Photo of Manuela Picq being arrested. Photo used with permission.
Over the weekend news came from Ecuador that Dr Manuela Picq of Universidad San Francisco de Quito, had been beaten and arrested while participating in a legal protest over indigenous rights as a journalist. Initially hospitalised as a result of injuries sustained at the hands of police, she was informed that her visa had been cancelled due to her having engaged in “political activity” and that she would be deported from Ecuador, where she has lived and worked for the past eight years. She is currently being held in a hotel that is used to detain illegal immigrants until her case is heard this afternoon.
[UPDATE: Manuela has been released after the judge ruled that her arrest was not justified and detention unreasonable.]
Once news had broken, the reaction has been swift and condemnatory from activists and academics alike. A petition on Change.org calling for Manuela’s deportation to be halted has gathered more than 6,000 signatures at the time of writing, letters of support are being sent to President Correa and his government, and a protest has been held in Ecuador.
Gamification is “is the application of game elements and digital game design techniques to non-game problems, such as business and social impact challenges”, to borrow the course description from The Wharton School of the University of Pennsylvania’s Gamification MOOC.
The approach has been used to try and improve employee productivity, facilitate risk prevention education (and indeed many other forms of education) , resolve social conflict, and, perhaps less surprisingly, in marketing. And just in case you thought there were any contexts in which gamification couldn’t be used, militaries are already in on the act, with both the US military and the Israeli Defence Force using it to try and cultivate favourable attitudes and support and get their message out to target audiences. Gamifiying conflict by militaries was always going to be controversial, especially when they’re actively engaged in warfare as the IDF discovered in 2012, although gamification guru Yu-kai Chou argues that this is actually just coming full circle given that most games are predicated on mimicking the essential characteristics of war in the first place.
But if trying to make war appealing and “fun” will strike many people as a negative (or at least highly pragmatic) use of gamification, what about efforts aimed at highlighting the horrors of war? Helen Berents recently responded to the release of a viral advert from UK charity War Child that is designed to raise awareness of children’s experiences of conflict. Using Storify, this post presents the debate that ensued (minus the bit that happened on Facebook, which I’ll leave Helen to summarise), and considers the role and efficacy of emotion in trying to mobilize people in support of a particular cause.
[As two fellow NGO researchers, Wendy and Maryam are going to collaborate on some posts to provide contrasting views on hot-button issues related to NGOs. Think of us as the Siskel and Ebert of
NGOs – we definitely agree on certain things, but clearly not on others (and don’t ask who’s who). Our points of view will not always reflect what we personally think of an issue–we need drama and suspense!–but we will always provide food for thought.]
By now everyone is well aware of the recent tragic killing of Cecil the lion by Minnesota dentist Walter Palmer. Josh shared a post about this incident here on the Duck, as have countless others. One opinion from People for the Ethical Treatment of Animals’ (PETA), no stranger to controversial statement, has caught plenty of attention:
“If, as has been reported, this dentist and his guides lured Cecil out of the park with food so as to shoot him on private property, because shooting him in the park would have been illegal, he needs to be extradited, charged, and, preferably, hanged.”
Needless to say, calling for Palmer to be hanged has generated a public outcry of its own. We weigh in here.
It’s All About Strategy and Positioning
PETA calls for Walter Palmer to be hanged. Offensive? Yes. But it is doing what we expect groups like PETA to do. The PETAs of the world play a very important role in the world of global activism and international nongovernmental organizations (INGOs) – they make some outlandish statements, they embark on ambitious (perhaps even wacky) projects, but these actions mark clear distinctions between types of INGOs: even if INGOs are a class of actor, they often adopt very different means to approach the same concern. PETA’s role is to stay outside of the mainstream, to do what other INGOs won’t do. Continue reading
I never thought that when I started grad school I’d be relocating to another country. Then again, when I got the job in Canada, it did not really occur to me that I was “really” leaving the US – on my previous visits to Toronto, everything felt pretty familiar. Plus, as a scholar of transnational activism, borders were supposed to be made increasingly irrelevant. I still remember the moment the border agent stamped my passport and glued the work permit into its folds. I had actually crossed a border for my job – politically, socially, and culturally.
While many things are the same, functionally, between the US and Canada in terms of academic life, here are a few things that I’ve noticed in my time in Toronto, some of which perhaps resonate with other abroad-Americans here and elsewhere. Continue reading
I have yet to weigh in on the recent hack on the Office of Personnel Management (OPM). Mostly this is due to two reasons. First is the obvious one for an academic: it is summer! But the second, well, that is due to the fact that as most cyber events go, this one continues to unfold. When we learned of the OPM hack earlier this month, the initial figures were 4 million records. That is, 4 million present and former government employees’ personal records were compromised. This week, we’ve learned that it is more like 18 million. While some argue that this hack is not something to be worried about, others are less sanguine. The truth of the matter is, we really don’t know. Coming out on one side or the other is a bit premature. The hack could be state-sponsored, where the data is squirreled away in a foreign intelligence agency. Or it could be state-sponsored, but the data could be sold off to high bidders on the darknet. Right now, it is too early to tell.
What I would like to discuss, however, is what the OPM hack—and many recent others like the Anthem hack—show in relation to thinking about cybersecurity and cyber “deterrence.” Deterrence as any IR scholar knows is about getting one’s adversary to not undertake some action or behavior. It’s about keeping the status quo. When it comes to cyber-deterrence, though, we are left with serious questions about this simple concept. Foremost amongst them is: Deterrence from what? All hacking? Data theft? Infrastructure damage? Critical infrastructure damage? What is the status quo? The new cybersecurity strategy released by the DoD in April is of little help. It merely states that the DoD wants to deter states and non-state actors from conducting “cyberattacks against U.S. interests” (10). Yet this is pretty vague. What counts as a U.S. interest?
With much attention being given to the passage of the 2015 USA Freedom Act, there is some odd silence about what the bill actually contains. Pundits from every corner identify the demise of section 215 of the Patriot Act (the section that permits the government to acquire and obtain bulk telephony meta data). While the bill does in fact do this, now requiring a “specific selection term” to be utilized instead of bulk general trolling, and it hands over the holding of such data to the agents who hold it anyway (the private companies). Indeed, the new Freedom Act even “permits” amicus curiae for the Foreign Surveillance and Intelligence Court, though the judges of the court are not required to have the curiae present and can block their participation if they deem it reasonable. In any event, while some ring in the “win” for Edward Snowden and privacy rights, another interesting piece of this bill has passed virtually unnoticed: extending “maritime safety” rights and enacting specific provisions against nuclear terrorism.
The Department of Defense’s (DoD) new Cyber Strategy is a refinement of past attempts at codifying and understanding the “new terrain” of cybersecurity threats to the United States. While I actually applaud many of the acknowledgements in the new Strategy, I am still highly skeptical of the DoD’s ability to translate words to deeds. In particular, I am so because the entire Strategy is premised on the fact that the “DoD cannot defend every network and system against every kind of intrusion” because the “total network attack surface is too large to defend against all threats and too vast to close all vulnerabilities (13).
Juxtapose this fact to the statement that “from 2013-2015, the Director of National Intelligence named the cyber threat as the number one strategic threat to the United States, placing it ahead of terrorism for the first time since the attacks of September 11, 2001.” (9). What we have, then, is the admission that the cyber threat is the top “strategic” –not private, individual or criminal—threat to the United States, and it cannot defend against it. The Strategy thus requires partnerships with the private sector and key allies to aid in the DoD’s fight. Here is the rub though: private industry is skeptical of the US government’s attempt to court it and many of the US’s key allies do not trust much of what Washington says. Moreover, my skepticism is furthered by the simple fact that one cannot read the Strategy in isolation. Rather, one must take it in conjunction with other policies and measures, in particular Presidential Policy Directive 20 (PPD 20), H.R. 1560 “Protecting Cyber Networks Act”, and the sometimes forgotten Patriot Act.
Last week Joe Scarborough from Politico raised the question of why US foreign policy in the Middle East is in “disarray.” Citing all of the turmoil from the past 14 years, he posits that both Obama and Bush’s decisions for the region are driven by “blind ideology [rather] than sound reason.” Scarborough wonders what historians will say about these policies in the future, but what he fails to realize is that observers of foreign policy and strategic studies need not wait for the future to explain the decisions of the past two sitting presidents. The strategic considerations that shaped not merely US foreign policy, but also US grand strategy, reach back farther than Bush’s first term in office.
Understanding why George W. Bush (Bush 43) engaged US forces in Iraq is a complex history that many academics would say requires at least a foray into operational code analysis of his decision making (Renshon, 2008). This position is certainly true, but it too would be insufficient to explain the current strategic setting faced by the US because it would ignore the Gulf War of 1991. What is more, understanding this war requires reaching back to the early 1980s and the US Cold War AirLand Battle strategy. Thus for us to really answer Scarborough’s question about current US foreign policy, we must look back over 30 years to the beginnings of the Reagan administration.