I wrote a short opinion piece in the Herald outlining some of my thoughts about the Brussels terrorist attacks. Unless the root causes of the problem are addressed, there will be no end to them. Even if they overlap in the form of foreign fighters, those root causes primarily reside in the disaffection and alienation produced by socio-economic and cultural grievances at home rather than in the conflicts of the Middle East. The solution is to be proactive as well as reactive to the threat posed by domestic radicalisation, and that involves social reform as well as better human intelligence collection in the communities from which home-grown jihadists emerge.
Questions of the day.
It seems that a fair share of people are concerned about the Intelligence Review Committee’s recommendation that the GCSB be allowed to spy on the private communications of NZ citizens and residents, most often with a warrant adhering to a three tiered process that requires the signature of the Attorney General and Judicial Commissioner for the most intrusive searches of private individual’s communications and, under highly exceptional circumstances (involving the combination of imminent threat and the need for immediate real time information), accessing private individual’s communications without a warrant.
This essentially codifies what is already being done in practice under the GCSB’s “assist” role whereby it can offer its technological capabilities under warrant to other government agencies when asked and can engage in warrantless spying on NZ citizens and residents if they reside abroad or work for or are associated with foreign-based entities like NGO’s, IO’s embassies, corporations, charities and CSO’s. Remember: this is targeted eavesdropping and signals intercepts, not mass (meta-) data collection or mass surveillance. The argument goes, and I tend to agree in part with it, that the NZ threat environment has become increasingly “glocal” or “intermestic,” meaning that the boundaries between global or international affairs and domestic and local concerns are increasingly blurred thanks to advances in telecommunications, transportation and economic transaction. Hence the need for targeted GCSB involvement in matters of domestic espionage when warranted.
In any event my first question is this: why, if people are concerned about the publicly-debated legal extension of the GCSB’s de facto “assist” role, are they not concerned about the use of military assets (specifically, the deployment of light armoured vehicles, a helicopter and troops) to assist the police in the Kawerau police shooting and siege? After all, the use in a police operation of combat designed equipment and soldiers trained and equipped  for external combat would seem to be stretching the proper, legally defined role of the NZDF even if we consider its civil defense responsibilities (which, if I am not mistaken, would only apply to armed intervention in instances of civil war or insurrectionist  (read: Maori) upheaval). Should there not be a clear separation of NZDF missions and police matters delineated in law? Pardon my ignorance, but is there? Is there a legally outlined “assist” role for the NZDF in armed confrontations like this latest incident and the Napier siege of a few years ago? Or is the operational relationship between the NZDF and Police more ad hoc, informal and circumstantial in nature?
Then there is the suggestion by Michael Cullen that future Intelligence Reviews could consider merging the GCSB and SIS. This would be akin to merging the NZDF and NZ Police. So my next question is: would we ever consider merging the NZDF and Police? If not, why would we consider merging a signals intelligence collection agency with a human intelligence collection agency?
There is more to ask. Most of what the GCSB does is foreign intelligence collection on behalf of the 5 eyes network. The domestic side of its targeted spying is relatively small in comparison and again, done in service of or in concert with domestic agencies such as the SIS and Police, most often under warrant or given the exceptions listed above. Otherwise and for all intents and purposes, the GCSB is a branch of the 5 Eyes on NZ soil, not a fully independent or autonomous NZ spy agency. Think of the amount of money that the GCSB receives from 5 Eyes, amounts that are believed to be well in excess of its NZ government-provided budgetary allocations (the exact figures are classified so are what is known as “black” allocations under he “reciprocity agreement” that binds the GCSB to the rest of the 5 Eyes partners). Think of the highly sensitive technologies it employs. When the GCSB was first established, was the equipment and personnel used completely Kiwi in nature? Is the equipment used today completely Kiwi in nature and are the people manning the listening posts at Waihopai and Tangimoana today all NZ citizens?
Given the network resources at its disposal, were the GCSB to merge with the SIS it is possible that the latter would be subject to institutional “capture” by the former. That would mean that the intelligence priorities and requirements of 5 Eyes could come to dominate the human intelligence priorities of the SIS. I am not sure that is a good thing. And if we consider that the separation of powers concept that is at the core of democratic practice should institutionally extend beyond the tripartite structure at the apex of the state apparatus (executive, legislature, judiciary), then centralising the most intrusive spying powers of the state in one agency answerable almost exclusively to the executive branch seems to be antithetical to that premise.
It could  be the case that the possibility of a merger is being floated so that the SIS and GCSB can concentrate on external espionage and counter-espionage, with the domestic intelligence function reverting wholly to the police (who already have their own intelligence units). But even then the GCSB will continue to have a role in domestic signals collection, so the result of the merger would mainly impact the focus and organisation of the SIS.
I was fortunate to have a private audience with the Review Committee. From what I have read in the report so far, much of what I recommended was ignored. Even so, I do believe that the committee tried to balance civil liberties with security requirements and take what is a hodgepodge of disparate intelligence legislation and craft a uniform legal framework in which the iNZ intelligence community can conduct its operations. Heck, they even have recommendations about the legal cover given to undercover agents, both in terms of the process of assuming false identities as well as in terms of their immunity from liability when discharging their undercover tasks (apparently no such legal cover exists at the moment or is patchy at best).
Although I was disappointed that much of what I recommended to the committee did not appear in the final report, I am satisfied that their recommendations are a step forward in terms of transparency, accountability and oversight. I realise that this sentiment is not shared by many observers (for example, Nicky Hager was scathing in his appraisal of the report), but to them the questions I posed above are worth considering. To wit: If you are comfortable with the military getting involved in domestic law enforcement in exceptional (yet apparently regular) circumstances, then what is the problem with the GCSB getting more publicly involved in domestic espionage in similar circumstances?
There is much more to discuss about the Report and I may well do so as I wade through it. For the moment, here is a good critical appraisal worth reading.
The Impunity Files, Police Edition: Trolling for Rawshark.
By now it is well known that in their effort to find the source of the information upon which Nicky Hager’s book Dirty Politics was based, the NZ Police searched and seized computers, phones and personal records from Mr. Hager’s home. They also intimidated Mr. Hager’s daughter (who was home at the time) by forcing her to dress in front of an officer and relinquish her personal computer. In addition, they asked a number of service providers to give them access to Mr. Hager’s personal details without a warrant or production order. Most of the service providers refused or asked for a warrant but at least one, the financial corporation Westpac, gave up eight month’s worth of Mr. Hager’s transaction records without asking the Police for a legal instrument compelling them to do so.
News of this caused a brief furore amongst civil libertarians, privacy advocates, some journalists and a few business people. But as with much that the Police does that is borderline in terms of legality, the issue soon dropped from the public eye. Few if any follow ups have been published and for all intents and purposes the Police have emerged unscathed from yet another episode of operating with impunity and contempt for the law.
I have had opportunity to review Police documentation regarding the case released under Discovery (79 pages in total). Readers are invited to read the full dossier released by the High Court over at Scoop, which also has an interesting newspaper story detailing the genesis of the investigation into Mr. Hager.
Much in the Police documents is redacted but there is plenty to consider nevertheless. In the spirit of public interest journalism (although I am not a journalist by training, inclination or employment), I have decided to add a bit more to the public domain on this case. As it turns out, the Police did more than ask various service providers to give them access to Mr. Hager’s private information, and they got things rolling just before and then accelerated  the investigation very quickly after a complaint was laid about the source of the material from which Dirty Politics was constructed (the infamous or heroic hacker known as Rawshark, depending on how you view things).
On August 22, 2014, amid the sequels to the publication of Dirty Politics and the speculation as to the identity of the hacker who accessed the information from a notorious right-wing blogger that detailed his unsavoury connections to government officials and corporate interests, Rawshark tweeted what most observers saw as a satirical or diversionary tweet saying that s/he was on vacation in Vanuatu. Rather than take it with a grain of salt, and after the blogger formally complained on August 25, 2014, the NZ Police fired up their investigative resources and on September 18, 2014 a detective constable by the name of Rachelle (I shall leave her last name out), who was assigned to the case by a superior named Simon (again, I shall leave his surname out for the moment), telephoned Immigration New Zealand (INZ) for information on all NZ residents and citizens who had traveled to Vanuatu around that time.
I should note that this very same detective Simon was the police officer who made the “enquiry” of Westpac about Mr. Hager’s financial details on September 24, 2014. In the days that followed the Police were able to obtain detailed information on Mr. Hager’s property holdings from Wellington City Council as well as full details of his Westpac bank accounts and credit cards. Although some of this information was available through the Council web site, on at least one occasion detective constable Rachelle was able to obtain information directly from the Council without a warrant or production order (this information is available on pages 25-26  of the Discovery documents that I have read. (KEB Vol 4 Part 1C file pages 1468-69).
One has to wonder what relevance Mr. Hager’s property valuations and rate payments have with regard to the search for Rawshark. If the figures were obtained for a future asset seizure in the event Mr. Hager is found guilty of a crime, we have to remember that he has not been charged, much less convicted of any such thing. A search for aspects of his worth with an eye to future seizure implies a presumption of guilt on the  part of the Police before any charges have been laid against Mr. Hager. To say the least, that is a perversion of natural justice.
During the September 18, 2014 conversation with detective constable Rachelle, a female senior INZ officer replied that it would be difficult to compile a list of all New Zealanders who traveled to Vanuatu during the referenced time period because INZ only had data on those who traveled directly to Vanuatu from NZ and did not hold information on those who may have stopped off elsewhere (such as Fiji) on their way to the holiday destination. She sent the Police an OIA form to fill out (which was completed and returned that day) in order to assist the INZ side of the investigation. A day later, on September 19, 2014, she emailed detective constable Rachelle and wrote that there was nothing more that INZ could do “on their end” and suggested that the Police “might want to try Customs.”
That was a good tip. Â Detective constable Rachelle noted then that she would speak to someone at Customs who was working on organised crime to find out the best source for that information. On September 23, 2014, after approaching NZ Customs, the NZ Police received from them spreadsheets containing the names of 2500 NZ citizens or residents who travelled directly from NZ to Vanuatu in the two weeks prior and after August 22, 2014. The spreadsheets were then sent to an officer Nichola (again, no last name needs to be published at this time) “at intel to see what plan we can come with in relation to analysing this information.”
The passenger information was presumably sourced from Air Vanuatu and/or Air New Zealand, who code share the three weekly flights between Auckland and Port Villa. No warrant or production order was issued for the release of this information, and it is unclear as to who and how Air Vanuatu and/or Air New Zealand were approached, or whether they were approached directly at all. This information is detailed on pages 70-71 (KEB Vol 4 Part 1C file pages 1525-26) of the Police documents released under Discovery in the case Mr. Hager has brought against them.
It is unclear whether the Police ever came up with a plan to analyse the personal information of the 2500 NZ citizens and residents that flew to Vanuatu from NZ in the two weeks before and after August 22, 2014. What is clear is that it was done, at a minimum, in violation of the Privacy Act because the data was obtained without a warrant or production order. Moreover, it is not clear what was ultimately done with the information about the 2500 people whose details were obtained by the Police. Was it analysed? Did any of it lead to further inquiries or action? Was it stored? Was it destroyed? Was some records kept and others not? The bottom line is that this information was obtained based upon a “courtesy” request, not a lawful order, and was part of a trolling exercise that began before a complaint was laid and not as a result of specific or precise information related to the Hager investigation. Both procedurally and substantively, obtaining this travel-related data of 2500 NZ citizens and residents was unlawful.
Given that Rawshark appears to be a pretty savvy hacker who knows how to cover his/her tracks, it is arguable that any of the 2500 people whose privacy was violated by Customs and the Police (and perhaps Air Vanuatu and/or Air New Zealand) had anything to do with obtaining the material for Dirty Politics. Beyond the issue of what was done with their personal information, the question is whether they have been told by any of these agencies about their records being accessed. After all, they have nothing to fear if they have nothing to hide, so it would seem natural that the Police and/or the other entities involved in the privacy breach would let the 2500 travellers know that their private records are safe. That is important because these records could well be more than passport details and could include ticket purchase location details, credit card information etc. At this point we do not know the full extent of the Police handling of this private information, but the privacy breach is a pretty big one in any event so the duty to inform those affected is great.
Published information is that the senior officer in charge of the investigation into Rawshark is Assistant Commissioner Malcolm Burgess. It appears that Mr. Burgess was contacted by email by the rightwing blogger on August 19, 2014 and immediately assigned the matter to the National Criminal Investigation Group (see the NZ Herald article on November 14, 2015 by David Fisher). That is odd because at the time no formal complaint had been made–that did not happen until August 25, 2014. In fact, it appears that an investigative plan of action was drawn up before the blogger made his formal complaint, then quickly put into action once he did.
In any case, perhaps Mr. Burgess is a “hand’s off” manager who did not know what those under him were doing, particularly detective Simon. But it would be interesting to see how he feels about the way the information on Vanuatu travellers was accessed given that it appears to have shed no light on Rawshark’s identity and seems to have violated the Privacy Act. In other words, it looks like it was a useless and illegal fishing expedition, which should be a concern for him as the senior office in charge.
I understand the importance of chasing all leads and avenues of inquiry in criminal investigations. I understand the notion of professional courtesy amongst security agencies. I understand the utility of informal agreements between government offices. I understand that institutional cultures may see legal requirement more as a challenge rather than as an obligation. I understand that sometimes investigatory overkill in one case is needed to serve as a deterrent to others who might seek to pursue similar courses of action.
But IÂ also know, from both my academic writing on democratic governance and my professional experience while working in security branches of the US government, that at its institutional core democracy is about self-limitation and the universal rule of law, to which can be added the bureaucratic axion “CYA.” Yet when it comes to the NZ Police in this case and others, it seems that an institutional culture of impunity far outweighs respect for the self-limitations imposed by law when it comes to decision-making on matters of policy and operations.
Perhaps the Privacy Commissioner and other civil rights groups might want to take another look into this case because it is not just Mr. Hager who has had his rights violated by the Police investigation into Rawshark’s identity (in what to my mind is more a case of journalistic intimidation rather than a legitimate investigation into criminal wrong-doing). As much as I would like to believe that the Independent Police Conduct Authority (IPCA) would seize the opportunity to examine the particulars that I have outlined, its track record suggests otherwise.
One thing is certain: there are 2500 people in NZ who got a lot more than they bargained for when they booked direct flights to Vanuatu in the middle of last year.
The US has a mass murder problem, not a terrorism problem.
The latest spate of mass murder in the US has again demonstrated the hypocrisy and bigotry of right-wingers on the subject. When the murderers are white Christians such as the Colorado Planned Parenthood assassin or the  Charleston South Carolina church gunman, the Right speaks of them being “unstable” or psychopathic. Yet when Muslims commit acts of mass violence such as that in San Bernadino, it is always considered by the Right to be an act of terrorism.
We need to cut through the BS and see things for what they are: not all mass murders are terroristic in nature. In fact, given the easy access to firearms, mass murder is as American as apple pie and almost as common. In most cases it matters less what drives US perpetrators to murder than it is their unique yet common ability to make a statement by murdering in numbers.
Let’s begin with the definition of “problem.” A problem is something pernicious that is persistent, continual and hard to resolve, counter or ameliorate.
Mass murders can be serial, sequential or simultaneous in nature depending on the perpetrator’s intent and capabilities. Most mass murders are motivated by personal reasons–revenge, alienation, stress, and yes, mental illness. The term “going postal” was coined in the US because of the propensity for workplace conflicts to lead to mass bloodshed. In fewer numbers of mass murder cases the killers express support for or involvement in political or ideological causes, such as the Colorado, San Bernadino and South Carolina events mentioned above. Â In a fair number of cases personal and political motivations combine into mass murderous intent. In many cases mentally ill people adopt extremist causes as an interpretation of their plight and justification for their murderous intent. The Sydney cafe siege instigator is a case in point. Whatever the motivation, what all the US killers share is their ability to kill in numbers. Given its frequency, that is a particularly American way of death.
We need to be clear that not all politically motivated killing is terrorism. The murder of US presidents, public officials and political activists of various stripes was and is not terroristic in nature. On the either hand, the murder of blacks and civil rights workers by the Klu Klux Klan was clearly terroristic in nature because it was designed to do much more the physically eliminate the victims. Although they were all politically motivated one can argue that the Charleston killings were not terroristic but the Colorado and San Bernadino murders were. The Boston marathon bombing was terroristic, but was the bombing of the Oklahoma City federal building by Timothy McVeigh also terroristic in nature or was it just a case of lethal lashing out by a disgruntled loser? What about today’s London tube stabber and the Palestinians who kill Israelis with knives? Are they really terrorists or just lashing out in murderous anger? Could not the same be said for all of the events mentioned here?
Terrorism has a target, subject and object. The target is the immediate victims of an act of politically motivated lethal violence, the subject is the larger body politic, and the object is to influence both the general public and decision makers to bend to the will of the perpetrators. This can be done by getting the latter to desist from doing something (say, joining in a foreign conflict) or by getting them to overreact in order to exacerbate tensions or contradictions within the subject society itself. Not all mass murders extend beyond the target, and even then most are not driven by a desire to shape the will of decision-makers or public at large. If we review the cases mentioned earlier, how many of them properly fall into the category of terrorism?
The currency of terrorism is irrational fear and panic. It has a paralysing or galvanising effect depending on the nature of the subject. But the key to differentiating terrorism is that those who perpetrate it seek to manipulate panic and fear to their advantage. They may not always calculate right and and up losing, but that is their intent.
Taking that criteria, it is clear that the US has a mass murder problem, not a terrorism problem. The answer to that problem lies in effective gun control, to be sure, but also involves backing away from the culture of violence into which US citizens are socialised. That includes reducing the amount of everyday exposure to militarism, jingoism, mindless patriotism and violence glorified in popular culture.
That will be hard to do because violence and the fear that it brings sells, and selling violence and playing on fear makes money for those who know how to manipulate it in order to take advantage of the opportunity. Not only does it sell guns and increases the profits of arms manufacturers big and small. It also sells electronic games, movies, toys (!), television series and any number of other appended industries. It helps further political careers. Violence is exalted, even reified as the preferred method of conflict resolution by a mass media industry fuelled by fear mongering and funded by war-mongerers. There are many vested interests in maintaining a culture of violence in which mass murder thrives. Yet these are not terrorists, by definition.
Rather than confront this thorny issue, the US Right prefer to selectively apply the word “terrorism” to mass murders committed by Muslims whether or not they are inspired or directed by a known irregular warfare group such as Daesh. Daesh knows this and along with al-Qaeda has urged supporters in the US to take advantage of loose gun laws to commit so-called “lone wolf” or small cell attacks on everyday targets. Although it is as much an admission of Daesh and al-Qaeda’s inability to confront established states like the US or France directly, the strategy has the virtue of making the threat of Islamic terrorism in the West seem much bigger than it really is, thereby eliciting the type of response called for by the Right–bans on Muslim immigration, increased surveillance and profiling of Muslims, etc. That serves to increase the alienation between Muslims and non-Muslims in the West, which suits the Daesh narrative about a clash of civilisations to a “T.”
This is not to say that we should disregard the threat of terrorism, Islamic or otherwise. But what it does suggest is that the focus should be on the penchant for mass slaughter in the US regardless of cause. Once that is addressed the real threat of terrorism can be addressed in proper context and without the ideological opportunism that currently drives debates about guns and extremism in the US.
In summary: Mass murders are extraordinarily common in the US when compared to pretty much everywhere else (not just the “developed” world), specifically because US mass murders are carried out by individuals rather than state forces or irregular armed groups or criminal organisations. The overwhelming majority of US mass murders are not motivated by political or ideological beliefs. Of those that are, Â few can be properly considered acts of terrorism and should be seen instead as acts of lethal retribution, retaliation, or striking out at society and authority by individuals with personal as well as political grievances.
This does not make them any less dangerous. Yet  it does help clarify the unique US mass murder phenomena in order to more sharply focus the search for preventatives that address root rather than superficial causes as well as strip that search of the normative baggage many pundits, politicians and the general public currently carry into it.
The Daesh Matryoshka doll.
Much ether and pulp have been expended analysing the Daesh phenomenon and its consequences. The range and acuity of interpretations is broad yet often shallow or incomplete. Since it is a rainy weekend on Auckland’s west coast, I figured that I would alternate playing with the toddler with compiling a brief on the multiple interlocked layers that is the war of Daesh.
I refer to the irregular warfare actor otherwise known as ISIS, ISIL or IS as Deash because the latter is a derogatory term in Arabic and denies the group its claim to legitimacy as a state or caliphate. Plus, Isis is a common Arabic female name so it is insulting to Arab women to use it.
Much like the famed Russian dolls, the conflicts involving Daesh can be seen as a series of embedded pieces or better yet, as a multilevel chess game, with each piece or level interactive with and superimposed on the other. Working from the core outwards, this is what the conflict involving Daesh is about:
First, it is a conflict about the heart and soul of Sunni Islam. Daesh is a Wahabist/Salafist movement that sees Sunni Arab petroligarchies, military nationalist regimes such as those of Saddam Hussein, Bashar al-Asaad and Muammar al-Qaddafi, nominally secular regimes like those in Algeria, Egypt, Turkey and Tunisia, and moderate monarchies such as those of Jordan and Morocco as all being degenerate and sold out to Western interests, thereby betraying their faith. The overthrow of these regimes and the prevention of anything moderate (read: non-theocratic) emerging as their political replacement are core objectives for Daesh.
Secondly, Daesh is at the front of a Sunni-Shiia conflict. In significant measure funded by the Arab petroligarchies who opportunistically yet myopically see it as a proxy in the geopolitical competition for regional dominance with Iran and its proxies (such as Hizbollah) and allies (like the Syrian and post-Saddam Iraqi regimes), Daesh has as its second main objective eliminating the Shiia apostates as much as possible. To that can be added removing all ethnic and religious minorities for the Middle East, starting with the Levant. Because Daesh is racist as well as fundamentalist in orientation, it wishes to purge non-Arabs from its domain even if it will use them as cannon fodder in Syria and Iraq and as decentralised autonomous terrorist cells in Europe and elsewhere.
Thirdly, Daesh is engaged in a territorial war of conquest in Iraq and Syria, where it seeks to geographically situate its caliphate. This has allowed it to gain control over important oil processing facilities in Iraq and Syria and use the proceeds from the black-market sale of oil (including to the Assad regime!) to help fund its recruitment and weapons procurement efforts.
Fourth, Daesh is the source of inspiration, encouragement and sometimes training of decentralised, independent and autonomous urban guerrilla cells in Europe and elsewhere that use terrorism as the tactic of choice. The strategy is a variant of Che Guevara’s “foco” theory of guerrilla warfare whereby cadres receive common training in a secure safe haven then return to their home countries in order to exploit their knowledge of the local terrain (cultural, socio-economic, political as well as physical) in order to better carry out terrorist attacks with high symbolic and psychological impact. In this variant Daesh uses social media to great effective to provide ideological guidance and practical instruction to would-be domestic jihadis, thereby obviating the need for all of them to gain combat experience in the Middle East.
Like Lenin and Guevara, Daesh understands that its terrorism will attract the mentally unbalanced and criminally minded seeking a cause to join. Along with disaffected, alienated and angry Muslim youth, these are the new Muslim lumpenproletarians that constitute the recruitment pool for the guerrilla wars it seeks to wage in the Western world. In places like Belgium, France and arguably even Australia, that recruitment pool runs deep.
Fifth, through these activities Daesh hopes to precipitate a clash of civilizations between Muslims and non-Muslims on a global scale. Â It sees the current time much as fundamentalist Christians do, as an apocalyptic “end of days” moment. Its strategy is to fight a two-front war to that end, using the territorial war in the Middle East as a base for conventional and unconventional military operations while engaging in irregular war in Europe and elsewhere. The key of their military strategy is to lure Western powers into a broad fight on Muslim lands while getting them to overreact to terrorist attacks on their home soil by scapegoating the Muslim diaspora resident within them.
Daesh may be barbaric but its political and military leadership (made up mostly of Sunni Baathists from Iraq) is not stupid. It has not attacked Israel, knowing full well what the response will be from the Jewish state. In its eyes the confrontation with the Zionists must wait until the pieces of the end game are in place.
A critical component of Daesh’s strategy is the so-called “sucker ploy,” and it is being successful in implementing it. Basically, the sucker ploy is a tactic by which a weaker military actor commits highly symbolic atrocities in order to provoke over-reactions from militarily stronger actors that deepen the alienation from the stronger actor of core prospective constituencies of the weaker actor. That is exactly what has happened in places like the US, where opposition to the acceptance of Syrian refugees has become widespread in conservative political circles. It also is seen in the bans on refugees imposed by the Hungarian and Polish governments, and the clamour to halt refugee flows from conservative-nationalist sectors throughout Europe. We even see it in NZ on rightwing blogs and talkback radio, where the calls are to keep the Syrian refugees out even though no Syrian has ever done politically-motivated harm to a Kiwi (the projected intake is 750).
Sowing disproportionate fear, paranoia and the blind thirst for revenge amongst targeted populations is the bread and butter of the sucker ploy and by all indicators Daesh has done very well in doing so.
There is more to the picture but I shall leave things here and resume my asymmetric campaign versus the toddler.
One final thought. For the anti-Daesh coalition the fight must assume the form of a conventional war of territorial re-conquest in Syria and Iraq, run in parallel with a shadow urban counter-insurgency campaign in the West that is fought irregularly but which is treated judicially as a criminal matter, much like an anti Mafia campaign would be. Eliminating the territorial hold of Daesh in Syria and Iraq will remove their safe haven and training grounds as well as kill many of their fighters and leaders. That will help slow refugee flows and the recruitment of Westerners to the cause and facilitate the domestic counter-insurgency campaigns of Daesh-targeted states. The latter include better human intelligence gathering and intelligence sharing by and among erstwhile allies and adversaries in order to better counter dispersed terrorist plots.
Of course, the long-term solution to Daesh, al-Qaeda and other Islamicist groups is political reform in the Arab world and socio-economic reform in the Western world that respectively treat the root causes of  alienation and resentment within them.  So what is outlined in the previous paragraph is just a short-term solution.
In order for even that to happen, there has to be a tactical alliance between all actors with strategic stakes in the game: Russia, major Western powers, the Sunni Arab states and Turkey, the Syrian and Iraqi regimes, the Kurds, Iran and a host of irregular warfare actors including Hizbollah, the Free Syrian Army and assorted Islamicist groups not beholden to Daesh. It will be a hard coalition to cobble together, but the common threat posed by Daesh could just well force them to temporarily put aside their differences in favour of a workable compromise and military division of labour between them.
Of course, should that all occur and Daesh be defeated, then the old fashioned geopolitical chess game between Russia, the West, the Arabs, Kurds and Iranians can resume in Syria and Iraq. The conditions for that game depend on who emerges strongest from the anti-Daesh struggle.
Somewhere in the Kremlin Vladimir Putin is smiling.
Don’t tase me bro
Police Commissioner Mike Bush on Friday announced that tasers will be deployed for the use of all front-line officers.
The reasoning behind tasers emphasises the taser’s potential for de-escalation — a “less-than-lethal” alternative to shooting someone — sometimes on the basis very limited operational data. In 2009 and early 2010, when the weapons were on limited deployment in Auckland and Wellington, 10 people were tased, prompting then-Commissioner Howard Broad to write: “It’s pretty clear that in several instances, the person could have been shot with a firearm if Taser hadn’t been available.” The wiggle room here is important: several, could.
Technical and cultural problems
In June, science writer Phillip Ball addressed (MP3) the Royal Society of New Zealand on the topic of invisibility, emphasising that while we tend to regard advantages of this sort as technical problems they are, in reality, moral problems: problems of money, power and sex, or all three at once. One might as well say “cultural problems”. The crucial questions are not about what it does, but about how it is used, by whom, for whose benefit, and governed by what norms. This is the same profound observation that underpins restrictions on weapons of mass destruction, landmines and poison gas, why signatories to the Geneva Conventions use full metal jacketed ammunition, and why no nuclear weapons have been used in war since 1945. So it is disappointing, but not surprising, that the discussion around the Police’s deployment of tasers is largely technical, not cultural.
The justification is clearly-articulated: tasers have, the Police say, proven a useful tactical option between OC spray and a firearm. But the evidence is more complex. It is clear from New Zealand Police operational reports that tasers are safe in aggregate — from 2010 to 2014, 87% of situations where a taser was presented were resolved without it being fired, and the injury rate from their use was 1.1%.
How they are used, by whom, against whom
Aggregates do not tell the whole story. More than half of those tasered are MÄori or Pasifika, a figure that has remained reasonably consistent, and which matches the overseas experience in the UK, Canada, the USA and Australia — in Queensland from 2010 to 2012, Indigenous Australians were subject to 22.6% of taser use, despite comprising only 3.5% of the Queensland population. People with mental illness are also subject to much higher rates than others — the British Home Secretary says mentally ill people are about 30% of taser victims, and the Queensland Police Service data cited above says 24.2%. We know also that those at the margins of society, with the fewest options and the least access to legal systems and good medical support — including victims of domestic abuse, sex workers, trans people, drug users and homeless people — are also much more likely to be subject to profiling, greater suspicion, and greater threat of violence by Police. Members of these groups are also more likely to suffer from medical conditions such as heart disease and schizophrenia that can elevate the danger of being hit by a taser. Mental health risks are also particularly concerning, given how prevalent mental illness is in members of these groups, often with violence or abuse by people in power as a contributing factor.
Risks are not evenly distributed. Non-white people are overrepresented in crime statistics, and this must explain some of the increased rates of taser usage against them, but the fact that they are overrepresented is itself a function of the economic, systemic and cultural biases that infuse our society. All else being equal, wider deployment of weapons in the hands of the Police is escalation. It means those at the margins get a double-dose of systemic bias: they’re more likely to be selected as a potential criminal, and once selected, they’re more likely to be subject to violence. Those that are subject to violence then suffer greater harm and have fewer options for recovery or redress.
It is surely with this in mind that Emmy RÄkete has requested the Police release whatever research they have conducted into the lethality of tasers, and their potential for abuse. Gina Rangi also asked, on Twitter, about Police training in institutional racism, and the monitoring of it in relation to taser usage. We deserve answers to these queries.
Even the presentation of a taser without it being fired is a strong tactical option, including “laser painting” and “arcing”; explicit threats of force. And although injury rates are low, the fact that tasers are regarded as “less-than-lethal” means they tend to be used more readily than “lethal” tactical options, and are apt to be used as a compliance tool, rather than to defend the safety of Police or the public. In New Zealand, about half the time tasers are used against people who are threatening, but not violent towards Police, and according to Amnesty International, 90% of those who died as a result of taser were unarmed and do not present a serious threat. The New South Wales Ombudsman found that one in seven taser presentations was “inappropriate”, including cases of tasers being used on fleeing suspects and people who had already been handcuffed. “Less-than-lethal” violence can still be a heavy punishment.
These risks are all cultural, not technical. No amount of “less-than-lethal” rhetoric or low recorded-injury rates can adequately address these concerns when the factors leading to the decision to use a taser are not subject to the same scrutiny as its final use. Given that context, and absent significant change in the cultural factors, the wider deployment of tasers is not de-escalation, it is escalation.
Displacing firearms or augmenting the existing arsenal
To the extent that tasers displace firearms from frontline Police use, their wide deployment is a good thing, because in spite of everything else, it is generally better to be tased than to be shot. Tasers are less lethal than firearms, they operate at shorter range without such risks to bystanders, and they are equipped with cameras that provide some context to aid inquiry in case of abuse. Firearms do not record the circumstances in which a trigger is pulled — though the technology exists, and its use may grow, along with with the advent of body-cameras. While the last year’s worth of fatal shootings of unarmed black American men by white Police illustrates that technical solutions do not themselves correct cultural problems, the prospect of being charged with murder may prove a deterrent to the worst abuses. To ensure this, New Zealand should provide for the release of taser-cam footage in case of alleged abuse. (The NSW Ombudsman released video of case studies showing abuse of the weapons in that context; some are taser-cam, and some are not. You can watch them here, but be warned; some of it is quite harrowing.)
However, the real trouble with the argument that tasers displace guns isn’t with the claim that tasers are less-lethal than guns, or that they provide better oversight — it’s that that the evidence for displacement is weak, or at best unclear. In New South Wales, firearm presentations by police remained steady at about 800 per year for the three years following the introduction of tasers — while taser usage nearly tripled from 407 presentations to 1,169 over the same period. Similar effects were noted in Canada, where Police have walked back the argument that a taser is a replacement for a firearm:
When the RCMP unveiled plans to equip its Alberta detachments with Tasers in 2002, Sgt. Steve Gleboff told reporters “what we’re trying to do is eliminate the necessity to shoot somebody.” […] That expectation was wrong, according to the man who trains Calgary police officers to use Tasers. “Use of force experts across Canada right now, we’re kind of shaking our heads going, ‘How did we give the impression to the lay public or the media that Tasers were ever supposed to be a replacement for lethal force?'” said Staff Sgt. Chris Butler. “They were another use-of-force tool in the same regard as the baton, the O.C. spray. Just another tool.”
Given this position — that the taser is not a replacement for a firearm, but an alternative to OC spray and batons — it is clear that wider deployment of a more effective weapon over and above those existing tools, where the ultimate tactical option of firearms does not already exist, means the escalation of violence, not its de-escalation, as a matter of policy.
The limited deployment of firearms is an important difference between New Zealand and the jurisdictions for which good data is available (in Australia and North America), that make these comparisons uncertain. (In the UK, which would be a better comparison, there are strong calls for similar policy.) Given this difference, we may have little to fear — it may be that the deployment of tasers forestalls the routine arming of frontline police for five or 10 or more years longer than it otherwise would have occurred. But as someone pointed out to me on Twitter, the avoidance of hypothetical violence by the application of actual violence also is not de-escalation: you can’t defend giving the Police machine guns on the basis that you have declined to give them tanks as well. The onus is on the Police to demonstrate that their decision to deploy tasers across the force will reduce the use of firearms, and will also be accompanied by more rigorous training and oversight to prevent abuse, and to limit excessive use on the groups who already bear the heaviest burden of Police violence.
L
Cyberwar comes to New Zealand.
News that Chinese hackers obtained personal details of 4 million US federal employees dating to 1985, following on the heels of similar attacks on the customer records of private insurance companies and retirement funds as well as the internal email networks of the US State Department and White House, demonstrate that a guerrilla cyber-war is underway. Although it will not replace traditional warfare any time soon, this is the new face of war for several reasons.
First, it does not involve physical conflict using kinetic weapons, which removes direct bloodletting from the equation. Second, it can target critical infrastructure (power grids, water supplies) as well as the command, control, communications, computing and intelligence (C4I) capabilities of adversaries. Third, it can be masked so that perpetrators can claim a measure of plausible deniability or at least intellectual distance from the action. Fourth, it can be used for tactical and strategic purposes and the pursuit of short or long-term objectives.
Much like military drones, cyberwar is here to stay.
The war is not one sided: Russian hackers have penetrated Pentagon email networks and the 5 Eyes signals intelligence alliance has dedicated hacking cells working 24/7 on targets of opportunity. Many other nations also indulge in the practice as far as their technological capabilities allow them. To these can be added a host of non-state actors—Wikileaks, Anonymous, ISIS, among others—who have also developed the capability to engage in electronic espionage, sabotage, data capture and theft.
With the most recent revelations about the hacks on the US Office of Personnel Management (OPM) archival records (which include personal details of active and retired federal employees as well as identities of those who have had or hold security clearances, perhaps including myself given my prior employment by the Department of Defense) an evolution in cyber warfare is now evident.
Previously, most state-sanctioned cyber attacks were so-called “front door†attacks on government or corporate mainframes, servers and networks. The interest was in surreptitiously obtaining sensitive data or installing surveillance devices in order to engage in ongoing monitoring of targeted entities. “Back door†probes and attacks were the province of non-state actors, especially criminal organisations, seeking to obtain private information of individuals and groups for fraudulent use. However, the recent attacks have been of the “back door†variety yet purportedly state sanctioned, and the Snowden leaks have revealed that 5 Eyes targets the personal communications of government officials, diplomats, military officials and corporate managers as a matter of course.
The move to state-sponsored “back door†hacks is ominous. Accessing data about current and retired government employees can be used to blackmail those suffering personal liabilities (debt, infidelity) in order to obtain sensitive information about government processes, procedures, protocols and policy. It can target active and former intelligence and military officials and others with access to classified information. It can target former public officials that have moved to the private sector, particularly in fields of strategic or commercial importance. Likewise, obtaining sensitive personal data of employees working in private firms opens the door to similar exploitation for illicit commercial gain.
Advances in consumer telecommunications have made cyber hacking easier. Smart phones and their applications are considered to be the most vulnerable to hacking. Because many people store an enormous amount of personal data on these devices, and because they often mix work and personal business on them, they represent an enticing entry point when targeted. Yet even knowing this millions of consumers continue to pack their lives into electronic devices, treating them more as secure bank vaults rather than as windows on their deepest secrets. Not surprisingly, both state and non-state actors have embarked on concerted efforts to penetrate mobile networks and hand-held devices. Encryption, while a useful defense against less capable hackers, only slows down but does not stop the probes of technologically sophisticated hackers such as those in the employ of a number of states.
The bottom line is this: the smaller the telecommunications market, the easier it is for cyber hackers to successfully place backdoor “bugs” into the network and targets within it, especially if government and corporate resources are directed towards defending against “front door” attacks. On the bright side, it is easier to defend against attacks in a smaller market if governments, firms, service providers and consumers work to provide a common defense against both “front door” and “back door” hacking.
The implications for New Zealand are significant.
In this new battleground physical distance cannot insulate New Zealand from foreign attack because cyber-war knows no territorial boundaries. New Zealand provides an inviting target because not only is an integral and active member of Western espionage networks, it also has proprietary technologies and intellectual property in strategic sectors of its trade-dependent economy (including niche defense-related firms) that are of interest to others. Because New Zealand’s corporate, academic and public service elites are relatively small and the overlap between them quite extensive, hacks on their personal data are a valuable tool of those who wish to use them for untoward purposes.
New Zealand public agencies and private firms have been relatively slow to react to the threat of cyber warfare. The data they hold on their employees, managers, policy elites and general population is an inviting “back door†for determined hackers seeking to exploit vulnerabilities in New Zealand’s cyber networks. Since many Kiwis are lax about separating their work and private electronic correspondence and records, the potential to access sensitive personal information is high.
New Zealand has been the subject of numerous “front door†cyber attacks and probes on public and private agencies, including an attack by Chinese-based hackers on the NIWA supercomputer carried out in concert with a similar attack by the same source on the supercomputer run by the US National Oceanographic and Atmospheric Administration (NIWA’s US counterpart). New Zealanders have been the targets of numerous “back door” intrusions such as phishing and other scams perpetrated by fraudsters and conmen. Yet successive governments have been slow to recognize the new threat advancing towards it in the cyber-sphere, only recently creating dedicated cyber security cells within the intelligence community and just last year amending the GCSB Act to address vulnerabilities in domestic internet security. But it still may not be enough.
Until New Zealand resolves the problem of institutional lag (that is, the time gap between the emergence of a technologically-driven threat and an institutional response on the part of those agencies responsible for defending against it), there is reason to be concerned for the security of private data stored in it. After all, in the age of cyberwar there is no such thing as a benign strategic environment.
Beware the sucker ploy.
A few years back I wrote about the strategic utility of terrorism. One thing I did not mention in that post was the use of a tried and true guerrilla tactic as part of the terrorist arsenal: the sucker ploy.
In guerrilla warfare the sucker ploy is a tactic whereby the weaker irregular forces stage an incident in order to provoke an over-reaction from their stronger adversaries. Examples include killing a local official so as to have the security forces engage in mass repression of the people in the locality in which he worked. Another is firing at enemy aircraft or armour from inside villages in order to have them retaliate indiscriminately against the entire village. The objective is to alienate and erode support for the enemy by the victims.
For the last five years or so, the international jihadist movement spearheaded by al-Qaeda and now the Islamic State have evolved their tactics to suit the strategic environment they are confronted with. No longer able to carry out large scale attacks such as 9/11 or the Bali, London and Madrid bombings, would-be jihadists have been encouraged to engage in self-radicalised “lone wolf” or small-cell attacks within their respective countries using their familiarity with the local terrain and knowledge of local customs and symbology. These are low level, highly independent and autonomous operations, as was seen in the Boston Marathon bombings last year.
Attacks of this nature are tactically opportune but strategically insignificant. They do not present an existential challenge to any established state. By themselves they are tragic but politically inconsequential.
The motives and desired impact of the perpetrators may differ from those of the Islamicist leadership. Perpetrators may wish to strike a blow and sow localised fear while achieving martyrdom. The Islamicist leadership desires a strategic victory. The only way that it can do so is to use these types of attacks as a sucker ploy.
If governments respond to lone wolf and small cell low level terrorism with blanket increases in mass surveillance, national threat levels, expansion of security and anti-terrorism laws and restrictions on freedoms of association, movement and speech by groups associated with the perpetrators by virtue of religion, ethnicity or the like, then the strategic objectives of the Islamicist leadership are being served. That is because such measures target innocents, not only on an indiscriminate mass scale but often because of who they are rather than anything they have done. That further alienates and marginalises previously passive but increasingly disaffected sectors of society, thereby delegitimising governmental authority while breeding new recruits to the cause.
The temptation for democratic governments responding to such attacks to engage in large scale security tightening is overwhelming, which is of course what the Islamicists are banking on. The public needs reassurance, security agencies see opportunity and conservative politicians want their pound of flesh. Few opposition politicians want to appear soft on the threat of terrorism, Â much less by opposing moves to “tighten” security in the wake of lethal attacks in the West motivated by Islam. But that urge, even if given carte blanche by the media-fed hysteria of the moment, needs to be tempered with a broader perspective and deeper analysis of what is at play.
Of course security measures need to be in place in order to thwart such low-level attacks. In Ottawa they clearly were not. But this is no excuse to engage in a knee-jerk over-reaction that results in the type of divisive measures that serve the purposes of the Islamicists more than the population at large. To do so is to fall into the trap set by the Islamicst leadership when they ordered the shift in tactics towards decentralised low level operations conducted by “home-grown” jihadis.
A couple of points worth mentioning: The Canadian threat environment and exposure to Islamic terrorism is different and greater than that of New Zealand and has been for some time. IS had directly threatened Canada before the attacks because Canada has actively joined the conflict by sending ground attack aircraft and special forces troops to the fray.
The perpetrators responsible for this week’s crimes were not returning from the killing fields of Syria or Iraq. They were native born Quebecois, evidencing mental halt issues, with prior criminal records who were known to the Canadian authorities. They were recent converts to Islam, one of whom had been placed on a so-called “watch list” and had his passport revoked because of his overt Islamicist sympathies. The other, a recovering drug addict, was waiting for a passport application to be processed, was living in a half way house, and was frustrated by the delays in securing the passport. Â Unable to leave Canada, both turned their murderous gaze inwards.
This should serve as a lesson on several levels. But the foremost one is simple: beware the sucker ploy.
Another National double standard.
Maurice Williamson is forced to resign as Minister because he made a phone call to the police asking them to be undertake a thorough review and be “on solid ground” when investigating a domestic violence incident involving a wealthy Chinese friend of his who invested a lot of money in New Zealand (the same Chinese fellow granted citizenship over the objections of immigration authorities, and who donated more than NZ$ 20 thousand to National in 2012).
Judith Collins retains her ministerial portfolios in spite of revelations that she interceded with Chinese officials on behalf of her husband’s export company while on an official visit to China that had nothing to do with exports or trade.
What is similar and what is different about the two cases? They are similar in that they both involve Chinese nationals with economic ties to the National party or entities linked to it. They are similar in that the ministerial interventions were in violation of the cabinet manual regarding conflicts of interest. They also represent obvious forms of political influence peddling.
How are they different? Collins is a a key player on National’s front bench, whereas Williamson is on the outers with National’s heavy hitters. Thus he is expendable while she is not.
Comparatively speaking, Williamson’s crime was arguably less than that of Collins. He made a call on behalf of a constituent urging Police diligence when investigating the charges against his friend, then left the matter at that. The fact that rather than tell the minister to buzz off the cops bent over backwards to satisfy him that they were on “solid ground” before prosecuting is a police issue, not a Williamson issue (the Police decided to prosecute in any event, with Mr. Liu eventually pleading guilty to two charges of domestic violence).
Collins used taxpayer funded official travel to take time out of her official schedule to divert and meet with Chinese business associates of her husband over dinner in the presence of an unnamed Chinese government official at a time when her husband’s business interests in China were being hindered by official reviews of New Zealand based export contracts. Although she had no real business being there, she brought an aide with her, adding to the impression that her presence at that dinner had the stamp of official approval.
Of the two, which is more obviously a conflict of interest and which has the clear stench of corruption wafting over it? Of the two, which one would be viewed more dimly by the likes of Transparency International (the anti-corruption agency that habitually lists NZ amongst the least corrupt countries to do business in)?
Hypocrisy much in the handling of the two cases by the Prime Minister? You be the judge, by I think that there is.
Monitoring Syrians and Supplicants.
The subject of spying is back in the news this week, but the coverage has been inadequate. Allow me to clarify some issues, first with regard to those who want to join the Syrian conflict and second with regard to politicians trying to ingratiate themselves with Kim Dotcom.
Contrary to the thrust of the coverage, not all those seeking to join the Syrian conflict are Syrian or descendants of Syrians. The Syrian War is a civil war between Shiia and Sunnis, where the minority Alawite-backed Assad regime is fighting to maintain its grip over a majority Sunni population (Alawites are a sub-sect of Shiia Islam). For a variety of affective and strategic reasons Iran (a very large Shiia dominant country) supports the Assad regime while Sunni-controlled Saudi Arabia and Gulf oligarchies back the armed opposition. This opposition is divided into what can be loosely called secular moderates (such as those grouped in the Free Syrian Army) and Islamicists (such as those in the al-Nusra Front and Al-Qaeda in Iraq and the Levant).
The latter have come to dominate the military side of the opposition due to their superior combat skills and determination. Their ranks include Sunni internationalists from all over the world (including New Zealand) who see joining the struggle as a religious imperative. Egyptians, Jordanians, Pakistanis, Britons, Australians and French nationals are among those fighting in Islamicist ranks. That has led to serious clashes with the moderate secularists (who do not have as many internationalists in their ranks, although there are some), to the point that the fighting between the armed opposition factions has allowed the Assad regime to re-gain the upper hand in the overall struggle after being near collapse just six months ago.
Where the armed opposition is winning, it is the Islamicists who are doing so.
In the last nine months the Prime Minister has made repeated reference to would-be New Zealand jihadis joining the fight in Syria. Some are already there and others have been barred from going. They may or may not be Syrian in origin, but his use of the “Syrian trump card” is a naked political ploy designed to use fear-mongering as a justification for extension of domestic espionage and, perhaps, as a way of pre-emptively steeling public opinion against the negative consequences of the inevitable revelations from Edward Snowden about New Zealand’s foreign espionage role within the Five Eyes/Echelon signals intelligence collection network. The trouble with the PM’s ploy is that the proclaimed threat does not match the facts.
According to the government ten New Zealand passports have been revoked since 2005 and a handful of Kiwis are in Syria fighting. The PM makes it sound as if all these have associations with extremist Islam. Perhaps they do, but the Syrian conflict only heated up as of early 2012, so the Syrian card does not explain why passports were cancelled prior to that. Moreover, the PM says that passports were cancelled in order to prevent “radicalized” Kiwis from returning and making trouble at home. That begs the question as to what the frustrated wanna-be jihadis are going to do now that their plans are thwarted and they are forced to remain in the country under heavy scrutiny.
A Syrian community spokesman has said that two brothers had their passports revoked after their parents informed authorities of their plans to travel back home to join the fight. He also accused the PM and his government of “racial discrimination.” The latter claim is ridiculous and shows a gross misunderstanding of how democratic governance works. John Key did not personally order the revocation of any passports nor does he have the power to rescind the cancellation order. New Zealand authorities did not cancel the brother’s passports because they were Syrian but because of their purported intentions. They did not target the entire Syrian community for who they are.
In fact, under current legislation the government is well within its rights to revoke passports on the grounds that the individuals involved intend to become or are part of a criminal enterprise, of which terrorism is one. Since the Islamicists fighting in Syria are considered terrorist organizations by the New Zealand government, any intent to join them could be construed as an attempt to engage in criminal activity. One might argue that the definition of terrorism is too broad (and I believe that it is), but as things stand the government’s concern about returning, combat experienced jihadis is a legitimate motive for canceling passports.
I shall leave aside the fact that the chances of survival of those joining the Syrian conflict is quite low* and they are being monitored in any event, so mitigating the potential threat posed by returning jihadis is not as formidable as Mr. Key implies. There are technical means of tracking the location of passports, and the individuals who are in Syria or want to go there have been identified already via domestic intelligence gathering. In fact, allowing suspects to travel while being secretly monitored is a standard intelligence collection method, so one can reasonably assume that the handful of Kiwi internationalists in Syria as well as their as of yet to travel brethren are the focus of both human and signals intelligence collection efforts by local espionage agencies in conjunction with foreign counterparts.
However, Mr. Key’s repeated public use of the Syrian card certainly has alerted any would-be extremists in the New Zealand Muslim community that they have been infiltrated by the Police and SIS and that there are informants in their midst. In fact, the New Zealand Muslim community is a bit of a sieve since 9/11 because personal, sectarian and financial vendettas as well as legitimate concerns about ideological extremism have seen the accusation of “terrorist” thrown around quite freely within it. This has been well known inside security circles (who have to separate bogus from legitimate accusations of terrorist sympathies), but the PM’s public disclosure has given potential jihadis a clear signal to exercise increased caution and diligence when planning future violence (should there be any).
The most important issue, however, is the selective application of the passport revocation authority. If would-be Islamic internationalists have not been convicted of crimes in New Zealand, and barring clear evidence that they intend to engage in crime abroad, then they should be allowed free passage to travel. If they engage in war crimes or crimes against humanity during a foreign conflict (be it in Syria or elsewhere), they can be charged upon their return, or even detained on the suspicion of complicity in said crimes. This is not a far-fetched speculation because both the Assad regime and its armed opposition have committed a raft of atrocities that fall under both definitions of illegal war-time behavior.
This applies equally to those who may choose to join non-Islamicist groups in other foreign conflicts (for example, by joining Christian militias in the Central African Republic), so specifically targeting those intending to go to Syria to fight is, in fact, selective if not discriminatory application of the relevant law. As far as following the Australian example and making it illegal to join a foreign conflict under penalty of imprisonment or revocation of citizenship, one can only hope not.
The simple fact is that would-be jihadis and other internationalists should be free to join any foreign conflict. They assume the risk of doing so and understand that they give up the diplomatic protections usually reserved for citizens traveling abroad. Should they be deemed a potential threat upon their return (in the event that they do), then it is the responsibility of local law enforcement and intelligence agencies to mitigate that threat within the rule of law. As I have alluded to above, that is not particularly hard to do in the New Zealand context.
As for politicians meeting with Dotcom, the issue is far more simple than sinister. Dotcom is a NZ permanent resident who is a fugitive from US justice still under extradition warrant (which is being argued in court). The authorities may well consider him a flight risk because he certainly has the means to do so. They may believe that he is continuing his criminal associations or practices while his court case is being heard (I shall refrain from making bad jokes about those who have flocked to his side during the GCSB Bill debates, or about the politicians who have knocked on his door). Given his penchant for partying and those he associates with when doing so, they may want to catch him in possession of illegal drugs.
Thus the Police would have legitimate reason to run ongoing surveillance operations on him, and can do so legally with or without the help of the SIS and now, thanks to the passage of the GCSB Bill, the GCSB. In doing so, they would monitor and record the comings and goings of visitors to his mansion, with that information passed up the chain of command.
That is why Mr Key’s version of how he came to know about Mr. Peters’ treks to the Coatesville property is odd. He claims that he got his information about Dotcom’s political visitors from Cameron Slater working with or independently from a Herald gossip columnist. That is troubling.
The Right Honorable John Key is the Minister of Intelligence and Security, so presumably he is aware of the status of security operations and the Dotcom case in particular given its history. But he claims that he received domestic espionage information about Dotcoms’s visitors from a right-wing, admittedly partisan “attack” blogger, rather than from the security agencies for which he is responsible and who have a legal right to monitor Mr. Dotcom. That is a sign of incompetence or willful ignorance on his part.
I have shares in a Bolivian gold mine I am willing to sell at a very affordable price to readers who believe a sociopath was the first source of the Dotcom visit data provided to the PM. Â Perhaps I am wrong and it is simply too much for domestic law enforcement and intelligence agencies to pursue the monitoring of Dotcom for a supposed copyright infringement when so many Syrian-focused terrorists abound. But given the amount of resources expended and the reputational stakes involved, it would not be surprising and in fact legal for security agencies to do so.
I would suggest that if people like Winston Peters are concerned about being spied on when visiting Mr. Dotcom, then they should look at their own roles in allowing that to happen. Since 9/11 the legal powers and practical reach of the domestic espionage apparatus have been increased incrementally yet extensively under both Labour and National governments. Other than a relatively small number of Left activists and the Green Party (as well as ACT while Rodney Hide was still around to lead it), neither the majority public or the majority of political parties did anything to oppose this extension.
In fact, although Labour party figures and Winston Peters joined Kim Dotcom on the stage at various anti-GCSB Bill protests last year, and the bow-tied buffoon with a pompadour posing as a political party objected to having his personal communications accessed during the course of an investigation into leaks of confidential government information, Labour is responsible for the majority of the extensions and Dunne and Peters supported all of them. National has merely deepened the trend towards a surveillance society.
Hence, whatever Labour, NZ First or United Future may say now as a way of partisan point-scoring, they are full accomplices in the erosion of Kiwi privacy rights over the last decade. Any current whinging about violations of their personal and the larger collective privacy should be dismissed as cowardly rank hypocrisy.
In any event, when it comes to intrusions on basic freedoms of association, privacy and travel, not only Syrians living in New Zealand have reason to feel aggrieved.
* This is due to the immutable Buchanan rule of ground warfare: if you are firing your weapon over your head, or firing blindly around corners in the general direction of the enemy, you will not last long once s/he closes in. Should that rule be miraculously violated without consequence, the fifth Buchanan rule of asymmetrical warfare comes into effect: strapping explosives or amulets to your body in the hope of divine intervention is based on a false premise.