Tag Archives: Medill DC

Will a new China-led investment bank be a responsible stakeholder environmentally? Experts weigh in

WASHINGTON — After several European allies applied to join the Asian Infrastructure Investment Bank this week, U.S. officials have begun to soften their critical view on the China-backed initiative.

“We do not ask any country to choose ties with the U.S. to the exclusion of anyone else,” Deputy Secretary of the State Tony Blinken said Tuesday in a speech at the Brookings Institution, the centrist think tank.

Tony Blinken talks about China’s role in Central Asia development

Blinken restated the White House’s earlier concerns about the standards the China-backed will use for making decisions. Treasury Secretary Jack Lew also remarked at a congressional hearing last week that anyone joining the AIIB need to ask those questions.

The AIIB’s operation plan won’t be revealed until later this year. But it is said the bank will model itself after existing development banks, giving founding members the most voting power. China will also reportedly give up veto power, which eased concerns from many countries.

Blinken worries the AIIB could “dilute the standard” of existing institutions

On one front, the environment, the AIIB is not a copy of World Bank

In the “Environmental and Social Framework” released last June, the World Bank sets specific requirements on labor and working conditions, resource efficiency and pollution protection, community health and safety, and three other categories of environmental and social standards. All are mandatory in order to reduce poverty and increase prosperity in a sustainable manner worldwide, the World Bank asserts.

Chen Bin, a commentator in the outspoken Chinese newspaper, Southern Weekly, however, said it’s “inconsiderate” to ask AIIB to stick to and carry out these criteria.

China’s Finance Minister Lou Jiwei said at a recent Asian-Pacific Economic Cooperation meeting that the bank is aimed at promoting connectivity among Asian countries, through commercial infrastructure investment instead of poverty reduction.

Largely commercial, AIIB sets itself apart from the World Bank and the Asian Development Bank, led by Japan, both committed to public welfare. This leaves more space as well as questions in how the bank will select the programs and infrastructures in which to invest.

“The World Bank and other existing multilateral development assistance organizations have strong rules to promote sustainable and inclusive growth,” said Scott Kennedy, director of Project on Chinese Business & Political Economy at the Center for Strategic and International Studies. “China’s bilateral foreign assistance to date is filled with examples where there has been insufficient attention to protecting the environment and ensuring safe and fair treatment of workers. And a substantial portion of this aid has benefitted Chinese companies. Hence, there is good reason to have some concerns about how the AIIB will operate,” he said.

AIIB currently has 30 prospective founding members, including Great Britain, France, Germany and Italy. Seventeen other countries and regions, including Australia and Taiwan, have yet to be approved. The final list will be confirmed on April 15.

Retired officer: US let ISIS gain foothold in Iraq

David Gregory (left) moderates a discussion concerning the rise of ISIS with retired Army Col. Peter Mansoor at American University on Wednesday, April 8. Mansoor said that the takeover of ISIS is a direct result of the U.S. decision to invade, and then leave Iraq in the 2000s: “Al-Qaida was defeated during the surge in 2007-2008 – not destroyed.” (Mary Cirincione/MEDILL)

David Gregory (left) moderates a discussion concerning the rise of ISIS with retired Army Col. Peter Mansoor at American University on Wednesday, April 8. Mansoor said that the takeover of ISIS is a direct result of the U.S. decision to invade, and then leave Iraq in the 2000s: “Al-Qaida was defeated during the surge in 2007-2008 – not destroyed.” (Mary Cirincione/MEDILL)

Whatever headway the U.S. gained in Iraq following the 2007 surge has for the most part come undone — paving the way for the rise of the self-described Islamic State.

That’s the assessment of retired Army Col. Peter Mansoor, who had a front-row seat for the surge in his capacity as executive officer to retired Army Gen. David Petraeus in Iraq from 2007 to 2008, the culmination of Mansoor’s 26-year Army career.

When the last U.S. troops left Iraq on Dec. 18, 2011, following several years of drawdowns, al-Qaida was defeated, but was not irrevocably destroyed.

“We had al-Qaida down on the 10-count, and we let it off the mat,” Mansoor said.

And, he added, from those not-quite-extinguished ashes rose the Islamic State, also known as ISIS or ISIL.

Continue reading

Encryption Becomes a Part of Journalists’ Toolkit

TEXT AND PHOTOS BY J. ZACH HOLLO FOR THE GROUNDTRUTH PROJECT & REPRINTED WITH PERMISSION.

WASHINGTON — When whistleblower Edward Snowden used an email encryption program called PGP to contact documentary filmmaker Laura Poitras, only a tiny fraction of journalists used it. The precaution, designed to scramble messages so only the sender and receiver can read them, was essential for Snowden to leak the information.

The series of stories that followed shocked the world and radically altered the way people think about government surveillance and the Internet. Now, encryption is becoming a standard item of the journalism toolkit, a must-have for anyone hoping to report on sensitive issues that might upset institutions of power. It was also the subject of a workshop recently held at Northwestern’s Medill newsroom in Washington, DC, which walked about 15 journalists through the basic software installations involved in setting up PGP, which is short for “Pretty Good Privacy” and ironically named after a grocery store in Garrison Keillor’s fictional town of Lake Wobegon.

Aaron Rinehart displays the GPG encryption download suite for those at the workshop to follow along. (J. Zach Hollo/THE GROUNDTRUTH PROJECT)

Aaron Rinehart displays the GPG encryption download suite for those at the workshop to follow along. (J. Zach Hollo/THE GROUNDTRUTH PROJECT)

For Aaron Rinehart, one of the workshop’s leaders, the goal is to protect the relationship between journalists and their sources, “to get journalists confident using these tools so sources feel they can give them information safely,” said Rinehart. Without that possibility, he said, the Fourth Estate could be fundamentally crippled.

And it’s not just the NSA journalists and sources need to protect themselves from, warned Rinehart. He used an example of a story exposing pharmaceutical malpractice. “It’s not that sexy of an issue, right? But just think of the potential adversaries.” There’s the government whose regulators screwed up, the drug companies who are poisoning people, and their stakeholders who don’t want to lose profits. With any story, there are likely a host of people who want to hack the journalist and sources to prevent the information from being aired.

The workshop was taught by Rinehart and digital security advisers David Reese and Ferdous Al-Faruque. Rinehart and Reese recently founded TestBed Inc., a technology consulting company. And Al-Faruque is a master’s journalism student at the University of Missouri who said he wants to establish a class there on encryption and cyber security.

Rinehart, who spent time in Djibouti while serving in the Marine Corps, said his motivation for putting on the workshop came from a time when journalism salvaged his college career. “The media saved me,” he said. About a decade ago, Rinehart faced a bureaucratic nightmare at the University of Missouri, when he returned from serving abroad and was not permitted to complete his studies. A local paper led an investigation into the problems veterans were having there, and the university changed policies. Since then, Rinehart said he tries to do all he can to help journalists.

Of the reporters who attended, many are intent on investigative work like the kind that exposed the NSA’s mass, indiscriminate surveillance. “Since I cover national security and defense, I would definitely use this to coax sources to communicate with me or send me documents that they don’t want their government or our government to see or know about,” said Kristina Wong, a reporter for The Hill.

But others also attended, including a cryptologist who said he comes to events like this out of professional interest, and a human rights worker.

“In a lot of countries, activists and human rights defenders especially are really targeted,” said Sarah Kinosian, who monitors American security assistance in Latin America for the Center for International Policy. “So we want to make sure [victims] can pass documentation to us in a safe way.”

The workshop began with Rinehart and Reese playing a segment of Citizen Four, Poitras’s documentary on Snowden and government surveillance that recently won an academy award.

“I would like to confirm out of email that the keys we exchanged were not intercepted and replaced by your surveillance,” a narrator said, reading Snowden’s correspondence with Poitras as a line of ominous tunnel light split darkness on the screen. “Please confirm that no one has ever had a copy of your private key and that it uses a strong passphrase.” Rinehart interjected: “That is what we will be teaching you today.”

He then spoke for a while on the importance of responsible password management, recommending a program called KeePass, before moving on to downloading email client software and installing extensions designed to encrypt communications.

The way it works can seem daunting and complex, especially for anyone not tech-savvy. The email extension, called GPG or PGP, generates both a public and private key for each user. When PGP is used to send an email, the sender uses the receiver’s public key to encrypt the contents of the email so only the receiver’s private key can decrypt it.

Also on the other end, the receiver can see that the sender’s identity is confirmed. A public key is just what it sounds like: something meant to be made public along with an email address so the owner can be contacted by anyone. The private key must be kept secret by the owner, and is used to decrypt messages sent using his or her public key.

In essence, it’s is the same concept of an email. Anyone can send a message to someone but only that someone can read it. But encryption makes it nearly impossible for that message to be intercepted. And while subpoenas can force Google or Yahoo to turn over peoples’ emails, PGP makes it impossible for Google and Yahoo to read the messages, so they’d be turning over incoherent nonsense (although it is still possible to see who the sender and receiver are, and the subject line of the email is not encrypted. Ergo, aliases are commonly used once initial contact is made).

Click here to see my public key.

Encryption’s complexity has deterred it from becoming widespread, even in newsrooms. “At The Hill, not many people use it at all,” said Wong, something many would deem troublesome given the publication’s focus on politics and aim to bring transparency to Washington.

But most people agree the complexity is in the technical details behind the process, not in its application. “The world of cryptology and algorithms and coding that goes into encryption tools is difficult for just about anyone to comprehend,” Rinehart said. “But using the tools is quite simple for people who take the time to learn.”

While the majority journalists still do not use encryption, it is becoming common practice for many organizations who do investigative work. The New Yorker, The Intercept, Washington Post, and ProPublica are a few of the early sign-ons for Secure Drop, a new encryption system for journalists designed by the Freedom of the Press Foundation and originally coded by Kevin Poulsen and the late Aaron Swartz. Gawker is another publication that uses it, showing encryption may become more widespread for groups focused on less hard-hitting subjects as well.

[Editor’s note: This piece originally appeared in The Huffington Post.]