative and executive branches, to provoke the masters of secrecy to try to be more transparent, to wrong-foot the NSA again with a new disclosure, to cause rifts within both major US political parties, and to exacerbate problems between great powers is, ladies and gentlemen, one hell of a week, in more ways than one.

Each development of this past week deserves its own scrutiny, but my objective here is to try to assess what the sum of these episodes means for the US. The initial disclosures from Snowden brought forth calls for a “national conversation” about the implications of the revelations of NSA surveillance activities and the policy and legal justifications for them. This conversation has been extremely awkward because a proudly open and free society found itself debating critical issues kept secret by its government and only revealed by a law-breaker who sought succor in the sovereignty of anti-American governments. To quote one of history’s great admirers of the US, not our finest hour.

But, this past week should signal that the “national conversation” requires decisions needed to shape post-Snowden American policy and law on issues ranging from the privacy of American citizens dependent on digital communications technologies to the impact of cyber espionage on the power and reputation of the US in geopolitics. No one should underestimate the gravity of these decisions because the questions to be answered go deep into what America means at home and abroad. In its main leader of its August 3rd issue, The Economist–hardly an American nemesis–embeds the Snowden affair along with other post-9/11 policies in what it calls “liberty’s lost decade.”

Provocative, to be sure, but The Economist is trying to piece together what it all means for the US, from Mohamed Atta to Edward Snowden, and is encouraging Americans to re-evaluate where their government has been–from detention cells in Guantanamo Bay to “collecting it all” in cyberspace–and whether and how they want the future to be different. We might not like the headlines, the harsh questions, and the flippant or cynical condemnations of American behavior as hysterical hypocrisy. But, when someone like Edward Snowden can affect this country’s domestic politics and foreign affairs as wrenchingly as he repeatedly has (see, this past week), we have serious work to do in crafting policies and laws less dependent on the fear secrecy breeds and more confident in the resilience openness brings when betrayal from within and enmity from without test our interests and values.