agosto 10, 2009

‘O jogo duplo da Turquia na segurança energética da UE‘ in EUObserver


Turkey has agreed to grant access to Russia's South Stream gas pipeline through its part of the Black Sea, in a move which could hurt the prospects of an EU-backed project to reduce Russian energy dependency.

The Turkish deal is a major breakthrough for the Russian pipeline, which has to cross the maritime economic areas of either Turkey or Ukraine, but with Ukraine very unlikely to give consent.

At a signing ceremony in Ankara on Thursday (6 August), Russian prime minister Vladimir Putin and his Turkish counterpart, Recep Tayyip Erdogan, insisted that South Stream is not a rival to the EU-backed Nabucco pipeline project.

"Even with the construction of South Stream, Nabucco will not be closed," Mr Putin said at a news conference. "The more infrastructure projects, the better, because that will create reliability and stability of energy supply to Europe."

The European Commission also officially rejects the idea the two projects are in competition.

"We consider [South Stream] a complementary initiative to our ongoing Nabucco efforts," commission spokesman Martin Selmayr said at a press briefing in Brussels.

South Stream is designed to bring more Russian gas under the Black Sea to Bulgaria and Italy. Nabucco is to bring gas from Caspian Sea area countries to Europe via Turkey, bypassing Russia.

Experts warn that if South Stream is built the EU will be forced to buy Caspian gas at a much higher price, however.

"I argue that if South Stream is built, Nabucco will not be, at least not for Caspian gas," Zeyno Baran, a Turkish-American energy expert with the Washington-based Hudson Institute, told Euobserver.

"If South Stream is built, all that Caspian gas is going to pour into it. Nabucco is important not only for diversifying Europe's needs, but it's also freeing the Central Asian countries and the Caucasian countries from the hold of Russia. Now with this, Turkey sent a signal, whether it to wanted or not, that it doesn't really care about those countries, it just cares about becoming a gas hub."

Turkey just last month signed a legal framework agreement for Nabucco, raising hopes of the country's strategic backing of EU energy security interests.

"Europeans need to really understand what's going on in Turkey, how close it has gotten to Russia as opposed to Europe and the US," Ms Baran said.

In terms of geopolitical impact, South Stream would reduce the importance of Ukraine's transit pipeline network, which currently ships 80 percent of Russian gas to the EU.

The new situation would make it easier for Moscow to exert political pressure on Kiev by raising the price of its gas exports to Ukraine without the fear of a potential knock-on effect on its EU customers.

If South Stream is built before Nabucco, it could also see Azerbaijan sell its extra gas into the Russian pipeline, damaging prospects for Georgia's independence.

Georgia currently buys all its gas from Azerbaijan, with the country being forced to go back to Russian suppliers if its Azeri channels were blocked.

In a parallel development highlighting Russia's attitude to the energy sector, Mr Putin on Thursday also signed an executive order definitively rejecting the country's participation in the Energy Charter Treaty.

The 1991 multilateral agreement is designed to help EU companies invest in Russian energy firms and to grant access to Russia's vast pipeline system, effectively breaking its monopoly on Caspian zone exports.

http://euobserver.com/9/28530?print=1

JPTF 2009/08/10

agosto 03, 2009

Iraque: a ciberguerra que não chegou a ser


por John Markoff e Tom Shanker

It would have been the most far-reaching case of computer sabotage in history. In 2003, the Pentagon and American intelligence agencies made plans for a cyberattack to freeze billions of dollars in the bank accounts of Saddam Hussein and cripple his government’s financial system before the United States invaded Iraq. He would have no money for war supplies. No money to pay troops.

“We knew we could pull it off — we had the tools,” said one senior official who worked at the Pentagon when the highly classified plan was developed.

But the attack never got the green light. Bush administration officials worried that the effects would not be limited to Iraq but would instead create worldwide financial havoc, spreading across the Middle East to Europe and perhaps to the United States.

Fears of such collateral damage are at the heart of the debate as the Obama administration and its Pentagon leadership struggle to develop rules and tactics for carrying out attacks in cyberspace.

While the Bush administration seriously studied computer-network attacks, the Obama administration is the first to elevate cybersecurity — both defending American computer networks and attacking those of adversaries — to the level of a White House director, whose appointment is expected in coming weeks.

But senior White House officials remain so concerned about the risks of unintended harm to civilians and damage to civilian infrastructure in an attack on computer networks that they decline any official comment on the topic. And senior Defense Department officials and military officers directly involved in planning for the Pentagon’s new “cybercommand” acknowledge that the risk of collateral damage is one of their chief concerns.

“We are deeply concerned about the second- and third-order effects of certain types of computer network operations, as well as about laws of war that require attacks be proportional to the threat,” said one senior officer.

This officer, who like others spoke on the condition of anonymity because of the classified nature of the work, also acknowledged that these concerns had restrained the military from carrying out a number of proposed missions. “In some ways, we are self-deterred today because we really haven’t answered that yet in the world of cyber,” the officer said.

In interviews over recent weeks, a number of current and retired White House officials, Pentagon civilians and military officers disclosed details of classified missions — some only considered and some put into action — that illustrate why this issue is so difficult.

Although the digital attack on Iraq’s financial system was not carried out, the American military and its partners in the intelligence agencies did receive approval to cripple Iraq’s military and government communications systems in the early hours of the war in 2003. And that attack did produce collateral damage.

Besides blowing up cellphone towers and communications grids, the offensive included electronic jamming and digital attacks against Iraq’s telephone networks. American officials also contacted international communications companies that provided satellite phone and cellphone coverage to Iraq to alert them to possible jamming and to ask their assistance in turning off certain channels.

Officials now acknowledge that the communications offensive temporarily disrupted telephone service in countries around Iraq that shared its cellphone and satellite telephone systems. That limited damage was deemed acceptable by the Bush administration.

Another such event took place in the late 1990s, according to a former military researcher. The American military attacked a Serbian telecommunications network and accidentally affected the Intelsat satellite communications system, whose service was hampered for several days.

These missions, which remain highly classified, are being scrutinized today as the Obama administration and the Pentagon move into new arenas of cyberoperations. Few details have been reported previously; mention of the proposal for a digital offensive against Iraq’s financial and banking systems appeared with little notice on Newsmax.com, a news Web site, in 2003.

The government concerns evoke those at the dawn of the nuclear era, when questions of military effectiveness, legality and morality were raised about radiation spreading to civilians far beyond any zone of combat.

“If you don’t know the consequences of a counterstrike against innocent third parties, it makes it very difficult to authorize one,” said James Lewis, a cyberwarfare specialist at the Center for Strategic and International Studies in Washington.

But some military strategists argue that these uncertainties have led to excess caution on the part of Pentagon planners.

“Policy makers are tremendously sensitive to collateral damage by virtual weapons, but not nearly sensitive enough to damage by kinetic” — conventional — “weapons,” said John Arquilla, an expert in military strategy at the Naval Postgraduate School in Monterey, Calif. “The cyberwarriors are held back by extremely restrictive rules of engagement.”

Despite analogies that have been drawn between biological weapons and cyberweapons, Mr. Arquilla argues that “cyberweapons are disruptive and not destructive.”

That view is challenged by some legal and technical experts.

“It’s virtually certain that there will be unintended consequences,” said Herbert Lin, a senior scientist at the National Research Council and author of a recent report on offensive cyberwarfare. “If you don’t know what a computer you attack is doing, you could do something bad.”

Mark Seiden, a Silicon Valley computer security specialist who was a co-author of the National Research Council report, said, “The chances are very high that you will inevitably hit civilian targets — the worst-case scenario is taking out a hospital which is sharing a network with some other agency.”

And while such attacks are unlikely to leave smoking craters, electronic attacks on communications networks and data centers could have broader, life-threatening consequences where power grids and critical infrastructure like water treatment plants are increasingly controlled by computer networks.

Over the centuries, rules governing combat have been drawn together in customary practice as well as official legal documents, like the Geneva Conventions and the United Nations Charter. These laws govern when it is legitimate to go to war, and set rules for how any conflict may be waged.

Two traditional military limits now are being applied to cyberwar: proportionality, which is a rule that, in layman’s terms, argues that if you slap me, I cannot blow up your house; and collateral damage, which requires militaries to limit civilian deaths and injuries.

“Cyberwar is problematic from the point of view of the laws of war,” said Jack L. Goldsmith, a professor at Harvard Law School. “The U.N. Charter basically says that a nation cannot use force against the territorial integrity or political independence of any other nation. But what kinds of cyberattacks count as force is a hard question, because force is not clearly defined.”

http://www.nytimes.com/2009/08/02/us/politics/02cyber.html?_r=2&scp=4&sq=irak%20war&st=cse

JPTF 2009/08/03