Haile Selassie I, born Tafari Makonnen, ruled as Emperor of Ethiopia from 1930 to 1974. He was known for modernizing the country through political and social reforms, such as the written constitution and the abolition of slavery.
His power was interrupted by the Second Italo-Ethiopian War, which forced him into exile during Italian occupation. The Allied campaign in East Africa, using pioneering methods of irregular warfare, liberated the country in 1941 and restored Selassie.
He also presided over and became the first chair of the 1963 Organization of African Unity (today known as African Union). A 1974 military coup by the “Derg” removed him from power and he was murdered by them August 27, 1975.
It’s an important history lesson in context of a new Hill article that says the United States unfortunately modeled counter-insurgency in Afghanistan on colonial instead of post-colonial doctrines.
Galula’s objective was perpetuating colonial rule. He, as a French officer, was fighting in France’s name to shore up France’s legitimacy. In contrast, we fight in someone else’s name to shore up someone else’s legitimacy.
At its most concrete, the difference between colonial and post-colonial settings boils down to what one can offer the population, which, per FM 3-24, is the true “center of gravity” in an insurgency. Galula emphasizes in his writing that a key part of the colonial regime’s pitch to the population is that the colonial power is not going anywhere. Therefore, siding with the colonial power and supporting it tacitly or actively is a reasonable choice. One can trust that which will always be there.
This argument undoubtedly helped France recruit large numbers of locals to fight under French colors. In contrast, the post-colonial foreign power that broadcasts its intention to leave from the moment it first arrives faces a far more difficult time rallying and sustaining support.
No one really has figured out how a third-party military intervention shores up the legitimacy of a client state in a post-colonial context.
The Allied liberation of states held by the Axis was all about intervention to shore up legitimacy of a client state, so there’s plenty of evidence to reference. Ethiopia makes for a particularly good case example, bridging into a post-colonial context, because it was never colonized.
Just three years after a code of ethics was drafted in Nuremberg (condemning Nazis for experimenting on humans without consent and with no benefit to test subjects) the US started a massive bioweapons test… violating the code:
Over a period of six days in September 1950, members of the US Navy sprayed clouds of Serratia from giant hoses aboard a Navy minesweeper drifting two miles along the San Francisco coastline, a bacterial fog quickly enveloped and disguised by the region’s own mist. By monitoring the air at 43 scattered sites throughout the region, the Navy found Serratia bacteria blown throughout San Francisco and extending to the adjacent communities of Albany, Berkeley, Daly City, Colma, Oakland, San Leandro, and Sausalito
Eleven fell sick from the experiment, one died.
A week after the spraying, eleven patients were admitted to the now defunct Stanford University Hospital in San Francisco with severe urinary tract infections, resistant to the limited antibiotics available in that era. One gentlemen, recovering from prostate surgery, developed complications of heart infection as Serratia colonized his heart valves. His would be the only death during the aftermath of the experiment.
Such practices are said to have continued all the way to November 25, 1969.
From 1950 to 1966, the military performed open-air testing of potential terrorist weapons at least 239 times in at least eight American cities, including New York City, Key West, and Panama City, FL, exposing still unknown numbers of Americans to Serratia and other microbial organisms.
It all supposedly came to an abrupt end on that single day in 1969 because President Nixon made an offical “Statement on Chemical and Biological Defense Policies and Programs”.
The United States shall renounce the use of lethal biological agents and weapons, and all other methods of biological warfare. The United States will confine its biological research to defensive measures such as immunization and safety measures
Instead, Ronald Reagan with Donald Rumsfeld just fourteen years later did the opposite and shipped bioweapons into Iraq for offensive measures including use against their own population.
After Rumsfeld’s visit to Baghdad in 1983, U.S. intelligence began supplying the Iraqi dictator with satellite photos showing Iranian deployments. Official documents suggest that America may also have secretly arranged for tanks and other military hardware to be shipped to Iraq in a swap deal–American tanks to Egypt, Egyptian tanks to Iraq. Over the protest of some Pentagon skeptics, the Reagan administration began allowing the Iraqis to buy a wide variety of “dual use” equipment and materials from American suppliers. According to confidential Commerce Department export-control documents obtained by NEWSWEEK, the shopping list included a computerized database for Saddam’s Interior Ministry (presumably to help keep track of political opponents); helicopters to transport Iraqi officials; television cameras for “video surveillance applications”; chemical-analysis equipment for the Iraq Atomic Energy Commission (IAEC), and, most unsettling, numerous shipments of “bacteria/fungi/protozoa” to the IAEC. According to former officials, the bacteria cultures could be used to make biological weapons, including anthrax. The State Department also approved the shipment of 1.5 million atropine injectors, for use against the effects of chemical weapons, but the Pentagon blocked the sale. The helicopters, some American officials later surmised, were used to spray poison gas on the Kurds.
The United States almost certainly knew from its own satellite imagery that Saddam was using chemical weapons against Iranian troops. When Saddam bombed Kurdish rebels and civilians with a lethal cocktail of mustard gas, sarin, tabun and VX in 1988, the Reagan administration first blamed Iran, before acknowledging, under pressure from congressional Democrats, that the culprits were Saddam’s own forces. There was only token official protest at the time. Saddam’s men were unfazed. An Iraqi audiotape, later captured by the Kurds, records Saddam’s cousin Ali Hassan al-Majid (known as Ali Chemical) talking to his fellow officers about gassing the Kurds. “Who is going to say anything?” he asks. “The international community? F– them!”
Read that again: President Reagan almost certainly knew from satellite imagery that Saddam was using chemical weapons on his own population… and offered only token official protest at the time.
Who is going to say anything, indeed.
This perhaps gives insight into the false claims by extreme right-wing groups about vaccination (e.g. claiming it is unsafe or that it does harm). They probably celebrated Reagan’s use of power for thoughtless violations of ethical and moral codes, and now are projecting — find it hard to believe anyone given power would do what’s right.
Security experts like myself have been explaining carefully why Apple is doing the right thing. We kind of have to when Snowden takes it upon himself to generate baseless controversy that offers little logical value.
Beware privacy extremists who incoherently draw a line at children’s rights; somehow they rationalize adults must have absolute “freedom” to deny privacy to others if their victims are children.
Also Snowden calling someone a “Ken doll” and saying “every security expert in the world is screaming themselves hoarse now, imploring Apple to stop” are just over-the-top obvious fallacies.
Either I’m not a security expert or Snowden is an unrepentant liar. I’ll leave it to you gentle reader to decide.
Seriously, what kind of average white man goes around calling another average white man he looks like… a Ken doll? Is that a jealously thing?
Maybe this new Atlantic piece explains why Snowden tends to organize Puritain-like reputational attacks:
Once it becomes clear that attention and praise can be garnered from organizing an attack on someone’s reputation, plenty of people discover that they have an interest in doing so.
Update September 14: research also suggests that Snowden is using a method of playing into crowd ignorance to generate engagement using false pretense.
… popularity bias is more likely to lower the overall quality of content…engagement generates a noisy signal, and the algorithm is likely to amplify this initial noise. Once the popularity of a low-quality item is large enough, it will keep getting amplified…Evidence shows that information is transmitted via “complex contagion,” meaning the more times someone is exposed to an idea online, the more likely they are to adopt and reshare it. When social media tells people an item is going viral, their cognitive biases kick in and translate into the irresistible urge to pay attention to it and share it…We found that players are more likely to like or share and less likely to flag articles from low-credibility sources when players can see that many other users have engaged with those articles. Exposure to the engagement metrics thus creates a vulnerability… The wisdom of the crowds fails because it is built on the false assumption that the crowd is… [rational and intelligent]
Apple showed responsibility and diligence in addressing its own cloud space with distributed technology. It is BETTER than the alternatives and academic THEORY of control tampering doesn’t hold a candle to the REALITY of children abused.
Snowden reveals mostly how his opinions are a bunch of heated emotional rhetoric with little to no ethical or technical substance.
Read his crazy ranting if you must, but if you’re an expert in anything involving analysis and logic beware the awful taste it might leave you with.
“I thought, ‘Okay, there’s a bunch of sea urchins in there, these guys are predators of urchins, nothing’s gonna happen,’” recalls Clements, of Fisheries and Oceans Canada in Moncton. The urchins, he says, hadn’t eaten anything in two weeks.
The next day, when Clements came into the lab, he couldn’t find the sun star. There was a pile of urchins on the side of the tank, with something red barely visible underneath. Clements pried the urchins off, revealing the victim.
“The sea star was absolutely decimated,” he says. “The urchins had just ripped it apart.”
It’s the next section that really puzzles me. On the one had it says intentional coordinated attack isn’t possible, and then right after that it suggests a mechanism for intentional coordinated attack.
…urchin attacks can’t be intentional since the animals don’t have a brain or central nervous system, she says. “Urchins doing a coordinated predatory attack is not biologically feasible.”
The synchronized attacks may be based on chemical consequences of the ongoing feeding releasing smells into the water, Clements says. Once the first urchin starts chewing on the sun star, the other urchins may start recognizing the sun star as food…
Eating seems like intent. Signaling seems like coordination.
Definitely food for thought (pun intended, of course) when thinking about drone swarms.