pe

Experts weigh in (part 3): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago.

Next up was Aymenn al-Tamimi, a Jihad-Intel research fellow at the Middle East Forum, who argued that internal documents show increasing challenges for the Islamic State. 

This time, we’ve asked Aaron Zelin, the Richard Borow Fellow at the Washington Institute for Near East Policy, to weigh in with a historical perspective.


Aaron Zelin: Attempts by salafi-jihadis to create states or govern territory are not a new phenomenon. Even for the Islamic State (IS), this is its second attempt at establishing a state and governing territories it controls. What sets it apart this time is the level of planning, sophistication, and capabilities compared to ten years ago.

Unlike the prior pieces in this series, I hope to present a historical perspective on IS governance, since I do not think one can be separate from the other.

The first state

In October 2006—when the Islamic State of Iraq (ISI) was declared—the leader of al-Qaida in the Land of Two Rivers (better known as AQI), Abu Ayyub al-Masri (Abu Hamza al-Muhajir) pledged allegiance to the new self-declared leader of the faithful, Abu ‘Umar al-Baghdadi. In a January 2007 book, ISI’s Shaykh ‘Uthman ‘Abd al-Rahman al-Tamimi explains the rationale for declaring the state. In it, he also outlines the state’s responsibilities for areas it controls: prosecuting criminals and sinners, implementation of the hudud (fixed punishments in the Qur’an and Hadith), mediating and resolving conflicts, providing security, distributing food and relief, and selling oil and gas. 

Although it called itself a state, the Islamic State of Iraq controlled only small amounts of territory, for limited periods of time—in no small part because of the American military occupation, but also due to insurgent and tribal competition for power. It attempted to show a veneer of legitimacy by establishing a cabinet of ministries in April 2007 and September 2009. Because of ISI’s limitations, it was nearly impossible to resolve conflicts, provide security, distribute food and relief, or sell oil and gas. Instead, it fell back on mostly only instituting hisba (moral policing) activities and targeting enemies as murtadin (apostates) and therefore legitimate to target and kill. Ten years ago, therefore, ISI did not live up to its own standards of governance excellence.

Ten years ago, therefore, ISI did not live up to its own standards of governance excellence.

ISI killed and kidnapped leaders from prior allies—such as the Islamic Army of Iraq, Ansar al-Sunnah, and other insurgent factions—because they were unwilling to pledge allegiance to al-Baghdadi. It required female residents to wear the niqab, burned down beauty salons and stores selling music, flogged individuals for drinking alcohol or smoking cigarettes, and banned barbers’ use of electric razors. ISI also banned positioning certain fruits next to one another at markets out of concerns over sexual innuendo, as well as banned the local bread (samun) and the use of ice. In town after town, this precipitated what eventually became known as the tribal sahwa, or awakening. That, along with the U.S. military surge in Iraq, tactically defeated ISI by 2009.

Towards a second state

Since ISI was only tactically and not strategically defeated, it used the American drawdown of troops that ended in December 2011, Sunni grievances with the Nouri al-Maliki regime in Baghdad, and most importantly the battlefield next door in Syria to rebuild its infrastructure and capabilities. As I noted in March 2013, a month before it changed its name to the Islamic State of Iraq and al-Sham (ISIS): “Through sectarian rhetoric, [ISI] will use the Syrian fight to try and gain more recruits in Iraq and redeem itself for its lost opportunity last decade.” Indeed it did. This time proved much different than a decade earlier. It also had a provisional position paper that outlined how it sought to take over territory and govern.

Prior to the infighting that began in January 2014 between ISIS and revolutionary, Islamist, and other jihadi factions in Syria, there was an understanding among the different insurgent forces against the Assad regime. As a consequence, ISIS was able to embed itself within the broader anti-Assad coalition even if other factions were wary of it—unlike now, when IS has pariah status. From April 2013 to January 2014, ISIS’s main focus was to present itself in a positive light to the Syrian population through da’wa (missionary) forums and by providing services. It also conducted softer moral policing, such as burning cigarettes or confiscating alcohol. But similar to a decade ago, it also killed other leaders from Syrian insurgent factions, prompting backlash. ISIS was pushed out of Latakia, Idlib, and parts of Aleppo governorates between January and March 2014. 

This led to ISIS’s independent consolidation of territory farther to the east in the Raqqa governorate and parts of Dair al-Zour governorate. It is also when more harsh punishments began to appear, such as cutting off hands for robbery or crucifying alleged apostates. In this period, ISIS also sought to appear as a state-like entity, showing off its various administrative departments including its da’wa offices, shariah courts, religious schools, police stations, and local municipalities, among others. It was an uneven process across its proto-wilayat (provinces) until its June 2014 declaration of the Caliphate, when ISIS changed its name again—to IS.

The second state

Since then, based on my review of thousands of IS media releases, a pattern emerged in IS attempts to expand, take over new territory, and consolidate its control. IS’s systematizing, bureaucratizing, and formalizing its governance structures allow it to operate consistently and in parallel across its various wilayat. This governance model can equally be applied in its core territory of Iraq and Syria as well as various other provinces. It is far more advanced than its prior incarnations, let alone al-Qaida branches (the closest instance being al-Shabab in Somalia).

IS’s systematizing, bureaucratizing, and formalizing its governance structures allow it to operate consistently and in parallel across its various wilayat.

My research demonstrates that IS state-building exhibits two stages: pre- or partial territorial control and full territorial control. Within these two categories are five phases of establishing control: intelligence, military, da’wa, hisba (consumer protection and moral policing), and governance. Although hisba would generally be considered part of IS’s governance apparatus, I separated the two—this helps distinguish the level of advancement and sophistication associated with meting out justice, versus that associated with actual services, administration, and economic activity, since the former is easier to implement than the latter. More details with specifics and case studies can be found here.

When compared with its first state as ISI and its building toward a second state as ISIS, the post-June 2014 IS structures, plans, and implementation are far superior.

When compared with its first state as ISI and its building toward a second state as ISIS, the post-June 2014 IS structures, plans, and implementation are far superior. Further, depending on the date and the particular province, IS did live up to its own standards of governance. That’s not to legitimize it, but rather to understand it on its own terms. This increased efficacy illustrates the organization’s ability to learn from past experiences. It also suggests that IS may apply lessons learned as more of its governance plays out in areas outside of Iraq and Syria—especially in Libya, but possibly even in Yemen or Afghanistan in the future. New knowledge will sharpen IS’s thinking and continue its growth and evolution as well as shorten its learning curve.

Therefore, aspects of the IS model could shift in the future. Moreover, since the American-led airstrikes began, its capabilities have been slowly diminished. As a result, it is currently difficult to determine whether IS is living up to its standards anymore.

Moreover, since the American-led airstrikes began, its capabilities have been slowly diminished. As a result, it is currently difficult to determine whether IS is living up to its standards anymore.

Watch and learn

Similar to IS, al-Qaida is in the process of learning lessons from the governance experience of the ISI in the mid-2000s. It is also looking back on its first attempted cases of governance activities by its own branches in the past several years in Somalia, Yemen, Mali, and Syria. Unlike IS, al-Qaida is attempting to root itself into local insurgencies in Libya, Syria, Yemen, and Mali, and not play a monopolizing role (at least for now). The second governance attempt by al-Qaeda in the Arabian Peninsula (AQAP) is still in its infancy, but its performance will provide more answers about the evolution in al-Qaida’s thinking on governance and how it differs from IS’s second governance attempt. 

The establishment of jihadi governance projects are a new normal. For now, it’s clear that IS has set a higher standard when compared to its earlier attempt a decade ago and to al-Qaida’s present governance. But the question going forward is whether either IS’s or al-Qaida’s models (or both) will be able to self-sustain in the long-term as they continue to incorporate lessons learned.

Authors

     
 
 




pe

Experts weigh in (part 4): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance.

Now, we have Kamran Bokhari, a fellow with George Washington University's Program on Extremism, to argue that security—namely defending territory—is the foremost governance objective of ISIS in the short term.


Kamran Bokhari: Ascertaining the extent to which ISIS excels at governing requires, among other things, an understanding of its imperatives and capabilities. The most fundamental act of governance for any state is protecting its territory. With many of the world’s most powerful militaries now dedicating significant resources towards the Islamic State’s destruction, the group has its work cut out for it in this regard. Defending its current territorial holdings in Syria and Iraq (and expanding if and where possible) is the single most critical imperative for ISIS.

This is not to say that other aspects of governance, including those detailed by Mara Revkin, Aymenn al-Tamimi, and Aaron Zelin, are not priorities for ISIS. The polity erected by the transnational jihadist movement cannot hope to survive—much less expand—without the provision of essential services such as sanitation, utilities, healthcare, and education to its citizenry. However, ISIS can only focus so much on these functions when the areas it controls are under attack on multiple fronts. In the last few months, it has lost ground in certain areas—largely in Iraq—but its core turf in Syria remains intact. 

This resilience should sharpen the focus of U.S. and Western military and intelligence institutions. At present, analysts and policymakers focus too much on ISIS’s ideology and too little on its war-making tradecraft. Radicalization is necessary but not sufficient to produce violence—definitely not on the scale that ISIS has demonstrated. The geopolitical real estate directly under ISIS control in Syria and Iraq is about the size of the state of New York; if we include the swathes of land where it enjoys relative freedom of operation, it’s approximately as big as Great Britain. 

Defending such a wide expanse against ground assaults, airstrikes, special operations forces missions, as well as human and signals intelligence probes requires elaborate institutionalization. Aaron Zelin details how ISIS systematized bureaucratic structures between the fall of its first attempt at statehood (2006 to 2009) and its second incarnation (2011 to the present). During these periods, it crucially developed a multi-divisional conventional military and counter-intelligence. In addition to its primary need to defend its nascent state, the jihadist movement has spent most of its existence developing military and intelligence capabilities, which played a key role in its emergence as the most potent rebel force in post-Arab spring Syria. 

Where did ISIS leaders pick up their self-defense strategies? One answer is al-Qaida, though many analysts over-emphasize that linkage. ISIS leadership has also likely studied the rise and fall of the Islamic Emirate of Afghanistan. Run by the Afghan Taliban, the Emirate was the first and only contemporary jihadist movement to have established a state of any significance before ISIS. There are differences, of course. The Taliban emirate was based within the confines of the Afghan nation-state, and enjoyed active backing from Pakistan and other Gulf Arab states. Furthermore, ISIS leader Abu Bakr al-Baghdadi has denounced the movement founded by Mullah Mohammed Omar as a “deviant” entity. However, the experiences of the Afghan Taliban from 1996 to 2001 offer very valuable lessons for ISIS—all the more since the latter’s caliphate rejects national boundaries and lacks state sponsorship. 

Security first

ISIS leaders fear losing their nascent state in the face of growing economic and military pressures. They seek to avoid, in particular, the circumstances that allowed for the collapse of the Taliban regime following the September 11 attacks. Many have asked why ISIS would engage in transcontinental attacks in the West if its primary aim is the preservation of its polity. As Shadi Hamid has discussed, ISIS likely does not view its terrorist attacks like the one in Paris as undermining its state. I would actually argue that ISIS sees a U.S. ground intervention as only helping its cause. What it fears is a more complex approach from the Americans involving Syrian boots on the ground. 

Thus in many ways, ISIS’s caliphate today faces circumstances similar to the ones that the Taliban emirate did in late 2001. The U.S.-led coalition against the Taliban launched airstrikes, while intelligence and special operations forces supported an anti-Taliban militia coalition, the proverbial “boots on the ground.” Fast-forward 15 years, and the battlespace that ISIS finds itself in—though much more complex—has the same basic configuration. The ISIS leadership is now vigorously searching for ways to endure airstrikes, block intelligence efforts, and thwart special operations missions designed to take out critical leadership and infrastructure. 

Perhaps most pressing is the need to prevent the emergence of a critical mass of Kurdish and/or rival jihadist militias to whom ISIS could potentially lose significant tracts of land. In Afghanistan, anti-Taliban militiamen with U.S. support were able to stage a comeback from their bases in northern Afghanistan near the Tajikistan border, sweeping through Kabul and even seizing the Taliban’s home turf of Kandahar. ISIS does not want to experience something similar to that, with Syrian rebel forces turning toward its territory in eastern Syria, especially now that they have run into serious problems in western parts of the county. There, regime forces backed by Russian aircraft are gaining the upper hand in critical places in Aleppo and Idlib provinces. U.S. strategy, for its part, seems to be focused not on the collapse of the Assad regime but rather in equipping rebel forces to take on ISIS. Some rebels may do so in the hope of garnering greater Western support. 

For these reasons, ISIS needs to ensure that both those in its own ranks as well as the people over whom it rules have little incentive to desert or rebel. Coercion helps, but only to a certain extent. The Afghan Taliban learned this lesson the hard way, when the very same population that had initially welcomed it as protectors against anarchy turned against the movement and were instrumental in the implosion of its state. This is why the ISIS regime will try to balance coercion and the provision of quality services (which Mara Revkin highlights). But as Aymenn al-Tamimi notes, financial constraints seriously limit the organization’s ability to sustain public support by providing essential services without having to resort to tax increases. 

Civilian administration is a relatively new activity for ISIS, and it therefore will take time to improve its performance. In the short term, ISIS will focus more heavily on the security aspects of governance. It is better equipped and experienced in this sphere, given its own prior experience as non-state jihadist force. ISIS is likely to continue to focus on what it knows best, as doing so offers it a better chance of holding hard-fought ground against its opponents.

Authors

      
 
 




pe

Experts Weigh In (part 3): What is the future of al-Qaida and the Islamic State?


Will McCants: As we continue onwards in the so-called Long War, it’s a good time to reflect on where we are in the fight against al-Qaida and its bête noire, the Islamic State. Both organizations have benefited from the chaos unleashed by the Arab Spring uprisings but they have taken different paths. Will those paths converge again or will the two organizations continue to remain at odds? Who has the best strategy at the moment? And what political changes might happen in the coming year that will reconfigure their rivalry for leadership of the global jihad?

To answer these questions, I’ve asked some of the leading experts on the two organizations to weigh in. First was Barak Mendelsohn, who analyzed the factors that explain the resilience and weaknesses of both groups. Then Clint Watts offered ways to avoid the flawed assumptions that have led to mistaken counterterrorism forecasts in recent years. 

Next up is Charles Lister, a resident fellow at the Middle East Institute, to examine the respective courses each group has charted to date and whether that's likely to change. 


Charles Lister: The world of international jihad has had a turbulent few years, and only now is the dust beginning to settle. The emergence of the Islamic State as an independent transnational jihadi rival to al-Qaida sparked a competitive dynamic. That has heightened the threat of attacks in the West and intensified the need for both movements to demonstrate their value on local battlefields. Having spent trillions of dollars pushing back al-Qaida in Afghanistan and Pakistan and al-Qaida in Iraq, the jihadi threat we face today far eclipses that seen in 2000 and 2001.

As has been the case for some time, al-Qaida is no longer a grand transnational movement, but rather a loose network of semi-independent armed groups dispersed around the world. Although al-Qaida’s central leadership appears to be increasingly cut off from the world, frequently taking many weeks to respond publicly to significant events, its word remains strong within its affiliates. For example, a secret letter from al-Qaida leader Ayman al-Zawahiri to his Syrian affiliate the Nusra Front in early 2015 promptly caused the group to cease plotting attacks abroad.

Seeking rapid and visible results, ISIS worries little about taking the time to win popular acceptance and instead controls territory through force.

While the eruption of the Arab Spring in 2010 challenged al-Qaida’s insistence that only violent jihad can secure political change, the subsequent repression and resulting instability provided an opportunity. What followed was a period of extraordinary strategic review. Beginning with Ansar al-Sharia in Yemen (in 2010 and 2011) and then with al-Qaida in the Islamic Maghreb (AQIM), Ansar al-Din, and the Movement for Unity and Jihad in West Africa (MUJAO) in Mali (2012), al-Qaida began developing a new strategy focused on slowly nurturing unstable and vulnerable societies into hosts for an al-Qaida Islamic state. Although a premature imposition of harsh Shariah norms caused projects in Yemen and Mali to fail, al-Qaida’s activities in Syria and Yemen today look to have perfected the new “long game” approach.

In Syria and Yemen, al-Qaida has taken advantage of weak states suffering from acute socio-political instability in order to embed itself within popular revolutionary movements. Through a consciously managed process of “controlled pragmatism,” al-Qaida has successfully integrated its fighters into broader dynamics that, with additional manipulation, look all but intractable. Through a temporary renunciation of Islamic hudud (fixed punishments in the Quran and Hadith) and an overt insistence on multilateral populist action, al-Qaida has begun socializing entire communities into accepting its role within their revolutionary societies. With durable roots in these operational zones—“safe bases,” as Zawahiri calls them—al-Qaida hopes one day to proclaim durable Islamic emirates as individual components of an eventual caliphate.

Breadth versus depth

The Islamic State (or ISIS), on the other hand, has emerged as al-Qaida’s obstreperous and brutally rebellious younger sibling. Seeking rapid and visible results, ISIS worries little about taking the time to win popular acceptance and instead controls territory through force and psychological intimidation. As a militarily capable and administratively accomplished organization, ISIS has acquired a strong stranglehold over parts of Iraq and Syria—like Raqqa, Deir el-Zour, and Mosul—but its roots are shallow at best elsewhere in both countries. With effective and representative local partners, the U.S.-led coalition can and will eventually take back much of ISIS’s territory, but evidence thus far suggests progress will be slow.

Meanwhile, ISIS has developed invaluable strategic depth elsewhere in the world, through its acquisition of affiliates—or additional “states” for its Caliphate—in Yemen, Libya, Algeria, Egypt, Afghanistan, Pakistan, Nigeria, and Russia. Although it will struggle to expand much beyond its current geographical reach, the growing importance of ISIS in Libya, Egypt, and Afghanistan-Pakistan in particular will allow the movement to survive pressures it faces in Syria and Iraq. 

As that pressure heightens, ISIS will seek to delegate some level of power to its international affiliates, while actively encouraging retaliatory attacks—both centrally directed and more broadly inspired—against high-profile Western targets. Instability breeds opportunity for groups like ISIS, so we should also expect it to exploit the fact that refugee flows from Syria towards Europe in 2016 look set to dramatically eclipse those seen in 2015.

Instability breeds opportunity for groups like ISIS.

Charting a new course?

That the world now faces threats from two major transnational jihadist movements employing discernibly different strategies makes today’s counterterrorism challenge much more difficult. The dramatic expansion of ISIS and its captivation of the world’s media attention has encouraged a U.S.-led obsession with an organization that has minimal roots into conflict-ridden societies. Meanwhile the West has become distracted from its long-time enemy al-Qaida, which has now grown deep roots in places like Syria and Yemen. Al-Qaida has not disappeared, and neither has it been defeated. We continue this policy imbalance at our peril.

In recent discussions with Islamist sources in Syria, I’ve heard that al-Qaida may be further adapting its long-game strategy. The Nusra Front has been engaged in six weeks of on/off secret talks with at least eight moderate Islamist rebel groups, after proposing a grand merger with any interested party in early January. Although talks briefly came to a close in mid-January over the troublesome issue of the Nusra Front’s allegiance to al-Qaida, the group’s leader Abu Mohammed al-Jolani now placed those ties as an issue on the table for negotiation. 

Al-Qaida has not disappeared, and neither has it been defeated.

The fact that this sensitive subject is now reportedly open for discussion is a significant indicator of how far the Nusra Front is willing to stretch its jihadist mores for the sake of integration in Syrian revolutionary dynamics. However, the al-Nusra Front's leader, Abu Mohammed al-Jolani, is a long-time Al-Qaeda loyalist and doesn't fit the profile of someone willing to break a religious oath purely for the sake of an opportunistic power play. It is therefore interesting that this secret debate inside Syria comes amid whispers within Salafi-jihadi and pro-al-Qaida circles that Zawahiri is considering “releasing” his affiliates from their loyalty pledges in order to transform al-Qaida into an organic network of locally-inspired movements—led by and loosely tied together by an overarching strategic idea.

Whether al-Qaida and its affiliates ultimately evolve along this path or not, the threat they pose to local, regional, and international security is clear. When compounded by ISIS’s determination to continue expanding and to conduct more frequent and more deadly attacks abroad, jihadist militancy looks well-placed to pose an ever present danger for many years to come. 

Authors

      
 
 




pe

Experts weigh in (part 5): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance. And Kamran Bokhari argued that security—namely defending territory—is the foremost governance objective of ISIS in the short term.

Below is an analysis from Quinn Mecham, Assistant Professor of Political Science at Brigham Young University. He focuses on the need to provide alternative, positive models of governance for the populations living under ISIS control.


Quinn Mecham: The Islamic State group (ISIS), despite clear pretentions to statehood in the form of the “caliphate” it declared in June 2014, does not preside over a particularly successful “state.” It faces numerous challenges from both within and without, challenges that accelerated in 2015 with increasingly systematic airstrikes on ISIS fighters and facilities by numerous external actors. 

However, the governing institutions over which the Islamic State presides currently represent the best approximation of institutionalized governance for the millions of people in Iraq and Syria under its rule. Though international actors unanimously refuse to acknowledge the Islamic State as a legitimate state in the international system, it nevertheless provides many of the functions of a state for those living within its territory. The fulfillment of these state functions is critical to the lives and livelihoods of those governed in territory controlled by the Islamic State. An effective policy to challenge the Islamic State must take the group’s governance agenda into account by constructing appealing alternatives to Islamic State governance rather than simply seeking to undermine it. 

The Islamic State’s ambitious state-building efforts present a challenging policy problem for the array of states now fighting the Islamic State group. France, Britain, Russia, and the United States, among others, regularly articulate the urgent need to destroy the group and they have increasingly acted to do so. Airstrikes that accelerated in the later half of 2015 have put substantial pressure on the Islamic State’s institutions, killing off thousands of Islamic State fighters and destroying a substantial amount of military and economic infrastructure, most notably the capacity to refine and distribute oil resources. Ground operations, such as the one that retook the Iraqi city of Ramadi in December, have also ratcheted up the pressure. 

[I]n addition to degrading the organization, the attacks on ISIS are also degrading the only current form of effective governance for civilians.

While these efforts help fulfill the primary goal of degrading or destroying ISIS by targeting the group’s military and operational infrastructure, they also harm the coalition’s ultimate goal of creating regional stability. This is because, in addition to degrading the organization, the attacks on ISIS are also degrading the only current form of effective governance for civilians, leading to very negative consequences for the populations living under Islamic State rule. As governing capacity is degraded without providing an effective substitute for ISIS governance, many of the coalition’s objectives in the region will become more elusive in the medium term. Additionally, certain aspects of the Islamic State’s state-building goals, which outside groups would like to prevent, may actually be enhanced as a result of the conflict. 

War, what is it good for?

As military pressure mounts on the Islamic State, significant parts of its project are in danger, including its financing, military success, and leadership capacity. However, it is not certain that all aspects of its state capacity will decline. Scholarship on state-building makes it clear that although war can destroy states, it can also help to build them. Although the Islamic State is often viewed externally simply as a rebel group, its domestic state-building agenda follows the historical path of many developing states in that it has benefitted from some of the effects of being at war.

[A]lthough war can destroy states, it can also help to build them.

War helps to build states in a number of ways. First, it creates an environment where the state can much more efficiently extract resources from the population in the form of taxation, military conscription, or extortion. When security is at stake, people are more willing to give up other goods for protection; a state at war also has a high degree of readiness for violence, which can be applied to extract resources from its own people. 

Second, state survival during war requires a high degree of institutional efficiency, including the creation of new bureaucratic structures such as taxation systems, governance mechanisms, information networks, and other institutions designed to control and manage conquered territory. Finally, the pressures of constant warfare for those under threat and on the front lines can also solidify group commitments and strengthen aspects of the military culture, bureaucracy, and ideology that have contributed to the group’s success.

Scaling back

Certainly warfare also can degrade state capacity, and it has done so across Islamic State territory over the past year. Much of that degraded capacity is military in nature, but the process has also reduced state capacity on which civilians directly depend. There is substantial evidence now to suggest that military pressure on the Islamic State group has negatively impacted a variety of core state functions for civilians. While most coalition airstrikes to date have sought to avoid dominantly civilian targets, economic infrastructure has been actively targeted, leading to a significant decline in the resources devoted to civilian concerns.

Compared with only a year ago, the group is now a less effective distributor of resources and has also become more dependent on resource extraction from the populations that it controls. For example, as the group’s revenues from oil and the initial spoils from captured territory have declined, both its social service provision and its ability to pay salaries have severely deteriorated. This is harmful not just because of concerns over civilian protection, but also because it reduces social stability and plays into the group’s narrative that its enemies are making people’s lives much worse. While it is difficult to measure the extent to which civilians blame the group for these new difficulties, a current media crackdown in ISIS territory means that the dominant ISIS narrative of blaming external aggressors is the only one disseminated and likely has significant impact on public opinion.

After airstrikes accelerated in the autumn, an internal Islamic State memo revealed that due to a loss of revenue, the salaries of Islamic State fighters were being cut by a dramatic 50 percent from the original promised payments. These cuts have also affected non-military employees of the Islamic State, spreading to all civil servants. At the same time, the prices for basic goods have been dramatically increasing. Financial infrastructure has also been targeted, making basic economic transactions much harder, while declining soldier salaries make it more likely that those with guns will look to civilian resources to supplement their incomes. Popular policies such as subsidies for bread have been difficult to finance and in some areas under external pressure, essentials such as wheat have become very scarce. This pressure on the food supply impacts civilians in unpredictable ways because the Islamic State has tightly regulated agricultural markets and has failed to allow free market mechanisms to efficiently distribute food resources. 

In the realm of health and education, student registration fees have gone up dramatically while subsidies have declined, scaling back access to a key service designed to systematically socialize students into the ideology of the Islamic State. Professionals are also fleeing Islamic State territory, as exemplified by physicians who have been leaving the Islamic State in large numbers. Despite apparently having significant physical resources for basic medical care, such as vaccinations, the new labor shortage of physicians has made it impossible to keep up regular vaccination schedules within the civilian population. More recently, pressure on obtaining key medical supplies has also increased. 

Two sides of the coin

Attacks on the Islamic State have therefore both strengthened and degraded different components of state capacity. Some aspects of state capacity have actually increased under conditions of war, such as taxation, extortion, conscription, and coercive institutions that control civilians. Military attacks have degraded other aspects of the state, however, such as the resources of ISIS fighters and civil servants, resource distribution capacity, and institutions that support economic development. 

It is not yet clear what these changes in military and state capacity will have on the overall trajectory of Islamic State survival and the stated goal to destroy the Islamic State. While the Islamic State could ultimately be destroyed by a coalition military campaign that proactively takes and governs territory, under the present strategy it is much more likely that the Islamic State will persist and continue to preside over a fragile and increasingly marginal system of governance that is neither good for the group, for the people that live within its territory, or for long-term stability in the Middle East. 

Costs and benefits of a military campaign

This creates a set of difficult policy choices because there are also many good reasons for the military campaign against the Islamic State. The group has demonstrated its capacity and will continue to launch violent attacks on a range of international targets, providing external actors with clear justification to destroy the group’s military capacity in an effort to maintain global security. Likewise, the group’s military success and territorial control are central to its attractiveness to foreign fighters. The ideology that drives the Islamic State depends in part on its continued ability to challenge the current international system. Delivering sustained military defeats is therefore critical to puncturing the group’s apocalyptic narrative of ever greater success and expansion. 

Much of the Islamic State’s domestic control is also maintained through fear, and military defeats confirm in the public imagination that the group can be beaten, from without and potentially from within. Although significant local challenges have not yet materialized, as the Islamic State’s coercive capacity becomes weaker, defections to other groups may occur, and domestic opponents may begin to recalculate their odds of a successful challenge. 

[U]nder the present strategy it is much more likely that the Islamic State will persist and continue to preside over a fragile and increasingly marginal system of governance.

The clear need for military action must, however, be weighed against the serious costs to both civilian populations and to the long-term war effort of harming existing state capacity on which civilians depend. The largely aerial campaign against the Islamic State group has had painful effects on the populations it controls. The reduction of fuel availability, the collapse in salaries, the removal of food and educational subsidies, and the deep insecurity that comes from a constant fear of bombardment has likely done very little to endear civilian populations to the cause of the coalition’s military activity, which is often seen as supporting the Syrian regime. 

Degrading state capacity through military action also feeds into the group’s narrative that both the West and Arab leaders have no concern for Muslim civilians, and that the group is the only possible one that can act as a protector against external enemies. Dozens of recent Islamic State videos paint the anti-ISIS coalition as a Russian, Syrian, Jewish, or U.S. conspiracy designed to harm civilians. While it is difficult to determine the extent of civilian casualties as a result of the campaign to date, the heightened deprivation resulting from the coalition military campaign, coupled with a glaring lack of alternative models of good governance, is unlikely to break the dependence of civilians on the Islamic State. 

Wanted: Alternatives

When one takes the Islamic State’s substantive role in governance into account in formulating a strategy to destroy the group, it becomes increasingly clear that an effective military strategy must be coupled with a much more robust agenda to build alternative governance mechanisms if it is to be successful at permanently displacing the group from its territory. 

Challenging civilian dependence on the Islamic State requires alternative forms of governance that are more appealing to the populations currently governed by the group. Even if the quality of Islamic State governance declines in relative terms, a substantively more appealing option must be available if those currently under the Islamic State’s control will be willing to support it. The great current challenge is to formulate a policy that can meet or exceed the Islamic State’s ability to build governing institutions, not just tear them down. At this point in the tragic narrative, those craving good governance are likely to be much less interested in regime type than in institutions that can provide consistent levels of security, economic growth, and the rule of law.

The great current challenge is to formulate a policy that can meet or exceed the Islamic State’s ability to build governing institutions, not just tear them down.

While the Islamic State adeptly uses theatrical violence and fear to exercise control within its territory, a large portion of its success in maintaining control should also be attributed to the poor alternative options for the populations that reside within it. For many Sunnis in Iraq and Syria, the imaginable alternative models of governance are currently deeply unappealing. These include:

  • re-absorption into the repressive cruelties of the Syrian state, 
  • control by violent and corrupt Syrian rebel groups without a track record of effective governance, 
  • governance by a deeply sectarian, Shiite-dominated Iraqi government that is dependent on ideological sectarian militias to maintain security, or 
  • rule by ethnic Kurdish militias that have a poor reputation for their treatment of Arab communities. 

When compared with these options, the Islamic State group often comes across as more authentic, less corrupt, more committed to the rule of law, and a better provider of state services. Its current basic governance failures, while many, are also increasingly attributable to the effects of the military campaign waged by its enemies. 

Let's build

Despite its deep, persistent flaws, an alternative, better system of governance is more likely to come from the Iraqi state (in the case of large population centers such as Mosul), or from existing informal tribal governance (in Syria and more rural areas) than it is to come from other sources. The key actions that currently need to be taken are thus two-fold:

  1. First, in territory already reclaimed from the group—such as in the devastated city of Ramadi—the anti-ISIS coalition should extend every effort to distribute needed resources, infuse the economy with ready employment options, reaffirm property rights and judicial institutions, and severely punish those pursuing violent retribution. Unfortunately, little in this direction has been accomplished in the months since the capture of Ramadi, as the rebuilding of civilian infrastructure has been treated as secondary to lingering security concerns. A clear investment of institutional and economic resources that helps to demonstrate the ability to maintain security and equal treatment under the rule of law will send a more powerful signal of the Islamic State’s weakness than the results of an aerial bombing campaign. 
  2. Second, a greater external commitment to support the best in existing institutions within the Iraqi state as well as in areas with the potential for effective non-state tribal governance is a critical investment in the long-term stability of Islamic State territory. In other words, external resources should increasingly focus not just on training and equipping local military allies, but also in supporting high quality civilian institutions of local and regional governance. 

Unfortunately, it takes much longer to build effective state institutions than to destroy them.

Aggressively pursuing a governance strategy will be much more difficult than pursuing an air war against a proto-state without anti-air defenses, but it is a necessary one if the persistent appeal of the group’s state-building project is to be overcome. Because the Islamic State has powerfully distinguished itself from other jihadist competitors through its governance agenda, its support cannot be eliminated through a strategy solely dependent on destroying the governance upon which local populations depend. 

Unfortunately, it takes much longer to build effective state institutions than to destroy them. The faster that a serious, resource-intensive commitment to building alternative governing institutions in areas bordering Islamic State territory begins, the more likely we are to see the group that calls itself the Islamic State lose control of its narrative, its territory, and the civilian support upon which it relies.

Authors

      
 
 




pe

Experts weigh in (part 6): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance. Kamran Bokhari argued that security—namely defending territory—is the foremost governance objective of ISIS in the short term, while Quinn Mecham focused on the need to provide alternative, positive models of governance for the populations living under ISIS control.

Next up, Nelson Kasfir, Professor of Government Emeritus at Dartmouth College, and Zachariah Mampilly, Associate Professor of Political Science and Director of Africana Studies at Vassar College, compare ISIS’s governance choices with how other armed groups have governed civilian populations. 


Nelson Kasfir and Zachariah Mampilly: Now that the Islamic State (ISIS) claims to be a state, any useful analysis of how it rules should rest on a systematic conception of governance by insurgents who hold populated territory, a surprisingly common phenomenon. If we are to understand what ISIS is doing, how long it is likely to stick around and indeed why some civilians in its domain prefer its government to what they had experienced from either Baghdad or Damascus, it would be a good idea to compare its choices of governance with other armed groups that have captured territory and governed civilian populations. All of them must administer territory without the advantages conferred by sovereignty—an important resource available to even the weakest internationally recognized states.

In our new book, Rebel Governance in Civil War, we offer a framework to explain how rebels govern. We bring together leading scholars to explore specific issues and cases from all over the globe. While single-factor hypotheses don't help much, there are broad patterns describing how and why armed groups govern that fit ISIS.

By rebel governance, we mean decision-making, the provision of services and the regulatory framework that armed groups establish to produce a social order within a specific territory they control. Rebel governance activities can be separated into those that concern how decisions are made, what social services are provided and how the production or taxation of economic rents is organized. Symbolic practices and ideologies, including religious creeds, have significant effects in supporting any system of rebel rule.

Armed groups differ widely in their approach to governance.

Armed groups differ widely in their approach to governance, as the case studies in our book demonstrate. Few armed groups that control territory can ignore civilian governance, short of expelling civilian populations altogether. The vast majority of insurgent organizations range from governing minimally, by assuming few regulatory functions, to maximally by ruling everything, including the provision of public goods.

For example, although the leaders of the National Patriotic Front (NPFL) in Liberia were primarily interested in personal profit, they still created the veneer of government to seek international recognition and to ensure the proceeds of commercial enterprises went into their pockets. Both types of insurgents were active during the Greek civil war, the conservatives limiting their governance activities, while the communists tried to regulate all aspects of social life.

Despite the many Western press accounts that dwell on ISIS’ penchant for flamboyant displays of callous cruelty, it would be a mistake to think that ISIS does not engage in civilian governance. As Charles Lister notes: "By perceiving and presenting itself as a state, IS [ISIS] has sought to control and govern territory and maintain a cabinet of ministers responsible for a broad range of 'ministries,' incorporating military, civil, political, and financial duties." As a caliphate, ISIS has opted primarily for a hierarchical top-down administration. It demands strict obedience, but it is also intent on building infrastructure and running it effectively. By basing governance on its revival of the "Caliphate according to the prophetic method," that is, re-establishing institutions on the basis of what it understands the Prophet Mohammed to have insisted, ISIS leaders appear to have demanded control over most facets of social and personal life.

As a caliphate, ISIS has opted primarily for a hierarchical top-down administration.

As early as 2007, ISIS published a booklet outlining its plans for governance. In 2013, it issued pamphlets that laid out the exact governance activities the organization would undertake once in control of specific territories. Immediately after capturing various towns in Syria and Iraq, ISIS set about taking control over key industries and services including the distribution of electricity, water, and fuel as well as the production and distribution of food. ISIS monopolized service provision and proved sophisticated in using it to balance its brutality. As a result, "Sunni civilians have been more likely to accept the imposition of harsh norms," as Lister has written.

Symbolic processes are powerful tools of governance that legitimate rebel groups or signal their coercive capability. These processes are often influenced by specific ideological concerns. Like nation-states, rebels create distinctive symbolic repertoires by producing their own flags, currencies, mausoleums and staging parades and rallies. The leaders of ISIS are well aware of the importance of symbols. "The Islamic State was signaling that its flag was not only the symbol of its government and the herald of a future caliphate; it was the harbinger of the final battle at the End of Days," writes Will McCants in The ISIS Apocalypse.

The leaders of ISIS are well aware of the importance of symbols.

Explaining varying approaches

What factors shape these different traits of rebel governance? In our book, we identify four clusters: causes arising before the rebellion; causes arising during the rebellion; those emanating from attributes or behavior of the rebels; and finally those developing from responses of civilians.

First, pre-conflict factors involving the relations between state and society shape subsequent patterns of rebel governance. History matters because insurgents mostly acquire their cultural values, education, and ideas about governance, while growing up in the society they later defy. These experiences shape them even as they rebel. How they resolve these contradictions will vary from case to case. Thus, the Forces Nouvelles that occupied northern Côte d'Ivoire after 2002 "adopted—or rather adapted—procedures from the former state administration." Since they did not hold unchallenged authority, they chose to share the maintenance of security with neo-traditional hunters' associations who were deeply trusted by local residents. In a different case, General Padiri's Mai-Mai militia in the Democratic Republic of the Congo adopted the administrative pattern of offices of the Congolese government while adding "Bureau Six" to incorporate commonly held autochthonous magico-religious beliefs that greatly deepened the legitimacy of the militia's leaders.

Because ISIS takes an uncompromisingly radical stance, it is difficult to identify its continuities with prior governance. Still, a closer examination of ISIS’ involvement in food distribution provides an illustrative example of its links with the practices of past regimes. As one recent academic study (by José Ciro Martínez and Brent Eng, in a still-unpublished manuscript) points out, food production has long been understood as a key element of the weak social contract binding pre-conflict regimes in Syria and Iraq to their people. In pre-conflict Syria, the Baath Party had long understood direct control over the bread market as an integral task of the social welfare pact it struck with the population. Recognizing the importance of bread distribution to the Syrian population, ISIS undertook numerous efforts to control and ensure the production of bread within its territories. In a 2013 pamphlet published in Aleppo that outlines ISIS’ governance strategy, a promise to ensure bread distribution stands out alongside more conventional governance activities. Importantly, considering the propagandistic nature of many ISIS communications, the group went far beyond rhetorical positions in their commitment to policies concerning bread. Instead of merely mandating the manner in which bread would be produced and distributed in ISIS-controlled areas of Aleppo and Raqqa, the group also “subsidized the cost of flour, accelerated the opening of bakeries and distributed bread itself when necessary,” as Martínez and Eng write.

[W]artime contextual factors...affect rebel governance.

Second, wartime contextual factors—those circumstances that emerge during rebellion— also affect rebel governance. As rebels fight and as they engage with civilians, they often change their practices of governance. The military threat of the incumbent and other military rivals as well as the broader wartime political economy often significantly impact insurgents’ approaches toward civilians. With regard to military capacity, Stathis Kalyvas shows that as the communist insurgents lost territory towards the end of the Greek civil war, they became more coercive. In Latin America as well, there have been many cases in which rebel governance decayed when insurgent groups failed to protect their civilian populations from either internal or external violence, or in response to expansion of electoral opportunities by the incumbent state.

Similarly, a comparison of ISIS’ governance in Raqqa and Mosul, the two largest cities under its control, suggests that external military pressure has made the government more intimidating and sometimes less willing to abide by its own rules. After ISIS took control of each city, it quickly imposed its authority and provided more efficient administration than its predecessors had. In Raqqa the regime acted on the basis of its posted rules until American-led air strikes caused its leaders to become somewhat “more paranoid and prone to kidnapping people randomly.” In Mosul, residents, who originally regarded ISIS as “liberators,” became more dissatisfied as their taxes greatly increased and their nonpayment was met with physical punishments and fines. The failure of ISIS to protect its citizens from collateral damage from air strikes is certain to have increased their discontent.

After ISIS took control of each city, it quickly imposed its authority and provided more efficient administration than its predecessors had.

Material rewards also affect rebel governance. Rebels often change their pattern of governance when they begin to accumulate significant rents through the exploitation of natural resources. The National Union for the Total Independence of Angola (UNITA) changed after it began to export diamonds and the Revolutionary Armed Forces of Columbia (FARC) stopped following some of its Marxist principles after it began to export cocaine.

Usually, rebels cannot defend oil wells from attacks by incumbent states. ISIS has been an exception, making a daily income of $3 million in September 2014. After the recent steep fall in crude oil prices and air strikes, internal taxation (or extortion) may have become a more significant source of revenue. ISIS has also profited from kidnapping and bank robberies. Its reliance on oil production has proven both a boon and curse as the value of ISIS-produced oil shifts dramatically due to both the challenge of ensuring production and fluctuations in oil prices globally. The income permitted ISIS to pay generous salaries to civilians to keep sanitation and utility services functioning.

Third, rebel attributes and behavior—organizational structure and ideological orientation—affect rebel governance. Ideologies often provide rebels with political identities, coherent frameworks for political and social action and a sense of disciplined commitment to an overriding purpose. The Greek communists learned their Marxism before they rebelled. Ethnic secessionists, such as the Naga in India, knew whom they were going to exclude from their imagined polity in advance of taking up arms.

Establishing a legal code is a social service that often demonstrates the influence of ideology on rebel governance.

Establishing a legal code is a social service that often demonstrates the influence of ideology on rebel governance. Rules that rebels create and civilians obey can help provide legitimate authority, whether out of trust (as in the case of the Shining Path in Peru) or out of fear (as inspired by the Taliban in Afghanistan).

ISIS bases not only its fundamental character, but also its plan of governance, almost entirely on its peculiar interpretation of Islamic doctrine. Abu Bakr al-Baghdadi, the ISIS leader, received both a masters and a doctorate in Islamic rhetoric from the University of Islamic Sciences in Baghdad. As the caliph, some of the Islamic rationales that have been supplied to justify specific ISIS regulations can be traced to his earlier education.

The influence of Islam on ISIS’ ideology is most evident in its attempts to establish a legal system. The rebellion "sees itself as creating a distinctive and authentic legal order for the here and now, one that is based not only on a literal (if selective) reading of early Islamic materials but also on a long-standing [Islamic] theory of statecraft and legal authority." Andrew March and Mara Revkin identify laws governing land, trade, taxation and treatment of prisoners and slaves, all derived from ISIS’ interpretation of scripture. In addition, they assert "the theory of the caliphate implies a law-based social contract with reciprocal obligations and rights between the caliph and the people." The extent to which this legal order actually results in enforceable rights that protect civilians is unclear. However, there is evidence that ISIS officials engaged in dispute resolution among civilians, even punishing its fighters when they took bribes or harmed civilians.

[C]ivilian responses to the insurgent group affect rebel governance.

Finally, civilian responses to the insurgent group affect rebel governance. We examine both individual reactions to armed groups as well as how varying social groups—such as traders, religious orders, ethnic groups, and civil society organizations—engage with or challenge an armed group’s governance efforts. ISIS is challenging to study since it is perceived as denying civilians’ agency completely. But even under the most autocratic governance arrangements, civilians have found ways to influence and even challenge armed groups. For example, during the war in Sri Lanka, the Liberation Tigers of Tamil Eelam had numerous methods for incorporating civilian feedback despite its deserved reputation as an autocratic and brutal organization. The education system in Tiger-ruled areas emerged as a result of civilian pressure and meaningfully incorporated civilians into its daily operations.

Indeed, a surprising number of rebel groups have shared decision-making with civilians. The African Party for the Independence of Guinea-Bissau and Cape Verde (PAIGC) created democratic village councils, as did the National Resistance Army during its war in Uganda. On the other hand, summary justice and brutal punishments can increase legitimacy among civilians when meted out to thieves and rapists. Residents gave strong support to rebels who took over neighborhoods in Medellín, Colombia and provided instant justice to those the community regarded as criminals.

It appears that ISIS does not share decision-making with civilians, similar to other rebels that take Islam as the doctrinal basis for their revolt such as the Taliban in Afghanistan or Boko Haram in Nigeria. But discerning whether civilian responses affect ISIS governance would require difficult (though not impossible) field visits to ISIS-controlled territory. The fact that the group frequently needs to rely on civilians in order to provide services suggests that there may be greater scope for civilian involvement than is commonly recognized.

[W]hile ISIS may appear unique, it is not an exception from the pressures that shape rebel governance patterns generally.

Taken together, the above discussion shows that while ISIS may appear unique, it is not an exception from the pressures that shape rebel governance patterns generally. Armed groups do not determine the outcome of their governance efforts in a vacuum. Rather, civilian governance outcomes are established by the behavior of a variety of actors each interacting in a shifting and complex environment. While ISIS may be distinctive in its commitment to implementing a form of civilian governance based on its understanding of Islamic modes of governance, it is still subject to these dynamics. Analyzing it through the four clusters of factors discussed above show how its governance of civilians compares with other rebel groups.

The sustainability question

What does this tell us about the future of civilian governance under ISIS? Because ISIS has established a caliphate, it is committed to governing the people in the territories it conquers. As discussed above, ISIS leaders have adopted an approach to law that creates room for some protections for civilians and an approach to social welfare that provides space for a limited social pact. Yet, these rulers have fashioned an uncompromising notion that civilians must be governed within their strict interpretation of Islamic doctrine. In addition, they depend on foreign military recruits to buttress their rule.

These factors create contradictions that may cause regime instability that might either increase regime brutality, if leaders remain constant to their principles, or result in regime decay, if they lose their sense of purpose. ISIS may eventually be “hamstrung by its radicalism.” During the short time that ISIS has ruled civilians, it has insisted that its decisions cannot be questioned. The relevant lesson from studying other rebellions is that groups better able to accommodate different political actors through a process of political negotiation are more likely to endure. If ISIS leaders remain obstinate, refusing to compromise in favor of a principled ideological stand, civilians will continue to suffer and either fight or flee if they can. Alternately, if the group’s leaders are tempted by the wealth the regime has accumulated, they may give in to corruption and fashion a more predatory regime.

ISIS has also become a magnet for foreign fighters. No one really knows how many there are, but an early (2014) estimate is 15,000 from 90 countries. Although the flow has decreased recently, cultural interactions and political disputes among these foreigners and civilians are certain to remain problematic. As the external military threats faced by ISIS grow, its leaders are likely to rely on the loyalty and morale of their foreign fighters at the expense of the civilian population. Civilian governance will probably decay, resulting in greater instability and perhaps sowing the seeds of ISIS' own demise.

Authors

      
 
 




pe

Experts weigh in (part 7): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, Egypt, and Brussels indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance. And Kamran Bokhari argued that security—namely defending territory—is the foremost governance objective of ISIS in the short term. Quinn Mecham focused on the need to provide alternative, positive models of governance for the populations living under ISIS control, and most recently, Nelson Kasfir and Zachariah Mampilly compared ISIS’ governance choices with how other armed groups have governed civilian populations.

Next up is Hassan Hassan, a resident fellow at the Tahrir Institute for Middle East Policy and co-author of ISIS: Inside the Army of Terror. He assesses ISIS’ model of governance before and after coalition airstrikes against the group began. Before the strikes, he argues, ISIS had a freer hand to implement its policies, and has used savagery and governance to both deter and incentivize communities under its control.


Hassan Hassan: Abu Sameh, a Syrian in his late twenties, joined the Syrian al-Qaida-affiliated Nusra Front as a fighter in early 2013. He fought for the group in Deir Ezzor and northeastern Syria until the Islamic State (ISIS) began to dominate there in the summer of 2014. That’s when he switched sides.

He was drawn to ISIS through one of his relatives, a commander of a small armed faction operating near the Iraqi border. With ISIS, battle-hardened Abu Sameh landed a job related to his undergraduate major for the first time since graduating college in 2009. He became an accountant working in the group’s oil industry.

As with many like Abu Sameh, ISIS benefited from local expertise to run its state-building enterprise in the areas it conquered in northwestern Iraq and northeastern Syria in 2013 and 2014. It also re-opened institutions that ceased to operate after the collapse of provisional governments—former employees, for instance, had continued to receive salaries from Baghdad and Damascus, but they typically sat at home and enjoyed the kickbacks, without being made to work by armed groups in control of the areas. When ISIS took over, many of them were forced back to work.

Enforcement of strict rules helped ISIS establish a semblance of order, which appealed to local communities plagued by kidnapping, highway robbery, theft, and warlordism. After ISIS took control, crime disappeared overnight and people could travel unarmed from Aleppo to Mosul. Through savagery and governance, ISIS both deterred and incentivized communities under its control.

Through savagery and governance, ISIS both deterred and incentivized communities under its control.

Local perception

Assessments of ISIS’ model of governance should distinguish between the periods before and after coalition airstrikes. Priority should be given to the period that preceded the airstrikes—between June and November 2014 in most areas—when the group had a freer hand to implement its policies. Assessments must also consider how ISIS fared in comparison to the armed groups and governments which preceded it. In some cases, ISIS appeared to have gone even further than previous governments in extending its writ to rural areas of Iraq and Syria. 

In this context, local perception is key to the evaluation of ISIS’ performance. According to weekly or sometimes daily conversations I have had with residents in eastern Syria—where I am originally from—people living under ISIS rule equally blame airstrikes or government bombings for the worsening economic situation in their areas, not just ISIS. The desire to link ISIS’ inability to deliver services with the failure of its model is understandable, it allows one to undermine its appeal and wholly blame it for the deteriorating situation in ISIS-held areas. But properly understanding the way ISIS ruled during this specific period with an emphasis on local perceptions is vital not only for academic objectivity but also to fully grasp the unintended consequences of the current coalition campaign against ISIS.

Referring to the destruction of Ramadi after the expulsion of ISIS in December, Col. Steven H. Warren, a Pentagon spokesman in Iraq, told The New York Times: “One hundred percent of this is on ISIL [another acronym for ISIS] because no one would be dropping any bombs if ISIL hadn’t gone in there.” In reality, however, many in those areas see the causes of destruction with a little more nuance than “no ISIS, no bombs.” First, ISIS entered most of those towns with little confrontation with civilians; it was political grievances and the failure of other armed groups that partly enabled ISIS to occupy certain areas to begin with. Moreover, the air campaign targeted bridges and oil facilities, which made life harder for civilians and disrupted a wartime economy that preceded ISIS rule.

Beyond violence 

ISIS is a manager and not a distributor of resources. In the Syrian context, nationalist, Islamist, and jihadist groups have generally sought to win hearts and minds primarily through the free or cheap provision of basic resources. ISIS, however, opts for managing what it has under its control. Even as it charges the population for services, the model remains more effective than the ones in southern and northern Syria for a simple reason. Because ISIS seeks to function as a state, local communities obtain essential benefits in return: safety and security, effective courts, and unified rule. Elsewhere, like in Eastern Ghouta outside Damascus or in Aleppo, provision of services is trumped by chaos, uncertainty, and ineffective courts, because local groups do not have exclusive or unchallenged control over territory.

Because ISIS seeks to function as a state, local communities obtain essential benefits in return: safety and security, effective courts, and unified rule.

Other forces that ruled in Syria prior to ISIS aimed to establish order based on consent. Even the Nusra Front, which was far more powerful and disciplined than other forces up until the rise of ISIS, retracted some of its decisions, seeking to avoid clashes with local families. The Nusra Front (and other Islamist groups as well) typically shied away from enforcing their rules to avoid alienating the population. In most court cases, for instance, whether a ruling would be enforced or not would hinge on whether the criminal or his family had voluntarily accepted the court’s judgment in the first place.

Conversely, under ISIS, courts have a high enforcement mechanism. This was true even when ISIS was a minor player operating from bases in rebel-controlled areas in early 2013. ISIS would encourage people to seek its help when they had a complaint about a person and would forcefully resolve the issue, even if that meant confrontation with powerful groups or individuals. This occurred numerous times ahead of ISIS’ rise to prominence in late 2013. This partly explains why many villagers either travelled outside their towns to fight for ISIS even after it was driven out of their areas in that period or accepted it when it returned later.

ISIS’ model was high-risk. The group was consistent and determined about enforcing its rules, and would not tolerate rivalry in its territory or recognize Sharia commissions other than its own. It demanded uniformity at any cost. One of the most claimed “advantages" of ISIS’ rule in its territories is that it “gets the job done.” Unlike the Free Syrian Army and other Islamist groups, ISIS would send a patrol to fetch someone if another person filed a complaint about him (these complaints typically involved financial fraud or unsettled commercial disputes). According to one resident who was involved in such a case, even if the complaint in question dated back to the years before the uprising, ISIS would settle the situation, provided that the complainant had proof.

ISIS...demanded uniformity at any cost.

“If you’re an FSA commander and you have a civilian relative, [FSA and other rebels] would accept mediation,” Hassan al-Salloum, a former rebel commander from Idlib, told me, referring to the time when ISIS was still a marginal player in 2013. “But with ISIS, if I complain about an FSA member, they go and bring him in for interrogation. They would not accept mediation. People then started to go to complain to ISIS, looking for help and asking them to intervene.”

Regulations and price controls are other areas in which ISIS’ governance proved successful. It banned fishermen from using dynamite and electricity to catch fish. It also prohibited residents from using the chaos of war to stake new land claims. This was especially true in the Syrian desert, where residents had attempted to build new homes or establish new businesses in public lands, much to the chagrin of their neighbors. ISIS also limited the profit margins on oil by-products, ice, flour, and other essential commodities. It also prohibited families from setting up refineries close to private residences, under the threat of confiscation, a policy that led some families to quit the oil business altogether, according to residents I interviewed.

A state—and more

In certain cases, ISIS governed areas more comprehensively than the governments of Baghdad and Damascus. Whether in delivery of services or management of people and resources under its control, ISIS makes it clear it is the only ruler in town, and once residents recognize that, they are often allowed to help govern their areas. There have been instances, according to tribal sources from Iraq and Syria I spoke to, of “deputization” whereby ISIS re-armed specific tribesmen to control their own area, though that process remained extremely limited.

Before, other groups and previous governments would use tribal leaders as intermediaries between them and local communities. ISIS, by contrast, acts as an intermediary between different tribes and even within the same tribe to resolve disputes, some of which date back to the 1970s and 1980s. Furthermore, it has systematically disarmed local communities that came under its rule in a way that previous governments failed to do over decades. 

The group is the only one in the two countries that employs an extensive network of staff exclusively dedicated to dealing with tribal affairs. The man in charge of tribal affairs is a Saudi national by the name of Daygham Abu Abdullah, locally known to be well-versed in tribal lineage and dynamics. He oversees a bureau that receives tribal delegations from across the self-styled caliphate that desire to resolve conflict or appeal for clemency. After ISIS asserts control over an area, tribal outreach helps it engage with local tribes and act as a social arbiter. Even though the organization carried out mass atrocities against certain tribes, the group often has other members of those same tribes fighting in its ranks, including members of Albu Nimr and Albu Fahad in Iraq, and Al Shaytat in Syria. ISIS employs a seemingly contradictory strategy of divide-and-rule. It first attempts infiltrate an area, and follows up with an outreach policy after consolidating control. The office that handles amending tribal disputes is known as Public Relations Bureau.

Whereas Islamic inheritance laws stipulate that women are to receive half of that received by a male sibling, tribal society often deprives women even of that half share. Unlike governments, which rarely enforce Sharia-based inheritance laws, ISIS sent out instructions to local communities to provide women with their due share and some women who complained to ISIS judges would receive their shares retroactively from their brothers.

These measures suggest that the group, in some instances, is more vigorous and micro-managerial than previous governments that ruled these predominantly rural areas in Iraq and Syria.

These measures suggest that the group, in some instances, is more vigorous and micro-managerial than previous governments that ruled these predominantly rural areas in Iraq and Syria. Lawlessness, kidnappings, arbitrary killings, and highway robbery are greater sources of grievance for people living outside regime areas than poor services, something that ISIS has dealt with by providing security based on brutal justice and policing. The semblance of order established by ISIS remains a strong advantage for the group, despite its diminished ability in other aspects of governance, and forces that will take over from ISIS will be judged accordingly.

Conclusion

There is little doubt that the group has lost the initial appeal it had when it conquered large swaths of territory in Iraq and Syria in the summer of 2014. The U.S.-led air campaign has blunted the group’s ability to generate income from oil and war spoils that usually come from rapid expansion. It has also reduced the group’s capacity to provide sufficient services for communities under its rule. The air campaign has also resulted in an interesting trend: it has strengthened the role of ISIS’ security and intelligence core in the towns, villages and cities the group controls, a development that has led to mounting complaints about their harsh and crude behavior.

ISIS associates, too, complain of the group’s security apparatus to the extent that it has become common to hear of clerics explaining to ISIS members that the state that Prophet Mohammed founded also included munafiqun, or “hypocrites,” and that this should not be a reason to abandon it, according to interviews I conducted, including with members. (Connoting someone who only feigns belief in public, the term munafiqun is a heavy accusation to levy at a fellow Muslims, and such people are condemned in the Quran.)

[T]argeting the economy of ISIS-controlled areas can make matters worse.

But all that will not translate into a rebellion against ISIS. Additionally—and more importantly—targeting the economy of ISIS-controlled areas can make matters worse. In some cases, airstrikes led families to send their children to join ISIS as the only way to generate income. Iraqi officials have warned that choking off ISIS’s economic routes might result in “collateral damage.” While they may see this as necessary evil, it also runs the risk of helping ISIS tighten its grip by driving residents closer to it as the only employer or provider in town.

The unintended consequences of the air campaign are a serious concern, especially if ISIS is to be defeated strategically. This is something I have discussed with everyone involved, from civilians to ISIS members to Western officials involved in the anti-ISIS campaign. Residents often complain that they are suffering collective punishment by inconsiderate foreign forces. ISIS, meanwhile, tells the communities under its rule that it would have brought more prosperity to their towns had it not been for the airstrikes. A high-level American official involved in the campaign acknowledged to me that officials were aware of the possibility of unintended consequences but insisted that airstrikes targeting the economy in eastern Syria and western Iraq will only intensify. 

Authors

      
 
 




pe

The Neoliberal Podcast: Carbon Taxes ft. Adele Morris, David Hart & Philippe Benoit

       




pe

Adele Morris on BPEA and looking outside macroeconomics

Adele Morris is a senior fellow in Economic Studies and policy director for Climate and Energy Economics at Brookings. She recently served as a discussant for a paper as part of the Spring 2019 BPEA conference.Her research informs critical decisions related to climate change, energy, and tax policy. She is a leading global expert on the design…

       




pe

Webinar: Reopening the coronavirus-closed economy — Principles and tradeoffs

In an extraordinary response to an extraordinary public health challenge, the U.S. government has forced much of the economy to shut down. We now face the challenge of deciding when and how to reopen it. This is both vital and complicated. Wait too long—maintain the lockdown until we have a vaccine, for instance—and we’ll have another Great Depression. Move too soon, and we…

       




pe

Why Europe’s energy policy has been a strategic success story


For Europe, it has been a rough year, or perhaps more accurately a rough decade. The terrorist attacks in London, Madrid, and elsewhere have taken a toll, as did the Iraq and Afghanistan wars. But things really got tough beginning with the Great Recession—and its prolonged duration for Europe, including grave economic crises in much of the southern part of the continent. That was followed by Vladimir Putin’s aggression against Ukraine, as well as the intensification of the Syrian, Libyan, and Yemeni conflicts with their tragic human consequences, including massive displacement of people and the greatest flow of refugees since World War II. The recent attacks in Paris and Brussels have added to the gloom and fear. This recent history, together with the advent of nationalistic and inward-looking policies in virtually all European Union member states, makes it easy to get despondent—and worry that the entire European project is failing.

To be sure, these are not the best of times. Europe is perceived by some, including Republican presidential candidate Donald Trump, as failing to invest enough in its own security, since NATO allies spend less than 1.4 percent of GDP on their armed forces while the United States spends twice that. However, we must not lose sight of the key structural advantages—and the important policy successes—that have brought Europe where it is today. For example, Europe’s recent progress in energy policy has been significant—good not only for economic and energy resilience, but also for NATO's collective handling of the revanchist Russia threat. 

[W]e must not lose sight of the key structural advantages—and the important policy successes—that have brought Europe where it is today.

For many years, analysts and policymakers have debated the question of Europe's dependence on natural gas from Russia. Today, this problem is largely solved. Russia provides only one-third of Europe’s gas. Importantly, Europe’s internal infrastructure for transporting natural gas in all desired directions has improved greatly. So have its available storage options, as well as its possibilities to import alternatives either by pipeline or in the form of liquefied natural gas. As a result, almost all member states are currently well-positioned to withstand even a worst-case scenario. 

Indeed, European Commission analyses show that even a multi-month long supply disruption could be addressed, albeit at real economic cost, by diversification and fuel switching. Progress in energy efficiency and renewable energy investments also help. There is more to do to enhance European energy security, but much has been done already. The Europeans have shown that, with ups and downs, they can address energy security themselves.

Already this energy success has contributed to a strategic success. Europe has been heavily criticized for not standing up more firmly to Russia in response to the annexation of Crimea and the conflict in eastern Ukraine. In fact, all EU member states have agreed to keep economic sanctions in place against Moscow. In addition, lifting the sanctions has been firmly attached to the implementation of the Minsk II agreement—and despite recent cracks in European solidarity, we hope that this stance will hold going forward. 

The notion that Europe is weak and dependent on Russian natural gas is a relic from the past.

The notion that Europe is weak and dependent on Russian natural gas is a relic from the past. Europe has a strong regulatory framework with which commercial entities, including Gazprom, have to abide. For those who doubt the impact of these regulations, just ask Google or Microsoft. With the end of so-called destination clauses, natural gas can be re-sold whenever required, as long as sufficient infrastructure is in place. Just last year, Germany re-exported over 30 billion cubic meters of gas, mostly Russian, in particular to Central and Eastern Europe (including Ukraine). That volume exceeds the annual consumption of every European state with the exceptions of Germany, Italy, France, and Britain.

In theory, Europe could even substantially wean itself off Russian gas if need be. To be sure, that would come at a major expense: over 200 billion euros of additional investments over a period of two years or more, and then an annual 35 billion euros, according to some calculations. That will almost surely not happen. But as a way of bounding the worst-case scenario, it is still informative. One might say that Europe has escalation dominance over Russia; the latter needs to export to Europe more than Europe need Russian hydrocarbons.

The internal energy market is not finished, but Europe’s energy security has significantly improved in recent years. Even though world markets are currently awash in resources, there is no time for complacence, and European leaders should finish the job, foremost by safeguarding the swift construction of the so-called Projects of Common Interest (key energy infrastructure projects that address the remaining bottlenecks in the EU market), so that the U.S. State Department can take new infrastructure projects like Nord Stream 2 off its priority list, and make energy policy another true European success story. It is already much of the way there, and Western security is the better for it.

     
 
 




pe

Why a Trump presidency could spell big trouble for Taiwan


Presumptive Republican presidential nominee Donald Trump’s idea to withdraw American forces from Asia—letting allies like Japan and South Korea fend for themselves, including possibly by acquiring nuclear weapons—is fundamentally unsound, as I’ve written in a Wall Street Journal op-ed.

Among the many dangers of preemptively pulling American forces out of Japan and South Korea, including an increased risk of war between Japan and China and a serious blow to the Nuclear Non-Proliferation Treaty, such a move would heighten the threat of war between China and Taiwan. The possibility that the United States would dismantle its Asia security framework could unsettle Taiwan enough that it would pursue a nuclear deterrent against China, as it has considered doing in the past—despite China indicating that such an act itself could be a pathway to war. And without bases in Japan, the United States could not as easily deter China from potential military attacks on Taiwan. 

Trump’s proposed Asia policy could take the United States and its partners down a very dangerous road. It’s an experiment best not to run.

      
 
 




pe

What Clinton should say in her DNC speech tonight


When she gives her speech tonight at the Democratic National Convention, Hillary Clinton will of course be at a crucial point in her campaign for the presidency. Her fellow Democrats—including her running mate Senator Tim Kaine, as well as Michael Bloomberg—have roundly criticized her Republican opponent Donald Trump this week. Vice President Biden and President Obama usefully offered a counterpoint to the dark worldview we saw from Mr. Trump last week in Cleveland. And former President Bill Clinton, as well as first lady Michelle Obama, told us about Clinton’s longstanding dedication to women and children, the less fortunate, and the nation as a whole. As a parent of a child on the autism spectrum, I have seen and deeply appreciated this side of Clinton myself.

Now, it is up to Clinton to sketch out a positive vision for her own presidency. In so doing, she must strike a balanced tone—acknowledging and tapping the energy (and at times anger) of Bernie Sanders, Elizabeth Warren, and their wing of the Democratic Party—while also reaching out to independents and moderate Republicans to whom she should appeal (given her past and her politics, and most of all, her opponent), but who at present tend not to think favorably of her.

Against this complex backdrop, I would offer only a few suggestions for her upcoming speech:

  • On the state of the world, we need a nuanced view. Yes, there are big problems. Yes, ISIS is a greater threat than President Obama has sometimes acknowledged. On balance, however, things are troubled but not bad. Democracy has taken a hit in recent years, and the world’s economy has struggled in many ways for a decade, and Russia and China have caused considerable problems of late. But taking a larger perspective, the international order still has many strong points. Our alliances are strong. Despite recent setbacks, a higher percentage of people around the world live in democratic countries and above the poverty line this century than ever before. Child mortality globally is way down. U.S.-India relations are better than ever, as are America’s ties to other key rising powers like Indonesia. The U.S. military is indeed very strong (as retired General David Petraeus and I write in a forthcoming Foreign Affairs article), even if there is much to do to make it even better.

  • We do need to do better in fighting ISIS. Ideas on how to attack it in Syria and Libya, among other places, will be key, even if details will necessarily need to await 2017. And while I think President Obama has done better in dealing with Russia and China than commonly understood, Obama has not explained his strategies for handling these powers very well to the United States. Clinton can help.

  • The fading middle-class economic dream in the United States remains the central issue of this campaign. It explains the rise of Sanders and Trump better than any other single factor or phenomenon. Clinton’s views on economics are good but they come across as a bit piecemeal, borrowing from Sanders on a few key points like the minimum wage and trade but somewhat lacking her own key stamp. Above all other issues, I hope she concentrates on this tonight.

  • We have not heard much about Benghazi or about Clinton’s email problems this week. To be sure, many Republicans have inflated these issues beyond all reason. But Clinton should still apologize for her mistakes to the country, without overdoing it. As best I can tell, she put no true national secrets or American personnel at risk in her emails, and while Benghazi was a tragedy that might have been preventable, no one can be perfect in times like these. We don’t typically excoriate our military commanders for mistakes that tragically may cost American lives in a given tactical operation, recognizing that such setbacks happen in war. That is not to excuse the lack of proper attention to Libya and Benghazi by the U.S. government back in 2011 and 2012, only to put it in perspective.

  • It would be good to hear some nice words about Republicans too, in an effort to reach across the aisle and defuse some of the anger in American politics today. I don’t mean just to compliment Lincoln and Teddy Roosevelt, but also to note the importance of people like Pete Domenici and Warren Rudman in fiscal policy and deficit reduction (and more recently, John Boehner and Paul Ryan); George H.W. Bush and Bob Dole in the Americans with Disabilities Act; the Republican Congress of the 1990s in welfare reform; George H.W. Bush again as well as people like Christie Todd Whitman in environmental policy; George W. Bush on PEPFAR/AIDS and also on stressing inclusivity while avoiding anti-Muslim rhetoric after the 9/11 attacks; and good GOP governors or former governors like Mitch Daniels, John Kasich, and Jeb Bush in fostering economic growth as well as education reform across much of the country. To Democrats angry with the current Republican presidential ticket, as well as much of the current congressional leadership, this may seem like bending over backwards to appease the opposition. But in fact, the above folks are not the opposition that Clinton needs to defeat now; they are responsible, constructive, patriotic members of the other main political party in the United States. They are not the enemy, and by reaching out to them, Clinton can improve her odds of beating the person who is now very much the adversary—not only of the Democratic ticket, but of much of this country’s finest bipartisan traditions and accomplishments.

I’ll be rooting for all the above (and also hoping to get to bed before midnight). Please bring it on, Hillary!

      
 
 




pe

Terrorism in the Philippines and U.S.-Philippine security cooperation

Events of the past few months—in particular, the prolonged standoff in Marawi, Mindanao—have significantly increased concerns about terrorist activity in the southern Philippines, and in Southeast Asia more broadly. The shape and focus of the U.S.-Philippine alliance has already been somewhat in flux with the ascension of relatively new leadership in both countries—Rodrigo Duterte having…

       




pe

Investigating the Khashoggi murder: Insights from UN Special Rapporteur Agnes Callamard

Perhaps the most shocking episode of repression in Saudi Arabia’s recent history is the brutal and bizarre murder of Jamal Khashoggi, a U.S. resident and columnist for the Washington Post, in the Saudi consulate in Istanbul in October 2018. Two weeks ago, the United Nations Special Rapporteur on extrajudicial, summary or arbitrary executions, Agnes Callamard,…

       




pe

Peace with justice: The Colombian experience with transitional justice

Executive summaryTo wind down a 50-year war, the Colombian state and the Fuerzas Armadas Revolucionarias de Colombia-Ejército Popular (FARC-EP) agreed in November 2016 to stop the fighting and start addressing the underlying causes of the conflict—rural poverty, marginalization, insecurity, and lawlessness. Central to their pact is an ambitious effort to address the conflict’s nearly 8…

       




pe

Colombia’s search for peace and justice

In June 2016, the government of Colombia signed a historic peace agreement with the armed rebel group known as FARC-EP to end a conflict that over five decades had taken the lives of at least 260,000 Colombians and displaced over 7 million. Three years later, the peace accord—a complex effort to not only stop the…

       




pe

What are the prospects for the Cyber Threat Intelligence Integration Center?

Last week we learned that the federal government plans to create a Cyber Threat Intelligence Integration Center (CTIIC). There is some confusion about the purpose of this agency, especially as it relates to the National Cybersecurity and Communications Integration Center (NCCIC) and the United States Computer Emergency Readiness Team (US-CERT). While I am not a…

       




pe

Outside perspectives on the Department of Defense cyber strategy

Chairman Thornberry, Ranking Member Smith, members of the Committee, thank you for the opportunity to testify. I am Richard Bejtlich, Chief Security Strategist at FireEye. I am also a nonresident senior fellow at the Brookings Institution, and I am pursuing a PhD in war studies from King’s College London. I began my security career as…

       




pe

Classifying Sustainable Development Goal trajectories: A country-level methodology for identifying which issues and people are getting left behind

       




pe

How much does the world spend on the Sustainable Development Goals?

Pouring several colors of paint into a single bucket produces a gray pool of muck, not a shiny rainbow. So too with discussions of financing the Sustainable Development Goals (SDGs). Jumbling too many issues into the same debate leads to policy muddiness rather than practical breakthroughs. Financing the SDGs requires a much more disaggregated mindset:…

       




pe

Getting specific to leave no one behind

World leaders are gathering in New York this week to attend the first major stocktaking summit on the Sustainable Development Goals (SDGs). When the SDGs were agreed by all countries in 2015, they were intended to help countries accelerate their transition to more sustainable paths by 2030, with sustainability understood to include economic, environmental, and…

       




pe

Leave no one behind: Time for specifics on the sustainable development goals

A central theme of the sustainable development goals (SDGs) is a pledge “that no one will be left behind.” Since the establishment of the SDGs in 2015, the importance of this commitment has only grown in political resonance throughout all parts of the globe. Yet, to drive meaningful results, the mantra needs to be matched…

       




pe

Building the SDG economy: Needs, spending, and financing for universal achievement of the Sustainable Development Goals

Pouring several colors of paint into a single bucket produces a gray pool of muck, not a shiny rainbow. Similarly, when it comes to discussions of financing the Sustainable Development Goals (SDGs), jumbling too many issues into the same debate leads to policy muddiness rather than practical breakthroughs. For example, the common “billions to trillions”…

       




pe

Central Asian Regional Integration and Cooperation: Reality or Mirage?


Editor’s Note: The following piece is a chapter from the 2012 edition of Eurasian Development Bank’s Eurasian Integration Yearbook.

INTRODUCTION

For centuries Central Asia was in the backwater of global political and economic attention, tales of “Great Games” and “Silk Roads” notwithstanding. However, interest in Central Asia from outside the region has been on the rise in recent years: Central Asia’s energy resources are of great importance to its neighbours in Europe and Asia. In addition, China wants a peaceful backyard, while Russia considers Central Asia part of its historical economic and regional interests and draws heavily on Central Asia migrants. Turkey is attracted by the common Turkic heritage of the region. Iran shares language and cultural ties with the Tajik people. The Central Asia’s Islamic tradition connects it with the Middle East and other Islamic countries. And now NATO countries rely on Central Asia for transit of their nonlethal military supplies in their engagement in Afghanistan.

There is wide agreement that economic prosperity and political stability in Central Asia is critical not only for the 60-plus million inhabitants of the region, but also for Central Asia’s neighbours, since Central Asia serves as a strategically important land bridge between Europe and Asia. Since the five Central Asian countries are landlocked small economies, a critical prerequisite for long-term economic growth and political stability is successful economic integration underpinned by effective regional cooperation.

This paper therefore addresses the central question of what are the prospects for regional economic integration and regional cooperation in Central Asia. It starts by briefly reviewing the role of Central Asia in the context of the overall process of Eurasian continental economic integration. It then considers what are the benefits and obstacles of regional integration and cooperation in Central Asia against the backdrop of lessons of international experience with regional integration and cooperation, and looks at four of the most important recent regional cooperation initiatives. In closing, the paper provides an answer to the question whether regional integration and cooperation in Central Asia are for real or only a mirage.

Downloads

Publication: Eurasian Development Bank
Image Source: © Staff Photographer / Reuters
     
 
 




pe

Scaling Up Programs for the Rural Poor: IFAD's Experience, Lessons and Prospects (Phase 2)


The challenge of rural poverty and food insecurity in the developing world remains daunting. Recent estimates show that “there are still about 1.2 billion extremely poor people in the world. In addition, about 870 million people are undernourished, and about 2 billion people suffer from micronutrient deficiency. About 70 percent of the world’s poor live in rural areas, and many have some dependency on agriculture,” (Cleaver 2012). Addressing this challenge by assisting rural small-holder farmers in developing countries is the mandate of the International Fund for Agricultural Development (IFAD), an international financial institution based in Rome.

The International Fund for Agricultural Development is a relatively small donor in the global aid architecture, accounting for approximately one-half of 1 percent of all aid paid directly to developing countries in 2010. Although more significant in its core area of agricultural and rural development, IFAD still accounts for less than 5 percent of total official development assistance in that sector.1 Confronted with the gap between its small size and the large scale of the problem it has been mandated to address, IFAD seeks ways to increase its impact for every dollar it invests in agriculture and rural development on behalf of its member states. One indicator of this intention to scale up is that it has set a goal to reach 90 million rural poor between 2012 and 2015 and lift 80 million out of poverty during that time. These numbers are roughly three times the number of poor IFAD has reached previously during a similar time span. More generally, IFAD has declared that scaling up is “mission critical,” and this scaling-up objective is now firmly embedded in its corporate strategy and planning statements. Also, increasingly, IFAD’s operational practices are geared towards helping its clients achieve scaling up on the ground with the support of its loans and grants.

This was not always the case. For many years, IFAD stressed innovation as the key to success, giving little attention to systematically replicating and building on successful innovations. In this regard, IFAD was not alone. In fact, few aid agencies have systematically pursued the scaling up of successful projects. However, in 2009, IFAD management decided to explore how it could increase its focus on scaling up. It gave a grant to the Brookings Institution to review IFAD’s experience with scaling up and to assess its operational strategies, policies and processes with a view to strengthening its approach to scaling up. Based on an extensive review of IFAD documentation, two country case studies and intensive interactions with IFAD staff and managers, the Brookings team prepared a report that it submitted to IFAD management in June 2010 and published as a Brookings Global Working Paper in early 2011 (Linn et al. 2011).

Download the paper (PDF) »

Downloads

Authors

Image Source: © Andrew Biraj / Reuters
     
 
 




pe

Getting to Scale : How to Bring Development Solutions to Millions of Poor People


Brookings Institution Press 2013 240pp.

Winner of Choice Magazine's Outstanding Academic Title of 2014!

The global development community is teeming with different ideas and interventions to improve the lives of the world’s poorest people. Whether these succeed in having a transformative impact depends not just on their individual brilliance but on whether they can be brought to a scale where they reach millions of poor people.

Getting to Scale explores what it takes to expand the reach of development solutions beyond an individual village or pilot program, but to poor people everywhere. Each of the essays in this book documents one or more contemporary case studies, which together provide a body of evidence on how scale can be pursued. It suggests that the challenge of scaling up can be divided into two: financing interventions at scale, and managing delivery to large numbers of beneficiaries. Neither governments, donors, charities, nor corporations are usually capable of overcoming these twin challenges alone, indicating that partnerships are key to success.

Scaling up is mission critical if extreme poverty is to be vanquished in our lifetime. Getting to Scale provides an invaluable resource for development practitioners, analysts, and students on a topic that remains largely unexplored and poorly understood.

ABOUT THE EDITORS

Laurence Chandy
Akio Hosono
Akio Hosono is the director of the Research Institute of the Japanese International Cooperation Agency.
Homi Kharas
Johannes F. Linn

Downloads

Ordering Information:
  • {9ABF977A-E4A6-41C8-B030-0FD655E07DBF}, 978-0-8157-2419-3, $29.95 Add to Cart
      
 
 




pe

Green Growth Innovation: New Pathways for International Cooperation

INTRODUCTION We are at a key moment in the evolution of our global approach to the challenges of development, environment and the transition to a green economy. This year marked the 20th anniversary of the U.N. Conference on Environment and Development, also known as the Rio Earth Summit, and the 40th anniversary of the first…

       




pe

Ryan Hass speaks on a panel about China’s Belt and Road Initiative, hosted by the World Economic Forum in Amman, Jordan

On April 7, Ryan Hass spoke on a panel about China's Belt and Road Initiative and China's relations with the Middle East during a session of the "World Economic Forum on the Middle East and Africa," which was held in Amman, Jordan.

       




pe

Is free trade still alive? Hong Kong’s perspective

Hong Kong has been heralded as the freest economy in the world, according to the Heritage Foundation’s 2019 Index of Economic Freedom. The city’s special administrative region status has underpinned its reputation as a center of commerce governed by the rule of law, enabling it to play a key role in international trade while serving as…

       




pe

International migration: What happens to those left behind?

There are many sides to the vociferous debate over international migration. While much of it focuses on the economic costs and benefits of migration in both recipient and sending countries, much less is known about the human side of the migration story. Most of what we know is based on anecdotal stories, such as a…

       




pe

Greece's financial trouble, and Europe's


I attended a fascinating dinner earlier this week with Greek Foreign Minister Nikos Kotzias as part of his whirlwind visit to Washington DC. I shared with the minister some reflections on challenges facing him and the new Greek government at home in Greece and in Europe. When I served in Prague, I often urged the Europeans to take a page from our U.S. approach in 2009-10 and to avoid excessive austerity. I reiterated that view to the minister, and in particular pointed out the need for Germany to do more to help (see, for example, my colleague Ben Bernanke's recent post on the German current account surplus in his Brookings blog.) Paul Krugman hit the nail on the head with his recent column as well. On a personal note, when my father found himself trapped in Poland in 1939 is the Nazis invaded, he made his way to Greece, which gave him shelter until he was able to escape to the United States in 1940. So I was able to thank the Foreign Minister for that as well (somewhat belatedly, but all the more heartfelt for that). I was impressed with the Minister's grasp of the Greek financial crisis and the many other important issues confronting Europe.

Authors

Image Source: © Kostas Tsironis / Reuters
      




pe

Challenges to the future of the EU: A Central European perspective


Event Information

March 31, 2016
10:00 AM - 11:00 AM EDT

Falk Auditorium
Brookings Institution
1775 Massachusetts Avenue, N.W.
Washington, DC 20036

A conversation with Prime Minister of the Czech Republic Bohuslav Sobotka



Today, the European Union faces critical risks to its stability. The possibility of a Brexit. The ongoing Ukraine/Russia conflict. The strain of mass migration. ISIL and other terrorism threats. The lingering financial crisis in Greece and beyond. These issues pose distinct challenges for the EU, its 28 member countries, and their 500 million citizens. How will these developing problems affect Europe?          

On March 31, Governance Studies at Brookings hosted Czech Prime Minister Bohuslav Sobotka to discuss the current status of the EU as seen through the lens of a Central European nation, close U.S. NATO ally and current Chair of the Visegrad Group. Prime Minister Sobotka offered insight into how the EU will address these issues, and where its future lies.

Video

Audio

Transcript

Event Materials

       




pe

The Iran deal, one year out: What Brookings experts are saying


How has the Joint Comprehensive Plan of Action (JCPOA)—signed between the P5+1 and Iran one year ago—played out in practice? Several Brookings scholars, many of whom participated prominently in debates last year surrounding official congressional review, offered their views.

Strobe Talbott, President, Brookings Institution:

At the one-year mark, it’s clear that the nuclear agreement between Iran and the major powers has substantially restricted Tehran’s ability to produce the fissile material necessary to build a bomb. That’s a net positive—for the United States and the broader region.

Robert Einhorn, Senior Fellow, Center for 21st Century Security and Intelligence and Senior Fellow, Arms Control and Non-Proliferation Initiative, Foreign Policy program:

One year after its conclusion, the JCPOA remains controversial in Tehran and Washington (as I describe in more detail here), with opponents unreconciled to the deal and determined to derail it. But opponents have had to scale back their criticism, in large part because the JCPOA, at least so far, has delivered on its principal goal—blocking Iran’s path to nuclear weapons for an extended period of time. Moreover, Iran’s positive compliance record has not given opponents much ammunition. The IAEA found Iran in compliance in its two quarterly reports issued in 2016.

But challenges to the smooth operation and even the longevity of the deal are already apparent.

A real threat to the JCPOA is that Iran will blame the slow recovery of its economy on U.S. failure to conscientiously fulfill its sanctions relief commitments and, using that as a pretext, will curtail or even end its own implementation of the deal. But international banks and businesses have been reluctant to engage Iran not because they have been discouraged by the United States but because they have their own business-related reasons to be cautious. Legislation proposed in Congress could also threaten the nuclear deal. 

For now, the administration is in a position to block new legislation that it believes would scuttle the deal. But developments outside the JCPOA, especially Iran’s regional behavior and its crackdown on dissent at home, could weaken support for the JCPOA within the United States and give proponents of deal-killing legislation a boost. 

A potential wildcard for the future of the JCPOA is coming governing transitions in both Washington and Tehran. Hillary Clinton would maintain the deal but perhaps a harder line than her predecessor. Donald Trump now says he will re-negotiate rather than scrap the deal, but a better deal will not prove negotiable. With President Hassan Rouhani up for re-election next year and the health of the Supreme Leader questionable, Iran’s future policy toward the JCPOA cannot be confidently predicted.

A final verdict on the JCPOA is many years away. But it is off to a promising start, as even some of its early critics now concede. Still, it is already clear that the path ahead will not always be smooth, the longevity of the deal cannot be taken for granted, and keeping it on track will require constant focus in Washington and other interested capitals. 

Suzanne Maloney, Deputy Director, Foreign Policy program and Senior Fellow, Center for Middle East Policy, Foreign Policy program:

The Joint Comprehensive Plan of Action has fulfilled neither the worst fears of its detractors nor the most soaring ambitions of its proponents. All of the concerns that have shaped U.S. policy toward Tehran for more than a generation—terrorism, human rights abuses, weapons of mass destruction, regional destabilization—remain as relevant, and as alarming, as they have ever been. Notably, much the same is true on the Iranian side; the manifold grievances that Tehran has harbored toward Washington since the 1979 revolution continue to smolder.

An important truth about the JCPOA, which has been wielded by both its defenders and its detractors in varying contexts, is that it was transactional, not transformational. As President Barack Obama repeatedly insisted, the accord addressed one specific problem, and in those narrow terms, it can be judged a relative success. The value of that relative success should not be underestimated; a nuclear-armed Iran would magnify risks in a turbulent region in a terrible way. 

But in the United States, in Iran, and across the Middle East, the agreement has always been viewed through a much broader lens—as a waystation toward Iranian-American rapprochement, as an instrument for addressing the vicious cycle of sectarian violence that threatens to consume the region, as a boost to the greater cause of moderation and democratization in Iran. And so the failure of the deal to catalyze greater cooperation from Iran on a range of other priorities—Syria, Yemen, Iraq, to name a few—or to jumpstart improvements in Iran’s domestic dynamics cannot be disregarded simply because it was not its original intent. 

For the “new normal” of regularized diplomatic contact between Washington and Tehran to yield dividends, the United States will need a serious strategy toward Tehran that transcends the JCPOA, building on the efficacy of the hard-won multilateral collaboration on the nuclear issue. Iranians, too, must begin to pivot the focus of their efforts away from endless litigation of the nuclear deal and toward a more constructive approach to addressing the deep challenges facing their country today. 

Bruce Riedel, Senior Fellow, Center for Middle East Policy and Center for 21st Century Security and Intelligence and Director, Intelligence Project, Foreign Policy program:

As I explain more fully here, one unintended but very important consequence of the Iran nuclear deal has been to aggravate and intensify Saudi Arabia's concerns about Iran's regional goals and intentions. This fueling of Saudi fears has in turn fanned sectarian tensions in the region to unprecedented levels, and the results are likely to haunt the region for years to come.

Riyadh's concerns about Iran have never been primarily focused on the nuclear danger. Rather, the key Saudi concern is that Iran seeks regional hegemony and uses terrorism and subversion to achieve it. The deal deliberately does not deal with this issue. In Saudi eyes, it actually makes the situation worse because lifting sanctions removed Iran's isolation as a rogue state and gives it more income. 

Washington has tried hard to reassure the Saudis, and President Obama has wisely sought to build confidence with King Salman and his young son. The Iran deal is a good one, and I've supported it from its inception. But it has had consequences that are dangerous and alarming. In the end, Riyadh and Tehran are the only players who can deescalate the situation—the Saudis show no sign of interest in that road. 

Norman Eisen, Visiting Fellow, Governance Studies:

The biggest disappointment of the post-deal year has been the failure of Congress to pass legislation complementing the JCPOA. There is a great deal that the legislative branch could do to support the pact. Above all, it could establish criteria putting teeth into U.S. enforcement of Preamble Section III, Iran's pledge never to seek nuclear weapons. Congress could and should make clear what the ramp to seeking nuclear weapons would look like, what the triggers would be for U.S. action, and what kinds of U.S. action would be on the table. If Iran knows that, it will modulate its behavior accordingly. If it does not, it will start to act out, and we have just kicked the can down the road. That delay is of course immensely valuable—but why not extend the road indefinitely? Congress can do that, and much more (e.g. by increasing funding for JCPOA oversight by the administration and the IAEA), with appropriate legislation.

Richard Nephew, Nonresident Senior Fellow, Center for 21st Century Security and Intelligence, Arms Control and Non-Proliferation Initiative, Foreign Policy program:

Over the past year, much effort has gone into ensuring that the Iran deal is fully implemented. To date, the P5+1 has—not surprisingly—gotten the better end of the bargain, with significant security benefits accruing to them and their partners in the Middle East once the International Atomic Energy Agency (IAEA) verified the required changes to Iran's nuclear program. Iran, for its part, has experienced a natural lag in its economic resurgence, held back by the collapse in oil prices in 2014, residual American and European sanctions, and reluctance among banks and businesses to re-engage.

But, Iran's economy has stabilized and—if the deal holds for its full measure—the security benefits that the P5+1 and their partners have won may fall away while Iran's economy continues to grow. The most important challenge related to the deal for the next U.S. administration (and, presumably, the Rouhani administration in its second term) is therefore: how can it be taken forward, beyond the 10- to 15-year transition period? Iran will face internal pressure to expand its nuclear program, but it also will face pressure to refrain both externally and internally, should other countries in the region seek to create their own matching nuclear capabilities. 

The best next step for all sides is to negotiate a region-wide arrangement to manage nuclear programs –one that constrains all sides, though perhaps not equally. It must ensure—at a minimum—that nuclear developments in the region are predictable, understandable, and credibly civilian (something Bob Einhorn and I addressed in a recent report). The next White House will need to do the hard work of convincing countries in the region—and beyond—not to rest on the victory of the JCPOA. Rather, they must take it for what it is: another step towards a more stable and manageable region.

Tamara Wittes, Senior Fellow and Director, Center for Middle East Policy, Foreign Policy program

This week, Washington is awash in events and policy papers taking stock of how the Iran nuclear deal has changed the Middle East in the past year. The narratives presented this week largely track the positions that the authors, speakers, or organizations articulated on the nuclear deal when it was first concluded last summer. Those who opposed the deal have marshaled evidence of how the deal has "emboldened" Iran's destabilizing behavior, while those who supported the deal cite evidence of "moderated" politics in the Islamic Republic. That polarized views on the deal last year produce polarized assessments of the deal's impact this year should surprise no one.

In fact, no matter which side of the nuclear agreement’s worth it presents, much of the analysis out this week ascribes to the nuclear deal Iranian behavior and attitudes in the region that existed before the deal's conclusion and implementation. Iran has been a revisionist state, and a state sponsor of terrorism, since the 1979 Islamic Revolution. The Saudi-Iranian rivalry predates the revolution; Iran's backing of Houthi militias against Saudi and its allies in Yemen well predates the nuclear agreement. Most notably, the upheavals in the Arab world since 2011 have given Iran wider opportunities than perhaps ever before to exploit the cracks within Arab societies—and to use cash, militias, and other tools to advance its interests and expand its influence. Iran has exploited those opportunities skillfully in the last five years and, as I wrote last summer, was likely to continue to do so regardless of diplomatic success or failure in Vienna. To argue that the nuclear deal somehow created these problems, or could solve them, is ahistorical. 

It is true that Iran's access to global markets might free even more cash for these endeavors, and that is a real issue worth tracking. But since severe sanctions did not prevent Iran from spending hundreds of millions of dollars to support and supply Hezbollah, or marshaling Islamic Revolutionary Guard Corps (IRGC) and militia fighters to sustain the faltering regime of Bashar Assad in Syria, it's not clear that additional cash will generate a meaningful difference in regional outcomes. Certainly, the nuclear deal's conclusion and implementation did not alter the trajectory of Iranian policy in Yemen, Iraq, Syria, or Lebanon to any noticeable degree—and that means that, no matter what the merits or dangers of the JCPOA, the United States must still confront and work to resolve enduring challenges to regional instability—including Iran's revisionist behavior.

Kenneth M. Pollack, Senior Fellow, Center for Middle East Policy, Foreign Policy program: 

When the JCPOA was being debated last year, I felt that the terms of the deal were far less consequential than how the United States responded to Iranian regional behavior after a deal was signed. I see the events of the past 12 months as largely having borne that out. While both sides have accused the other of "cheating," the deal has so far largely held. However, as many of my colleagues have noted, the real frictions have arisen from the U.S. geostrategic response to the deal.

I continue to believe that signing the JCPOA was better than any of the realistic alternatives—though I also continue to believe that a better deal was possible, had the administration handled the negotiations differently. However, the administration’s regional approach since then has been problematic—with officials condemning Riyadh and excusing Tehran in circumstances where both were culpable and ignoring some major Iranian transgressions, for instance (and with President Obama gratuitously insulting the Saudis and other U.S. allies in interviews). 

America's traditional Sunni Arab allies (and to some extent Turkey and Israel) feared that either the United States would use the JCPOA as an excuse to further disengage from the region or to switch sides and join the Iranian coalition. Their reading of events has been that this is precisely what has happened, and it is causing the GCC states to act more aggressively.

I think our traditional allies would enthusiastically welcome a Hillary Clinton presidency. She would likely do all that she could to reassure them that she plans to be more engaged and more willing to commit American resources and energy to Middle Eastern problems. But those allies will eventually look for her to turn words into action. I cannot imagine a Hillary Clinton administration abrogating the JCPOA, imposing significant new economic sanctions on Iran, or otherwise acting in ways that it would fear could provoke Tehran to break the deal. Our allies may see that as Washington trying to remain on the fence, which will infuriate them. 

So there are some important strategic differences between the United States and its regional allies. The second anniversary of the JCPOA could therefore prove even more fraught for America and the Middle East than the first. 


       




pe

The post-Paris clean energy landscape: Renewable energy in 2016 and beyond

Last year’s COP21 summit saw global economic powers and leading greenhouse gas emitters—including the United States, China, and India—commit to the most ambitious clean energy targets to date. Bolstered by sharp reductions in costs and supportive government policies, renewable power spread globally at its fastest-ever rate in 2015, accounting for more than half of the…

       




pe

Principals as instructional leaders: An international perspective


      
 
 




pe

Government spending: yes, it really can cut the U.S. deficit


Hypocrisy is not scarce in the world of politics. But the current House and Senate budget resolutions set new lows. Each proposes to cut about $5 trillion from government spending over the next decade in pursuit of a balanced budget. Whatever one may think of putting the goal of reducing spending when the ratio of the debt-to-GDP is projected to be stable above investing in the nation’s future, you would think that deficit-reduction hawks wouldn’t cut spending that has been proven to lower the deficit.

Yes, there are expenditures that actually lower the deficit, typically by many dollars for each dollar spent. In this category are outlays on ‘program integrity’ to find and punish fraud, tax evasion, and plain old bureaucratic mistakes. You might suppose that those outlays would be spared. Guess again. Consider the following:

Medicare. Roughly 10% of Medicare’s $600 billion budget goes for what officials delicately call ‘improper payments, according to the 2014 financial report of the Department of Health and Human Services. Some are improper merely because providers ‘up-code’ legitimate services to boost their incomes. Some payments go for services that serve no valid purpose. And some go for phantom services that were never provided. Whatever the cause, approximately $60 billion of improper payments is not ‘chump change.’

Medicare tries to root out these improper payments, but it lacks sufficient staff to do the job. What it does spend on ‘program integrity’ yields an estimated $14.40? for each dollar spent, about $10 billion a year in total. That number counts only directly measurable savings, such as recoveries and claim denials. A full reckoning of savings would add in the hard-to-measure ‘policeman on the beat’ effect that discourages violations by would-be cheats.

Fat targets remain. A recent report from the Institute of Medicine presented findings that veritably scream ‘fraud.’ Per person spending on durable medical equipment and home health care is ten times higher in Miami-Dade County, Florida than the national average. Such equipment and home health accounts for nearly three-quarters of the geographical variation in per person Medicare spending. Yet, only 4% of current recoveries of improper payments come from audits of these two items and little from the highest spending locations.

Why doesn’t Medicare spend more and go after the remaining overpayments, you may wonder? The simple answer is that Congress gives Medicare too little money for administration. Direct overhead expenses of Medicare amount to only about 1.5% of program outlays—6% if one includes the internal administrative costs of private health plans that serve Medicare enrollees. Medicare doesn’t need to spend as much on administration as the average of 19% spent by private insurers, because for example, Medicare need not pay dividends to private shareholders or advertise.

But spending more on Medicare administration would both pay for itself—$2 for each added dollar spent, according to the conservative estimate in the President’s most recent budget—and improve the quality of care. With more staff, Medicare could stop more improper payments and reduce the use of approved therapies in unapproved ways that do no good and may cause harm.

Taxes. Compare two numbers: $540 billion and $468 billion. The first number is the amount of taxes owed but not paid. The second number is the projected federal budget deficit for 2015, according to the Congressional Budget Office.

Collecting all taxes legally owed but not paid is an impossibility. It just isn’t worth going after every violation. But current enforcement falls far short of practical limits. Expenditures on enforcement directly yields $4 to $6 for each dollar spent on enforcement. Indirect savings are many times larger—the cop-on-the-beat effect again. So, in an era of ostentatious concern about budget deficits, you would expect fiscal fretting in Congress to lead to increased efforts to collect what the law says people owe in taxes.

Wrong again. Between 2010 and 2014, the IRS budget was cut in real terms by 20%. At the same time, the agency had to shoulder new tasks under health reform, as well as process an avalanche of applications for tax exemptions unleashed by the 2010 Supreme Court decision in the Citizens United case. With less money to spend and more to do, enforcement staff dropped by 15% and inflation adjusted collections dropped 13%.

One should acknowledge that enforcement will not do away with most avoidance and evasion. Needlessly complex tax laws are the root cause of most tax underpayment. Tax reform would do even more than improved administration to increase the ratio of taxes paid to taxes due. But until that glorious day when Congress finds the wit and will to make the tax system simpler and fairer, it would behoove a nation trying to make ends meet to spend $2 billion to $3 billion more each year to directly collect $10 billion to 15 billion a year more of legally owed taxes and, almost certainly, raise far more than that by frightening borderline scoff-laws.

Disability Insurance. Thirteen million people with disabling conditions who are judged incapable of engaging in substantial gainful activity received $161 billion in disability insurance in 2013. If the disabling conditions improve enough so that beneficiaries can return to work, benefits are supposed to be stopped. Such improvement is rare. But when administrators believe that there is some chance, the law requires them to check. They may ask beneficiaries to fill out a questionnaire or, in some cases, undergo a new medical exam at government expense. Each dollar spent in these ways generated an estimated $16 in savings in 2013.

Still, the Social Security Administration is so understaffed that SSA has a backlog of 1.3 million disability reviews. Current estimates indicate that spending a little over $1 billion a year more on such reviews over the next decade would save $43 billion. Rather than giving Social Security the staff and spending authority to work down this backlog and realize those savings, Congress has been cutting the agency’s administrative budget and sequestration threatens further cuts.

Claiming that better administration will balance the budget would be wrong. But it would help. And it would stop some people from shirking their legal responsibilities and lighten the burdens of those who shoulder theirs. The failure of Congress to provide enough staff to run programs costing hundreds of billions of dollars a year as efficiently and honestly as possible is about as good a definition of criminal negligence as one can find.

Authors

     
 
 




pe

Strengthening Medicare for 2030 - A working paper series


The addition of Medicare in 1965 completed a suite of federal programs designed to protect the wealth and health of people reaching older ages in the United States, starting with the Committee on Economic Security of 1934—known today as Social Security. While few would deny Medicare’s important role in improving older and disabled Americans’ financial security and health, many worry about sustaining and strengthening Medicare to finance high-quality, affordable health care for coming generations.

In 1965, average life expectancy for a 65-year-old man and woman was another 13 years and 16 years, respectively. Now, life expectancy for 65-year-olds is 18 years for men and 20 years for women—effectively a four- to five-year increase.

In 2011, the first of 75-million-plus baby boomers became eligible for Medicare. And by 2029, when all of the baby boomers will be 65 or older, the U.S. Census Bureau predicts 20 percent of the U.S. population will be older than 65. Just by virtue of the sheer size of the aging population, Medicare spending growth will accelerate sharply in the coming years.


Estimated Medicare Spending, 2010-2030



Sources: Future Elderly Model (FEM), University of Southern California Leonard D. Schaeffer Center for Health Policy & Economics, U.S. Census Bureau projections, Medicare Current Beneficiary Survey and Centers for Medicare & Medicaid Services.

The Center for Health Policy at Brookings and the USC Leonard D. Schaeffer Center for Health Policy and Economics' half-day forum on the future of Medicare, looked ahead to the year 2030--a year when the youngest baby boomers will be Medicare-eligible-- to explore the changing demographics, health care needs, medical technology costs, and financial resources that will be available to beneficiaries. The working papers below address five critical components of Medicare reform, including: modernizing Medicare's infrastructure, benefit design, marketplace competition, and payment mechanisms.

DISCUSSION PAPERS

  • Health and Health Care of Beneficiaries in 2030, Étienne Gaudette, Bryan Tysinger, Alwyn Cassil and Dana Goldman: This chartbook, prepared by the USC Schaeffer Center, aims to help policymakers understand how Medicare spending and beneficiary demographics will likely change over the next 15 years to help strengthen and sustain the program.
  • Trends in the Well-Being of Aged and their Prospects through 2030, Gary Burtless: This paper offers a survey of trends in old-age poverty, income, inequality, labor market activity, insurance coverage, and health status, and provides a brief discussion of whether the favorable trends of the past half century can continue in the next few decades.
  • The Transformation of Medicare, 2015 to 2030, Henry J. Aaron and Robert Reischauer: This paper discusses how Medicare can be made a better program and how it should look in 2030s using the perspectives of beneficiaries, policymakers and administrators; and that of society at large.
  • Improving Provider Payment in Medicare, Paul Ginsburg and Gail Wilensky: This paper discusses the various alternative payment models currently being implemented in the private sector and elsewhere that can be employed in the Medicare program to preserve quality of care and also reduce costs.

Authors

Publication: The Brookings Institution and the USC Schaeffer Center
     
 
 




pe

Eurozone desperately needs a fiscal transfer mechanism to soften the effects of competitiveness imbalances


The eurozone has three problems: national debt obligations that cannot be met, medium-term imbalances in trade competitiveness, and long-term structural flaws.

The short-run problem requires more of the monetary easing that Germany has, with appalling shortsightedness, been resisting, and less of the near-term fiscal restraint that Germany has, with equally appalling shortsightedness, been seeking. To insist that Greece meet all of its near-term current debt service obligations makes about as much sense as did French and British insistence that Germany honor its reparations obligations after World War I. The latter could not be and were not honored. The former cannot and will not be honored either.

The medium-term problem is that, given a single currency, labor costs are too high in Greece and too low in Germany and some other northern European countries. Because adjustments in currency values cannot correct these imbalances, differences in growth of wages must do the job—either wage deflation and continued depression in Greece and other peripheral countries, wage inflation in Germany, or both. The former is a recipe for intense and sustained misery. The latter, however politically improbable it may now seem, is the better alternative.

The long-term problem is that the eurozone lacks the fiscal transfer mechanisms necessary to soften the effects of competitiveness imbalances while other forms of adjustment take effect. This lack places extraordinary demands on the willingness of individual nations to undertake internal policies to reduce such imbalances. Until such fiscal transfer mechanisms are created, crises such as the current one are bound to recur.

Present circumstances call for a combination of short-term expansionary policies that have to be led or accepted by the surplus nations, notably Germany, who will also have to recognize and accept that not all Greek debts will be paid or that debt service payments will not be made on time and at originally negotiated interest rates. The price for those concessions will be a current and credible commitment eventually to restore and maintain fiscal balance by the peripheral countries, notably Greece.


Authors

Publication: The International Economy
Image Source: © Vincent Kessler / Reuters
     
 
 




pe

The impossible (pipe) dream—single-payer health reform


Led by presidential candidate Bernie Sanders, one-time supporters of ‘single-payer’ health reform are rekindling their romance with a health reform idea that was, is, and will remain a dream.  Single-payer health reform is a dream because, as the old joke goes, ‘you can’t get there from here.

Let’s be clear: opposing a proposal only because one believes it cannot be passed is usually a dodge.One should judge the merits. Strong leaders prove their skill by persuading people to embrace their visions. But single-payer is different. It is radical in a way that no legislation has ever been in the United States.

Not so, you may be thinking. Remember such transformative laws as the Social Security Act, Medicare, the Homestead Act, and the Interstate Highway Act. And, yes, remember the Affordable Care Act. Those and many other inspired legislative acts seemed revolutionary enough at the time. But none really was. None overturned entrenched and valued contractual and legislative arrangements. None reshuffled trillions—or in less inflated days, billions—of dollars devoted to the same general purpose as the new legislation. All either extended services previously available to only a few, or created wholly new arrangements.

To understand the difference between those past achievements and the idea of replacing current health insurance arrangements with a single-payer system, compare the Affordable Care Act with Sanders’ single-payer proposal.

Criticized by some for alleged radicalism, the ACA is actually stunningly incremental. Most of the ACA’s expanded coverage comes through extension of Medicaid, an existing public program that serves more than 60 million people. The rest comes through purchase of private insurance in “exchanges,” which embody the conservative ideal of a market that promotes competition among private venders, or through regulations that extended the ability of adult offspring to remain covered under parental plans. The ACA minimally altered insurance coverage for the 170 million people covered through employment-based health insurance. The ACA added a few small benefits to Medicare but left it otherwise untouched. It left unaltered the tax breaks that support group insurance coverage for most working age Americans and their families. It also left alone the military health programs serving 14 million people. Private nonprofit and for-profit hospitals, other vendors, and privately employed professionals continue to deliver most care.

In contrast, Senator Sanders’ plan, like the earlier proposal sponsored by Representative John Conyers (D-Michigan) which Sanders co-sponsored, would scrap all of those arrangements. Instead, people would simply go to the medical care provider of their choice and bills would be paid from a national trust fund. That sounds simple and attractive, but it raises vexatious questions.

  • How much would it cost the federal government? Where would the money to cover the costs come from?
  • What would happen to the $700 billion that employers now spend on health insurance?
  • How would the $600 billion a year reductions in total health spending that Sanders says his plan would generate come from?
  • What would happen to special facilities for veterans and families of members of the armed services?

Sanders has answers for some of these questions, but not for others. Both the answers and non-answers show why single payer is unlike past major social legislation.

The answer to the question of how much single payer would cost the federal government is simple: $4.1 trillion a year, or $1.4 trillion more than the federal government now spends on programs that the Sanders plan would replace. The money would come from new taxes. Half the added revenue would come from doubling the payroll tax that employers now pay for Social Security. This tax approximates what employers now collectively spend on health insurance for their employees...if they provide health insurance. But many don’t. Some employers would face large tax increases. Others would reap windfall gains.

The cost question is particularly knotty, as Sanders assumes a 20 percent cut in spending averaged over ten years, even as roughly 30 million currently uninsured people would gain coverage. Those savings, even if actually realized, would start slowly, which means cuts of 30 percent or more by Year 10. Where would they come from? Savings from reduced red-tape associated with individual insurance would cover a small fraction of this target. The major source would have to be fewer services or reduced prices. Who would determine which of the services physicians regard as desirable -- and patients have come to expect -- are no longer ‘needed’? How would those be achieved without massive bankruptcies among hospitals, as columnist Ezra Klein has suggested, and would follow such spending cuts? What would be the reaction to the prospect of drastic cuts in salaries of health care personnel – would we have a shortage of doctors and nurses? Would patients tolerate a reduction in services? If people thought that services under the Sanders plan were inadequate, would they be allowed to ‘top up’ with private insurance? If so, what happens to simplicity? If not, why not?

Let me be clear: we know that high quality health care can be delivered at much lower cost than is the U.S. norm. We know because other countries do it. In fact, some of them have plans not unlike the one Senator Sanders is proposing. We know that single-payer mechanisms work in some countries. But those systems evolved over decades, based on gradual and incremental change from what existed before. That is the way that public policy is made in democracies. Radical change may occur after a catastrophic economic collapse or a major war. But in normal times, democracies do not tolerate radical discontinuity. If you doubt me, consider the tumult precipitated by the really quite conservative Affordable Care Act.


Editor's note: This piece originally appeared in Newsweek.

Authors

Publication: Newsweek
Image Source: © Jim Young / Reuters
      
 
 




pe

Brookings experts on the implications of COVID-19 for the Middle East and North Africa

The novel coronavirus was first identified in January 2020, having caused people to become ill in Wuhan, China. Since then, it has rapidly spread across the world, causing widespread fear and uncertainty. At the time of writing, close to 500,000 cases and 20,000 deaths had been confirmed globally; these numbers continue to rise at an…

       




pe

Obama’s exit calculus on the peace process

One issue that has traditionally shared bipartisan support is how the United States should approach the Israeli-Palestinian conflict, write Sarah Yerkes and Ariella Platcha. However, this year both parties have shifted their positions farther from the center and from past Democratic and Republican platforms. How will that affect Obama’s strategy?

      
 
 




pe

In Daniel Patrick Moynihan Prize speech, Ron Haskins and Isabel Sawhill stress importance of evidence-based policy


Senior Fellows Ron Haskins and Isabel Sawhill are the first joint recipients of the Daniel Patrick Moynihan Prize from the American Academy of Political and Social Science (AAPSS). The prize is awarded each year to a leading policymaker, social scientist, or public intellectual whose career focuses on advancing the public good through social science. It was named after the late senator from New York and renowned sociologist Daniel Patrick Moynihan. The pair accepted the award May 12 at a ceremony in Washington, DC. 

In their joint lecture delivered at the ceremony, Haskins and Sawhill emphasized the importance of evidence-based public policy, highlighting Sawhill’s latest work in her book, Generation Unbound (Brookings, 2014). Watch their entire speech here:

“Marriage is disappearing and more and more babies are born outside marriage,” Sawhill said during the lecture. “Right now, the proportion born outside of marriage is about 40 percent. It’s higher than that among African Americans and lower than that among the well-educated. But it’s no longer an issue that just affects the poor or minority groups.”

Download Sawhill's slides » | Download Ron Haskins' slides »

The power of evidence-based policy is finally being recognized, Haskins added. “One of the prime motivating factors of the current evidence-based movement,” he said, “is the understanding, now widespread, that most social programs either have not been well evaluated or they don’t work.” Haskins continued:

Perhaps the most important social function of social science is to find and test programs that will reduce the nation’s social problems. The exploding movement of evidence-based policy and the many roots the movement is now planting, offer the best chance of fulfilling this vital mission of social science, of achieving, in other words, exactly the outcomes Moynihan had hoped for.

He pointed toward the executive branch, state governments, and non-profits implementing policies that could make substantial progress against the nation’s social problems.

Richard Reeves, a senior fellow at Brookings and co-director, with Haskins, of the Center on Children and Families (CCF), acknowledged Haskins and Sawhill’s “powerful and unique intellectual partnership” and their world-class work on families, poverty, opportunity, evidence, parenting, work, and education.

Haskins and Sawhill were the first to be awarded jointly by the AAPSS, which recognizes their 15-year collaboration at Brookings and the Center on Children and Families, which they established. In addition to their work at CCF, the two co-wrote Creating an Opportunity Society (Brookings 2009) and serve as co-editors of The Future of Children, a policy journal that tackles issues that have an impact on children and families.

Haskins and Sawhill join the ranks of both current and past Brookings scholars who have received the Moynihan Prize, including Alice Rivlin (recipient of the inaugural prize), Rebecca Blank, and William Julius Wilson along with other distinguished scholars and public servants.

Want to learn more about the award’s namesake? Read Governance Studies Senior Fellow and historian Steve Hess’s account of Daniel Patrick Moynihan’s time in the Nixon White House in his book The Professor and the President (Brookings, 2014).

Authors

  • James King
      
 
 




pe

Around the halls: Experts discuss the recent US airstrikes in Iraq and the fallout

U.S. airstrikes in Iraq on December 29 — in response to the killing of an American contractor two days prior — killed two dozen members of the Iranian-backed militia Kata'ib Hezbollah. In the days since, thousands of pro-Iranian demonstrators gathered outside the U.S. embassy in Baghdad, with some forcing their way into the embassy compound…

       




pe

Around the halls: What Brookings experts hope to hear in the Iowa debate

Iran and the recent the U.S. strike that killed Quds Force commander Qasem Soleimani will loom large for the Democratic candidates participating in the debate in Iowa. It may be tempting for the candidates to use this issue primarily as an opportunity to criticize the current administration and issue vague appeals for a return to…

       




pe

Around the halls: Brookings experts on the Middle East react to the White House’s peace plan

On January 28 at the White House, President Trump unveiled his plan for Middle East peace alongside Israeli Prime Minister Benjanim Netanyahu. Below, Brookings experts on the peace process and the region more broadly offer their initial takes on the announcement. Natan Sachs (@natansachs), Director of the Center for Middle East Policy: This is a…

       




pe

Experts assess the nuclear Non-Proliferation Treaty, 50 years after it went into effect

March 5, 2020 marks the 50th anniversary of the entry into effect of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Five decades on, is the treaty achieving what was originally envisioned? Where is it succeeding in curbing the spread of nuclear weapons, and where might it be falling short? Four Brookings experts on defense…

       




pe

Facebook, Google, and the Future of Privacy and Free Speech


Introduction

It was 2025 when Facebook decided to post live feeds from public and private surveillance cameras, so they could be searched online. The decision hardly came as a surprise. Ever since Facebook passed the 500 million-member mark in 2010, it found increasing consumer demand for applications that allowed users to access surveillance cameras with publicly accessible IP addresses. (Initially, live feeds to cameras on Mexican beaches were especially popular.) But in the mid-2020s, popular demand for live surveillance camera feeds were joined by demands from the U.S. government that an open circuit television network would be invaluable in tracking potential terrorists. As a result, Facebook decided to link the public and private camera networks, post them live online, and store the video feeds without restrictions on distributed servers in the digital cloud.

Once the new open circuit system went live, anyone in the world could log onto the Internet, select a particular street view on Facebook maps and zoom in on a particular individual. Anyone could then back click on that individual to retrace her steps since she left the house in the morning or forward click on her to see where she was headed in the future. Using Facebook’s integrated face recognition app, users could click on a stranger walking down any street in the world, plug her image into the Facebook database to identify her by name, and then follow her movements from door-to-door. Since cameras were virtually ubiquitous in public and commercial spaces, the result was the possibility of ubiquitous identification and surveillance of all citizens virtually anywhere in the world—and by anyone. In an enthusiastic launch, Mark Zuckerberg dubbed the new 24/7 ubiquitous surveillance system “Open Planet.”

Open Planet is not a technological fantasy. Most of the architecture for implementing it already exists, and it would be a simple enough task for Facebook or Google, if the companies chose, to get the system up and running: face recognition is already plausible, storage is increasing exponentially; and the only limitation is the coverage and scope of the existing cameras, which are growing by the day. Indeed, at a legal Futures Conference at Stanford in 2007, Andrew McLaughlin, then the head of public policy at Google, said he expected Google to get requests to put linked surveillance networks live and online within the decade. How, he, asked the audience of scholars and technologists, should Google respond?

If “Open Planet” went live, would it violate the Constitution? The answer is that it might not under Supreme Court doctrine as it now exists—at least not if it were a purely-private affair, run by private companies alone and without government involvement. Both the First Amendment, which protects free speech, and the Fourth Amendment, which prohibits unreasonable searches and seizures, only restrict actions by the government. On the other hand, if the government directed Open Planet’s creation or used it to track citizens on government-owned, as well as private-sector, cameras, perhaps Facebook might be viewed as the equivalent of a state actor, and therefore restricted by the Constitution.

At the time of the framing of the Constitution, a far less intrusive invasion of privacy – namely, the warrantless search of private homes and desk drawers for seditious papers – was considered the paradigmatic case of an unreasonable and unconstitutional invasion of privacy. The fact that 24/7 ubiquitous surveillance may not violate the Constitution today suggests the challenge of translating the framers’ values into a world in which Google and Facebook now have far more power over the privacy and free speech of most citizens than any King, president, or Supreme Court justice. In this essay, I will examine four different areas where the era of Facebook and Google will challenge our existing ideas about constitutional protections for free speech and privacy: ubiquitous surveillance with GPS devices and online surveillance cameras; airport body scanners; embarrassing Facebook photos and the problem of digital forgetting; and controversial YouTube videos. In each area, I will suggest, preserving constitutional values requires a different balance of legal and technological solutions, combined with political mobilization that leads to changes in social norms.

Let’s start with Open Planet, and imagine sufficient government involvement to make the courts plausibly consider Facebook’s program the equivalent of state action. Imagine also that the Supreme Court in 2025 were unsettled by Open Planet and inclined to strike it down. A series of other doctrines might bar judicial intervention. The Court has come close to saying that we have no legitimate expectations of privacy in public places, at least when the surveillance technologies in question are in general public use by ordinary members of the public.[1]  As mobile camera technology becomes ubiquitous, the Court might hold that the government is entitled to have access to the same linked camera system that ordinary members of the public have become accustomed to browsing. Moreover, the Court has said that we have no expectation of privacy in data that we voluntarily surrender to third parties.[2] In cases where digital images are captured on cameras owned by third parties and stored in the digital cloud—that is, on distributed third party servers--we have less privacy than citizens took for granted at the time of the American founding. And although the founders expected a degree of anonymity in public, that expectation would be defeated by the possibility of 24/7 surveillance on Facebook.

The doctrinal seeds of a judicial response to Open Planet, however, do exist. A Supreme Court inclined to strike down ubiquitous surveillance might draw on recent cases involving decisions by the police to place a GPS tracking device on the car of a suspect without a warrant, tracking his movements 24/7. The Supreme Court has not yet decided whether prolonged surveillance, in the form of “dragnet-type law enforcement practices” violates the Constitution.[3] Three federal circuits have held that the use of a GPS tracking device to monitor someone’s movements in a car over a prolonged period is not a search because we have no expectations of privacy in our public movements.[4] But in a visionary opinion in 2010, Judge Douglas Ginsburg of the U.S. Court of Appeals disagreed. Prolonged surveillance is a search, he recognized, because no reasonable person expects that his movements will be continuously monitored from door to door; all of us have a reasonable expectation of privacy in the “whole” of our movements in public. [5] Ginsburg and his colleagues struck down the warrantless GPS surveillance of a suspect that lasted 24 hours a day for nearly a month on the grounds that prolonged, ubiquitous tracking of citizen’s movements in public is constitutionally unreasonable. “Unlike one’s movements during a single journey, the whole of one’s movements over the course of a month is not actually exposed to the public because the likelihood anyone will observe all those movements is effectively nil,” Ginsburg wrote. Moreover, “That whole reveals more – sometimes a great deal more – than does the sum of its parts.”[6] Like the “mosaic theory” invoked by the government in national security cases, Ginsburg concluded that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble.  These types of information can each reveal more about a person than does any individual trip viewed in isolation.”[7] Ginsburg understood that 24/7 ubiquitous surveillance differs from more limited tracking not just in degree but in kind – it looks more like virtual stalking than a legitimate investigation – and therefore is an unreasonable search of the person.

Because prolonged surveillance on “Open Planet” potentially reveals far more about each of us than 24/7 GPS tracking does, providing real time images of all our actions, rather than simply tracking the movements of our cars, it could also be struck down as an unreasonable search of our persons. And if the Supreme Court struck down Open Planet on Fourth Amendment grounds, it might be influenced by the state regulations of GPS surveillance that Ginsburg found persuasive, or by Congressional attempts to regulate Facebook or other forms of 24/7 surveillance, such as the Geolocational Privacy and Surveillance Act proposed by Sen. Ron Wyden (D-OR) that would require officers to get a warrant before electronically tracking cell phones or cars.[8]

The Supreme Court in 2025 might also conceivably choose to strike down Open Planet on more expansive grounds, relying not just on the Fourth Amendment, but on the right to autonomy recognized in cases like Casey v. Planned Parenthood and Lawrence v. Texas. The right to privacy cases, beginning with Griswold v. Connecticut and culminating in Roe v. Wade and Lawrence, are often viewed as cases about sexual autonomy, but in Casey and Lawrence, Justice Anthony Kennedy recognized a far more sweeping principle of personal autonomy that might well protect individuals from totalizing forms of ubiquitous surveillance. Imagine an opinion written in 2025 by Justice Kennedy, still ruling the Court and the country at the age of 89. “In our tradition the State is not omnipresent in the home. And there are other spheres of our lives and existence, outside the home, where the State should not be a dominant presence,” Kennedy wrote in Lawrence. “Freedom extends beyond spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct.”[9] Kennedy’s vision of an “autonomy of self” that depends on preventing the state from becoming a “dominant presence” in public as well as private places might well be invoked to prevent the state from participating in a ubiquitous surveillance system that prevents citizens from defining themselves and expressing their individual identities. Just as citizens in the Soviet Union were inhibited from expressing and defining themselves by ubiquitous KGB surveillance, Kennedy might hold, the possibility of ubiquitous surveillance on “Open Planet” also violates the right to autonomy, even if the cameras in question are owned by the private sector, as well as the state, and a private corporation provides the platform for their monitoring.  Nevertheless, the fact that the system is administered by Facebook, rather than the Government, might be an obstacle to a constitutional ruling along these lines. And if Kennedy (or his successor) struck down “Open Planet” with a sweeping vision of personal autonomy that didn’t coincide with the actual values of a majority of citizens in 2025, the decision could be the Roe of virtual surveillance, provoking backlashes from those who don’t want the Supreme Court imposing its values on a divided nation.

Would the Supreme Court, in fact, strike down “Open Planet” in 2025? If the past is any guide, the answer may depend on whether the public, in 2025, views 24/7 ubiquitous surveillance as invasive and unreasonable, or whether citizens have become so used to ubiquitous surveillance on and off the web, in virtual space and real space, that the public demands “Open Planet” rather than protesting against it. I don’t mean to suggest that the Court actually reads the polls. But in the age of Google and Facebook, technologies that thoughtfully balance privacy with free expression and other values have tended to be adopted only when companies see their markets as demanding some kind of privacy protection, or when engaged constituencies have mobilized in protest against poorly designed architectures and demanded better ones, helping to create a social consensus that the invasive designs are unreasonable.

The paradigmatic case of the kind of political mobilization on behalf of constitutional values that I have in mind is presented by my second case: the choice between the naked machine and the blob machine in airport security screening. In 2002, officials at Orlando International airport first began testing the millimeter wave body scanners that are currently at the center of a national uproar. The designers of the scanners at Pacific Northwest Laboratories offered U.S. officials a choice: naked machines or blob machines? The same researchers had developed both technologies, and both were equally effective at identifying contraband. But, as their nicknames suggest, the former displays graphic images of the human body, while the latter scrambles the images into a non-humiliating blob.[10]

Since both versions of the scanners promise the same degree of security, any sane attempt to balance privacy and safety would seem to favor the blob machines over the naked machines. And that’s what European governments chose. Most European airport authorities have declined to adopt body scanners at all, because of persuasive evidence that they’re not effective at detecting low-density contraband such as the chemical powder PETN that the trouser bomber concealed in his underwear on Christmas day, 2009. But the handful of European airports that have adopted body scanners, such as Schiphol airport in Amsterdam, have opted for a version of the blob machine. This is in part due to the efforts of European privacy commissioners, such as Germany’s Peter Schaar, who have emphasized the importance of designing body scanners in ways that protect privacy.

The U.S. Department of Homeland Security made a very different choice. It deployed the naked body scanners without any opportunity for public comment—then appeared surprised by the backlash. Remarkably, however, the backlash was effective. After a nationwide protest inspired by the Patrick Henry of the anti-Naked Machines movement, a traveler who memorably exclaimed “Don’t Touch my Junk,” President Obama called on the TSA to go back to the drawing board. And a few months after authorizing the intrusive pat downs, in February 2011, the TSA announced that it would begin testing, on a pilot basis, versions of the very same blob machines that the agency had rejected nearly a decade earlier. According to the latest version, to be tested in Las Vegas and Washington, D.C, the TSA will install software filters on its body scanner machines that detects potential threat items and indicates their location on a generic, blob like outline of each passenger that will appear on a monitor attached to the machine. Passengers without suspicious items will be cleared as “OK,” those with suspicious items will be taken aside for additional screening. The remote rooms in which TSA agents view images of the naked body will be eliminated. According to news reports, TSA began testing the filtering software in the fall of 2010 – precisely when the protests against the naked machines went viral. If the filtering software is implemented across the country, converting naked machines into blob machines, the political victory for privacy will be striking.

Of course, it’s possible that courts might strike down the naked machines as unreasonable and unconstitutional, even without the political protests. In a 1983 opinion upholding searches by drug-sniffing dogs, Justice Sandra Day O’Connor recognized that a search is most likely to be considered constitutionally reasonable if it is very effective at discovering contraband without revealing innocent but embarrassing information.[11] The backscatter machines seem, under O'Connor's view, to be the antithesis of a reasonable search: They reveal a great deal of innocent but embarrassing information and are remarkably ineffective at revealing low-density contraband.

It’s true that the government gets great deference in airports and at the borders, where routine border searches don’t require heightened suspicion. But the Court has held that non-routine border searches, such as body cavity or strip searches, do require a degree of individual suspicion.  And although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals for the 9th Circuit ruled in 2007, that "a particular airport security screening search is constitutionally reasonable provided that it 'is no more extensive nor intensive than necessary, in the light of current technology, to detect the presence of weapons or explosives.'"[12]

It’s arguable that since the naked machines are neither effective nor minimally intrusive – that is, because they might be designed with blob machine like filters that promise just as much security while also protecting privacy – that courts might strike them down. As a practical matter, however, both lower courts and the Supreme Court seem far more likely to strike down strip searches that have inspired widespread public opposition – such as the strip search of a high school girl wrongly accused of carrying drugs, which the Supreme Court invalidated by a vote of 8-1,[13] then they are of searches that, despite the protests of a mobilized minority, the majority of the public appears to accept.

The tentative victory of the blob machines over the naked machines, if it materializes, provides a model for successful attempts to balance privacy and security: government can be pressured into striking a reasonable balance between privacy and security by a mobilized minority of the public when the privacy costs of a particular technology are dramatic, visible, widely distributed, and people experience the invasions personally as a kind of loss of control over the conditions of their own exposure.

But can we be mobilized to demand a similarly reasonable balance when the threats to privacy come not from the government but from private corporations and when those responsible for exposing too much personal information about us are none other than ourselves? When it comes to invasions of privacy by fellow citizens, rather than by the government, we are in the realm not of autonomy but of dignity and decency. (Autonomy preserves a sphere of immunity from government intrusion in our lives; dignity protects the norms of social respect that we accord to each other.) And since dignity is a socially constructed value, it’s unlikely to be preserved by judges--or by private corporations--in the face of the expressed preferences of citizens who are less concerned about dignity than exposure.

This is the subject of our third case, which involves a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing—where every online photo, status update, Twitter post and blog entry by and about us can be stored forever.[14] Consider the case of Stacy Snyder. Four years ago, Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.[15]

When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact.

Technological advances, of course, have often presented new threats to privacy. In 1890, in perhaps the most famous article on privacy ever written, Samuel Warren and Louis Brandeis complained that because of new technology — like the Kodak camera and the tabloid press — “gossip is no longer the resource of the idle and of the vicious but has become a trade.”[16] But the mild society gossip of the Gilded Age pales before the volume of revelations contained in the photos, video and chatter on social-media sites and elsewhere across the Internet. Facebook, which surpassed MySpace in 2008 as the largest social-networking site, now has more than 500 million members, or 22 percent of all Internet users, who spend more than 500 billion minutes a month on the site. Facebook users share more than 25 billion pieces of content each month (including news stories, blog posts and photos), and the average user creates 70 pieces of content a month.

Today, as in Brandeis’s day, the value threatened by gossip on the Internet – whether posted by us our by others – is dignity. (Brandeis called it an offense against honor.) But American law has never been good at regulating offenses against dignity – especially when regulations would clash with other values, such as protections for free speech. And indeed, the most ambitious proposals in Europe to create new legal rights to escape your past on the Internet are very hard to reconcile with the American free speech tradition.

The cautionary tale here is Argentina, which has dramatically expanded the liability of search engines like Google and Yahoo for offensive photographs that harm someone’s reputation. Recently, an Argentinean judge held Google and Yahoo liable for causing “moral harm” and violating the privacy of Virginia Da Cunha, a pop star, by indexing pictures of her that were linked to erotic content. The ruling against Google and Yahoo was overturned on appeal in August, but there are at least 130 similar cases pending in Argentina to force search engines to remove or block offensive content. In the U.S., search engines are protected by the Communications Decency Act, which immunizes Internet service providers from hosting content posted by third parties. But as liability against search engines expands abroad, it will seriously curtain free speech:  Yahoo says that the only way to comply with injunctions about is to block all sites that refer to a particular plaintiff.[17]

In Europe, recent proposals to create a legally enforceable right to escape your past have come from the French. The French data commissioner, Alex Turc, who has proposed a right to oblivion – namely a right to escape your past on the Internet. The details are fuzzy, but it appears that the proposal would rely on an international body – say a commission of forgetfulness – to evaluate particular take down requests and order Google and Facebook to remove content that, in the view of commissioners, violated an individuals’ dignitary rights.

From an American perspective, the very intrusiveness of this proposal is enough to make it implausible: how could we rely on bureaucrats to protect our dignity in cases where we have failed to protect it on our own? Europeans, who have less of a free speech tradition and far more of a tradition of allowing people to remove photographs taken and posted against their will, will be more sympathetic to the proposal. But from the perspective of most American courts and companies, giving people the right selectively to delete their pasts from public discourse would pose unacceptably great threats to free speech.

A far more promising solution to the problem of forgetting on the Internet is technological. And there are already small-scale privacy apps that offer disappearing data. An app called TigerText allows text-message senders to set a time limit from one minute to 30 days, after which the text disappears from the company’s servers, on which it is stored, and therefore, from the senders’ and recipients’ phones. (The founder of TigerText, Jeffrey Evans, has said he chose the name before the scandal involving Tiger Woods’s supposed texts to a mistress.)[18]

Expiration dates could be implemented more broadly in various ways. Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read. The technology doesn’t promise perfect control — you can’t stop someone from copying your photos or Facebook chats during the period in which they are not encrypted. But as Vanish improves, it could bring us much closer to a world where our data don’t linger forever.

Facebook, if it wanted to, could implement expiration dates on its own platform, making our data disappear after, say, three days or three months unless a user specified that he wanted it to linger forever. It might be a more welcome option for Facebook to encourage the development of Vanish-style apps that would allow individual users who are concerned about privacy to make their own data disappear without imposing the default on all Facebook users.

So far, however, Zuckerberg, Facebook’s C.E.O., has been moving in the opposite direction — toward transparency, rather than privacy. In defending Facebook’s recent decision to make the default for profile information about friends and relationship status public, Zuckerberg told the founder of the publication TechCrunch that Facebook had an obligation to reflect “current social norms” that favored exposure over privacy. “People have really gotten comfortable not only sharing more information and different kinds but more openly and with more people, and that social norm is just something that has evolved over time,” [19] he said.

It’s true that a German company, X-Pire, recently announced the launch of a Facebook app that will allow users automatically to erase designated photos. Using electronic keys that expire after short periods of time, and obtained by solving a Captcha, or graphic that requires users to type in a fixed number combinations, the application ensures that once the time stamp on the photo has expired, the key disappears.[20] X-Pire is a model for a sensible, blob-machine-like solution to the problem of digital forgetting. But unless Facebook builds X-Pire-like apps into its platform – an unlikely outcome given its commercial interests – a majority of Facebook users are unlikely to seek out disappearing data options until it’s too late. X-Pire, therefore, may remain for the foreseeable future a technological solution to a grave privacy problem—but a solution that doesn’t have an obvious market.

The courts, in my view, are better equipped to regulate offenses against autonomy, such as 24/7 surveillance on Facebook, than offenses against dignity, such as drunken Facebook pictures that never go away. But that regulation in both cases will likely turn on evolving social norms whose contours in twenty years are hard to predict.

Finally, let’s consider one last example of the challenge of preserving constitutional values in the age of Facebook and Google, an example that concerns not privacy but free speech.[21]

At the moment, the person who arguably has more power than any other to determine who may speak and who may be heard around the globe isn’t a king, president or Supreme Court justice. She is Nicole Wong, the deputy general counsel of Google, and her colleagues call her “The Decider.” It is Wong who decides what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet.

At the moment, Wong seems to be exercising that responsibility with sensitivity to the values of free speech. Google and Yahoo can be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad.

For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. Broadly, Google has decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. But not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?”

Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues worry that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes.

It is not only foreign countries that are eager to restrict speech on Google and YouTube. In May, 2006, Joseph Lieberman who has become the A. Mitchell Palmer of the digital age, had his staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” Recently, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.”

That category scrupulously tracks the Supreme Court’s rigorous First Amendment doctrine, which says that speech can be banned only when it poses an imminent threat of producing serious lawless action. Unfortunately, Wong and her colleagues recently retreated from that bright line under further pressure from Lieberman. In November, 2010, YouTube added a new category that viewers can click to flag videos for removal: “promotes terrorism.” There are 24 hours of video uploaded on YouTube every minute, and a series of categories viewers can use to request removal, including “violent or repulsive content” or inappropriate sexual content. Although hailed by Senator Lieberman, the new “promotes terrorism category” is potentially troubling because it goes beyond the narrow test of incitement to violence that YouTube had previously used to flag terrorism related videos for removal. YouTube’s capitulation to Lieberman shows that a user generated system for enforcing community standards will never protect speech as scrupulously as unelected judges enforcing strict rules about when speech can be viewed as a form of dangerous conduct.

Google remains a better guardian for free speech than internet companies like Facebook and Twitter, which have refused to join the Global Network Initiative, an industry-wide coalition committed to upholding free speech and privacy. But the recent capitulation of YouTube shows that Google’s “trust us” model may not be a stable way of protecting free speech in the twenty-first century, even though the alternatives to trusting Google – such as authorizing national regulatory bodies around the globe to request the removal of controversial videos – might protect less speech than Google’s “Decider” model currently does.

I’d like to conclude by stressing the complexity of protecting constitutional values like privacy and free speech in the age of Google and Facebook, which are not formally constrained by the Constitution. In each of my examples – 24/7 Facebook surveillance, blob machines, escaping your Facebook past, and promoting free speech on YouTube and Google -- it’s possible to imagine a rule or technology that would protect free speech and privacy, while also preserving security—a blob-machine like solution. But in some areas, those blob-machine-like solutions are more likely, in practice, to be adopted then others. Engaged minorities may demand blob machines when they personally experience their own privacy being violated; but they may be less likely to rise up against the slow expansion of surveillance cameras, which transform expectations of privacy in public. Judges in the American system may be more likely to resist ubiquitous surveillance in the name of Roe v. Wade-style autonomy than they are to create a legal right to allow people to edit their Internet pasts, which relies on ideas of dignity that in turn require a social consensus that in America, at least, does not exist. As for free speech, it is being anxiously guarded for the moment by Google, but the tremendous pressures, from consumers and government are already making it hard to hold the line at removing only speech that threatens imminent lawless action.

In translating constitutional values in light of new technologies, it’s always useful to ask: What would Brandeis do? Brandeis would never have tolerated unpragmatic abstractions, which have the effect of giving citizens less privacy in the age of cloud computing than they had during the founding era. In translating the Constitution into the challenges of our time, Brandeis would have considered it a duty actively to engage in the project of constitutional translation in order to preserve the Framers’ values in a startlingly different technological world. But the task of translating constitutional values can’t be left to judges alone: it also falls to regulators, legislators, technologists, and, ultimately, to politically engaged citizens. As Brandeis put it, “If we would guide by the light of reason, we must let our minds be bold.”


[1] See Florida v. Riley, 488 U.S. 445 (1989) (O’Connor, J., concurring).
[2] See United States v. Miller, 425 U.S. 435 (1976).
[3] See United States v. Knotts, 460 U.S. 276, 283-4 (1983).
[4] See United States v. Pineda-Morena, 591 F.3d 1212 (9th Cir. 2010); United States v. Garcia, 474 F.3d 994 (7th Cir. 2007); United States v. Marquez, 605 F.3d 604 (8th Cir. 2010).
[5] See United States v. Maynard, 615 F.3d 544 (D.C. Cir 2010).
[6] 615 F.3d at 558.  
[7] Id. at 562.
[8] See Declan McCullagh, “Senator Pushes for Mobile Privacy Reform,” CNet News, March 22, 2011, available at http://m.news.com/2166-12_3-20045723-281.html
[9] Lawrence v. Texas, 539 U.S. 558, 562 (2003).
[10] The discussion of the blob machines is adapted from “Nude Breach,” New Republic, December 13, 2010.
[11] United States v. Place, 462 U.S. 696 (1983).
[12] U.S. v. Davis, 482 F.2d 893, 913 (9th Cir. 1973).
[13] Safford Unified School District v. Redding, 557 U.S. ___ (2009).
[14] The discussion of digital forgetting is adapted from “The End of Forgetting,” New York Times Magazine, July 25, 2010.
[15]Snyder v. Millersville University, No. 07-1660 (E.D. Pa. Dec. 3, 2008).
[16] Brandeis and Warren, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890).
[17] Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y.  Times, August 20, 2010, B4.
[18] See Belinda Luscombe, “Tiger Text: An iPhone App for Cheating Spouses?”, Time.com, Feb. 26, 2010, available at http://www.time.com/time/business/article/0,8599,1968233,00.html
[19]Marshall Kirkpatrick, “Facebook’s Zuckerbeg Says the Age of Privacy Is Over,” ReadWriteWeb.com, January 9, 2010, available at http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php
[20] Aemon Malone, “X-Pire Aims to Cut down on Photo D-Tagging on Facebook,” Digital Trends.com, January 17, 2011, available at http://www.digitaltrends.com/social-media/x-pire-adds-expiration-date-to-digital-photos/
[21] The discussion of free speech that follows is adapted from “Google’s Gatekeepers,” New York Times Magazine, November 30, 2008.

Downloads

Authors

Image Source: David Malan
      
 
 




pe

The Future of Spectrum


Executive Summary

In recent years, growth in demand for wireless services has sparked a boom in the mobile phone and wireless data sector.[i] During the past four years, the number of mobile phone subscribers tripled,[ii] and the number of jobs in the telecommunications field has nearly quintupled.[iii] New, better, and faster mobile devices, such as tablets and smartphones, have created multi-billion dollar industries of their own, such as Google Android and the Apple iOS “app stores.”[iv] And those technologies have contributed to the dawning of an always-on, always-connected culture.

But this growing demand for mobile Internet access requires a growing amount of wireless radio spectrum, portending serious problems for the future. At the moment, the United States has designated 547 MHz of spectrum to wireless broadband services, but the Federal Communications Commission (FCC) predicts a need for 637 MHz of spectrum by 2013, and 822 MHz of spectrum by 2014.[v] Without more spectrum allocated to wireless Internet connectivity, America risks short-circuiting the mobile broadband revolution.

The National Broadband Plan proposes a solution. It sets forth a detailed plan to make 300 MHz of spectrum available for wireless broadband use within the next five years, and another 200 MHz in the five years after that.[vi] It seeks to achieve this freeing of spectrum by auctioning unused spectrum, lifting burdensome regulations to enable wireless broadband service in certain spectrum ranges, and reallocating spectrum from other services – notably broadcast television – to enable such spectrum to be used for wireless broadband.[vii] Though many of these provisions are controversial, the FCC has already done serious work to achieve these goals. If the FCC can achieve its goals to enable the growth of wireless broadband, America will be able to unlock the full potential of the wireless broadband revolution and realize the potential of a new wave of American innovation.



[i] Federal Communications Commission, Connecting America: The National Broadband Plan 78 (2010) [hereinafter National Broadband Plan].

[ii] Id.

[iii] Lawrence H. Summers, Remarks on the President's Spectrum Initiative As Prepared for Delivery (2010 June 28).

[iv] Robin Wauters, Report: Mobile App Market Will Be Worth $25 Billion By 2015 – Apple’s Share: 20 percent, TechCrunch.com, 2011 January 18, http://techcrunch.com/2011/01/18/report-mobile-app-market-will-be-worth-25-billion-by-2015-apples-share-20/

[v] Federal Communications Commission, Mobile Broadband: The Benefits of Additional Spectrum 18 (2011) , available at http://download.broadband.gov/plan/fcc-staff-technical-paper-mobile-broadband-benefits-of-additional-spectrum.pdf (hereinafter Benefits of Additional Spectrum). [hereinafter Benefits of Additional Spectrum].

[vi] See National Broadband Plan, supra note 1, at 84.

[vii] Id.

Downloads

Authors

Image Source: © Luke MacGregor / Reuters
      
 
 




pe

Careful or careless? Perspectives on the CARES Act

The Coronavirus Aid, Relief, and Economic Security (CARES) Act, passed by the Senate on March 25 and expected to be rapidly approved by the House and President, is the largest aid package in history. The bipartisan deal allocates $2 trillion in an effort to mitigate the mounting fallout from the COVID-19 pandemic, including $1.5 trillion…

       




pe

Mask diplomacy: How coronavirus upended generations of China-Japan antagonism

Within a few weeks of identifying the novel coronavirus in January, medical masks quickly became one of the most sought-after commodities for their perceived protective powers, disappearing online and from store shelves around the world. As the virus continues to spread, the stockpiling of medical supplies has led to global supply shortages. China has been…