الاثنين، 6 أكتوبر 2014

حماية التكنولوجيا الأمريكية

حماية التكنولوجيا الأمريكية

د. راشد علي محمد السعدي

لا يتعجب المرء من سرعة التقليد التجاري أو العسكري للتكنولوجيا ، ولكن ما يشد الإنتباه كثيرا هو التخلف التقني بين الولايات المتحدة وأوروبا وبينها وبين الصين والدول المتقدمة الأخرى. فكيف حافظت الولايات المتحدة على تقدمها بعشرات السنين ومنعت غيرها من الاستيلاء على وتقليد التكنولوجيا الامريكية خلال هذه الفترات؟
وسائل الحصول على التكنولوجيا
تشبه إدارة خدمات الأمن الدفاعية الأمريكية في تقريرها 2013م أعداؤها كالروائح الكريهة التي تسبب الأمراض كالكوليرا أوالملاريا وهي تحيط بهم من كل جانب وعندما تتمكن من الإنتشار ستسمم صناعاتهم وعسكريتهم واقتصادهم وبالتالي أمنهم القومي. وهناك سعي حثيث من الدول الأوروبية والآسيوية وغيرها للحصول على التقنيات الحساسة من خلال طرق كثيرة منها:
1.       من خلال نشاطات في الشبكات العنكبوتية: محاولة الدخول الى مواقع المقاولين المتعاقد معهم والحصول على المعلومات المحمية
2.       محاولة الحصول على التقنية: بالإستحواذ على الشركات الأمريكية المحلية او تلك التي تعمل في دول أخرى من أجل الحصول على كيفية تصنيع المعدات أو رسوماتها أو مواصفاتها الفنية
3.       طلبات أكاديمية: طلب محاضرات او مراجعة اوراق بحث او تقديم الاستشارة او الإنضمام الى الجامعات الأمريكية من أجل الدراسة أو العمل
4.       طلب معلومات رسمي: من خلال الهاتف أو البريد الإلكتروني أو مواقع الانترنت للحصول على معلومات محمية تحت ستار طلب عروض أسعار أو استبيان تسويقي
5.       طلب خدمات تسويقية: خلال المبيعات او التمثيل او العروض هدفها الاتصال بالمقاول والحصول منه على المعلومات المطلوبة
6.       زيارات أجنبية: هدفها الدخول الى الموقع والحصول على المعلومات التي يمنع نشرها خارج الموقع
7.       طلب الحصول على وظائف: حصول طالب الوظيفة الأجنبي على الوظيفة المطلوبة للوصول الى المعلومات
8.       إستغلال العلاقات: عن طريق شراكة أعمال او اتفاقيات رسمية او مبيعات عسكرية او ادارة اعمال
9.       الاستطلاع: عن طريق الوسائل المسموعة او المرئية او التنصت الالكتروني على الافراد او المعدات او التسهيلات
10.    نشاطات اجرامية: عن طريق السرقة
11.    البحث والاستيلاء:  تفتيش الناس او الممتلكات

أكثر التقنيات إستهدافاً:
1.       نظم المعلومات
2.       الالكترونيات
3.       الليزر والبصريات والمجسات
4.       هندسة الطيران
5.       المواد  
6.       أنظمة الفضاء
7.       أنظمة تحديد المواقع والملاحة
8.       الأنظمة البحرية
9.       أمن المعلومات
10.    الطرق الصناعية
وهناك قائمة بالتكنولوجيا العسكرية المحظورة يمكن البحث عنها في الانترنت تحت مسمى Military Critical Technologies List .

دراسة حالة: محاولة الحصول على تقنية الصواريخ
يصنع الصاروخ من قبل شركات مدنية مختصة في الصناعات العسكرية وتقوم القوات المسلحة بالتعاقد مع هذه الشركات والتي تطلق عليها المقاول أو المتعهد بالصناعة. ولحساسية هذه التقنيات يجب أن يكون المقاول معتمد وموثوق. وليكون الصاروخ أكثر دقة قامت الشركات الصانعة بالبحث عن أفضل التقنيات لصناعة الصواريخ (الشكل 1). 


الشكل (1) التقنيات المستخدمة في الصاروخ
في السنوات الأخيرة ، إهتمت بعض الدول التي تقوم بتصنيع صواريخ ناشئة بهذا النوع من التقنية ، وحاولت الحصول عليها عن طرق شرعية أو غير شرعية. وهنا دراسة حالة توضح إستخدام البريد الإلكتروني:
في عام 2012م أرسل شخص ما من آسيا رسالة إلكترونية إلى مقاول صواريخ في ألاباما بالولايات المتحدة يطلب معايير قياسات تحت مسمى C1211 لمواد سيراميك مقاوم لحرارات عالية. وبعد أن قام المقاول بالتقصي عن الشخص وجد أنه يتبع شركة آسيوية متخصصة في الأنظمة العسكرية والإلكترونية والأسلحة الموجهة الدقيقة. ووجد أيضا أن معايير القياسات المطلوبة عبارة عن معايير عسكرية MIL STD 1942 تستخدم السيراميك لصناعة أجزاء من هيكل الصواريخ.
كان ذلك مثال بسيط لكيفية الحصول على أجزاء صغيرة وطرق تبدو لا تأثير لها لتجمع لاحقا في بناء منظومة صواريخ كاملة.   
برامج حماية التكنولوجيا الحساسة الأمريكي
ولحماية التكنولوجيا الحساسة تقوم الولايات المتحدة الأمريكية ممثلة بمكتب خدمات الأمن الدفاعي ووشركاؤهم من الجهات القانونية والاستخبارات بالتصريح لمقاولين معتمدين فقط تثق بهم ، وبإحباط محاولات الاجانب الطامعين في جمع الأسرار. ووضعت عدة برامج لحماية التقنية تشمل تنظيم التصدير والتحري عن إستحواذ الشركات الأمريكية الأمنية. ومن هذه البرامج:
1.       برنامج التقنيات العسكرية الحساسة وتشرف عليه وزارة الدفاع والتي تحدد التقنيات التي لها تأثير على إستمرار الهيمنة الأمريكية.
2.       نظام مراقبة الصادرات الثنائية الإستخدام وهو برنامج تشرف عليه وزارة الأعمال والإستخبارات المركزية والدفاع والطاقة والعدل والأمن الوطني. ومهمتهم موازنة المصالح والتحكم بالصادرات.
3.       برنامج نظام مراقبة تصدير الأسلحة تقوده الدولة وأعضاؤه وزارة الدفاع والأمن الوطني والعدل لتنظيم تصدير الأسلحة للشركات الأمريكية ومنح الأولوية للأمن الوطني والسياسة الخارجية. وتحت هذا النظام تستدام قائمة الذخائر.
4.       برنامج المشتريات العسكرية الأجنبية تقودة الدولة ووزارة الدفاع معاً وأعضاؤه الأمن الوطني وهو يوفر للحكومات الأجنبية السلاح الأمريكي والخدمات لتعزيز التوافقية وتقليل تكاليف أنظمة التسليح.
5.       إجراءات سياسة الإفصاح الوطني وهو برنامج تشترك فيه الدولة والدفاع ومجتمع الإستخبارات وهو يحدد إمكانية الإفصاح عن المعلومات والأسلحة والتقنية العسكرية المحظورة للحكومات الأجنبية.
6.       لجنة الإستثمارات الأجنبية في الولايات المتحدة تترأسها الخزينة وأعضاؤها وزارة الأعمال والدفاع والأمن الوطني والعدل والدولة وعدد ستة مكاتب من مكتب الرئيس التنفيذي. تهدف اللجنة إلى التحري عن تأثير الإستثمارات الأجنبية على الأمن الوطني ومنع الإستحواذ الذي يعرض أمنها للخطر.
7.       برنامج أمن الصناعة الوطنية وتشرف عليه وزارة الدفاع ومهمته التأكد من أن المقاولين والمرخص لهم وذوي المنح لديهم إجراءات حماية مطبقة تصون المعلومات تحت حوزتهم.
8.       برنامج سياسة مكافحة العبث وتشرف عليه وزارة الدفاع ومهمتها منع أو تأخير الحصول على وإستغلال التكنولوجيا الحساسة لأنظمة التسليح.
الهجوم للحصول على التقنية الأمريكية لن يقف والدفاع المستميت من قبل الطرف الآخر سيستمر لأن هذه التقنيات هي الطريق الأكيد للمنافسة والنمو والربح التجاري بالنسبة للشركات العالمية وهي أيضاً الطريق إلى بناء القدرات العسكرية والتصدي للتهديدات وحماية الأمن الوطني بالنسبة لأي دولة.   



Reference:
Defense Security Services.2013. Targeting US Technologies. A trend Analysis of Cleared Industry Reporting. 
United States Government Accountability Office. Protecting Defense Technologies. GAO-13-157. Report to Congressional Committees. January 2013

PROTECTING U.S. TECHNOLOGY

PROTECTING U.S. TECHNOLOGY

The swift illegal commercial and military imitation of technology does not astonish anyone, but what really surprises is the persistent technological gap between the U.S. and the West. How has the United States preserved its critical military technological advances' gap, estimated to be ten years and over compared with its next rivals, and prevented other countries from acquiring it during these years? 
Methods of Acquiring Technology
In its 2013 report, the U.S. Defense Security Services (DSS) stated that "adversaries surround us with a pervasive miasmatic atmosphere". Once it seeps from any direction, it will poison the U.S. Industry, military, economy and ultimately national security. European, Asian and other countries pursue critical technology persistently through many means including;
1.      Cyberspace: trying to access contractors' websites to get protected information
2.      Acquisition of Technology:  through acquisition of U.S. companies, locally or abroad. In order to obtain schematic diagrams, there are attempts to acquire methods of manufacturing or specification of military equipment.
3.      Academic Solicitation: requesting presentation and lectures, peer reviewing papers, providing consultations or actually joining a university as a student or as an employee.
4.      Requests for information: requesting protected information through telephone, emails or websites under the cover of quotations or market research.
5.      Solicitations or Marketing Services: through sales, representations or demonstrations. The target is to interact with contractors and get the required information.
6.      Foreign Visits: to get access to the site and get information that otherwise cannot be shared.
7.      Direct Employment: wittingly or unwittingly seeking employment to get access to protected information.
8.      Exploitation of Relationship: through joint ventures, official agreements, foreign military sales or business management.
9.      Surveillance: via visual, aural, electronic, photographic or other means to tap information from personnel, equipment and facilities.
10.  Criminal Activities: like theft.
11.  Search and Seizure: searching personnel or properties.
Top Targeted Technologies:
1.      Information Technology
2.      Electronics
3.      Lasers, Optics and Sensors
4.      Aeronautics
5.      Material Process
6.      Space Systems
7.      Global Positioning Systems
8.      Marine Systems
9.      Information Security
10.  Processing and Manufacturing
There is an extensive list that can be googled under the name "Military Critical Technologies List". Here is a case study on how missile technology is pursued.

Acquiring Missiles Technology:

Missiles are manufactured by civilian companies specialized in military industry. The Department of Defense deals with these companies, so called contractors. For such sensitive technologies, contractors must be reliable and certified. To be more accurate and lethal, missile manufacturers are in continuous search for the best technologies, see Figure 1.
Figure 1. Technologies Used in Missile Systems

In the past years, countries that are developing missiles have been interested in such U.S. missile technologies and sought to acquire them legally or illegally. Here is a case study of one of their methods.
In 2012, someone in Asia sent an email to a missile contractor in Alabama in the United States asking for temperature resistant ceramic standards C1211. After investigation, the contractor found that this person is an employee of a defense company specialized in military systems, electronics and guided weapon systems. The contractor also found that this standard is the same as the military standard MIL STD 1942 ceramic that is used in missile structure.
The above was a piece example on how other pieces are integrated to build the complete system.
U.S. Critical Technology Protection Programs
To protect its critical technology, the U.S. Government (represented by Defense, Defense Security Services, Department of Justice, the intelligence and Homeland security) authorize reliable contractors and thwart foreign ambition to collect secrets information. They enacted many protection programs to protect this technology involving the regulation of export and investigating U.S. companies' acquisitions.  These programs are;
1.       Military Critical Technology Program: Headed by Defense and aims to specify technology that is vital to American military dominance.
2.      Dual-Use Export Control System: Headed by Commerce with members from the Defense, CIA, Energy, Homeland Security and Justice to balance interests and control Exports.
3.      Arms Export Control System: lead by the State with members from Defense, Homeland Security and Justice to regulate exports of arms by U.S. Companies and to give priority to national security and foreign policy. The program maintains munitions list.
4.      Foreign Military Sales Program: Headed by the State and Defense with members from Homeland Security to provide foreign governments with U.S. weapons and services. One of its main objectives is interoperability and lowering the unit cost of weapon systems.
5.      National Disclosure Policy Process: a program where the State, Defense and intelligence community determine when to release classified information, weapons or military technology to foreign governments
6.       Committee on Foreign Investment in the United States: Headed by the Treasury with members from Commerce, Defense, Homeland Security, Justice, State, and offices from the President Executive Office to investigate the effects of foreign investments on national security and to prevent acquisitions that threatens its security.
7.       National Industrial Security Program: Supervised by Defense as a lead with members from other departments and agencies to ensure that contractors, licensees and grantees have the appropriate procedures to protect information under their custody.
8.       Anti-Tamper Policy: Supervised by Defense to prevent or postpone the acquisition or exploitation of weapon system critical technology.
The attack on American technology is relentless and will not stop. The defense to safeguard the technology will also continue. These technologies are the sure way to companies' profit and growth and it is also the way to build any country's military capabilities, confront threats and protect national security.
References:
Defense Security Services.2013. Targeting US Technologies. A trend Analysis of Cleared Industry Reporting. 
United States Government Accountability Office. Protecting Defense Technologies. GAO-13-157. Report to Congressional Committees. January 2013

الأربعاء، 27 أغسطس 2014

الارهاب بين الظالم والمظلوم



عدة تغريدات سابقة جمعتها لكم
 https://twitter.com/raalsaadi/status/499807729591279616

لا يوجد معنى واضح للإرهاب. الفقرات التالية تضع شرح بسيط للإرهاب وتؤكد أن العنف ليس وسيلة حل. 

اذا اردنا ان نمنع ما يطلق عليه الارهاب يجب ان نفهم شخصياته الثلاثة:

الشخصيات الثلاثة:
١. الظالم أو المستبد
٢. المظلوم او المضطهد
٣. المظلوم الظالم

لا يستطيع الظالم ان يعامل المظلوم بعدالة لأنه لا يفهمها ولكن يستطيع المظلوم أن يُعلِّم الظالم كيف يتعامل مع المظلوم

إذا فالظالم والمظلوم يحتاجان بعضيهما بشدة ليخرجا من الأزمة. ونشتق منه ان الحرب على الارهاب مفهوم مفاقم ليس حل

المظلوم الظالم هو المظلوم الذي تمكن من ان يتغلب جزئياً على الظالم وأصبح ظالماً يتصرف بنفس الوحشية

يحتاج المظلوم الظالم إلى اعادة تشكيل الفكر لديه والتعليم وليس بالعنف والقوة


إذاً لدى المظلوم مهمتان: 
الاولى ان يحرر نفسة
والثانية أن يحرر الظالم بمساعدته كيف يعامل المظلوم بعدالة

الجمعة، 9 مايو 2014

EVEN SNAILS HAVE THE RIGHT TO LIVE



EVEN SNAILS HAVE THE RIGHT TO LIVE
A commentary against the West’s misguided anti-terrorism strategy
Dr Rashid Ali Al-Saadi
“… A few really dedicated people can offset the ill effects of masses of out-of-harmony people, so we who work for peace must not falter”The Peace Pilgrim
Once, when my family and I were visiting a friend in Switzerland, my kids started collecting snails in the back garden. My host knew us very well. After seeing the children subject the snails to torture-play, she gathered them together and told them, “Look, even a snail has the right to live – we don’t decide whether snails live or die!” From this brief, but effective lesson my children learned a fundamental tenet of justice: don’t oppress the weak. It is a lesson they still remember and practice.
The Muslim Brotherhood, like any other oppressed group, has a right to live and to determine its own destiny.  We cannot isolate or annihilate them. Not only would it be an impossible task, it would also be a desperate and unsustainable one that defies the lessons we’ve learned from history.
Western countries agree that, for many reasons, terrorist organizations and/or Islamist parties should not be allowed to govern countries in the Arab world. On the face of it, the West appears to be afraid that those nations would, in due course, become enemies (particularly against Israel) and would build up nuclear arsenals that would destabilize the world. However, the more likely reason that the West opposes them is fear of economic loss. Whatever the reason, the West’s strategy is unsustainable, exorbitantly expensive in the long run, and simply misguided. There are more practical and economically effective means to build a better world.
* * *
Since FY 2001, the United States has spent $1.5 trillion fighting “wars against terror”.  The true cost is around $5 trillion due to interest on the debt it accrued and the cost of homeland security and veteran care. Most of the US defense planners or leaders who underestimated the durations of the wars in Iraq and Afghanistan did so in large part because they failed to comprehend what is entailed in dealing with other, complex cultures. Just imagine how the strategies of other American government departments, dependent on the US Department of Defense, were affected socio-economically by such a misjudgment. Because of their commitment to stand by the U.S. in this effort, NATO and the UK were also affected.
While these misjudgments were significant and costly, one of the greatest failures was in understanding why terrorist organizations do what they do in the first place. This understanding may have not only prevented drawn-out wars, but also prevented the attacks that prompted them. But why do these terrorist organizations do what they do? Simply put, they feel oppressed. Members of terrorist groups been gradually dehumanized over the years, and they are, quite naturally, fighting back to restore their lives, values, and dignity. The fight against terrorism has to be ideological and educational, not military. The philosopher Paolo Freire once theorized that if the oppressed succeed in overthrowing the oppressor, they themselves become the oppressor and act with the same cruelty. Freire also posited that oppressors cannot recover from this behavior on their own; only the oppressed can help them learn how to treat others fairly. Therefore, the oppressed have two tasks: one, to liberate themselves, and two, to help liberate their former oppressor. Applied to anti-terrorism, this leads to the realization that the West’s anti-terrorism strategy does not embrace this philosophy – a philosophy that is essential if we are to solve the ongoing struggle with terrorism and end the ‘war’ against it.
Part of the trouble is that the oppressed are not always capable of undertaking this intricate task. To enact it, a facilitator is needed to teach the oppressed how to do it. This facilitator can be anything – a country, an NGO, the United Nations or even a phenomenon, such as globalization. In the case of the Muslim Brotherhood., they, as the oppressed, took power democratically and then began acting in the same way that their predecessor had, becoming the new oppressor. What happened afterwards – the military coup – was categorically wrong, but the Muslim Brotherhood had antagonized the military by trying to prosecute their intelligence heads. Instead, upon taking power, a facilitator should have assisted the Muslim Brotherhood in developing a way to govern the Egyptian people fairly and to deal with the previous regime in a way that was based on the “oppressed philosophy" .
If, for instance, the forces of globalization had, collectively, been “appointed” the facilitator, then the Muslim Brotherhood would have been allowed to continue as a political party, but they would have ultimately failed unless they faced up to the tough issues that are a direct consequence of globalization. This, in turn, would have forced them to make major concessions or change their ideology to some extent to better align it with global norms. Globalization might prompted acceptance of certain Western values like banking principles, women’s liberation, and true democracy. The Muslim Brotherhood would eventually have had to concede the validity of these new ideas. These global norms can be accommodated within Islamic Sharia law, provided that the law is interpreted or changed accordingly. Sharia scholars can use concessions based on contemporary circumstances to rewrite laws to suit these circumstances. The Renaissance Party in Tunisia has faced the same issues, but unlike the Muslim Brotherhood, they accepted certain Western values and still embrace them.
The change in the Muslim Brotherhood’s ideology must be genuine; otherwise, they will come under intense pressure locally from moderates and those affected by the ‘culture of silence will revolt against them. If they continue to ignore this necessity, they will be isolated, the economy will suffer and they will ultimately be replaced. 
The West has tried to encourage the development of new democratic societies. However, actively isolating the Muslim Brotherhood, as is currently happening, will create an oppressed people; this isolation will force them to struggle underground in what will later be called terrorist organizations. Ironically, then, the West will have helped to create these organizations through its anti-terrorism strategies. This is definitely unsustainable.
Researchers over the past decades found pertinent facts about terrorism that support the philosophy of the oppressed. RAND, for example, found that terrorist groups dwindle if they are allowed to participate politically.  Conversely, terrorist groups of 10,000 or more members are victorious more than 25% of the time. Given that the Muslim Brotherhood has a membership in the tens of millions, they are highly likely to succeed. Along the same lines, enraging millions of Muslims has only led to an enormous growth in the number of wanted terrorists since the 1990s. It is vital, then, to recognize that political and economic factors sustain conflicts. Reducing poverty and unemployment, increasing social justice, and stopping corruption will lead to a decent standard of living and reduce resentment. However, the best, most long-term, and evidence-based solution is the creation of democratically elected governments. 
Together, these strategies will substantially reduce terrorism and build harmonious societies. Only a very small number of extreme and uncritical enthusiasts or zealots will remain who will need to be controlled by government police and intelligence agencies. That's it!
* * *

The Dalai Lama put it this way: “All that is necessary is for each of us to develop our good human qualities.” We need to be able to instill values in younger generations through liberatory education, which will also rescue them from the ignorance and illiteracy that would make them targets for extremism. We also need to allow nations to aspire to freedom and dignity by allowing them to publicize their experiences and interact with the rest of the world. Eventually, as Paolo Freire explains, they will help us to understand how to treat them better – just as my kids learned about how to treat the oppressed from the snails.