y Taking Down the (Entry) Barriers to Digital Financial Inclusion By webfeeds.brookings.edu Published On :: Thu, 22 Jan 2015 07:30:00 -0500 Recent reports have highlighted how mobile-based financial services are transforming banking and payments in Kenya, Bangladesh, and Peru, and all the hype about how they are about to explode everywhere else. For all of the promise that digital financial systems have for lowering costs and helping people all over the globe, it is unfortunate that their development is hampered by regulation that protects the interests of the largest providers. These regulations create significant barriers and raise the total costs to achieve universal financial inclusion. It is indeed conceivable that purely digital financial transactions could be handled at vanishingly small unit costs, from anywhere. But the cost that won´t go away is that at the interface between the new digital payment system and the legacy payment system – hard cash. Cash in/cash out (CICO) points are like tollgates at the edge of the digital payments cloud. Cash is Still King Even in areas with flourishing mobile banking usage, people tend to cash in every time they want to make a mobile payment, and to cash out immediately and in full every time they receive digital money. Rather than displacing cash, digital platforms have made local cash ecosystems more efficient. Without full backward compatibility with cash, digital payment systems could not take root. The bigger issue is not the size of the CICO toll, but the fact that small players cannot expect to have the transaction volume to sustain a widespread CICO network. The incumbent banks and telecommunications firms have built in competitive advantages. They can quickly form agreements with brick and mortar shops, attract users from the current customer base, threaten new entrants, and aggregate enough transactions to induce CICO outlets to maintain sufficient liquidity on hand. Therefore, the competition in digital financial services will not be determined primarily by what happens within the digital payments market itself, but rather by what happens in the contiguous cash market. The power of digital services is their ability to transcend geography, and yet success in the digital payments space will go to whoever has the best physical CICO footprint. Regulators treat the digital payments service and the CICO service as conjoined twins: each digital financial service provider must have its own base of contractually bound CICO outlets. When the two services are bundled it is not surprising that the tough economics of CICO —and, therefore, the incumbent— dominates. A Two Market Regulatory Approach In a recent paper, I argue it is necessary to split up these two markets, from a regulatory point of view. The market for effecting electronic payments (issuing payment instructions and debiting and crediting electronic accounts accordingly) is logically distinct from the market for exchanging two forms of money (hard cash versus electronic value). Most regulators approve of stores receiving electronic money from customers in exchange for packs of rice on a store shelf. But, if that same electronic money was exchanged for cash then it would violate the law in many countries. In the latter case, the store is presumed to be an agent of the customer’s financial service provider, and the store cannot offer the CICO service without an agency contract from that provider. But why? The cash that was offered was the store’s as is the account that would receive the electronic payment, and the transaction would have occurred entirely through a secure, real-time technology platform that banks offer all their clients. A Regulatory Fix Of course, purely financial transactions are usually held to higher consumer protection standards than normal commercial transactions. My proposal is not to deregulate CICO, but to create a new license type for CICO network managers. Holders of this license would carry certain consumer protection obligations (such as ensuring that tariffs are explicitly posted at all CICO outlets, and that they have a call center to handle any complaints that customers may have on individual CICO outlets) – entirely reasonable expectations for retailers, even if we normally don´t ask them of rice sellers. But once you have a CICO license, then you could sign up any store you wanted and crucially, offer CICO services on the platform of any financial institution in which you have an account. In other words, you wouldn’t have to beg the incumbent to give you a special agent contract. All you would need to do is to open a normal customer account with them, which the incumbent couldn´t deny you. This one little change would completely shift the competitive dynamics of digital financial services. Under the current direct agency model, incumbent firms have no incentive to make it easier for competitors to create CICO outlets. Whereas under the independent CICO network manager model, all licensed CICO networks would have the incentive to offer CICO services for all providers, no matter their size: with a full suite of available services, they will find it easier to sign up stores to work for them, and these stores will find it easier to convince more users to walk into their stores. Incumbents would still be free to establish their own proprietary CICO networks, as today. But they would have to compete with independent CICO networks that are now able to aggregate business from all financial service providers, creating true competition. All players could then claim a comparable physical presence as the incumbent. They would all benefit from the same branded competition between CICO networks. They could compete strictly on the basis of the quality of their digital financial services offering. Unbundling the regulatory treatment of digital financial services would help competition reach every segment of the business; the current integrated model only serves the interests of the largest telecommunication companies and banks in the land. Authors Ignacio Mas Image Source: © Noor Khamis / Reuters Full Article
y Identity and inclusion: When do digital identities help the poor? By webfeeds.brookings.edu Published On :: Tue, 10 Mar 2015 07:30:00 -0400 We tend to think of having a formal identity as an enabler for social and economic inclusion, but in fact identity can have entirely the opposite effect. Once socioeconomic interactions are based on a standardized notion of identity, it is likely that social status based on past achievements, family histories, personal connections, political backing, wealth and education levels will influence socioeconomic outcomes — thereby potentially reinforcing the established class hierarchy. Systems that are based on anonymity might in fact be the most equitable and inclusive, in the sense of ensuring equal participation by all, by systematically stripping out social status. But anonymous systems carry a high cost in terms of efficiency. Reputations would be impossible to establish, contracts would be hard to enforce, and there would be more insecurity as it would be much harder to track and clamp down on illicit activities. It is therefore not at all certain that the poorer segments of the population would be better off in absolute terms if the economy worked on the basis of anonymity. The need for digital identities for inclusive access In fact, giving lower-income people digital identities would make it possible for them to participate in the modern digital economy in many ways: to open accounts and receive moneys from anyone, assert their rights over digital services they have contracted and digital assets they have purchased, settle disputes, etc. But establishing a formally recognized identity can be a major hurdle in itself, especially in countries that do not have digitized national ID schemes. It is ironic that the difficulty of establishing formal identity in the first place often prevents so many lower-income, and especially rural, people from accessing digital services. Identity systems with selective coverage of the population create a double whammy of inequality: on the one hand, these partial systems help the haves to carry their social and economic status symbols and reputations into every market interaction they are engaged in, and on the other they negate digital visibility and access to digital services for the have not´s. We argue in a new research paper that it should be the government´s responsibility to ensure that every citizen in fact has a digital identity, not merely to create a platform that enables people to have digital identities. The Indian government´s Aadhar push to provide everyone in India with a unique number ID linked to biometrics is a good example of such a policy. The demands of identity verification systems The problem is that different policy agendas converge on the issue of identity and have different requirements for a digital identity platform. What works as an identify standard for financial systems may not be good enough for law enforcement agencies. The risk is that governments adopt the highest standard, with the result that the inclusion agenda and the needs of the poor are ignored. If there is no centralized government system for identity, then what we need is a system that: Lets the issue of identity be resolved in the first instance within the communities where poor people live, shop and work (e.g. through attestation by known local figures) Draws people into seeking and improving their digital identities over time, much in the way that they develop their social network over time. This is the notion of social identity. Let people with meager resources help each other overcome their limitations: each may have very little voice, but collectively they represent a potentially vast information system for official identification purposes. That is hard to reconcile with the way governments and formal institutions tend to handle identity verification: in silos, contained within databases and cards. We need more flexible notions of identity, which build layers of identity information and verification through social networks – as well as bureaucratized ID-seeking processes. Authors Ignacio MasDavid Porteous Image Source: © Kacper Pempel / Reuters Full Article
y The multi-stop journey to financial inclusion on digital rails By webfeeds.brookings.edu Published On :: Wed, 03 Jun 2015 07:30:00 -0400 One of the foundational notions of digital financial services has been the distinction between payment rails and services running on the rails. This is a logical distinction to make, one easily understood by engineers who tend to think in terms of hierarchies (or stacks) of functionalities, capabilities, and protocols that need to be brought together. But this distinction makes less sense when it is taken to represent a logical temporal sequencing of those layers. It is not too much of a caricature to portray the argument —and, alas, much common practice— like this: I’ll first build a state-of-the art digital payments platform, and then I’ll secure a great agent network to acquire customers and offer them cash services. Once I have mastered all that, then I’ll focus on bringing new services to delight more of my customers. The result is that research on customer preferences gets postponed, and product design projects are outsourced to external consultants who run innovation projects in a way that is disconnected from the rest of the business. This mindset is understandable given limited organizational, financial and human resource capabilities. But the problem with such narrow sequencing is that all these elements reinforce each other. Without adequate services (a.k.a. customer proposition), the rails will not bed down (a.k.a. no business case for the provider or the agents). In businesses such as digital payments that exhibit strong network effects, it’s a race to reach a critical mass of users. You need to drive the entire stack to get there, as quickly as possible. Unless, you develop a killer app early on, as M-PESA seems to have done with the send money home use case in the Kenyan environment. It is tough for any organization to advance on all these fronts simultaneously. Only superhero organizations can get this complex job done. I have argued in a previous post that the piece that needs to be parceled off is not the service creation but rather cash management: that can be handled by independently licensed organizations working at arms length from the digital rails-and-products providers. What are payment rails? Payment rails are a collection of capabilities that allow value to be passed around digitally. This could include sending money home, paying for a good or a bill, pushing money into my or someone else’s savings account, funding a withdrawal at an agent, or repaying a loan. The first set of capabilities relates to identity: being able to establish you are the rightful owner of the funds in your account, and to designate the intended recipient in a money transfer. The second set of capabilities relates to the accounting or ledger system: keeping track of balances held and owed, and authorizing transactions when there are sufficient funds per the account rules. The third set of capabilities relates to messaging: collecting the necessary transaction details from the payment initiator, conveying that information securely to the authorizing entity, and providing confirmations. Only the third piece has been transformed by the rise of mobile phones: we now have an increasingly inclusive and ubiquitous real-time messaging fabric. Impressive as that is, this messaging capability is still linked to legacy approaches on identity and accounting. Which is why mobile money is still more an evolution than a revolution in the quest for financial inclusion. The keepers of the accounts —traditionally, the banks— are, of course, the guardians of the system’s choke points. There is now recognition in financial inclusion circles that to expand access to finance it is not enough to proliferate the world with mobile phones and agents: you need to increase the number and type of account keepers, under the guise of mobile money operators, e-money issuers or payment banks. But that doesn’t change the fundamental dynamics, which is that there still are choke point guardians who need to be convinced that there is a business case in order to invest in marketing to poor people, that there are opportunities to innovate to meet their needs, and that perhaps all players can be better off if only they interoperated. A true transformation would be to open up these ledgers, so anyone can check the validity of any transaction and write them into the ledger. That’s what crypto-currencies are after: decentralizing the accounting and transaction authorization piece, much in the same way as mobile phones have decentralized the transaction origination piece. Banks seek to protect the integrity of their accounting and authorizations systems —and hence their role as arbiters of financial transactions— by hiding them behind huge IT walls; crypto-currencies such as Bitcoin and Ripple do the opposite: they use sophisticated protocols to create a shared consensus for all to see and use. The other set of capabilities in the digital rails, identity, is also still in the dark ages. Let me convince you of that through a personal experience. My wallet was stolen recently, and it contained my credit card. I can understand the bank wanting to know my name, but why is the bank announcing my name to the thief by printing it on the credit card, thereby making it easier for him to impersonate me? The reason is, of course, that the bank wants merchants to be able to cross check the name on the card with a piece of customer ID. But as you can imagine, my national ID got stolen along with my credit card, and because of that the thief knows not only my name but also my address. That was an issue because I also kept a key to my house in the wallet. None of this makes sense: why are these “trusted” institutions subverting my sense of personal security, not to mention privacy? The problem is that the current financial regulatory framework is premised on a direct binding of every transaction to my full legal identity. As David Porteous and I argue in a recent paper, what we need is a more nuanced digital identity system that allows me to present different personas to different identity-requesting entities and choose precisely which attributes of myself get revealed in each case, while still allowing the authorities to trace the identity unequivocally back to me in case I break the law. The much-celebrated success of mobile money has so far really only transformed one third (messaging) of one half (payment rails) of the financial inclusion agenda. We ain’t seen nothin’ yet. Authors Ignacio Mas Image Source: © Noor Khamis / Reuters Full Article
y Upcoming Brookings report and scorecard highlight pathways and progress toward financial inclusion By webfeeds.brookings.edu Published On :: Thu, 20 Aug 2015 07:30:00 -0400 Editor’s Note: Brookings will hold an event and live webcast on Wednesday, August 26 to discuss the findings of the 2015 Financial and Digital Inclusion (FDIP) Report and Scorecard. Follow the conversation on Twitter using #FinancialInclusion Access to affordable, quality financial services is vital both for ensuring the financial well-being of individuals and for fostering broader economic development. Yet about 2 billion adults around the world still do not have formal financial accounts. The Financial and Digital Inclusion Project (FDIP), launched within the Center for Technology Innovation at Brookings, set out to answer three key questions: Do country commitments make a difference in progress toward financial inclusion? To what extent do mobile and other digital technologies advance financial inclusion? What legal, policy, and regulatory approaches promote financial inclusion? To answer these questions, the FDIP team spent the past year examining how governments, private sector entities, non-government organizations, and the general public across 21 diverse countries have worked together to advance access to and usage of formal financial services. This research informed the development of the 2015 Report and Scorecard — the first in a 3-year series of research on the topic. For the 2015 Scorecard, FDIP researchers assessed 33 indicators across four dimensions of financial inclusion: Country commitment, mobile capacity, regulatory environment, and adoption of selected basic traditional and digital financial services. The 2015 FDIP Report and Scorecard provide detailed profiles of the financial inclusion landscape in 21 countries, focusing on mobile money and other digital financial services. On August 26, the Center for Technology Innovation will discuss the findings of the 2015 Report and Scorecard and host a conversation about key trends, opportunities, and obstacles surrounding financial inclusion among authorities from the public and private sectors. Register to attend the event in-person or by webcast, and join the conversation on Twitter at #FinancialInclusion. Authors Darrell M. WestJohn Villasenor Image Source: © Noor Khamis / Reuters Full Article
y Five key findings from the 2015 Financial and Digital Inclusion Project Report & Scorecard By webfeeds.brookings.edu Published On :: Wed, 02 Sep 2015 07:30:00 -0400 Editor’s note: This post is part of a series on the Brookings Financial and Digital Inclusion Project, which aims to measure access to and usage of financial services among individuals who have historically been disproportionately excluded from the formal financial system. To read the first annual FDIP report, learn more about the methodology, and watch the 2015 launch event, visit the 2015 Report and Scorecard webpage. Convenient access to banking infrastructure is something many people around the world take for granted. Yet while the number of people outside the formal financial system has substantially decreased in recent years, 2 billion adults still do not have an account with a formal financial institution or mobile money provider.1 This means that significant opportunities remain to provide access to and promote use of affordable financial services that can help people manage their financial lives more safely and efficiently. To learn more about how countries can facilitate greater financial inclusion among underserved groups, the Brookings Financial and Digital Inclusion Project (FDIP) sought to answer the following questions: (1) Do country commitments make a difference in progress toward financial inclusion?; (2) To what extent do mobile and other digital technologies advance financial inclusion; and (3) What legal, policy, and regulatory approaches promote financial inclusion? To address these questions, the FDIP team assessed 33 indicators of financial inclusion across 21 economically, geographically, and politically diverse countries that have all made recent commitments to advancing financial inclusion. Indicators fell within four key dimensions of financial inclusion: country commitment, mobile capacity, regulatory commitment, and adoption of selected traditional and digital financial services. In an effort to obtain the most accurate and up-to-date understanding of the financial inclusion landscape possible, the FDIP team engaged with a wide range of experts — including financial inclusion authorities in the FDIP focus countries — and also consulted international non-governmental organization publications, government documents, news sources, and supply and demand-side data sets. Our research led to 5 overarching findings. Country commitments matter. Not only did our 21 focus countries make commitments toward financial inclusion, but countries generally took these commitments seriously and made progress toward their goals. For example, the top five countries within the scorecard each completed at least one of their national-level financial inclusion targets. While correlation does not necessarily equal causation, our research supports findings by other financial inclusion experts that national-level country commitments are associated with greater financial inclusion progress. For example, the World Bank has noted that countries with national financial inclusion strategies have twice the average increase in the number of account holders as countries that do not have these strategies in place. The movement toward digital financial services will accelerate financial inclusion. Digital financial services can provide customers with greater security, privacy, and convenience than transacting via traditional “brick-and-mortar” banks. We predict that digital financial services such as mobile money will become increasingly prevalent across demographics, particularly as user-friendly smartphones become cheaper2 and more widespread.3 Mobile money has already driven financial inclusion, particularly in countries where traditional banking infrastructure is limited. For example, mobile money offerings in Kenya (particularly the widely popular M-Pesa service) are credited with advancing financial inclusion: The Global Financial Inclusion (Global Findex) database found that the percentage of adults with a formal account in Kenya increased from about 42 percent in 2011 to about 75 percent in 2014, with around 58 percent of adults in Kenya having used mobile money within the preceding 12 months as of 2014. Geography generally matters less than policy, legal, and regulatory changes, although some regional trends in terms of financial services provision are evident. Regional trends include the widespread use of banking agents (sometimes known as correspondents)4 in Latin America, in which retail outlets and other third parties are able to offer some financial services on behalf of banks,5 and the prevalence of mobile money in sub-Saharan Africa. However, these regional trends aren’t absolute: For example, post office branches have served as popular financial access points in South Africa,6 and the GSMA’s “2014 State of the Industry” report found that the highest growth in the number of mobile money accounts between December 2013 and December 2014 was in Latin America. Overall, we found high-performing countries across multiple regions and using multiple approaches, demonstrating that there are diverse pathways to achieving greater financial inclusion. Central banks, ministries of finance, ministries of communications, banks, non-bank financial providers, and mobile network operators have major roles in achieving greater financial inclusion. These entities should closely coordinate with respect to policy, regulatory, and technological advances. With the roles of public and private sector entities within the financial sector becoming increasingly intertwined, coordination across sectors is critical to developing coherent and effective policies. Countries that performed strongly on the country commitment and regulatory environment components of the FDIP Scorecard generally demonstrated close coordination among public and private sector entities that informed the emergence of an enabling regulatory framework. For example, Tanzania’s National Financial Inclusion Framework7 promotes competition and innovation within the financial services sector by reflecting both public and private sector voices.8 Full financial inclusion cannot be achieved without addressing the financial inclusion gender gap and accounting for diverse cultural contexts with respect to financial services. Persistent gender disparities in terms of access to and usage of formal financial services must be addressed in order to achieve financial inclusion. For example, Middle Eastern countries such as Afghanistan and Pakistan have demonstrated a significant gap in formal account ownership between men and women. Guardianship and inheritance laws concerning account opening and property ownership present cultural and legal barriers that contribute to this gender gap.9 Understanding diverse cultural contexts is also critical to advancing financial inclusion sustainably. In the Philippines, non-bank financial service providers such as pawn shops are popular venues for accessing financial services.10 Leveraging these providers as agents can therefore be a useful way to harness trust in these systems to increase financial inclusion. To dive deeper into the report’s findings and compare country rankings, visit the FDIP interactive. We also welcome feedback about the 2015 Report and Scorecard at FDIPComments@brookings.edu. 1 Asli Demirguc-Kunt, Leora Klapper, Dorothe Singer, and Peter Van Oudheusden, “The Global Findex Database 2014: Measuring Financial Inclusion around the World,” World Bank Policy Research Working Paper 7255, April 2015, VI, http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2015/04/15/090224b082dca3aa/1_0/Rendered/PDF/The0Global0Fin0ion0around0the0world.pdf#page=3. 2 Claire Scharwatt, Arunjay Katakam, Jennifer Frydrych, Alix Murphy, and Nika Naghavi, “2014 State of the Industry: Mobile Financial Services for the Unbanked,” GSMA, 2015, p. 24, http://www.gsma.com/mobilefordevelopment/wp-content/uploads/2015/03/SOTIR_2014.pdf. 3 GSMA Intelligence, “The Mobile Economy 2015,” 2015, pgs. 13-14, http://www.gsmamobileeconomy.com/GSMA_Global_Mobile_Economy_Report_2015.pdf. 4 Caitlin Sanford, “Do agents improve financial inclusion? Evidence from a national survey in Brazil,” Bankable Frontier Associates, November 2013, pg. 1, http://bankablefrontier.com/wp-content/uploads/documents/BFA-Focus-Note-Do-agents-improve-financial-inclusion-Brazil.pdf. 5 Alliance for Financial Inclusion, “Discussion paper: Agent banking in Latin America,” 2012, pg. 3, http://www.afi-global.org/sites/default/files/discussion_paper_-_agent_banking_latin_america.pdf. 6 The National Treasury, South Africa and the AFI Financial Inclusion Data Working Group, “The Use of Financial Inclusion Data Country Case Study: South Africa – The Mzansi Story and Beyond,” January 2014, http://www.afi-global.org/sites/default/files/publications/the_use_of_financial_inclusion_data_country_case_study_south_africa.pdf. 7 Tanzania National Council for Financial Inclusion, “National Financial Inclusion Framework: A Public-Private Stakeholders’ Initiative (2014-2016),” 2013, pgs. 19-22, http://www.afi-global.org/sites/default/files/publications/tanzania-national-financial-inclusion-framework-2014-2016.pdf. 8 Simone di Castri and Lara Gidvani, “Enabling Mobile Money Policies in Tanzania,” GSMA, February 2014, http://www.gsma.com/mobilefordevelopment/wp-content/uploads/2014/03/Tanzania-Enabling-Mobile-Money-Policies.pdf. 9 Mayada El-Zoghbi, “Mind the Gap: women and Access to Finance,” Consultative Group to Assist the Poor, 13 May 2015, http://www.cgap.org/blog/mind-gap-women-and-access-finance. 10 Xavier Martin and Amarnath Samarapally, “The Philippines: Marshalling Data, Policy, and a Diverse Industry for Financial Inclusion,” FINclusion Lab by MIX, June 2014, http://finclusionlab.org/blog/philippines-marshalling-data-policy-and-diverse-industry-financial-inclusion. Authors Robin LewisJohn VillasenorDarrell M. West Full Article
y Financial inclusion in Latin America: Regulatory trends and market opportunities By webfeeds.brookings.edu Published On :: Thu, 29 Oct 2015 10:00:00 -0400 Editor’s Note: This post is part of a series on the 2015 Brookings Financial and Digital Inclusion Project (FDIP) Report and Scorecard, which were launched at a Brookings public event in August. Previous posts have highlighted regional findings from Southeast and Central Asia, the Middle East, and Africa, as well as selected financial inclusion milestones from FDIP countries. This post focuses on key financial inclusion achievements and challenges regarding the five Latin American FDIP countries: Brazil, Chile, Colombia, Mexico, and Peru. Financial inclusion growth and opportunities in Latin America With its well-developed banking infrastructure and growing mobile ecosystem, Latin America presents a unique set of opportunities and obstacles with respect to promoting greater financial inclusion. From 2011 to 2014, there was a 12 percentage point increase in the number of adults in Latin America and the Caribbean with formal financial accounts, according to the World Bank’s Global Financial Inclusion (Global Findex) database. As noted in the 2015 GSMA report “Mobile financial services in Latin America & the Caribbean,” in 2014 Latin America and the Caribbean saw the fastest growth of any region in terms of new registered mobile money accounts. Moreover, these accounts are often used for more advanced transactions that go beyond simple transfers: As stated in a 2015 post published by the GSMA, “ecosystem transactions (transactions that involve third parties, e.g. bill payment, merchant payment or bulk payment) already make up 27% of transaction volumes in Latin America & the Caribbean.” In contrast, only 6 percent of transaction volumes over the same period were considered ecosystem transactions in East Africa, where mobile money has been most widely adopted and used. Moving forward, facilitating greater adoption of a suite of digital financial services (e.g., savings) will be a vital component of promoting sustainable financial inclusion in the region. Recent regulatory changes in several Latin American countries designed to promote a greater diversity of service providers should propel financial inclusion growth, although a need for regulatory clarity persists in some places. Financial inclusion strengths and challenges germane to our five Latin American FDIP countries are explored below. Brazil: Branchless banking leadership combined with dynamic mobile market Brazil achieved the highest ranking of any Latin American country on the Brookings 2015 FDIP Scorecard, ranking 3rd overall with a score of 78 percent. Brazil’s economy is the largest in Latin America, with a GDP (in current US dollars) of about $2.3 trillion as of 2014; for comparison, Mexico, the Latin American country with the second largest economy, had a GDP of about $1.3 trillion within that same period. Brazil received strong country commitment and mobile capacity scores (89 and 83 percent, respectively) in the 2015 FDIP Scorecard and earned the highest regulatory environment score among the Latin American FDIP countries, which also included Chile, Colombia, Mexico, and Peru. As noted in the 2015 FDIP Report, Brazil launched a National Partnership for Financial Inclusion in November 2011, which has supported the development of a number of enabling financial inclusion initiatives. In 2013, Law 12865 and associated regulations permitted non-banks to issue e-money as payments institutions. Brazil boasted the largest mobile market in Latin America as of 2014, with a unique subscribership rate of about 57 percent in 2015 (a lower unique subscribership rate than Chile’s by about 7 percentage points, but otherwise higher than that of any of the other Latin American FDIP countries). Brazil received 4th place on the 2015 FDIP Scorecard for adoption of selected traditional and digital financial services. As with many other countries in Latin America, branchless banking (i.e., access to formal financial services beyond a traditional brick-and-mortar bank) through “agents” is popular in Brazil — as of 2014, Brazilian banks’ agent networks had a presence in all of the country’s approximately 6,000 municipalities, contributing to formal account growth. Chile was the only Latin American country that received a higher ranking for the adoption dimension, placing 2nd. In terms of account usage, government-to-person payments comprise a significant source of activity for formal accounts: The 2014 Global Findex report noted that among recipients of government payments in Brazil, 88 percent received their transfers directly into an account. Yet according to the Global Findex, about 32 percent of Brazilian adults age 15 and older still do not have accounts with a formal financial institution or mobile money provider. As with the other Latin American countries in the FDIP sample, mobile money adoption in Brazil has remained low: Brazil received the lowest score (one out of three possible points) for all six mobile money indicators included in the 2015 FDIP Scorecard. However, given that as of 2014 Brazil had the fifth-largest global smartphone market in the world in terms of subscribers, a combination of growing smartphone penetration and an increasingly enabling regulatory environment should drive greater adoption of digital financial services in the future. Chile: Opportunities for enhanced e-money regulatory clarity Chile tied with Colombia and Turkey for 6th place on the overall 2015 FDIP Scorecard. Chile’s financial inclusion environment is characterized by a firm national commitment to financial inclusion (earning a country commitment score of 89 percent) but a less developed mobile money environment than the other Latin American FDIP countries. While Chile’s unique mobile subscribership rate and 3G network coverage rate by population are higher than and on par with other countries in the region, respectively, Chile’s mobile money offerings are limited. The lack of a robust mobile money market contributed to Chile’s mobile capacity score of 72 percent, the lowest score among the FDIP Latin American countries. Chile’s regulatory environment score (67 percent) was also the lowest of the Latin American FDIP countries, primarily due to a lack of regulatory clarity surrounding digital financial services. Developing or clarifying regulations pertaining to electronic money in particular could potentially drive more engagement with the sector and advance the diversity of mobile money providers and offerings. Further, supporting the interoperability of digital and traditional financial services could enhance the utility of these products for customers. Given that 37 percent of adults in Chile did not have an account with a formal financial provider as of 2014, there is also room for growth in terms of expanding financial inclusion. However, it should be noted that Chile earned the highest adoption ranking of any Latin American country featured in the 2015 FDIP Scorecard. While Chile’s adoption levels with respect to mobile money services were limited, adoption rates of other formal financial services were among the highest of the FDIP countries. Chile received three out of three possible points for all but one indicator (savings at a formal financial institution) related to traditional financial services. Chile’s performance on the adoption dimension of the scorecard contributed to its 6th place ranking overall. While Chile’s mobile money adoption rates are low, use of other digital financial services is increasingly popular. For example, as noted in the “2015 Maya Declaration Progress Report,” since 2012 the number of CuentaRUT accounts (accounts that feature debit cards associated with a savings account provided by Chile’s BancoEstado) has increased by about 47 percent. As of 2014, there were over 7 million active CuentaRUT cards in Chile. Colombia: Regulatory advancements coupled with sustained country commitment As noted above, Colombia tied with Chile for 6th place on the overall 2015 FDIP Scorecard. Colombia has demonstrated strong commitment to financial inclusion, including through involvement in multinational organizations such as the Alliance for Financial Inclusion (AFI). An example of Colombia’s national-level financial inclusion commitment is the 2006 establishment of Banca de las Oportunidades, an entity charged with fostering regulatory reforms conducive to financial inclusion. Another key player in the financial inclusion space is the Intersectoral Economic and Financial Education Committee, created in February 2014 under Decree 457. In terms of the country’s regulatory environment, Law 1735 of 2014 permitted new institutions, called Sociedades Especializadas en Depósitos y Pagos Electrónicos, to offer mobile financial services. As part of the law, proportionate “know-your-customer” (KYC) requirements were also instituted for under-resourced customers in order to facilitate greater access to financial services among low-risk populations. In July 2015, Decree 1491 implemented Colombia’s financial inclusion law and highlighted the regulatory regime for the mobile money market. Colombia’s regulatory environment earned a score of 89 percent, ranking it 2nd among the Latin American FDIP countries in this dimension. On the supply side, banking correspondents (also known as agents) have been utilized to extend financial access to underserved populations. As of 2015, all of Colombia’s 1,102 municipalities had at least one financial access point, defined as bank branches, banking correspondents, and ATMs. Another innovative approach to branchless banking in Colombia is bank Davivienda’s initiative to use DaviPlata mobile wallet accounts to distribute government transfers to more than 900,000 recipients of welfare program “Familias en Accion.” With respect to demand side figures, Colombia tied with Mexico for 7th place on the adoption dimension. As of 2014, about 38 percent of adults in Colombia had an account with a formal financial institution, and about 2 percent of adults were mobile money account holders. In terms of advancing future mobile money use, Colombia received the highest score of the Latin American countries on the mobile capacity dimension; thus, Colombia is well-positioned to advance access to and use of mobile money services in the future. Promoting usage of appropriate, quality financial services is critical, as dormancy rates have been identified as an obstacle to financial inclusion; about half of accounts in Colombia (including savings accounts, simplified accounts, and electronic deposits) were identified as dormant in 2014. Mexico: Recent reforms may enhance competition and drive digital takeup Mexico ranked 9th on the overall 2015 FDIP Scorecard, with adoption of traditional and digital financial services as its highest-ranked dimension. Among the Latin American FDIP countries, Mexico features the greatest parity in terms of formal financial account ownership rates among men and women, at about 39 percent each. In terms of national-level commitment to financial inclusion, Mexico tied with Peru for the highest ranking among the Latin American countries. AFI’s Maya Declaration was signed at the 2011 Global Policy Forum held in Riviera Maya, Mexico, signaling Mexico’s public commitment to financial inclusion. With respect to mobile capacity, as of the first quarter of 2015 Mexico’s unique subscribership rates were the lowest of the Latin American countries. Mexico tied with Chile and Brazil for 3G network coverage by population. In terms of mobile money, Mexico’s market is still developing; several providers were available as of May 2015, but the extent of offerings was somewhat limited. As noted in the GSMA’s “Mobile Economy: Latin America 2014” report, new telecommunications reforms recently passed in Mexico are expected to affect the mobile market and potentially increase competition among the telecommunications sector. This increased competition could in turn drive the development of a greater array of innovative, affordable mobile money products. Regarding Mexico’s regulatory environment, the country has been lauded for its risk-based KYC requirements that enable underserved individuals to access low-value accounts without fulfilling the full array of traditional identification processes, which can sometimes be burdensome for under-resourced groups. Under Mexico’s four-tiered KYC system (introduced in 2011), “level one” (very low-risk) accounts feature monthly deposit limits and a maximum balance limit of about 400 dollars; accounts can be opened at a bank branch, banking agent, over the internet, or by telephone. Higher-tier accounts have more stringent KYC requirements. A 2015 AFI article noted that Mexico's banking and securities regulator, the Comisión Nacional Bancaria y de Valores, indicated about 7.5 million new accounts were opened between August 2011 and September 2012, including over 4 million “level one” accounts. Mexico tied with Colombia for 7th place on the adoption dimension of the 2015 FDIP Scorecard. About 39 percent of adults in Mexico held accounts with a formal financial institution as of 2014, while about 3 percent of adults held mobile money accounts. As with other countries in Latin America, debit card and credit card use were much higher than mobile money use as of 2014, although usage of both kinds of cards was lower in Mexico than in several other Latin American FDIP countries such as Brazil and Chile. Initiatives such as the Saldazo debit card, which enables customers to use a debit card associated with a savings account and does not require a minimum balance, have helped drive adoption of digital financial services in Mexico. Peru: Enabling regulatory environment, but constrained adoption of financial services Peru presents perhaps one of the most interesting paradoxes among the FDIP countries. While Peru’s regulatory environment has been consistently recognized as among the best in the world for enabling financial inclusion, adoption of formal financial services remains quite low. Peru received 17th place overall on the 2015 FDIP Scorecard, which can primarily be attributed to its low adoption score: Peru received a 15th place ranking on the adoption dimension, the lowest score among the Latin American FDIP countries. However, we anticipate that recent regulatory changes in Peru, coupled with increasing smartphone penetration rates (Peru’s 2014 adoption rates were about 12 percentage points below the Latin American average), will facilitate adoption of digital financial services and drive greater financial inclusion in the future. With respect to the supply side aspect of financial inclusion, as of 2014 about 92 percent of Peru’s population lived in a district with access to financial services, according to the Superintendencia de Banca, Seguros y AFP (SBS) del Peru. Nonetheless, demand side figures lag behind: The Global Findex found that only about 29 percent of adults had an account with a formal financial provider as of 2014. Peru received a “1” for two-thirds of the non-mobile money indicators on the adoption dimension of the 2015 FDIP Scorecard, and mobile money adoption was negligible. Moreover, as of 2014 there was a 14 percentage point disparity in financial account ownership between men and women, the highest financial inclusion “gender gap” among the Latin American FDIP countries. However, given Peru’s strong national commitment to financial inclusion (reflected in Peru’s country commitment score of 94 percent) and legislative initiatives designed to promote an enabling regulatory environment, we fully anticipate that financial inclusion growth will accelerate in the future. For example, Peru recently finalized its national financial inclusion strategy, as discussed in our earlier post. Moreover, Peru has adopted laws and regulations that permit a greater diversity of players to enter the financial services market. Law 2998 of January 2013 allowed both banks and non-banks to issue e-money, and October 2013 regulations issued by the SBS enabled e-money issuers to follow a simplified account opening process. These initiatives should facilitate greater access to and usage of formal financial accounts in the future. In terms of electronic payments specifically, diversifying the mobile money market and increasing unique subscribership could help facilitate greater adoption of mobile money services. Demand side factors, such as ensuring that services are a good fit for customers, are also critical — as evidenced by the fact that Mexico, which had comparable smartphone adoption rates to Peru and lower unique subscribership rates as of 2014, features significantly higher rates of mobile money adoption across all demographics than Peru. Peru is making a concerted effort to develop innovative electronic platforms — for example, the Peruvian Association of Banks (ASBANC) is working on the creation of an electronic money platform accessible by both financial institutions and telecommunications companies. Implementation of this interoperable platform is expected to promote further adoption of digital financial services. Authors Robin LewisJohn VillasenorDarrell M. West Image Source: © Nacho Doce / Reuters Full Article
y Fostering financial inclusion and financial integrity: Brookings roundtable readout By webfeeds.brookings.edu Published On :: Thu, 12 Nov 2015 07:30:00 -0500 How can countries support innovative approaches to facilitating access to and usage of formal financial services among low-income and other marginalized groups while mitigating the risk of misuse within the financial sector? As part of the Brookings Financial and Digital Inclusion Project (FDIP), the FDIP team recently hosted a roundtable to examine this central question. The objective of the roundtable was to identify and discuss salient challenges and opportunities for financial services providers, government entities, and consumers with respect to balancing anti-money laundering/countering the financing of terrorism (AML/CFT) compliance — a critical component of financial integrity and stability — with inclusive financial access and growth. We explore several key questions and themes that emerged from the roundtable below. Do areas of synergy exist between financial inclusion and AML/CFT efforts? AML/CFT requirements and financial inclusion have sometimes been perceived as being in tension with one another — for example, stringent “know your customer” (KYC) requirements associated with AML processes can restrict formal financial access among marginalized groups who are unable to fulfill the KYC documentation requirements. However, the objectives of AML/CFT (ensuring stability and integrity within the financial sector) and financial inclusion (providing access to and promoting usage of a broad range of appropriate, affordable financial services) can be mutually reinforcing. By moving individuals from the shadow economy into the formal financial system, greater opportunities emerge for introducing underserved populations to a broad suite of formal financial services, and ensuring those services are accompanied by suitable consumer protections. Thus, financial inclusion, financial integrity, and financial stability can act as complementary objectives. The 2012 Declaration of the Ministers and Representatives of the Financial Action Task Force (FATF) recognized financial exclusion as a money laundering and terrorist financing risk in approving FATF’s 2012-2020 Mandate. This mandate affirmed FATF’s 2011 guidance on AML and terrorist financing measures and financial inclusion, which stated that “[i]t is acknowledged at the same time that financial exclusion works against effective AML/CFT policies. Indeed the prevalence of a large informal, unregulated and undocumented economy negatively affects AML/CFT efforts and the integrity of the financial system. Informal, unregulated and undocumented financial services and a pervasive cash economy can generate significant money laundering and terrorist financing risks and negatively affect AML/CFT preventive, detection and investigation/prosecution efforts.” What are key challenges and concerns with respect to balancing financial inclusion with financial integrity? Awareness of financial inclusion issues is not universal among individuals who work in the regulatory, compliance, and law enforcement spheres of the financial ecosystem. Engagement among these groups is critical for promoting knowledge-sharing with respect to financial integrity and inclusion. Although FATF and other standard-setting bodies (SSBs) have increasingly adopted recommendations favoring proportionate, risk-based approaches to AML/CFT (as evidenced by the 2013 FATF Guidance on Financial Inclusion), regulators often pursue more conservative approaches than SSB guidelines recommend. These conservative approaches may constrain access to and usage of formal financial services among marginalized groups. Combating the potential use of low-value transfers within countries and across borders for terrorist financing purposes is a salient concern for the law enforcement community when considering proportionate AML/CFT approaches. How does the digital component fit into these issues? As its name suggests, FDIP is interested in exploring the evolving role of digital technology within the financial services ecosystem. As discussed in the 2015 FDIP Report, digitization of financial services can be more cost-effective for public and private sector providers to manage and safer for consumers than carrying or storing cash. For example, a 2013 report found that the Mexican government saved about $1.3 billion annually by centralizing and digitizing payments for wages, pensions, and social transfers. A 2014 report by the World Bank Development Research Group, the Better Than Cash Alliance, and the Bill & Melinda Gates Foundation highlighted several countries, including South Africa, where disbursing social transfers electronically cost significantly less than manual cash disbursement. Digital financial services can also promote women’s economic empowerment, as these services are often more private and convenient to access than traveling to a “brick and mortar” financial service provider. Given that as of 2014 there was a 9 percentage point gap between the number of men and women with accounts in developing economies (with women disproportionately excluded from account ownership), facilitating access to formal financial services among the 42 percent of women globally who do not have an account will be a major factor in advancing financial inclusion. With respect to financial integrity in particular, digital identification mechanisms such as biometric IDs can help lower access barriers to financial services while ensuring that providers have the information they need to promote security and stability in the financial ecosystem. In its June 2011 guidance, FATF recognized the use of non-documentary methods of identification verification — for example, a signed declaration from a community leader coupled with a photo taken by a mobile phone — for advancing access to formal financial services among underserved groups. The Aadhaar initiative in India, which the FDIP team referenced in a previous post, is currently the largest biometric identification program in the world. The unique 12-digit ID enables individuals to meet KYC requirements and has been used as a financial account among those who do not have an account with a financial institution. Another innovative digital initiative is underway in Tanzania, where the government is working in concert with mobile carrier Tigo and UNICEF to provide birth certificates via mobile phones. What are critical questions and areas of opportunity for fostering financial inclusion and integrity moving forward? How can regulators and providers ensure sufficient privacy protections are in place for customers when advancing financial inclusion efforts, particularly through digital channels? Through what mechanisms can government entities and non-government financial services providers best mitigate the risks of centralizing sensitive customer data? Could an industry utility that facilitates a common solution to AML systems serve as a feasible solution for harmonizing standards? What is the proper role of private solutions in the AML/CFT and financial inclusion spaces? Could identification verification applications be developed using blockchain technology? In what ways can social networks be leveraged with respect to digital identity initiatives and financial inclusion? Authors Robin LewisJohn VillasenorDarrell M. West Image Source: © Jorge Cabrera / Reuters Full Article
y The prince of counterterrorism: The story of Washington’s favorite Saudi, Muhammad bin Nayef By webfeeds.brookings.edu Published On :: Tue, 29 Sep 2015 14:08:37 +0000 The kingdom of Saudi Arabia, America’s oldest ally in the Middle East, is on the verge of a historic generational change in leadership. King Salman bin Abdul-Aziz Al Saud, 79, who ascended to the throne in January, following the death of King Abdullah, will be the last of the generation of leaders who built the… Full Article
y The medical marijuana mess: A prescription for fixing a broken policy By webfeeds.brookings.edu Published On :: Tue, 22 Mar 2016 14:01:49 +0000 In 2013, Patrick and Beth Collins were desperate. Thirteen‐year‐old Jennifer, the younger of their two children, faced a life‐threatening situation. In response, the Collins family took extreme measures—sending Jennifer thousands of miles away in the company of her mother. Beth and Jennifer became refugees from a capricious government whose laws threatened Jennifer’s health, the family’s… Full Article
y The citizen-soldier: Moral risk and the modern military By webfeeds.brookings.edu Published On :: Tue, 24 May 2016 13:53:58 +0000 The rumor was he’d killed an Iraqi soldier with his bare hands. Or maybe bashed his head in with a radio. Something to that effect. Either way, during inspections at Officer Candidates School, the Marine Corps version of boot camp for officers, he was the Sergeant Instructor who asked the hardest, the craziest questions. No softballs.… Full Article
y AMLO’s first year: Mexico’s political, economic, and security trends By webfeeds.brookings.edu Published On :: Tue, 03 Dec 2019 14:14:59 +0000 Mexican President Andrés Manuel López Obrador (AMLO) assumed office in December 2018, promising to bring a fourth revolution to Mexico and to reduce Mexico’s inequality, corruption, and violent crime. Yet a year into his administration, homicides and violent criminality in Mexico have not diminished. While the new government has undertaken new security initiatives and adopted… Full Article
y Detoxifying Colombia’s drug policy By webfeeds.brookings.edu Published On :: Mon, 06 Jan 2020 18:01:24 +0000 Colombia’s counternarcotics policy choices have profound impact on consolidating peace in the wake of the 2016 peace deal with the Revolutionary Armed Forces of Colombia — People’s Army (Fuerzas Armadas Revolucionarias de Colombia — Ejército del Pueblo, FARC) and on the building of an effective state. Strategies of forced or voluntary eradication of coca crops… Full Article
y Should Mexico revive the idea of amnesty for criminals? By webfeeds.brookings.edu Published On :: Mon, 02 Mar 2020 19:12:33 +0000 As homicides levels in Mexico are rising and U.S. pressure is mounting, the administration of Andrés Manuel López Obrador (known widely as AMLO) is turning further away from several core precepts of the security policy with which it assumed office. The idea of giving amnesty to some criminals as a way to reduce violence that… Full Article
y Mexican cartels are providing COVID-19 assistance. Why that’s not surprising. By webfeeds.brookings.edu Published On :: Mon, 27 Apr 2020 20:06:03 +0000 That Mexican criminal groups have been handing out assistance to local populations in response to the COVID-19 pandemic sweeping through Mexico has generated much attention. Among the Mexican criminal groups that have jumped on the COVID-19 “humanitarian aid” bandwagon are the Cartel Jalisco Nueva Generación (CJNG), the Sinaloa Cartel, Los Viagras, the Gulf Cartel, and… Full Article
y Brazil’s biggest economic risk is complacency By webfeeds.brookings.edu Published On :: Thu, 30 Jan 2020 22:37:32 +0000 Brazil’s economy has endured a difficult few years: after a deep recession in 2015-2016, GDP grew by just over 1 percent annually in 2017-2019. But things are finally looking up, with the International Monetary Fund forecasting a 2.2-2.3 percent growth in 2020-21. The challenge now is to convert this cyclical recovery into a robust long-term… Full Article
y How Latin America can make fintech a priority By webfeeds.brookings.edu Published On :: Fri, 31 Jan 2020 18:09:08 +0000 Full Article
y The rapidly deteriorating quality of democracy in Latin America By webfeeds.brookings.edu Published On :: Fri, 28 Feb 2020 14:36:02 +0000 Democracy is facing deep challenges across Latin America today. On February 16, for instance, municipal elections in the Dominican Republic were suspended due to the failure of electoral ballot machines in more than 80% of polling stations that used them. The failure sparked large protests around the country, where thousands took to the streets to… Full Article
y Civilian Drones, Privacy, and the Federal-State Balance By webfeeds.brookings.edu Published On :: Tue, 30 Sep 2014 00:00:00 -0400 Full Article
y Confronting national security threats in the technology age By webfeeds.brookings.edu Published On :: Wed, 11 Mar 2015 13:30:00 -0400 Event Information March 11, 20151:30 PM - 3:00 PM EDTSaul/Zilkha RoomsBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventCutting-edge technology has led to medical breakthroughs, the information age, and space exploration, among many other innovations. The growing ubiquity of advanced technology, however, means that almost anyone can harness its power to threaten national, international, and individual security. In their new book, The Future of Violence: Robots and Germs, Hackers and Drones—Confronting a New Age of Threat (Basic Books, 2015), Benjamin Wittes and Gabriella Blum explore the potential dangers of modern technology when acquired by hostile groups or individuals. On March 11, Governance Studies at Brookings hosted a book event to discuss the new threats to national security and the developing framework for confronting the technology-enabled threats of the 21st century. In order to manage the challenges and risks associated with advanced technology, governments, organizations, and citizens must reconsider the intersection of security, privacy, and liberty. What does this mean for domestic and international surveillance? How will the government protect its citizens in an age of technology proliferation? After the program, panelists will take audience questions. Audio Confronting national security threats in the technology age Transcript Uncorrected Transcript (.pdf) Event Materials 20150311_national_security_technology_transcript Full Article
y Unmanned aircraft systems: Key considerations regarding safety, innovation, economic impact, and privacy By webfeeds.brookings.edu Published On :: Tue, 24 Mar 2015 14:30:00 -0400 Good afternoon Chair Ayotte, Ranking Member Cantwell, and Members of the Subcommittee. Thank you very much for the opportunity to testify today on the important topic of domestic unmanned aircraft systems (UAS). I am a nonresident senior fellow in Governance Studies and the Center for Technology Innovation at the Brookings Institution. I am also a National Fellow at the Hoover Institution at Stanford, and a professor at UCLA, where I hold appointments in the Electrical Engineering Department and the Department of Public Policy. The views I am expressing here are my own, and do not necessarily represent those of the Brookings Institution, Stanford University or the University of California. Downloads Download the testimony Authors John Villasenor Image Source: © Mike Segar / Reuters Full Article
y Explained: Why America's deadly drones keep firing By webfeeds.brookings.edu Published On :: Thu, 21 May 2015 12:00:00 -0400 President Obama's announcement last month that earlier this year a “U.S. counterterrorism operation” had killed two hostages, including an American citizen, has become a fresh occasion for questioning the rationales for continuing attacks from unmanned aerial vehicles aimed at presumed, suspected, or even confirmed terrorists. This questioning is desirable, although not mainly for hostage-related reasons connected to this incident. Sometimes an incident has a sufficient element of controversy to stoke debate even though what most needs to be debated is not an issue specific to the incident itself. More fundamental issues about the entire drone program need more attention than they are getting. The plight of hostages held by terrorists has a long and sometimes tragic history, almost all of which has had nothing to do with drones. Hostage-taking has been an attractive terrorist tool for so long partly because of the inherent advantages that the hostage-holders always will have over counterterrorist forces. Those advantages include not only the ability to conceal the location of hostages—evidently a successful concealment in the case of the hostages mentioned in the president's announcement—but also the ability of terrorists to kill the hostages themselves and to do so quickly enough to make any rescue operation extraordinarily difficult. Even states highly skilled at such operations, most notably Israel, have for this reason suffered failed rescue attempts. It is not obvious what the net effect of operations with armed drones is likely to be on the fate of other current or future hostages. The incident in Pakistan demonstrates one of the direct negative possibilities. Possibly an offsetting consideration is that fearing aerial attack and being kept on the run may make, for some terrorists, the taking of hostages less attractive and the management of their custody more difficult. But a hostage known to be in the same location as a terrorist may have the attraction to the latter of serving as a human shield. The drone program overall has had both pluses and minuses, as anyone who is either a confirmed supporter or opponent of the program should admit. There is no question that a significant number of certified bad guys have been removed as a direct and immediate consequence of the attacks. But offsetting, and probably more than offsetting, that result are the anger and resentment from collateral casualties and damage and the stimulus to radicalization that the anger and resentment provide. There is a good chance that the aerial strikes have created more new terrorists bent on exacting revenge on the United States than the number of old terrorists the strikes have killed. This possibility is all the more disturbing in light of what appears to be a significant discrepancy between the official U.S. posture regarding collateral casualties and the picture that comes from nonofficial sources of reporting and expertise. The public is at a disadvantage in trying to judge this subject and to assess who is right and who is wrong, but what has been pointed out by respected specialists such as Micah Zenko is enough to raise serious doubt about official versions both of the efforts made to avoid casualties among innocents and of how many innocents have become victims of the strikes. The geographic areas in which the drone strikes are most feasible and most common are not necessarily the same places from which future terrorist attacks against the United States are most likely to originate. The core Al-Qaeda group, which has been the primary target and concern in northwest Pakistan, is but a shadow of its former self and not the threat it once was. Defenders of the drone strikes are entitled to claim that this development is in large part due to the strikes. But that leaves the question: why keep doing it now? The principal explanation, as recognized in the relevant government circles, for the drone program has been that it is the only way to reach terrorists who cannot be reached by other tools or methods. It has been seen as the only counterterrorist game that could be played in some places. That still leaves more fundamental questions about the motivations for playing the game. Policy-makers do not use a counterterrorist tool just because the tool is nifty—although that may be a contributing factor regarding the drones—but rather because they feel obligated to use every available tool to strike at terrorists as long as there are any terrorists against whom to strike. In the back of their minds is the thought of the next Big One, or maybe even a not so big terrorist attack on U.S. soil, occurring on their watch after not having done everything they could to prevent it, or doing what would later be seen in hindsight as having had the chance to prevent it. The principal driver of such thoughts is the American public's zero tolerance attitude toward terrorism, in which every terrorist attack is seen as a preventable tragedy that should have been prevented, without fully factoring in the costs and risks of prevention or of attempted prevention. Presidents and the people who work for them will continue to fire missiles from drones and to do some other risky, costly, or even counterproductive things in the cause of counterterrorism because of the prospect of getting politically pilloried for not being seen to make the maximum effort on behalf of that cause. This piece was originally published by The National Interest. Authors Paul R. Pillar Publication: The National Interest Image Source: © Handout . / Reuters Full Article
y After the death of a senior leader in Yemen, al-Qaida faces new challenges and opportunities By webfeeds.brookings.edu Published On :: Thu, 18 Jun 2015 07:20:00 -0400 Editor's Note: This piece originally appeared in Foreign Policy. The killing of Nasir al-Wuhayshi, reportedly via U.S. drone strike, is not just another notch in the belt of America’s long campaign against al-Qaida and its allies. Wuhayshi was one of al-Qaida’s top remaining leaders, and he is the highest-level death the organization has suffered since Osama bin Laden was killed in 2011. Wuhayshi headed al-Qaida’s most active affiliate, the Yemen-based al-Qaida in the Arabian Peninsula (AQAP), and was the designated successor of al-Qaida leader Ayman al-Zawahiri. His killing adds one more element of uncertainty to the turbulence in Yemen and may set AQAP on a new path. Which path, however, remains an open question. Wuhayshi helped transform AQAP from a fractious organization on the edge of defeat to one that menaces both Yemen and the United States. A decade ago, Yemen’s jihadi movement seemed near defeat. In the aftermath of 9/11, the Yemeni government rounded up jihadis and imprisoned Wuhayshi, and it was Saudi Arabia, not Yemen, that was the focus of jihadis in the Arabian Peninsula. In 2003, al-Qaida sponsored the original AQAP’s uprising against the Saudi government. Several years later, most of AQAP’s Saudi members were dead or in jail, and its remnants had fled to Yemen. There, they mixed with Yemeni jihadis, including important figures like Wuhayshi, who had escaped from Yemen’s jails in 2006. In 2009, two regional Islamist groups merged and formally anointed themselves AQAP, basing their operations in Yemen and trying to unseat the government. As Osama bin Laden’s former secretary, Wuhayshi became the group’s leader and embraced al-Qaida’s emphasis on attacking Western targets. The group made fitful progress, at times taking territory but often losing it quickly after alienating locals and proving vulnerable to government counterattacks. But when the government of Yemeni President Ali Abdullah Saleh fell in 2012 during the Arab Spring, AQAP tried to step into the void. Saleh’s successor, Abed Rabbo Mansour Hadi, pursued AQAP vigorously, but his weak government was unable to score any lasting successes. In addition to its prowess in Yemen, AQAP has long been al-Qaida’s most active affiliate when it comes to taking on the West. The organization was behind the 2009 Christmas Day attempt to down a U.S. airliner over Detroit, a near-miss only foiled by the bomber’s incompetence and the quick thinking of the plane’s passengers. AQAP tried again in 2010, this time attempting to down U.S. cargo planes. The organization also attacked Western targets in Yemen, and puts out Inspire, a stylish English-language online publication that is one of al-Qaida’s more effective attempts to influence Western jihadis. These AQAP efforts to attack the United States and the West, in general, led to a greater U.S. focus on Yemen and more drone attacks there. In 2011, the United States killed Anwar al-Awlaki, a U.S. citizen and AQAP member who helped lead the terrorist group’s campaign against targets in the United States and Europe. Awlaki has continued to inspire terrorists after his death, with Boston Marathon plotters downloading his sermons before their attack. Awlaki also inspired the Fort Hood shooter in 2009 and the attacks on the Charlie Hebdo office in 2015. Wuhayshi’s death, however, comes as Yemen is falling apart. Earlier this year, Hadi’s government fell to the Houthi rebels, Yemeni Shiites who oppose both Yemen’s traditional order and the Sunni fanatics of AQAP who see Shiites as apostates. Alarmed by Houthi ties to Iran, Saudi Arabia has led an intervention in Yemen on Hadi’s behalf, bombing the Houthis and trying to reverse their gains. AQAP seems to be flourishing amid the chaos, as its enemies turn on one another. But with Wuhayshi’s death, AQAP may find it difficult to further exploit the Yemeni civil war. Personal connections, reputation, and charisma play a bigger role in leadership in the jihadi cause than do formal rank, and it is not clear if Qasim al-Raimi, the designated new leader, can retain the support of the AQAP rank and file. There is always a chance, of course, that Raimi proves an even more effective leader than Wuhayshi, and some observers see him as “more dangerous and aggressive.” (Lest we forget: In 1992, the Israelis killed Hezbollah’s Secretary-General Abbas al-Musawi, one of the group’s most competent leaders. Musawi was replaced by Hassan Nasrallah, who has proven one of the most effective terrorist and guerrilla leaders in modern times.) The bad news is that Raimi and AQAP may seek revenge, both out of genuine anger and to score points within the jihadi community. Al-Qaida’s chief bomb-maker, Ibrahim al-Asiri, may still be out there and has likely passed his sophisticated techniques on to others in Yemen. The bad news is that Raimi and AQAP may seek revenge, both out of genuine anger and to score points within the jihadi community. Over time, however, Wuhayshi’s death may push AQAP to focus even more on Yemen and less on the West. His close, personal ties to the al-Qaidacore may have been part of why AQAP was a steadfast ally of Zawahiri in his power struggle with the Islamic State. The opportunities and risks in the civil war are both tempting and frightening for AQAP. On the one hand, by taking up arms against the hated Shiites, AQAP can position itself as the defender of Yemen’s Sunnis, a strategy that has worked well for the Islamic State in Iraq and Syria. AQAP might gain more recruits and local support, while drawing foreign fighters and money from Sunnis eager to find yet another Shiite-Iran axis to oppose. Not surprisingly, AQAP has stepped up its operations against the Houthis in recent months. AQAP also has an opportunity to govern. And the bad news for the West is that it has learned from its own many mistakes on this front. In the past when AQAP made gains, it tried to impose a strict version of Islamic law that alienated local communities. Now when its fighters seize territory, theywork with local tribal figures and other elites, avoiding the most controversial measures and trying to portray themselves as guardians, not overlords. Wuhayshi’s death also comes at a time when the broader jihadi movement is split between backers of al-Qaida and supporters of the Islamic State, a struggle in which AQAP has long played an important role. As al-Qaida’s most active anti-Western affiliate, AQAP was important to Zawahiri’s claim that he was leading the struggle against the United States. Its strength in Yemen, moreover, also expanded al-Qaida’s presence and prestige to an important part of the Arab world. Islamic State supporters have already conducted attacks in Yemen, and the death of Wuhayshi offers them a chance to expand their influence there. The core leadership of AQAP is not likely to join the Islamic State, but some of its cells and supporters could break off if Raimi proves a weak leader. For now, Wuhayshi’s death means the United States has another point in the struggle against the jihadi movement. In the long term, successful disruption is more likely if the United States and its allies can keep the pressure on AQAP, forcing its leaders to go on the run and hindering their ability to communicate — particularly difficult challenges for a group in transition under new leadership. Wuhayshi’s death also comes on the heels of the deaths of several other AQAP members, including its top ideologue and spokesman. Having to hide also makes it difficult for the group to govern, as its exposed leaders run the risk of being killed. But AQAP has lost many leaders before, yet remains a force to be reckoned with. So at best, this should be seen as winning a battle, not the war. Authors Daniel L. Byman Publication: Foreign Policy Full Article
y Drones and the “Wild West” of regulatory experimentation By webfeeds.brookings.edu Published On :: Mon, 17 Aug 2015 07:30:00 -0400 As noted in our recent Brookings Institution report, unmanned aerial vehicles (UAVs), commonly referred to as drones, are an emerging technology that requires the attention of local governments. Unfortunately, regulations governing their usage are significantly lagging the pace of innovation. Individual citizens who do not want these devices flying over (or even near) their property due to privacy or safety concerns have limited options. You can stay in your home and turn the music up until it goes away. Or you can go about your business and ignore the possibility that the drone has a camera to see inside your home. Others might prefer a more active response. In fact, there have been several recent instances where residents have taken it upon themselves to remove these drones from the skies…by force. Misuses of drones The usage of UAVs and the lack of a functional regulatory environment have not been without incident. Fire personnel in southern San Bernardino County were fighting the first major fire of the season and had to abort their tanker flights due to someone flying a drone at approximately 12,000 feet and interfering with the safety of the pilots. Just two weeks later, firefighters in Southern California were using several manned aircraft to help put out 20 car fires on an interstate highway that were caused when a wildfire jumped the highway unexpectedly. Pilots had to ground the planes when it was reported that five drones were flying around the area to get a good look at the fires (two of which were witnessed actually chasing the tanker planes!). In addition to the general lack of common sense by a few users interfering with life-saving aircraft around the U.S., Britain, Poland, and elsewhere, there have been an increasing number of incidents involving drones accused of serving as remote “peeping toms.” UAVs have also crashed into cars and homes; they have even been used to smuggle drugs across the U.S.-Mexico border in addition to smuggling marijuana into prisons in South Carolina and in Ohio. Uneven regulations When it comes to regulations around drones, we are living in the proverbial wild-west. A few states, like Nevada and Wisconsin, have passed legislation to prevent the weaponization of drones. But in July, a YouTube video went viral of a teenager in Connecticut who modified his drone to fire a semi-automatic handgun successfully. When confronted by law enforcement officials, they determined that no laws had actually been broken. Virginia was the first state legislature to put in place a two-year moratorium on drone usage by state or law enforcement agencies. That moratorium expired July 1st. By the end of 2014, 36 states had introduced legislation aimed at protecting individual privacy in some manner. Only four of those passed last year. Currently, there are 17 states with some form of drone regulation on their books, and several other states still have legislation pending. Most of the laws that have passed, such as those in Idaho and Florida, focus on limiting police usage of drones by requiring probable cause warrants. Nevada has been one of the more active states in the drone legislation arena. In addition to their legislation prohibiting the weaponization of civilian drones, the state also has passed legislation to provide homeowners rights to sue drone owners who fly their drones over personal property in certain circumstances. Furthermore, Nevada now requires law enforcement agencies to get warrants when using drones near any home “where there is an expectation of privacy.” Potential benefits and rulemaking challenges We do acknowledge and are excited about the positive benefits that drone technology is poised to provide. Amazon has been testing their commercial “Prime Air” package delivery system under an experimental testing agreement with the FAA since early 2015, which will likely impact the nature of their almost two year old partnership with the U.S. Postal Service. Drone startup company Flirtey successfully demonstrated their ability to deliver medicine to a rural medical facility in Virginia as part of their proof of concept efforts this July. Drones may even represent the future of pizza delivery. The challenge this rapidly developing technology is creating is well ahead of local government efforts to rein in excessive activities. State and local governments need to engage on this policy issue more proactively. To do so, however, requires a delicate balancing act of the multiple competing interests of legitimate commercial uses, policing, public safety, privacy, and private property concerns. And this balancing has to take place in an environment where federal law remains unsettled too. One thing we would definitely caution against is ‘regulation by default.’ To date, the efforts to regulate drone policy has focused on the drones themselves. As is commonly the case with new technology, governments typically engaged with a heavy hand that sometimes misses the opportunities afforded by the new technologies to improve city services and quality of life. Examples of this possible overreaction is Iowa City, Iowa and Charlottesville, Virginia, both of which were early adopters of complete bans on all surveillance drones within city limits back in 2013. Local governments need to accept that drone technology is here for the near future. They must recognize that technology is not the problem, but how it is used can be a potential problem. Given the potential drawbacks and benefits, there is justification for reasoned regulation of drone technology. Authors David SwindellKevin C. DesouzaSabrina P.K. Glimcher Image Source: © Rick Wilking / Reuters Full Article
y Anwar al-Awlaki, Yemen, and American counterterrorism policy By webfeeds.brookings.edu Published On :: Thu, 17 Sep 2015 10:00:00 -0400 Event Information September 17, 201510:00 AM - 11:30 AM EDTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue, N.W.Washington, DC 20036 On September 30, 2011, the U.S.-born radical Islamic cleric, Anwar al-Awlaki, was killed by an American drone strike in Yemen, marking the first extra-judicial killing by the United States government against a U.S. citizen. Placed at the top of a CIA kill list in 2010 by the Obama administration, al-Awlaki was known for his intimate involvement in multiple al-Qaida terrorist plots against U.S. citizens, including the 2009 Christmas Day airline bombing attempt in Detroit and the 2010 plot to blow up U.S.-bound cargo planes. His calls for violent jihad remain prominent on the Internet, and his influence has turned up in many cases since his death, including the Boston Marathon bombing of 2013 and the Charlie Hebdo shootings in Paris early this year. In a new book, “Objective Troy: A Terrorist, A President, and the Rise of the Drone” (Crown, 2015), The New York Times national security reporter Scott Shane, drawing on in-depth field research in Yemen and interviews with U.S. government officials, charts the intimate details of the life and death of al-Awlaki, including his radicalization, his recruiting efforts for al-Qaida in the Arabian Peninsula, and the use of drone strikes by the United States to prosecute its counterterrorism goals. On September 17, the Intelligence Project hosted Shane to examine the roles played by al-Awlaki in al-Qaida plots against the United States, al-Awlaki’s continued influence on terrorism, and the current state of al-Qaida today. Brookings Senior Fellow Bruce Riedel, director of the Intelligence Project, provided introductory remarks and moderated the discussion. Audio Anwar al-Awlaki, Yemen, and American counterterrorism policy Transcript Uncorrected Transcript (.pdf) Event Materials 20150917_awlaki_yemen_transcript Full Article
y Is the U.S. drone program in Yemen working? By webfeeds.brookings.edu Published On :: Mon, 28 Sep 2015 11:25:00 -0400 Editor's Note: This piece originally appeared on Lawfare. The United States began to use drones in Yemen in 2002 to kill individuals affiliated with al-Qaida in the Arabian Peninsula (AQAP) and its predecessor organizations and disrupt its operations there and abroad. Since then, over 200 strikes have killed over a thousand Yemenis, tens of children, and at least a handful of U.S. citizens – one of whom was a deliberate target. The program has drawn widespread condemnation from human rights organizations and some UN bodies, yet it remains in place because the administrations of George W. Bush and Barack Obama view it as a success, as both have publicly stated. Criticism of the program often takes the form of debates about which legal regime is relevant to judging a state’s use of targeted killings, which critics call “extra-judicial executions” or simply “assassinations.” While dissent has been strongest in academic and human rights communities, some scholars have echoed the arguments made by states that the imperatives of self-defense permit states to carry out such killings as legitimate acts of war. The Lawfare consensus seems in favor of these strikes. I share the views of the moral and legal dissenters and hesitate to move beyond those debates because I don’t want to suggest that I accept the program’s legality. But I do want to engage those who do view the program as working — after all, if the U.S. administration did not believe it was working, it wouldn’t need to justify it legally. But by what metrics should we consider judging its success? Perhaps the most obvious metric is whether AQAP leaders are actually being killed and, even more, whether their deaths substantially disrupted the group’s activities in Yemen or its ability to pursue objectives outside of Yemen. For advocates of this metric, the program has been successful in the short term — individuals killed – even if the longer-term impact is less clear because new leaders seem to step in with regularity. Yet the success in taking out AQAP’s leadership is overstated. The numbers of AQAP members and supporters officially reported as killed are questionable, and probably grossly exaggerated. This is because the U.S. administration considers all adult males in the vicinity of the strikes to be combatants, not civilians, unless their civilian status can be established subsequently. Full investigations are neither desirable nor pragmatic for the U.S. government – particularly now that Yemen is the site of a civil and regional war. Even more troubling is that at times the U.S. may not even be certain of its primary targets. It frequently uses language that is so conditional that there seems to be more than a bit of guessing about the identities of those being targeted. But I would like to focus on different metric: the longer-term impact of the drone strikes on the legitimacy and attractiveness of al-Qaida’s message in Yemen and its ability to recruit among Yemenis themselves. Drone strikes are widely reported in local media and online and are a regular topic of discussion at weekly qat chewing sessions across the country. Cell phone calls spike after drone strikes, which are also widely reported on Twitter and Facebook. The strikes are wildly unpopular, with attitudes toward the United States increasingly negative. An Arab Barometer survey carried out in 2007 found that 73.5 percent of Yemenis believed that U.S. involvement in the region justified attacks on Americans everywhere. The narrative that the West, and especially the United States, fears the Muslim world is powerful and pervasive in the region. The U.S. intervenes regularly in regional politics and is a steadfast ally of Israel. It supports Saudi Arabia and numerous other authoritarian regimes that allow it to establish permanent U.S. military bases on Arab land. It cares more about oil and Israel than it does about the hundreds of millions in the region suffering under repressive regimes and lacking the most basic human securities. These ideas about the American role in Middle East affairs – many of them true – are among those in wide circulation in the region. Al-Qaida has since 1998 advanced the argument that Muslims need to take up arms against the United States and its allied regimes in the region. Yet al-Qaida’s message largely fell on deaf ears in Yemen for many years. Yes, it did attract some followers, mostly those disappointed to have missed the chance to fight as mujahidin in Afghanistan. But al-Qaida’s narrative of attacking the foreign enemy at home did not resonate widely. The movement remained isolated for many years, garnering only limited sympathy from the local communities in which they sought refuge. The dual effect of U.S. acceleration in drone strikes since 2010 and of their continued use during the “transitional” period that was intended to usher in more accountable governance has shown Yemenis how consistently their leaders will cede sovereignty and citizens’ security to the United States. While Yemenis may recognize that AQAP does target the United States, the hundreds of drone strikes are viewed as an excessive response. The weak sovereignty of the Yemeni state is then treated as the “problem” that has allowed AQAP to expand, even as state sovereignty has been directly undermined by U.S. policy – both under President Ali Abdullah Salih and during the transition. American “security” is placed above Yemeni security, with Yemeni sovereignty violated repeatedly in service of that cause. Regardless of what those in Washington view as valid and legitimate responses to “terrorist” threats, the reality for Yemenis is that the United States uses drone strikes regularly to run roughshod over Yemeni sovereignty in an effort to stop a handful of attacks – most of them failed – against U.S. targets. The fact that corrupt Yemeni leaders consent to the attacks makes little difference to public opinion. Regardless of what those in Washington view as valid and legitimate responses to “terrorist” threats, the reality for Yemenis is that the United States uses drone strikes regularly to run roughshod over Yemeni sovereignty in an effort to stop a handful of attacks – most of them failed – against U.S. targets. The United States cut aid to Yemen in 1990 when the newly united Yemeni state, which had just rotated into the Arab seat on the UN Security Council, voted against authorization for a U.S.-led coalition to reverse the Iraqi invasion of Kuwait. Yemen suffered a tremendous economic blow, as the United States joined Kuwait and Saudi Arabia in unilaterally severing aid to what was then and still is the poorest Arab nation. But with the rise of jihadi activism on the Arabian Peninsula over the next decade, and particularly after the bombing of USS Cole in 2000, Salih welcomed the return of U.S. aid to Yemen. This included a strong security dimension as the United States began tracking those suspected of involvement in the Cole attacks and other al-Qaida activities. Conspicuous caravans of FBI agents became a topic of local conversations, so the return of a U.S. presence in Yemen was also more visible than it had been previously. Salih claimed to have had advance knowledge of every drone strike. Saudi Arabia has meddled in Yemen at least since the fall of the northern Mutawakkilite monarchy in the late 1960s. The Saudi intervention that began with air strikes in March of this year and escalated to ground troops is thus only the latest — and most egregious — of the kingdom’s efforts to affect Yemen politics. This background is necessary to understand that if Yemen is a “failed state,” despite scholarly protestations otherwise, it is at least in part due to decades of external actors violating Yemeni sovereignty with near impunity. The drone program, like the Saudi-led war, is merely a recent and overt example. I lived in Yemen for several years spread over the period from 1994-1999. During that time, the optimism about the democratic opening of 1990 gave way to increasing frustrations as Salih solidified his control over united Yemen. He defeated the southern leadership in the 1994 war and curtailed the freedoms and pluralism that marked the early unification period, but open public debate has always been vibrant. Travel throughout Yemen was easy at that time, the only obstacle being the need to hire an all-terrain vehicle and driver who knew the many poorly marked roads. The Yemenis I met cut across social classes and regions, but were overwhelmingly welcoming and friendly toward Americans. In my research on Islamist political parties in Yemen and Jordan, I talked to hundreds of self-described Islamists. I spoke to people in the larger cities, the smaller towns, and in rural areas. We spent long hours talking about Islam and debating the contemporary political problems facing Yemen, the United States, and the world. In 1995 we spoke extensively about race and class in America as Yemenis watched the O.J. Simpson trial on CNN International. I often marveled at the knowledge Yemenis had of the U.S. political system; I wondered if most Americans had comparable knowledge of any other country at all. I was welcomed into homes and shared holidays with families. What strikes me now is how most Islamists saw jihadi groups as having no place in Yemeni politics. There were jihadis in Yemen, of course, primarily the “Afghan Arabs” who had returned from fighting abroad in Afghanistan and other theaters of jihad and faced difficulties reassimilating. Islamists donning mustaches complained about Taliban proclamations that adult male Muslims must sport a beard at least a fist long. They also complained of the Saudi-sponsored “scientific institutes” that taught the super-conservative Wahhabi take on Islam. Salih had even enjoined these extremists to launch deadly attacks against Southern socialists in the first years after unification. Most of the individuals influenced by these trends eventually found their way into al-Qaida circles. But they were relatively few. Al-Qaida found little success in attracting Yemenis who were not already drawn to jihadi ideas. The al-Qaida recruiting pitch of attacking foreign powers inside of Yemen simply rang hollow. Even the 2000 attack upon USS Cole — a warship docked in Aden — was not widely viewed as the legitimate targeting of a foreign military power intervening in Yemeni politics. Al-Qaida had to resort to extremist tactics precisely because its ideas did not attract a following significant enough to spark a popular mobilization. For al-Qaida, the drone program is a gift from the heavens. Its recruiting narrative exploits common misperceptions of American omnipotence, offering an alternative route to justice and empowerment. Regardless of American perceptions about the legitimacy or efficacy of the attacks, what Yemeni could now deny that the United States is waging an undeclared war on Yemen? Most recently, this narrative of direct U.S. intervention has been further substantiated by U.S. material and intelligence support for the Saudi-led military campaign aimed at the return to power of the unpopular and exiled-President Abed Rabbo Mansour Hadi. Photographs of spent U.S.-made cluster bombs are widely circulated. Nor have drone attacks ceased; alongside the often indiscriminate Saudi-led bombing, American drones continue their campaign of targeted assassination. One might think that the Saudi attacks would not help al-Qaida, but it is contributing to al-Qaida’s growth in Yemen. The indiscriminate targeting of the Saudi-led campaign undermines any sense of security, let alone Yemeni sovereignty. And AQAP-controlled areas like the port of Mukalla are not being targeted by Saudi or Gulf troops at all. The United States aims to take up the job of targeting AQAP while the Saudi-led (and U.S.-backed) forces focus on defeating the Houthis and restoring Hadi to power. But the overall situation is one in which those multiple interventions in Yemen are creating an environment in which al-Qaida is beginning to appeal in ways it never had before. For al-Qaida, the drone program is a gift from the heavens. Its recruiting narrative exploits common misperceptions of American omnipotence, offering an alternative route to justice and empowerment. For these reasons, the U.S. use of drones to kill even carefully identified AQAP leaders in Yemen is counterproductive: it gives resonance to the claims of the very group it seeks to destroy. It provides evidence that al-Qaida’s claims and strategies are justified and that Yemenis cannot count on the state to protect them from threats foreign and domestic. U.S. officials have argued that the drone program has not been used as a recruiting device for al-Qaida. But it is hard to ignore the evidence to the contrary, from counterinsurgency experts who have worked for the U.S. government to Yemeni voices like Farea Muslimi. It’s not just that drone strikes make al-Qaida recruiting easier, true as that probably is, but that they broaden the social space in which al-Qaida can function. America does not need to win the “hearts and minds” of Yemenis in the service of some grand U.S. project in the region. But if America wants to weaken al-Qaida in Yemen, it needs at a minimum to stop pursuing policies that are bound to enrage and embitter Yemenis who might otherwise be neutral. There is an old saying that when the only tool you have is a hammer, everything starts to look like a nail. The U.S. military — let alone its drones — is not the only tool on which the United States can rely. But when the measure of success is as narrow as the killing of a specific person, the tool gets used with increasing frequency. Indeed, drone strikes have significantly expanded under the Obama administration. It is crucial to see the bigger picture, the one in which long-time Yemeni friends tell me of growing anti-U.S. sentiment where there was previously very little. Public opinion toward America has clearly deteriorated over the past decade, and to reverse it may take much longer. But the use of drones to kill people deemed enemies of the United States, along with the Saudi-led war against the Houthis, is expanding the spaces in which al-Qaida is able to function. Authors Jillian Schwedler Publication: Lawfare Full Article
y 3 Earth technologies originating from a galaxy far, far away By webfeeds.brookings.edu Published On :: Fri, 18 Dec 2015 07:00:00 -0500 Technically, all of the Star Wars films occur a long time ago in a galaxy far, far away, but there are countless gadgets featured in the films that human beings in this galaxy can find here on Earth. Here are a handful of gadgets you will see this weekend when the seventh Star Wars film, "The Force Awakens," blasts into theaters. Drone surveillance The evil Galactic Empire has long employed drones and machines to do their dirty work. Way back when the empire was just a glint in Darth Sidious' eyes, his merciless apprentice Darth Maul used autonomous drones to search the desert landscape of Tatooine for fugitive Jedi. Later, when Darth Vader tirelessly searched the galaxy for Luke Skywalker and the Rebel Alliance, he sent similar autonomous drones to countless worlds such as the ice planet Hoth. Sure, the Empire may call them droids, but on the planet Earth these instruments are essentially remote drones you might see flying in cities or around your neighborhood. In the U.S. the use of unmanned drones to aid law enforcement is on the cutting edge of technology and sparks a spirited debate among privacy advocates. Should fear law enforcement as we would a Sith lord and thus burden them with a warrant-based, technology-centric approach to drone surveillance that might curtail the beneficial use of drones? Gregory McNeal wrote last year in a Brookings report that a property rights-centric approach with limits on surveillance would best appease privacy advocates and law enforcement, enabling drones to protect privacy in ways even manned surveillance can't achieve. By crafting simple, duration based surveillance legislation, law enforcement would only be permitted to surveil a person for a limited amount of time. Additionally, data retention guidelines could limit the amount of time that surveillance would be accessible to law enforcement. "Legislators should reject alarmist calls that suggest we are on the verge of an Orwellian police state," McNeal writes, as privacy advocates almost always invoke the the novel 1984 when technology makes surveillance more widespread and pervasive. As McNeal points out, the police state is hardly as nefarious as Darth Vader, so sensible legislation may be enough in this case to keep law enforcement from falling to the dark side. Holography In the first Star Wars film, Princess Leia recorded a short holographic message for Obi-Wan Kenobi asking for his help delivering the Death Star plans to the Rebel Alliance. The droid R2-D2 recorded the message almost as succinctly as many of use record short videos on our cell phone. But when can we expect to send and receive holographic messages ourselves? Barring some laughable election night hologram shenanigans on CNN, there have been some notable uses of holography in this galaxy. In 2012, the late rapper Tupac Shakur took the stage at the Coachella Festival with contemporaries Snoop Dogg and Dr. Dre. At the 2014 Billboard Music Awards, Michael Jackson performed on stage—five years after his death. These holograms were made possible by artful projections and reflections, creating convincing illusions suitable only for crowded concert halls. The technology is especially popular in South Korea where K-Pop performers regularly "perform" at virtual concerts to adoring fans. But a bona fide hologram? Researchers at Swinburne University this year used lasers and a specialized graphene mesh to project 3D objects in the air very much like you would see in Star Wars. As TIME Magazine reported, "It’s not quite Princess Leia-quality, and researchers say it has a long way to go before commercialization, but it’s a step." BB-8 Droid Since the first teaser for the new Star Wars films, fans have had questions about the new droid character BB-8. Rather than resort to computer animation to bring the droid to life, director J.J. Abrams and Lucasfilm designers sought to produce a live prop that could portray the droid on film. The filmmakers demoed the droid on stage at Comic Con to the roar of audience applause and delight—"It was the first official confirmation that BB-8 was not a CG creation, but rather, a practical effect." The use of practical effects in "The Force Awakens" is a return-to-form for the filmmakers who have shunned the special effects and digital artistry of the Star Wars prequel trilogies and instead embraced the kinds of practical effects and puppetry that made the original trilogy so beloved. The droid BB-8 even has a cousin here on Earth—the robotic ball toy Sphero. Inventors Ian Bernstein and Adam Wilson have adapted their smartphone-controlled spherical toy into a BB-8 toy that performs many of the same practical effects the screen version of BB-8 does in "The Force Awakens." As the new sequel trilogy continues, filmmakers are sure to wow audiences with amazing technologies—some we may even recognize from planet Earth. Authors Nick McClellanDarrell M. West Full Article
y Six ways to disable a drone By webfeeds.brookings.edu Published On :: Wed, 16 Mar 2016 07:30:00 -0400 Civilian drone activity has increased exponentially as drones become more easily accessible and affordable. With more drones in the sky every day, there have been some creative and sometimes dangerous attempts to disable drones. The reasons for disabling a drone can vary from boredom and curiosity to privacy and safety concerns. To be clear, the Center for Technology Innovation does not condone or promote the act of harming drones. 1. Guns Shooting a drone out of the sky may be effective, but it’s also extremely dangerous. The consequences for shooting down a drone vary by state, but perpetrators could face reckless endangerment charges or be prosecuted under laws relating to the discharge of firearms. Additionally, the offender could be liable for civil damages paid to the destroyed drone’s owner. 2. Nets Nets are a much safer alternative to capturing drones than shooting them with guns. Tokyo police are working to implement net-carrying drones that can intercept suspicious smaller drones. The Human-Interactive Robotics Lab at Michigan Tech is working a drone catcher system for removing intruding drones by developing a drone-mounted net cannon that can capture another drone in flight from a distance of up to 40 feet. Lastly, there’s anti-drone technology that can be assembled from hardware store items. The drone net gun is a plastic slingshot that releases a net from the user on the ground to capture a drone in-flight 3. Radio waves Battelle’s DroneDefender is a device that emits an electromagnetic field meant to disrupt the most popular GPS and ISM radio frequencies, which keep drones in the air. The DroneDefender can then take control and guide the drone safely down to the ground. It is not yet available for consumer use and is awaiting authorization from the Federal Communications Commission. 4. Hacking As drones are functionally flying computers, it’s been proven possible to hack into their software by using Wi-Fi to connect to an unsecured network port on the device. Conversely, at the DEFCON hacker conference in Las Vegas, David Jordan of Aerial Assault demonstrated a drone that can break into computer networks by scanning for unsecured networks, recording their locations using GPS, and relaying the information to the pilot. 5. Eagles The Dutch National Police are creatively working with Guard From Above, a raptor training company, to determine whether eagles could be used as anti-drone weapon systems. For those worried about the potential dangers to the birds, Guard From Above responded, “In nature, birds of prey often overpower large and dangerous prey. Their talons have scales, which protect them, naturally, from their victims’ bites. Of course, we are continuously investigating any extra possible protective measures we can take in order to protect our birds. The Dutch National Police has asked the Dutch Organization for Applied Scientific Research (TNO) to research the possible impact on the birds’ claws. The results are not yet known. We are working closely with the Dutch National Police on the development of our services.” 6. Jet Skis Jet Skis don’t seem to be the most practical way of disabling drones, but one jet skier at the 2016 Yamaha New Zealand Festival of Freeride 4 showed how effectively it could be done. Authors Hillary SchaubDarrell M. West Image Source: © Mike Segar / Reuters Full Article
y What might the drone strike against Mullah Mansour mean for the counterinsurgency endgame? By webfeeds.brookings.edu Published On :: Wed, 25 May 2016 15:45:00 -0400 An American drone strike that killed leader of the Afghan Taliban Mullah Akhtar Mohammed Mansour may seem like a fillip for the United States’ ally, the embattled government of Afghanistan’s President Ashraf Ghani. But as Vanda Felbab-Brown writes in a new op-ed for The New York Times, it is unlikely to improve Kabul’s immediate national security problems—and may create more difficulties than it solves. The White House has argued that because Mansour became opposed to peace talks with the Afghan government, removing him became necessary to facilitate new talks. Yet, as Vanda writes in the op-ed, “the notion that the United States can drone-strike its way through the leadership of the Afghan Taliban until it finds an acceptable interlocutor seems optimistic, at best.” [T]he notion that the United States can drone-strike its way through the leadership of the Afghan Taliban until it finds an acceptable interlocutor seems optimistic, at best. Mullah Mansour's death does not inevitably translate into substantial weakening of the Taliban's operational capacity or a reprieve from what is shaping up to be a bloody summer in Afghanistan. Any fragmentation of the Taliban to come does not ipso facto imply stronger Afghan security forces or a reduction of violent conflict. Even if Mansour's demise eventually turns out to be an inflection point in the conflict and the Taliban does seriously fragment, such an outcome may only add complexity to the conflict. A lot of other factors, including crucially Afghan politics, influence the capacity of the Afghan security forces and their battlefield performance. Nor will Mansour’s death motivate the Taliban to start negotiating. That did not happen when it was revealed last July’s the group’s previous leader and founder, Mullah Mohammad Omar, had died in 2013. To the contrary, the Taliban’s subsequent military push has been its strongest in a decade—with its most violent faction, the Haqqani network, striking the heart of Kabul. Mansour had empowered the violent Haqqanis following Omar’s death as a means to reconsolidate the Taliban, and their continued presence portends future violence. Mansour's successor, Mawlawi Haibatullah Akhundzada, the Taliban’s former minister of justice who loved to issue execution orders, is unlikely to be in a position to negotiate (if he even wants to) for a considerable time as he seeks to gain control and create legitimacy within the movement. The United States has sent a strong signal to Pakistan, which continues to deny the presence of the Afghan Taliban and the Haqqani network within its borders. Motivated by a fear of provoking the groups against itself, Pakistan continues to show no willingness to take them on, despite the conditions on U.S. aid. Disrupting the group’s leadership by drone-strike decapitation is tempting militarily. But it can be too blunt an instrument, since negotiations and reconciliation ultimately depend on political processes. In decapitation targeting, the U.S. leadership must think critically about whether the likely successor will be better or worse for the counterinsurgency endgame. Authors Vanda Felbab-BrownBradley S. Porter Full Article
y How instability and high turnover on the Trump staff hindered the response to COVID-19 By webfeeds.brookings.edu Published On :: Thu, 07 May 2020 18:04:06 +0000 On Jan. 14, 2017, the Obama White House hosted 30 incoming staff members of the Trump team for a role-playing scenario. A readout of the event said, “The exercise provided a high-level perspective on a series of challenges that the next administration may face and introduced the key authorities, policies, capabilities, and structures that are… Full Article
y Charts of the Week: Housing affordability, COVID-19 effects By webfeeds.brookings.edu Published On :: Thu, 07 May 2020 18:37:39 +0000 In Charts of the Week this week, housing affordability and some new COVID-19 related research. How to lower costs of apartment building to make them more affordable to build In the first piece in a series on how improved design and construction decisions can lower the cost of building multifamily housing, Hannah Hoyt and Jenny… Full Article
y A once-in-a-century pandemic collides with a once-in-a-decade census By webfeeds.brookings.edu Published On :: Thu, 07 May 2020 20:15:08 +0000 Amid the many plans and projects that have been set awry by the rampage of COVID-19, spare a thought for the world’s census takers. For the small community of demographers and statisticians that staff national statistical offices, 2020—now likely forever associated with coronavirus—was meant to be something else entirely: the peak year of the decennial… Full Article
y Putting women and girls’ safety first in Africa’s response to COVID-19 By webfeeds.brookings.edu Published On :: Fri, 08 May 2020 15:12:51 +0000 Women and girls in Africa are among the most vulnerable groups exposed to the negative impacts of the coronavirus pandemic. Although preliminary evidence from China, Italy, and New York shows that men are at higher risk of contraction and death from the disease—more than 58 percent of COVID-19 patients were men, and they had an… Full Article
y New polling data show Trump faltering in key swing states—here’s why By webfeeds.brookings.edu Published On :: Fri, 08 May 2020 17:25:27 +0000 While the country’s attention has been riveted on the COVID-19 pandemic, the general election contest is quietly taking shape, and the news for President Trump is mostly bad. After moving modestly upward in March, approval of his handling of the pandemic has fallen back to where it was when the crisis began, as has his… Full Article
y In the Republican Party establishment, Trump finds tepid support By webfeeds.brookings.edu Published On :: Fri, 08 May 2020 18:37:25 +0000 For the past three years the Republican Party leadership have stood by the president through thick and thin. Previous harsh critics and opponents in the race for the Republican nomination like Senator Lindsey Graham and Senator Ted Cruz fell in line, declining to say anything negative about the president even while, at times, taking action… Full Article
y The coronavirus has led to more authoritarianism for Turkey By webfeeds.brookings.edu Published On :: Fri, 08 May 2020 20:00:26 +0000 Turkey is well into its second month since the first coronavirus case was diagnosed on March 10. As of May 5, the number of reported cases has reached almost 130,000, which puts Turkey among the top eight countries grappling with the deadly disease — ahead of even China and Iran. Fortunately, so far, the Turkish death… Full Article
y Past is prologue? Saudi Arabia’s clumsy oil diplomacy By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Everything old is new again for Iran and Saudi Arabia. In recent days, a series of diplomatic skirmishes between Tehran and Riyadh has intensified the long simmering tensions between the two heavyweights of the Persian Gulf. The bitter clash over regional influence and energy policy parallels with striking similarity a protracted brawl between the two rivals three decades earlier, which generated a destructive spiral of violence and economic hardship for both countries. Full Article Uncategorized
y Why Europe’s energy policy has been a strategic success story By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 For Europe, it has been a rough year, or perhaps more accurately a rough decade. However, we must not lose sight of the key structural advantages—and the important policy successes—that have brought Europe where it is today. For example, Europe’s recent progress in energy policy has been significant—good not only for economic and energy resilience, but also for NATO's collective handling of the revanchist Russia threat. Full Article Uncategorized
y How do we end energy poverty? By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Worldwide, over 1.2 billion people lack access to electricity. On May 24, the Brookings Institution hosted Ted Nordhaus and Daniel Kammen for a debate on solutions for addressing energy poverty moderated by ClimateWire Editor Lisa Friedman. Full Article
y India’s energy and climate policy: Can India meet the challenge of industrialization and climate change? By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Charles Ebinger writes about India's ongoing efforts to achieve climate targets while balancing other considerations. Full Article
y Coal after the Paris agreement: The challenges of dirty fuel By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 On December 12, 2015, 195 countries adopted the Paris Agreement, the most ambitious climate change pact to date. The document lays out a plan to curb greenhouse gas emissions, among other climate-related initiatives. But one issue looms large: coal. Full Article
y The presidential candidates’ views on energy and climate By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Now that there are presumptive nominees for both major political parties, it’s an important moment to outline, in broad strokes, the positions of Secretary Hillary Clinton and businessman Donald Trump on energy and climate. Full Article Uncategorized
y Why net energy metering results in a subsidy: The elephant in the room By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 In a critique of a recent Brookings paper by Mark Muro and Devashree Saha, Lisa Wood argues that net energy metering is in fact a tariff that creates a subsidy for NEM customers and a cost-shift onto non-NEM customers. Full Article
y Dispatch from London: Anxiety following Brexit By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 The mood in London today is one of shock and profound uncertainty. It's a momentous day in Europe and, one fears, a portent in the broader debate about the West’s relationship to a globalized and open world. Full Article Uncategorized
y Brexit: Advice for the day after By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Post-Brexit, Tom Wright gives advice to the EU, the next British prime minister, the Remain campaign, Scotland, Ireland, and the United States. Full Article Uncategorized
y The Brexit contagion myth By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Fear of political contagion has emerged as an incredibly powerful and important idea that is poised to shape Europe’s future. Unfortunately, it has been repeated as mantra and has not been subjected to careful scrutiny. Full Article Uncategorized
y Sovereignty as responsibility: Building block for R2P By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Roberta Cohen and Francis M. Deng write on sovereignty and responsibility as the building block for R2P in the "The Oxford Handbook of the Responsibility to Protect." Full Article
y Towards a more just, secure, and peaceful world: Lessons from Albright and Axworthy By webfeeds.brookings.edu Published On :: Tue, 05 Jul 2016 14:15:00 +0000 At the second annual Madeleine K. Albright Lecture on Global Justice, Lloyd Axworthy—a former foreign minister of Canada—unpacked complex and interconnected issues related to the Responsibility to Protect and the role of democratic institutions in assuring peace. Full Article Uncategorized
y Democracy in Turkey: Before and after the coup By webfeeds.brookings.edu Published On :: Wed, 03 Aug 2016 20:41:05 +0000 “[Turkey’s] democracy was always a problematic one, interrupted by military coups, but also when there were no military coups the democracy itself had its own challenges with respect to the quality of human rights, the spectrum of democracy as well – the military always hung over this democracy like Damocles’ sword.” – Kemal Kirişci “Turkey […] Full Article
y Contemplating COVID-19’s impact on Africa’s economic outlook with Landry Signé and Iginio Gagliardone By webfeeds.brookings.edu Published On :: Mon, 04 May 2020 23:05:26 +0000 Full Article
y Closed Australia: The high price of sovereignty By webfeeds.brookings.edu Published On :: Tue, 05 May 2020 13:44:39 +0000 Full Article