academic and careers

Responsible innovation: A primer for policymakers


Technical change is advancing at a breakneck speed while the institutions that govern innovative activity slog forward trying to keep pace. The lag has created a need for reform in the governance of innovation. Reformers who focus primarily on the social benefits of innovation propose to unmoor the innovative forces of the market. Conversely, those who deal mostly with innovation’s social costs wish to constrain it by introducing regulations in advance of technological developments. In this paper, Walter Valdivia and David Guston argue for a different approach to reform the governance of innovation that they call "Responsible Innovation" because it seeks to imbue in the actors of the innovation system a more robust sense of individual and collective responsibility.

Responsible innovation appreciates the power of free markets in organizing innovation and realizing social expectations but is self-conscious about the social costs that markets do not internalize. At the same time, the actions it recommends do not seek to slow down innovation because they do not constrain the set of options for researchers and businesses, they expand it. Responsible innovation is not a doctrine of regulation and much less an instantiation of the precautionary principle. Innovation and society can evolve down several paths and the path forward is to some extent open to collective choice. The aim of a responsible governance of innovation is to make that choice more consonant with democratic principles.

Valdivia and Guston illustrate how responsible innovation can be implemented with three practical initiatives: 

  1. Industry: Incorporating values and motivations to innovation decisions that go beyond the profit motive could help industry take on a long-view of those decisions and better manage its own costs associated with liability and regulation, while reducing the social cost of negative externalities. Consequently, responsible innovation should be an integral part of corporate social responsibility, considering that the latter has already become part of the language of business, from the classroom to the board room, and that is effectively shaping, in some quarters, corporate policies and decisions.
  2. Universities and National Laboratories: Centers for Responsible Innovation, fashioned after the institutional reform of Internal Review Boards to protect human subjects in research and the Offices of Technology Transfer created to commercialize academic research, could organize existing responsible innovation efforts at university and laboratory campuses. These Centers would formalize the consideration of impacts of research proposals on legal and regulatory frameworks, economic opportunity and inequality, sustainable development and the environment, as well as ethical questions beyond the integrity of research subjects.
  3. Federal Government: Federal policy should improve its protections and support of scientific research while providing mechanisms of public accountability for research funding agencies and their contractors. Demanding a return on investment for every research grant is a misguided approach that devalues research and undermines trust between Congress and the scientific community. At the same time, scientific institutions and their advocates should improve public engagement and demonstrate their willingness and ability to be responsive to societal concerns and expectations about the public research agenda. Second, if scientific research is a public good, by definition, markets are not effective commercializing it. New mechanisms to develop practical applications from federal research with little market appeal should be introduced to counterbalance the emphasis the current technology transfer system places on research ready for the market. Third, federal innovation policy needs to be better coordinated with other federal policy, including tax, industrial, and trade policy as well as regulatory regimes. It should also improve coordination with initiatives at the local and state level to improve the outcomes of innovation for each region, state, and metro area.

Downloads

Authors

     
 
 




academic and careers

NASA considers public values in its Asteroid Initiative


NASA’s Asteroid Initiative encompasses efforts for the human exploration of asteroids—as well as the Asteroid Grand Challenge—to enhance asteroid detection capabilities and mitigate their threat to Earth. The human space flight portion of the initiative primarily includes the Asteroid Redirect Mission (ARM), which is a proposal to put an asteroid in orbit of the moon and send astronauts to it. The program originally contemplated two alternatives for closer study: capturing a small 10m diameter asteroid versus simply recovering a boulder from a much larger asteroid. Late in March, NASA offered an update of its plans. It has decided to retrieve a boulder from an asteroid near Earth’s orbit—candidates are the asteroids 2008 EV5, Bennu, and Itokawa—and will place the boulder on the moon’s orbit to further study it.

This mission will help NASA develop a host of technical capabilities. For instance, Solar Electric Propulsion uses solar electric power to charge atoms for spacecraft propulsion—in the absence of gravity, even a modicum of force can alter the trajectory of a body in outer space. Another related capability under development is the gravity tractor, which is based on the notion that even the modest mass of a spacecraft can exert sufficient gravitational force over an asteroid to ever so slightly change its orbit. The ARM spacecraft mass could be further increased by its ability to capture a boulder from the asteroid that is steering clear of the Earth, enabling a test of how humans might prevent asteroid threats in the future. Thus, NASA will have a second test of how to deflect near-Earth objects on a hazardous trajectory. The first test, implemented as part of the Deep Impact Mission, is a kinetic impactor; that is, crashing a spacecraft on an approaching object to change its trajectory.

The Asteroid Initiative is a partner of the agency’s Near Earth Object Observation (NEOO) program. The goal of this program is to discover and monitor space objects traveling on a trajectory that could pose the risk of hitting Earth with catastrophic effects. The program also seeks to develop mitigation strategies. The capabilities developed by ARM could also support other programs of NASA, such as the manned exploration of Mars.

NEOO has recently enjoyed an uptick of public support. It used to be funded at about $4 million in the 1990s and in 2010 was allocated a paltry $6 million. But then, a redirection of priorities—linked to the transition from the Bush to the Obama administrations—increased funding for NEOO to about $20 million in 2012 and $40 million in 2014—and NASA is seeking $50 million for 2015. It is clear that NASA officials made a compelling case for the importance of NEOO; in fact, what they are asking seems quite a modest amount if indeed asteroids pose an existential risk to life on earth. At the same time, the instrumental importance of the program and the public funds devoted to it beg the question as to whether taxpayers should have a say in the decisions NASA is making regarding how to proceed with the program.

NASA has done something remarkable to help answer this question.

Last November, NASA partnered with the ECAST network (Expert and Citizen Assessment of Science and Technology) to host a citizen forum assessing the Asteroid Initiative. ECAST is a consortium of science policy and advocacy organizations which specializes in citizen deliberations on science policy. The forum consisted of a dialogue with 100 citizens in Phoenix and Boston who learned more about the asteroid initiative and then commented on various aspects of the project.

The participants, who were selected to approximate the demographics of the U.S. population, were asked to assess mitigation strategies to protect against asteroids. They were introduced to four strategies: civil defense, gravity tractor, kinetic impactor, and nuclear blast deflection. As part of the deliberations, they were asked to consider the two aforementioned approaches to perform ARM. A consensus emerged about the boulder retrieval option primarily because citizens thought that option offered better prospects for developing planetary defense technologies.  This preference existed despite the excitement of capturing a full asteroid, which could potentially have additional economic impacts. The participants showed interest in promoting the development of mitigation capabilities at least as much as they wanted to protect traditional NASA goals such as the advancement of science and space flight technology. This is not surprising given that concerns about doomsday should reasonably take precedence over traditional research and exploration concerns.

NASA could have decided to set ARM along the path of boulder retrieval exclusively on technical merits, but having conducted a citizen forum, the agency is now able to claim that this decision is also socially robust, which is to say, is responsive to public values of consensus. In this manner, NASA has shown a promising method by which research mission federal agencies can increase their public accountability.

In the same spirit of responsible research and innovation, a recent Brookings paper I authored with David Guston—who is a co-founder of ECAST—proposes a number of other innovative ways in which the innovation enterprise can be made more responsive to public values and social expectations.

Kudos to NASA for being at the forefront of innovation in space exploration and public accountability.

Image Source: © Handout . / Reuters
     
 
 




academic and careers

The politics of federal R&D: A punctuated equilibrium analysis


The fiscal budget has become a casualty of political polarization and even functions that had enjoyed bipartisan support, like research and development (R&D), are becoming divisive issues on Capitol Hill. As a result, federal R&D is likely to grow pegged to inflation or worse, decline.

With the size of the pie fixed or shrinking, requests for R&D funding increases will trigger an inter-agency zero-sum game that will play out as pointless comparisons of agencies’ merit, or worse, as a contest to attract the favor of Congress or the White House. This insidious politics will be made even more so by the growing tendency of equating public accountability with the measurement of performance. Political polarization, tight budgets, and pressure for quantifiable results threaten to undermine the sustainability of public R&D. The situation begs the question: What can federal agencies do to deal with the changing politics of federal R&D?

In a new paper, Walter D. Valdivia and Benjamin Y. Clark apply punctuated equilibrium theory to examine the last four decades of federal R&D, both at the aggregate and the agency level. Valdivia and Clark observe a general upward trend driven by gradual increases. In turn, budget leaps or punctuations are few and far in between and do no appear to have lasting effects. As the politics of R&D are stirred up, federal departments and agencies are sure to find that proposing punctuations is becoming more costly and risky. Consequently, agencies will be well advised in securing stable growth in their R&D budgets in the long run rather than pushing for short term budget leaps.

While appropriations history would suggest the stability of R&D spending resulted from the character of the budget politics, in the future, stability will need the stewardship of R&D champions who work to institutionalize gradualism, this time, in spite of the politics.

Downloads

Authors

      
 
 




academic and careers

Federal R&D: Why is defense dominant yet less talked about?


Federal departments and agencies received just above $133 billion in R&D funds in 2013. To put that figure in perspective, World Bank data for 2013 shows that, 130 countries had a GDP below that level; U.S. R&D is larger than the entire economy of 60 percent of all countries in the world.

The chart below shows how those funds are allocated among the most important federal departments and agencies in terms of R&D.

Those looking at these figures for the first time may be surprised to see that the Department of Defense takes about half of the pie. It should be noted however that not all federal R&D is destined to preserve U.S. military preeminence in the world. From non-defense research, 42 percent is destined to the much-needed research conducted by the National Institutes of Health, 17 percent to the research of the Department of Energy—owner of 17 celebrated national laboratories—16 percent for space exploration, and 8 percent for understanding the natural and social worlds at a fundamental level. The balance category is only lumped together for visual display not for its importance; it includes for instance the significant work of the National Oceanic and Atmospheric Administration and the National Institute of Standards and Technology.

Despite the impressive size of defense R&D, we hear little about it. While much of defense research and development is classified, in time, civilian applications find their way into mainstream commercial uses—the Internet and GPS emerged from research done at DARPA. Far more visible than defense R&D is biomedical research, clean energy research, or news about truly impressive discoveries either in distant galaxies or in the depths of our oceans.

What produces this asymmetry of visibility of federal R&D work?

In a recent Brookings paper, a colleague and I suggest that the answer lies in the prominence of R&D in the agencies’ accounting books. In short: How visible is R&D and how much the agency seeks to discuss it in public fora depends not on the relative importance, but on how large a portion of the agency’s budget is dedicated to R&D.

From a budget perspective, we identified two types of agencies performing R&D: those agencies whose main mission is to perform research and development, and those agencies that perform many functions in addition to R&D. For the former, the share of R&D in the discretionary budget is consistently high, while for the latter group, R&D is only a small part of their total budget (see the chart below). This distinction influences how agencies will argue for their R&D money, because they will make their case on the most important uses of their budget. If agencies have a low R&D share, they will keep it mixed with other functions and programs; for instance, research efforts will be justified only as supporting the main agency mission. In turn, agencies with a high R&D share must argue for their budgets highlighting the social outcomes of their work. These include three agencies whose primary mission is research (NASA, NSF, NIH), and a fourth (DoE) where research is a significant element of its mission.

There is little question that the four agencies with high R&D share produce greatly beneficial research for society. Their strategy of promoting their work publicly is not only smart budget politics but also civic and pedagogical in the sense of helping taxpayers understand that their tax dollars are well-spent. However, it is interesting to observe that other agencies may be producing research of equal social impact that flies under the public radar, mainly because those agencies prefer as a matter of good budget policy to keep a low profile for their R&D work.

One interesting conclusion for institutional design from this analysis is that promoting a research agency to the level of departments of government or its director to a cabinet rank position may bring prominence to its research, not because more and better research will necessarily get done but simply because that agency will seek public recognition for their work in order to justify its budget. Likewise, placing a research agency within a larger department may help conceal and protect their R&D funding; the politics of the department will focus on its main goals and R&D would recede to a concern of secondary interest in political battles.

In the Politics of Federal R&D we discuss in more detail the changing politics of budget and how R&D agencies can respond. The general strategies of concealment and self-promotion are likely to become more important for agencies to protect a steady growth of their research and development budgets.

Data sources: R&D data from the American Association for the Advancement of Sciences historical trends in Federal R&D. Total non-discretionary spending by federal agency from the Office of Management and Budget.

Image Source: © Edgar Su / Reuters
      
 
 




academic and careers

Patent infringement suits have a reputational cost for universities


Universities cash handsome awards on infringement cases

Last month, a jury found Apple Inc. guilty of infringing a patent of the University of Wisconsin-Madison (UW) and ordered the tech giant to pay $234 million. The university scored a big financial victory, but this hardly meant any gain for the good name of the university.

The plaintiffs argued successfully in court that Apple infringed their 1998 patent on a predictor circuit that greatly improved the efficiency of microchips used in the popular iPhone 5s, 6, and 6 Plus. Apple first responded by challenging the validity of the patent, but the US Patent and Trademark Office ruled in favor of the university. Apple plans to appeal, but the appellate court is not likely to reverse the lower court’s decision.

This is not the first time this university has asserted its patents rights (UW sued Intel in 2008 for this exact same patent and reportedly settled for $110 million). Nor is this the first time universities in general have taken infringers to court. Prominent cases in recent memory include Boston University, which sued several companies for infringement of a patent for blue light-emitting diodes and settled out of court with most of them, and Carnegie Mellon, who was awarded $237 million by the federal appellate court on its infringement suit against Marvell, a semiconductor company, for its use of an enhanced detector of data in hard drives called Kavcic detectors.

Means not always aligned with aims in patent law

When university inventions emerge from federal research grants, universities can also sue the infringers, but in those cases they would be testing the accepted interpretations of current patent law.

The Bayh-Dole Act of 1980 extended patent law and gave small-business and universities the right to take title to patents from federal grants—later it was amended to extend the right to all federal grantees regardless of size. The ostensible aim of this act is to “to promote the utilization of inventions arising from federally supported research or development.” Under the law, a condition for universities to keep their exclusive rights on those patents is that they or their licensees take “effective steps to achieve practical application” of those patents. Bayh-Dole was not designed to create a new source of revenue for universities. If companies are effectively using university technologies, Bayh-Dole’s purpose is served without need of the patents.

To understand this point, consider a counterfactual: What if the text of Bayh-Dole had been originally composed to grant a conditional right to patents for federal research grantees? The condition could be stated like this: “This policy seeks to promote the commercialization of federally funded research and to this end it will use the patent system. Grantees may take title to patents if and only if other mechanisms for disseminating and developing those inventions into useful applications prove unsuccessful.” Under this imagined text, the universities could still take title to patents on their inventions if they or the U.S. Patent and Trademark Office were not aware that the technologies were being used in manufactures.

But no court would find their infringement claim meritorious if the accused companies could demonstrate that, absent of willful infringement, they had in fact used the technologies covered by university patents in their commercial products. In this case, other mechanisms for disseminating and developing the technologies would have proven successful indeed. The reality that Bayh-Dole did not mandate such a contingent assignation of rights creates a contradiction between its aims and the means chosen to advance those aims for the subset of patents that were already in use by industry.

I should clarify that the predictor circuit, the blue-light diode, and the Kavcic detectors are not in that subset of patents. But even in they were, there is no indication that the University of Wisconsin-Madison would have exercised its patent rights with any less vigor just because the original research was funded by public funds. Today, it is fully expected from universities to aggressively assert their patent rights regardless of the source of funding for the original research.

You can have an answer for every question and still lose the debate

It is this litigious attitude that puts off many observers. While the law may very well allow universities to be litigious, universities could still refuse to exercise their rights under circumstances in which those rights are not easily reconciled with the public mission of the university.

Universities administrators, tech transfer personnel, and particularly the legal teams winning infringement cases have legitimate reasons to wonder why universities are publicly scorned. After all, they are acting within the law and simply protecting their patent rights; they are doing what any rational person would do. They may be really surprised when critics accuse universities of becoming allies of patent trolls, or of aiding and abetting their actions. Such accusations are unwarranted. Trolls are truants; the universities are venerable institutions. Patent trolls would exploit the ambiguities of patent law and the burdens of due process to their own benefit and to the detriment of truly productive businesses and persons. In stark contrast, universities are long established partners of democracy, respected beyond ideological divides for their abundant contributions to society.

The critics may not be fully considering the intricacies of patent law. Or they may forget that universities are in need of additional revenue—higher education has not seen public financial support increase in recent years, with federal grants roughly stagnated and state funding falling drastically in some states. Critics may also ignore that revenues collected from licensing of patents, favorable court rulings, and out-of-court settlements, are to a large extent (usually two thirds of the total) plugged back into the research enterprise.

University attorneys may have an answer for every point that critics raise, but the overall concern of critics should not be dismissed outright. Given that many if not most university patents can be traced back to research funded by tax dollars, there is a legitimate reason for observers to expect universities to manage their patents with a degree of restraint. There is also a legitimate reason for public disappointment when universities do not seem to endeavor to balance the tensions between their rights and duties.

Substantive steps to improve the universities’ public image

Universities can become more responsive to public expectations about their character not only by promoting their good work, but also by taking substantive steps to correct misperceptions.

First, when universities discover a case of proven infringement, they should take companies to court as a measure of last resort. If a particular company refuses to negotiate in good faith and an infringement case ends up in court, the universities should be prepared to demonstrate to the court of public opinion that they have tried, with sufficient insistence and time, to negotiate a license and even made concessions in pricing the license. In the case of the predictor circuit patent, it seems that the University of Wisconsin-Madison tried to license the technology and Apple refused, but the university would be in a much better position if it could demonstrate that the licensing deals offered to Apple would have turned to be far less expensive for the tech company.

Second, universities would be well advised not to join any efforts to lobby Congress for stronger patent protection. At least two reasons substantiate this suggestion. First, as a matter of principle, the dogmatic belief that without patents there is no innovation is wrong. Second, as a matter of material interest, universities as a group do not have a financial interest in patenting. It’s worth elaborating these points a bit more.

Neither historians nor social science researchers have settled the question about the net effects of patents on innovation. While there is evidence of social benefits from patent-based innovation, there is also evidence of social costs associated with patent-monopolies, and even more evidence of momentous innovations that required no patents. What’s more, the net social benefit varies across industries and over time. Research shows economic areas in which patents do spur innovation and economic sectors where it actually hinders them. This research explains, for instance, why some computer and Internet giants lobby Congress in the opposite direction to the biotech and big pharma industries. Rigorous industrial surveys of the 1980s and 1990s found that companies in most economic sectors did not use patents as their primary tool to protect their R&D investments.

Yet patenting has increased rapidly over the past four decades. This increase includes industries that once were uninterested in patents. Economic analyses have shown that this new patenting is a business strategy against patent litigation. Companies are building patent portfolios as a defensive strategy, not because they are innovating more. The university’s public position on patent policy should acknowledge that the debate on the impact of patents on innovation is not settled and that this impact cannot be observed in the aggregate, but must be considered in the context of each specific economic sector, industry, or even market. From this vantage point, universities could then turn up or down the intensity with which they negotiate licenses and pursue compensation for infringement. Universities would better assert their commitment to their public mission if they compute on a case by case basis the balance between social benefits and costs for each of its controversial patents.

As to the material interest in patents, it is understandable that some patent attorneys or the biotech lobby publicly espouse the dogma of patents, that there is no innovation without patents. After all, their livelihood depends on it. However, research universities as a group do not have any significant financial interest in stronger patent protection. As I have shown in a previous Brookings paper, the vast majority of research universities earn very little from their patent portfolios and about 87% of tech transfer offices operate in the red. Universities as a group receive so little income from licensing and asserting their patents relative to the generous federal support (below 3%), that if the federal government were to declare that grant reviewers should give a preference to universities that do not patent, all research universities would stop the practice at once. It is true that a few universities (like the University of Wisconsin-Madison) raise significant revenue from their patent portfolio, and they will continue to do so regardless of public protestations. But the majority of universities do not have a material interest in patenting.

Time to get it right on anti-troll legislation

Last year, the House of Representative passed legislation closing loopholes and introducing disincentives for patent trolls. Just as mirror legislation was about to be considered in the Senate, Sen. Patrick Leahy withdrew it from the Judiciary Committee. It was reported that Sen. Harry Reid forced the hand of Mr. Leahy to kill the bill in committee. In the public sphere, the shrewd lobbying efforts to derail the bill were perceived to be pro-troll interests. The lobbying came from pharmaceutical companies, biotech companies, patent attorneys, and, to the surprise of everyone, universities.  Little wonder that critics overreacted and suggested universities were in partnership with trolls: even if they were wrong, these accusations stung.

University associations took that position out of a sincere belief in the dogma of patents and out of fear that the proposed anti-troll legislation limited their ability to sue patent infringers. However, their convictions stand on shaky ground and their material interests are not those of the vast majority of universities.

A reversal of that position is not only possible, but would be timely. When anti-troll legislation is again introduced in Congress, universities should distance themselves from efforts to protect the policy status quo that so benefits patent trolls. It is not altogether improbable that Congress sees fit to exempt universities from some of the requirements that the law would impose. University associations could show Congress the merit of such exemptions in consideration of the universities’ constant and significant contributions to states, regions, and the nation. However, no such concessions could ever be expected if the universities continue to place themselves in the company of those who profit from patent management.

No asset is more valuable for universities than their prestige. It is the ample recognition of their value in society that guarantees tax dollars will continue to flow into universities. While acting legally to protect their patent rights, universities are nevertheless toying with their own legitimacy. Let those universities that stand to gain from litigation act in their self-interest, but do not let them speak for all universities. When university associations advocate for stronger patent protection, they do the majority of universities a disservice. These associations should better represent the interests of all their members by advocating a more neutral position about patent reform, by publicly praising universities’ restraint on patent litigation, and by promoting a culture and readiness in technology transfer offices to appraise each patent not by its market value but by its social value. At the same time, the majority of universities that obtain neither private nor social benefits from patenting should press their political representatives to adopt a more balanced approach to policy advocacy, lest they squander the reputation of the entire university system.

Image Source: © Stephen Lam / Reuters
      
 
 




academic and careers

Patent infringement suits have a reputational cost for universities


This post originally appeared on the Center for Technology Innovation’s TechTank blog.

Universities cash handsome awards on infringement cases

This October, a jury found Apple Inc. guilty of infringing a patent of the University of Wisconsin-Madison (UW) and ordered the tech giant to pay $234 million. The university scored a big financial victory, but this hardly meant any gain for the good name of the university.

The plaintiffs argued successfully in court that Apple infringed their 1998 patent on a predictor circuit that greatly improved the efficiency of microchips used in the popular iPhone 5s, 6, and 6 Plus. Apple first responded by challenging the validity of the patent, but the US Patent and Trademark Office ruled in favor of the university. Apple plans to appeal, but the appellate court is not likely to reverse the lower court’s decision.

This is not the first time this university has asserted its patents rights (UW sued Intel in 2008 for this exact same patent and reportedly settled for $110 million). Nor is this the first time universities in general have taken infringers to court. Prominent cases in recent memory include Boston University, which sued several companies for infringement of a patent for blue light-emitting diodes and settled out of court with most of them, and Carnegie Mellon, who was awarded $237 million by the federal appellate court on its infringement suit against Marvell, a semiconductor company, for its use of an enhanced detector of data in hard drives called Kavcic detectors.

Means not always aligned with aims in patent law

When university patented inventions emerge from federal research grants, infringement suits test the accepted interpretations of current patent law.

The Bayh-Dole Act of 1980 extended patent law and gave small-business and universities the right to take title to patents from federal research grants—later it was amended to extend the right to all federal grantees regardless of size. The ostensible aim of this act is to “to promote the utilization of inventions arising from federally supported research or development.” Under the law, a condition for universities (or any other government research performers) to keep their exclusive rights on those patents is that they or their licensees take “effective steps to achieve practical application” of those patents. Bayh-Dole was not designed to create a new source of revenue for universities. If companies are effectively using university technologies, Bayh-Dole’s purpose is served without need of patents.

To understand this point, consider a counterfactual: What if the text of Bayh-Dole had been originally composed to grant a conditional right to patents for federal research grantees? The condition could be stated like this: “This policy seeks to promote the commercialization of federally funded research and to this end it will use the patent system. Grantees may take title to patents if and only if other mechanisms for disseminating and developing those inventions into useful applications prove unsuccessful.” Under this imagined text, the universities could still take title to patents on their inventions if they or the U.S. Patent and Trademark Office were not aware that the technologies were being used in manufactures.

But no court would find their infringement claim meritorious if the accused companies could demonstrate that, absent of willful infringement, they had in fact used the technologies covered by university patents in their commercial products. In this case, other mechanisms for disseminating and developing the technologies would have proven successful indeed. The reality that Bayh-Dole did not mandate such a contingent assignation of rights creates a contradiction between its aims and the means chosen to advance those aims for the subset of patents that were already in use by industry.

I should remark that UW’s predictor circuit resulted from grants from NSF and DARPA and there is no indication that the university exercised its patent rights with any less vigor just because the original research was funded by public funds. In fact, it is fully expected from universities to aggressively assert their patent rights regardless of the source of funding for the original research.

You can have an answer for every question and still lose the debate

It is this litigious attitude that puts off many observers. While the law may very well allow universities to be litigious, universities could still refuse to exercise their rights under circumstances in which those rights are not easily reconciled with the public mission of the university.

Universities administrators, tech transfer personnel, and particularly the legal teams winning infringement cases have legitimate reasons to wonder why universities are publicly scorned. After all, they are acting within the law and simply protecting their patent rights; they are doing what any rational person would do. They may be really surprised when critics accuse universities of becoming allies of patent trolls, or of aiding and abetting their actions. Such accusations are unwarranted. Trolls are truants; the universities are venerable institutions. Patent trolls would exploit the ambiguities of patent law and the burdens of due process to their own benefit and to the detriment of truly productive businesses and persons. In stark contrast, universities are long established partners of democracy, respected beyond ideological divides for their abundant contributions to society.

The critics may not be fully considering the intricacies of patent law. Or they may forget that universities are in need of additional revenue—higher education has not seen public financial support increase in recent years, with federal grants roughly stagnated and state funding falling drastically in some states. Critics may also ignore that revenues collected from licensing of patents, favorable court rulings, and out-of-court settlements, are to a large extent (usually two thirds of the total) plugged back into the research enterprise.

University attorneys may have an answer for every point that critics raise, but the overall concern of critics should not be dismissed outright. Given that many if not most university patents can be traced back to research funded by tax dollars, there is a legitimate reason for observers to expect universities to manage their patents with a degree of restraint. There is also a legitimate reason for public disappointment when universities do not seem to endeavor to balance the tensions between their rights and duties.

Substantive steps to improve the universities’ public image

Universities can become more responsive to public expectations about their character not only by promoting their good work, but also by taking substantive steps to correct misperceptions.

First, when universities discover a case of proven infringement, they should take companies to court as a measure of last resort. If a particular company refuses to negotiate in good faith and an infringement case ends up in court, the universities should be prepared to demonstrate to the court of public opinion that they have tried, with sufficient insistence and time, to negotiate a license and even made concessions in pricing the license. In the case of the predictor circuit patent, it seems that the University of Wisconsin-Madison tried to license the technology and Apple refused, but the university would be in a much better position if it could demonstrate that the licensing deals offered to Apple would have turned to be far less expensive for the tech company.

Second, universities would be well advised not to join any efforts to lobby Congress for stronger patent protection. At least two reasons substantiate this suggestion. First, as a matter of principle, the dogmatic belief that without patents there is no innovation is wrong. Second, as a matter of material interest, universities as a group do not have a financial interest in patenting. It’s worth elaborating these points a bit more.

Neither historians nor social science researchers have settled the question about the net effects of patents on innovation. While there is evidence of social benefits from patent-based innovation, there is also evidence of social costs associated with patent-monopolies, and even more evidence of momentous innovations that required no patents. What’s more, the net social benefit varies across industries and over time. Research shows economic areas in which patents do spur innovation and economic sectors where it actually hinders them. This research explains, for instance, why some computer and Internet giants lobby Congress in the opposite direction to the biotech and big pharma industries. Rigorous industrial surveys of the 1980s and 1990s found that companies in most economic sectors did not use patents as their primary tool to protect their R&D investments.

Yet patenting has increased rapidly over the past four decades. This increase includes industries that once were uninterested in patents. Economic analyses have shown that this new patenting is a business strategy against patent litigation. Companies are building patent portfolios as a defensive strategy, not because they are innovating more. The university’s public position on patent policy should acknowledge that the debate on the impact of patents on innovation is not settled and that this impact cannot be observed in the aggregate, but must be considered in the context of each specific economic sector, industry, or even market. From this vantage point, universities could then turn up or down the intensity with which they negotiate licenses and pursue compensation for infringement. Universities would better assert their commitment to their public mission if they compute on a case by case basis the balance between social benefits and costs for each of its controversial patents.

As to the material interest in patents, it is understandable that some patent attorneys or the biotech lobby publicly espouse the dogma of patents, that there is no innovation without patents. After all, their livelihood depends on it. However, research universities as a group do not have any significant financial interest in stronger patent protection. As I have shown in a previous Brookings paper, the vast majority of research universities earn very little from their patent portfolios and about 87% of tech transfer offices operate in the red. Universities as a group receive so little income from licensing and asserting their patents relative to the generous federal support (below 3%), that if the federal government were to declare that grant reviewers should give a preference to universities that do not patent, all research universities would stop the practice at once. It is true that a few universities (like the University of Wisconsin-Madison) raise significant revenue from their patent portfolio, and they will continue to do so regardless of public protestations. But the majority of universities do not have a material interest in patenting.

Time to get it right on anti-troll legislation

Last year, the House of Representative passed legislation closing loopholes and introducing disincentives for patent trolls. Just as mirror legislation was about to be considered in the Senate, Sen. Patrick Leahy withdrew it from the Judiciary Committee. It was reported that Sen. Harry Reid forced the hand of Mr. Leahy to kill the bill in committee. In the public sphere, the shrewd lobbying efforts to derail the bill were perceived to be pro-troll interests. The lobbying came from pharmaceutical companies, biotech companies, patent attorneys, and, to the surprise of everyone, universities.  Little wonder that critics overreacted and suggested universities were in partnership with trolls: even if they were wrong, these accusations stung.

University associations took that position out of a sincere belief in the dogma of patents and out of fear that the proposed anti-troll legislation limited the universities’ ability to sue patent infringers. However, their convictions stand on shaky ground and only a few universities sue for infringement. In taking that policy position, university associations are representing neither the interests nor the beliefs of the vast majority of universities.

A reversal of that position is not only possible, but would be timely. When anti-troll legislation is again introduced in Congress, universities should distance themselves from efforts to protect the policy status quo that so benefits patent trolls. It is not altogether improbable that Congress sees fit to exempt universities from some of the requirements that the law would impose. University associations could show Congress the merit of such exemptions in consideration of the universities’ constant and significant contributions to states, regions, and the nation. However, no such concessions could ever be expected if the universities continue to place themselves in the company of those who profit from patent management.

No asset is more valuable for universities than their prestige. It is the ample recognition of their value in society that guarantees tax dollars will continue to flow into universities. While acting legally to protect their patent rights, universities are nevertheless toying with their own legitimacy. Let those universities that stand to gain from litigation act in their self-interest, but do not let them speak for all universities. When university associations advocate for stronger patent protection, they do the majority of universities a disservice. These associations should better represent the interests of all their members by advocating a more neutral position about patent reform, by publicly praising universities’ restraint on patent litigation, and by promoting a culture and readiness in technology transfer offices to appraise each patent not by its market value but by its social value. At the same time, the majority of universities that obtain neither private nor social benefits from patenting should press their political representatives to adopt a more balanced approach to policy advocacy, lest they squander the reputation of the entire university system.

Editor's Note: The post was corrected to state that UW’s predictor circuit did originate from federally funded research.

Image Source: © Stephen Lam / Reuters
      
 
 




academic and careers

Stuck in a patent policy rut: Considerations for trade agreements


International development debates of the last four decades have ascribed ever greater importance to intellectual property rights (IPRs). There has also been a significant effort on the part of the U.S. to encourage its trade partners to introduce and enforce patent law modeled after American intellectual property law. Aside from a discussion on the impact of patents on innovation, there are some important consequences of international harmonization regarding the obduracy of the terms of trade agreements.

The position of the State Department on patents when negotiating trade agreements has consistently been one of defending stronger patent protection. However, the high-tech sector is under reorganization, and the most innovative industries today have strong disagreements about the value of patents for innovation. This situation begs the question as to why the national posture on patent law is so consistent in favor of industries such as pharmaceuticals or biotech to the detriment of software developers and Internet-based companies.

The State Department defends this posture, arguing that the U.S. has a comparative advantage in sectors dependent on patent protection. Therefore, to promote exports, our national trade policy should place incentives for partners to come in line with national patent law. This posture will become problematic when America’s competitive advantage shifts to sectors that find patents to be a hindrance to innovation, because too much effort will have already been invested in twisting the arm of our trade partners. It will be hard to undo those chapters in trade agreements particularly after our trade partners have taken pains in passing laws aligned to American law.

Related to the previous concern, the policy inertia effect and inflexibility applies to domestic policy as much as it does to trade agreements. When other nations adopt policy regimes following the American model, advocates of stronger patent protection will use international adoption as an argument in favor of keeping the domestic policy status quo. The pressure we place on our trade partners to strengthen patent protection (via trade agreements and other mechanisms like the Special 301 Report) will be forgotten. Advocates will present those trade partners as having adopted the enlightened laws of the U.S., and ask why American lawmakers would wish to change law that inspires international emulation. Innovation scholar Timothy Simcoe has correctly suggested that harmonization creates inflexibility in domestic policy. Indeed, in a not-too-distant future the rapid transformation of the economy, new big market players, and emerging business models may give policymakers the feeling that we are stuck in a patent policy rut whose usefulness has expired.

In addition, there are indirect economic effects from projecting national patent law onto trade agreements. If we assume that a club of economies (such as OECD) generate most of the innovation worldwide while the rest of countries simply adopt new technologies, the innovation club would have control over the global supply of high value-added goods and services and be able to preserve a terms-of-trade advantage. In this scenario, stronger patent protection may be in the interest of the innovation club to the extent that their competitive advantage remains in industries dependent of patent protection. But should the world economic order change and the innovation club become specialized in digital services while the rest of the world takes on larger segments of manufactures, the advantage may shift outside the innovation club. This is not a far-fetched scenario. Emerging economies have increased their service economy in addition to their manufacturing capacity; overall they are better integrated in global supply chains. What is more, these emerging economies are growing consumption markets that will become increasingly more relevant globally as they continue to grow faster than rich economies.

What is more, the innovation club will not likely retain a monopoly on global innovation for too long. Within emerging economies, another club of economies is placing great investments in developing innovative capacity. In particular, China, India, Brazil, Mexico, and South Africa (and possibly Russia) have strengthened their innovation systems by expanding public investments in R&D and introducing institutional reforms to foster entrepreneurship. The innovation of this second club may, in a world of harmonized patent law, increase their competitive advantage by securing monopolistic control of key high-tech markets. As industries less reliant on patents flourish and the digital economy transforms US markets, an inflexibly patent policy regime may actually be detrimental to American terms of trade.

I should stress that these kind of political and economic effects of America’s posture on IPRs in trade policy are not merely speculative. Just as manufactures displaced the once dominant agricultural sector, and services in turn took over as the largest sector of the economy, we can fully expect that the digital economy—with its preference for limited use of patents—will become not only more economic relevant, but also more politically influential. The tensions observed in international trade and especially the aforementioned considerations merit revisiting the rationale for America’s posture on intellectual property policy in trade negotiations.

Elsie Bjarnason contributed to this post.

Image Source: © Romeo Ranoco / Reuters
      
 
 




academic and careers

State of the Union’s challenge: How to make tech innovation work for us?


Tuesday night, President Obama presented four critical questions about the future of America and I should like to comment on the first two:

  1. How to produce equal opportunity, emphasizing economic security for all.
  2. In his words, “how do we make technology work for us, and not against us,” particularly to meet the “urgent challenges” of our days.

The challenges the president wishes to meet by means of technological development are climate change and cancer. Let’s consider cancer first. There are plenty of reasons to be skeptical: this is not the first presidential war against cancer, President Nixon tried that once and, alas cancer still has the upper hand. It is ironic that Mr. Obama chose this particular ”moonshot”, because not only are the technical aspects of cancer more uncertain than those of space travel, political support for the project is vastly different and we cannot be sure that even another Democrat in the White House would see this project to fruition. In effect, neither Mr. Obama nor his appointed “mission control”, Vice President Biden, have time in office to see fruits from their efforts on this front.

The second challenge the president wishes to address with technology is problematic beyond technical and economic feasibility (producing renewable energy at competitive prices); curbing carbon emissions has become politically intractable. The president correctly suggested that being leaders in the renewable energy markets of the future makes perfect business sense, even for global warming skeptics. Nevertheless, markets have a political economy, and current energy giants have a material interest in not allowing any changes to the rules that so favor them (including significant federal subsidies). Only when the costs of exploration, extraction, and distribution of fossil fuels rise above those of renewable sources, we can expect policy changes enabling an energy transition to become feasible. When renewables are competitive on a large scale, it is not very likely that their production will be controlled by new industrial players. Such is the political economy of free markets. What’s more, progressives should be wary of standard solutions that would raise the cost of energy (such as a tax on carbon emissions), because low income families are quite sensitive to energy prices; the cost of electricity, gas, and transportation is a far larger proportion of their income than that of their wealthier neighbors.

It’s odd that the president proposes technological solutions to challenges that call for a political solution. Again, in saying this, I’m allowing for the assumption that the technical side is manageable, which is not necessarily a sound assumption to make. The technical and economic complexity of these problems should only compound political hurdles. If I’m skeptical that technological fixes would curb carbon emissions or cure cancer, I am simply vexed by the president’s answer to the question on economic opportunity and security: expand the safety net. It is not that it wouldn’t work; it worked wonders creating prosperity and enlarging the middle-class in the post-World War II period. The problem is that enacting welfare state policies promises to be a hard political battle that, even if won, could result in pyrrhic victories. The greatest achievement of Mr. Obama expanding the safety net was, of course, the Affordable Care Act. But his policy success came at a very high cost: a majority of the voters have questions about the legitimacy of that policy. Even its eponymous name, Obamacare, was coined as a term of derision. It is bizarre that opposition to this reform is often found amidst people who benefit from it. We can blame the systematic campaign against it in every electoral contest, the legal subterfuges brought up to dismantle it (that ACA survived severely bruised), and the AM radio vitriol, but even controlling for the dirty war on healthcare reform, passing such as monumental legislation strictly across party lines has made it the lighting rod of distrust in government.

Progressives are free to try to increase economic opportunity following the welfare state textbook. They will meet the same opposition that Mr. Obama encountered. However, where progressives and conservatives could agree is about increasing opportunities for entrepreneurs, and nothing gives an edge to free enterprise more than innovation. Market competition is the selection mechanism by which an elite of enterprises rises from a legion created any given year; this elite, equipped with a new productive platform, can arm-wrestle markets from the old guard of incumbents. This is not the only way innovation takes place: monopolies and cartels can produce innovation, but with different outcomes. In competitive markets, innovation is the instrument of product differentiation; therefore, it improves quality and cuts consumer prices. In monopolistic markets, innovation also takes place, but generally as a monopolist’s effort to raise barriers to entry and secure high profits. Innovation can take place preserving social protections to the employees of the new industries, or it can undermine job security of its labor force (a concern with the sharing economy). These different modes of innovation are a function of the institutions that govern innovation, including industrial organization, labor and consumer protections.

What the President did not mention is that question two can answer question one: technological development can improve economic opportunity and security, and that is likely to be more politically feasible than addressing the challenges of climate change and cancer. Shaping the institutions that govern innovative activity to favor modes of innovation that benefit a broad base of society is an achievable goal, and could indeed be a standard by which his and future administrations are measured. This is so because these are not the province of the welfare state. They are policy domains that have historically enjoyed bipartisan consensus (such as federal R&D funding, private R&D tax credits) or low contestation (support for small business, tech transfer, loan guarantees).

As Mr. Obama himself suggested, technology can be indeed be made to work for us, all of us.

Image Source: © POOL New / Reuters
      
 
 




academic and careers

Why should I buy a new phone? Notes on the governance of innovation


A review essay of “Governance of Socio-technical Systems: Explaining Change”, edited by Susana Borrás and Jakob Edler (Edward Elgar, 2014, 207 pages).

Phasing-out a useful and profitable technology

I own a Nokia 2330; it’s a small brick phone that fits comfortably in the palm of my hand. People have feelings about this: mostly, they marvel at my ability to survive without a smart-phone. Concerns go beyond my wellbeing; once a friend protested that I should be aware of the costs I impose onto my friends, for instance, by asking them for precise directions to their houses. Another suggested that I cease trying to be smarter than my phone. But my reason is simple: I don’t need a smart phone. Most of the time, I don’t even need a mobile phone. I can take and place calls from my home or my office. And who really needs a phone during their commute? Still, my device will meet an untimely end. My service provider has informed me via text message that it will phase out all 2G service and explicitly encouraged me to acquire a 3G or newer model. 

There is a correct if simplistic explanation for this announcement: my provider is not making enough money with my account and should I switch to a newer device, they will be able to sell me a data plan. The more accurate and more complex explanation is that my mobile device is part of a communications system that is integrated to other economic and social systems. As those other systems evolve, my device is becoming incompatible with them; my carrier has determined that I should be integrated.

The system integration is easy to understand from a business perspective. My carrier may very well be able to make a profit keeping my account as is, and the accounts of the legion of elderly and low-income customers who use similar devices, and still they may not find it advantageous in the long run to allow 2G devices in their network. To understand this business strategy, we need to go back no farther than the introduction of the iPhone, which in addition to being the most marketable mobile phone set a new standard platform for mobile devices. Its introduction accelerated a trend underway in the core business of carriers: the shift from voice communication to data streaming because smart phones can support layers of overlapping services that depend on fast and reliable data transfer. These services include sophisticated log capabilities, web search, geo-location, connectivity to other devices, and more recently added bio-monitoring. All those services are part of systems of their own, so it makes perfect business sense for carriers to seamlessly integrate mobile communications with all those other systems. Still, the economic rationale explains only a fraction of the systems integration underway.

The communication system of mobile telephony is also integrated with regulatory, social, and cultural systems. Consider the most mundane examples: It’s hard to imagine anyone who, having shifted from paper-and-pencil to an electronic agenda, decided to switch back afterwards. We are increasingly dependent of GPS services; while it may have once served tourists who did not wish to learn how to navigate a new city, it is now a necessity for many people who without it are lost in their home town. Not needing to remember phone numbers, the time of our next appointment, or how to go back to that restaurant we really liked, is a clear example of the integration of mobile devices into our value systems.

There are coordination efforts and mutual accommodation taking place: tech designers seek to adapt to changing values and we update our values to the new conveniences of slick gadgets. Government officials are engaged in the same mutual accommodation. They are asking how many phone booths must be left in public places, how to reach more people with public service announcements, and how to provide transit information in real-time when commuters need it. At the same time, tech designers are considering all existing regulations so their devices are compliant. Communication and regulatory systems are constantly being re-integrated.

The will behind systems integration

The integration of technical and social systems that results from innovation demands an enormous amount of planning, effort, and conflict resolution. The people involved in this process come from all quarters of the innovation ecology, including inventors, entrepreneurs, financiers, and government officials. Each of these agents may not be able to contemplate the totality of the system integration problem but they more or less understand how their respective system must evolve so as to be compatible with interrelated systems that are themselves evolving.  There is a visible willfulness in the integration task that scholars of innovation call the governance of socio-technical systems.

Introducing the term governance, I should emphasize that I do not mean merely the actions of governments or the actions of entrepreneurs. Rather, I mean the effort of all agents involved in the integration and re-integration of systems triggered by innovation; I mean all the coordination and mutual accommodation of agents from interrelated systems. And there is no single vehicle to transport all the relevant information for these agents. A classic representation of markets suggests that prices carry all the relevant information agents need to make optimal decisions. But it is impossible to project this model onto innovation because, as I suggested above, it does not adhere exclusively to economic logic; cultural and political values are also at stake. The governance task is therefore fragmented into pieces and assigned to each of the participants of the socio-technical systems involved, and they cannot resolve it as a profit-maximization problem. 

Instead, the participants must approach governance as a problem of design where the goal could be characterized as reflexive adaptation. By adaptation I mean seeking to achieve inter-system compatibility. By reflexive I mean that each actor must realize that their actions trigger adaption measures in other systems. Thus, they cannot passively adapt but rather they must anticipate the sequence of accommodations in the interaction with other agents. This is one of the most important aspects of the governance problem, because all too often neither technical nor economic criteria will suffice; quite regularly coordination must be negotiated, which is to say, innovation entails politics.

The idea of governance of socio-technical systems is daunting. How do we even begin to understand it? What kinds of modes of governance exist? What are the key dimensions to understand the integration of socio-technical systems? And perhaps more pressing, who prevails in disputes about coordination and accommodation? Fortunately, Susana Borrás, from the Copenhagen Business School, and Jakob Edler, from the University of Manchester, both distinguished professors of innovation, have collected a set of case studies that shed light on these problems in an edited volume entitled Governance of Socio-technical Change: Explaining Change. What is more, they offer a very useful conceptual framework of governance that is worth reviewing here. While this volume will be of great interest to scholars of innovation—and it is written in scholarly language—I think it has great value for policymakers, entrepreneurs, and all agents involved in a practical manner in the work of innovation.

Organizing our thinking on the governance of change

The first question that Borrás and Edler tackle is how to characterize the different modes of governance. They start out with a heuristic typology across the two central categories: what kinds of agents drive innovation and how the actions of these agents are coordinated. Agents can represent the state or civil society, and actions can be coordinated via dominant or non-dominant hierarchies.

Change led by state actors

Change led by societal actors

Coordination by dominant hierarchies

Traditional deference to technocratic competence: command and control.

Monopolistic or oligopolistic industrial organization.

Coordination by non-dominant hierarchies

State agents as primus inter pares.

More competitive industries with little government oversight.

Source: Adapted from Borrás and Adler (2015), Table 1.2, p. 13.

This typology is very useful to understand why different innovative industries have different dynamics; they are governed differently. For instance, we can readily understand why consumer software and pharmaceuticals are so at odds regarding patent law. The strict (and very necessary) regulation of drug production and commercialization coupled with the oligopolistic structure of that industry creates the need and opportunity to advocate for patent protection; which is equivalent to a government subsidy. In turn, the highly competitive environment of consumer software development and its low level of regulation foster an environment where patents hinder innovation. Government intervention is neither needed nor wanted; the industry wishes to regulate itself.

This typology is also useful to understand why open source applications have gained currency much faster in the consumer segment than the contractor segment of software producers. Examples of the latter is industry specific software (e.g. to operate machinery, the stock exchange, and ATMs) or software to support national security agencies. These contractors demand proprietary software and depend on the secrecy of the source code. The software industry is not monolithic, and while highly innovative in all its segments, the innovation taking place varies greatly by its mode of governance.

Furthermore, we can understand the inherent conflicts in the governance of science. In principle, scientists are led by curiosity and organize their work in a decentralized and organic fashion. In practice, most of science is driven by mission-oriented governmental agencies and is organized in a rigid hierarchical system. Consider the centrality of prestige in science and how it is awarded by peer-review; a system controlled by the top brass of each discipline. There is nearly an irreconcilable contrast between the self-image of science and its actual governance. Using the Borrás-Edler typology, we could say that scientists imagine themselves as citizens of the south-east quadrant while they really inhabit the north-west quadrant.

There are practical lessons from the application of this typology to current controversies. For instance, no policy instrument such as patents can have the same effect on all innovation sectors because the effect will depend on the mode of governance of the sector. This corollary may sound intuitive, yet it really is at variance with the current terms of the debate on patent protection, where assertions of its effect on innovation, in either direction, are rarely qualified.

The second question Borrás and Edler address is that of the key analytical dimensions to examine socio-technical change. To this end, they draw from an ample selection of social theories of change. First, economists and sociologists fruitfully debate the advantage of social inquiry focused on agency versus institutions. Here, the synthesis offered is reminiscent of Herbert Simon’s “bounded rationality”, where the focus turns to agent decisions constrained by institutions. Second, policy scholars as well as sociologists emphasize the engineering of change. Change can be accomplished with discreet instruments such as laws and regulations, or diffused instruments such as deliberation, political participation, and techniques of conflict resolution. Third, political scientists underscore the centrality of power in the adjudication of disputes produced by systems’ change and integration. Borrás and Edler have condensed these perspectives in an analytical framework that boils down to three clean questions: who drives change? (focus on agents bounded by institutions), how is change engineered? (focus on instrumentation), and why it is accepted by society? (focus on legitimacy). The case studies contained in this edited volume illustrate the deployment of this framework with empirical research.

Standards, sustainability, incremental innovation

Arthur Daemmrich (Chapter 3) tells the story of how the German chemical company BASF succeeded marketing the biodegradable polymer Ecoflex. It is worth noting the dependence of BASF on government funding to develop Ecoflex, and on the German Institute for Standardization (DIN), making a market by setting standards. With this technology, BASF capitalized on the growing demand in Germany for biodegradables, and with its intense cooperation with DIN helped establish a standard that differentiate Ecoflex from the competition. By focusing on the enterprise (the innovation agent) and its role in engineering the market for its product by setting standards that would favor them, this story reveals the process of legitimation of this new technology. In effect, the certification of DIN was accepted by agribusinesses that sought to utilize biodegradable products.

If BASF is an example of innovation by standards, Allison Loconto and Marc Barbier (Chapter 4) show the strategies of governing by standards. They take the case of the International Social and Environmental Accreditation and Labelling alliance (ISEAL). ISEAL, an advocate of sustainability, positions itself as a coordinating broker among standard developing organizations by offering “credibility tools” such as codes of conduct, best practices, impact assessment methods, and assurance codes. The organization advocates what is known as the tripartite system regime (TSR) around standards. TSR is a system of checks and balances to increase the credibility of producers complying with standards. The TSR regime assigns standard-setting, certification, and accreditation of the certifiers, to separate and independent bodies. The case illustrates how producers, their associations, and broker organizations work to bestow upon standards their most valuable attribute: credibility. The authors are cautious not to conflate credibility with legitimacy, but there is no question that credibility is part of the process of legitimizing technical change. In constructing credibility, these authors focus on the third question of the framework –legitimizing innovation—and from that vantage point, they illuminate the role of actors and instruments that will guide innovations in sustainability markets.

While standards are instruments of non-dominant hierarchies, the classical instrument of dominant hierarchies is regulation. David Barberá-Tomás and Jordi Molas-Gallart tell the tragic consequences of an innovation in hip-replacement prosthesis that went terribly wrong. It is estimated that about 30 thousand replaced hips failed. The FDA, under the 1976 Medical Device Act, allows incremental improvements in medical devices to go into the market after only laboratory trials, assuming that any substantive innovations have already being tested in regular clinical trials. This policy was designed as an incentive for innovation, a relief from high regulatory costs. However, the authors argue, when products have been constantly improved for a number of years after an original release, any marginal improvement comes at a higher cost or higher risk—a point they refer to as the late stage of the product life-cycle. This has tilted the balance in favor of risky improvements, as illustrated by the hip prosthesis case. The story speaks to the integration of technical and cultural systems: the policy that encourages incremental innovation may alter the way medical device companies assess the relative risk of their innovations, precisely because they focus on incremental improvements over radical ones. Returning to the analytical framework, the vantage point of regulation—instrumentation—elucidates the particular complexities and biases in agents’ decisions.

Two additional case studies discuss the discontinuation of the incandescent light bulb (ILB) and the emergence of translational research, both in Western Europe. The first study, authored by Peter Stegmaier, Stefan Kuhlmann and Vincent R. Visser (Chapter 6), focuses on a relatively smooth transition. There was wide support for replacing ILBs that translated in political will and a market willing to purchase new energy efficient bulbs. In effect, the new technical system was relatively easy to re-integrate to a social system in change—public values had shifted in Europe to favor sustainable consumption—and the authors are thus able to emphasize how agents make sense of the transition. Socio-technical change does not have a unique meaning: for citizens it means living in congruence with their values; for policy makers it means accruing political capital; for entrepreneurs it means new business opportunities. The case by Etienne Vignola-Gagné, Peter Biegelbauer and Daniel Lehner (Chapter 7) offers a similar lesson about governance. My reading of their multi-site study of the implementation of translational research—a management movement that seeks to bridge laboratory and clinical work in medical research—reveals how the different agents involved make sense of this organizational innovation. Entrepreneurs see a new market niche, researchers strive for increasing the impact of their work, and public officials align their advocacy for translation with the now regular calls for rendering publicly funded research more productive. Both chapters illuminate a lesson that is as old as it is useful to remember: technological innovation is interpreted in as many ways as the number of agents that participate in it.

Innovation for whom?

The framework and illustrations of this book are useful for those of us interested in the governance of system integration. The typology of different modes of governance and the three vantage points from which empirical analysis can be deployed are very useful indeed. Further development of this framework should include the question of how political power is redistributed by effect of innovation and the system integration and re-integration that it triggers. The question is pressing because the outcomes of innovation vary as power structures are reinforced or debilitated by the emergence of new technologies—not to mention ongoing destabilizing forces such as social movements. Put another way, the framework should be expanded to explain in which circumstances innovation exacerbates inequality. The expanded framework should probe whether the mutual accommodation is asymmetric across socio-economic groups, which is the same as asking: are poor people asked to do more adapting to new technologies? These questions have great relevance in contemporary debates about economic and political inequality. 

I believe that Borrás and Edler and their colleagues have done us a great service organizing a broad but dispersed literature and offering an intuitive and comprehensive framework to study the governance of innovation. The conceptual and empirical parts of the book are instructive and I look forward to the papers that will follow testing this framework. We need to better understand the governance of socio-technical change and the dynamics of systems integration. Without a unified framework of comparison, the ongoing efforts in various disciplines will not amount to a greater understanding of the big picture. 

I also have a selfish reason to like this book: it helps me make sense of my carrier’s push for integrating my value system to their technical system. If I decide to adapt to a newer phone, I could readily do so because I have time and other resources. But that may not be the case for many customers of 2G devices who have neither the resources nor the inclination to learn to use more complex devices. For that reason alone, I’d argue that this sort of innovation-led systems integration could be done more democratically. Still, I could meet the decision of my carrier with indifference: when the service is disconnected, I could simply try to get by without the darn toy.

Note: Thanks to Joseph Schuman for an engaging discussion of this book with me.

Image Source: © Dominic Ebenbichler / Reuters
      
 
 




academic and careers

The fair compensation problem of geoengineering


The promise of geoengineering is placing average global temperature under human control, and is thus considered a powerful instrument for the international community to deal with global warming. While great energy has been devoted to learning more about the natural systems that it would affect, questions of political nature have received far less consideration. Taking as a given that regional effects will be asymmetric, the nations of the world will only give their consent to deploying this technology if they can be given assurances of a fair compensation mechanism, something like an insurance policy. The question of compensation reveals that the politics of geoengineering are far more difficult than the technical aspects.

What is Geoengineering?

In June 1991, Mount Pinatubo exploded, throwing a massive amount of volcanic sulfate aerosols into the high skies. The resulting cloud dispersed over weeks throughout the planet and cooled its temperature on average 0.5° Celsius over the next two years. If this kind of natural phenomenon could be replicated and controlled, the possibility of engineering the Earth’s climate is then within reach.

Spraying aerosols in the stratosphere is one method of solar radiation management (SRM), a class of climate engineering that focuses on increasing the albedo, i.e. reflectivity, of the planet’s atmosphere. Other SRM methods include brightening clouds by increasing their content of sea salt. A second class of geo-engineering efforts focuses on carbon removal from the atmosphere and includes carbon sequestration (burying it deep underground) and increasing land or marine vegetation. Of all these methods, SRM is appealing for its effectiveness and low costs; a recent study put the cost at about $5 to $8 billion per year.1

Not only is SRM relatively inexpensive, but we already have the technological pieces that assembled properly would inject the skies with particles that reflect sunlight back into space. For instance, a fleet of modified Boeing 747s could deliver the necessary payload. Advocates of geoengineering are not too concerned about developing the technology to effect SRM, but about its likely consequences, not only in terms of slowing global warming but the effects on regional weather. And there lies the difficult question for geoengineering: the effects of SRM are likely to be unequally distributed across nations.

Here is one example of these asymmetries: Julia Pongratz and colleagues at the department of Global Ecology of the Carnegie Institution for Science estimated a net increase in yields of wheat, corn, and rice from SRM modified weather. However, the study also found a redistributive effect with equatorial countries experiencing lower yields.2 We can then expect that equatorial countries will demand fair compensation to sign on the deployment of SRM, which leads to two problems: how to calculate compensation, and how to agree on a compensation mechanism.

The calculus of compensation

What should be the basis for fair compensation? One view of fairness could be that, every year, all economic gains derived from SRM are pooled together and distributed evenly among the regions or countries that experience economic losses.

If the system pools gains from SRM and distributes them in proportion to losses, questions about the balance will only be asked in years in which gains and losses are about the same. But if losses are far greater than the gains; then this would be a form of insurance that cannot underwrite some of the incidents it intends to cover. People will not buy such an insurance policy; which is to say, some countries will not authorize SRM deployment. In the reverse, if the pool has a large balance left after paying out compensations, then winners of SRM will demand lower compensation taxes.

Further complicating the problem is the question of how to separate gains or losses that can be attributed to SRM from regional weather fluctuations. Separating the SRM effect could easily become an intractable problem because regional weather patterns are themselves affected by SRM.  For instance, any year that El Niño is particularly strong, the uncertainty about the net effect of SRM will increase exponentially because it could affect the severity of the oceanic oscillation itself. Science can reduce uncertainty but only to a certain degree, because the better we understand nature, the more we understand the contingency of natural systems. We can expect better explanations of natural phenomena from science, but it would be unfair to ask science to reduce greater understanding to a hard figure that we can plug into our compensation equation.

Still, greater complexity arises when separating SRM effects from policy effects at the local and regional level. Some countries will surely organize better than others to manage this change, and preparation will be a factor in determining the magnitude of gains or losses. Inherent to the problem of estimating gains and losses from SRM is the inescapable subjective element of assessing preparation. 

The politics of compensation

Advocates of geoengineering tell us that their advocacy is not about deploying SRM; rather, it is about better understanding the scientific facts before we even consider deployment. It’s tempting to believe that the accumulating science on SRM effects would be helpful. But when we consider the factors I just described above, it is quite possible that more science will also crystalize the uncertainty about exact amounts of compensation. The calculus of gain or loss, or the difference between the reality and a counterfactual of what regions and countries will experience requires certainty, but science only yields irreducible uncertainty about nature.

The epistemic problems with estimating compensation are only to be compounded by the political contestation of those numbers. Even within the scientific community, different climate models will yield different results, and since economic compensation is derived from those models’ output, we can expect a serious contestation of the objectivity of the science of SRM impact estimation. Who should formulate the equation? Who should feed the numbers into it? A sure way to alienate scientists from the peoples of the world is to ask them to assert their cognitive authority over this calculus. 

What’s more, other parts of the compensation equation related to regional efforts to deal with SRM effect are inherently subjective. We should not forget the politics of asserting compensation commensurate to preparation effort; countries that experience low losses may also want compensation for their efforts preparing and coping with natural disasters.

Not only would a compensation equation be a sham, it would be unmanageable. Its legitimacy would always be in question. The calculus of compensation may seem a way to circumvent the impasses of politics and define fairness mathematically. Ironically, it is shot through with subjectivity; is truly a political exercise.

Can we do without compensation?

Technological innovations are similar to legislative acts, observed Langdon Winner.3 Technical choices of the earliest stage in technical design quickly “become strongly fixed in material equipment, economic investment, and social habit, [and] the original flexibility vanishes for all practical purposes once the initial commitments are made.” For that reason, he insisted, "the same careful attention one would give to the rules, roles, and relationships of politics must also be given to such things as the building of highways, the creation of television networks, and the tailoring of seeming insignificant features on new machines."

If technological change can be thought of as legislative change, we must consider how such a momentous technology as SRM can be deployed in a manner consonant with our democratic values. Engineering the planet’s weather is nothing short of passing an amendment to Planet Earth’s Constitution. One pesky clause in that constitutional amendment is a fair compensation scheme. It seems so small a clause in comparison to the extent of the intervention, the governance of deployment and consequences, and the international commitments to be made as a condition for deployment (such as emissions mitigation and adaptation to climate change). But in the short consideration afforded here, we get a glimpse of the intractable political problem of setting up a compensation scheme. And yet, if the clause were not approved by a majority of nations, a fair compensation scheme has little hope to be consonant with democratic aspirations.


1McClellan, Justin, David W Keith, Jay Apt. 2012. Cost analysis of stratospheric albedo modification delivery systems. Environmental Research Letters 7(3): 1-8.

2Pongratz, Julia, D. B. Lobell, L. Cao, K. Caldeira. 2012. Nature Climate Change 2, 101–105.

3Winner, Langdon. 1980. Do artifacts have politics? Daedalus (109) 1: 121-136.

Image Source: © Antara Photo Agency / Reuters
      
 
 




academic and careers

Gene editing: New challenges, old lessons


It has been hailed as the most significant discovery in biology since polymerase chain reaction allowed for the mass replication of DNA samples. CRISPR-Cas9 is an inexpensive and easy-to-use gene-editing method that promises applications ranging from medicine to industrial agriculture to biofuels. Currently, applications to treat leukemia, HIV, and cancer are under experimental development.1 However, new technical solutions tend to be fraught with old problems, and in this case, ethical and legal questions loom large over the future.

Disagreements on ethics

The uptake of this method has been so fast that many scientists have started to worry about inadequate regulation of research and its unanticipated consequences.2 Consider, for instance, the disagreement on research on human germ cells (eggs, sperm, or embryos) where an edited gene is passed onto offspring. Since the emergence of bioengineering applications in the 1970s, the scientific community has eschewed experiments to alter human germline and some governments have even banned them.3 The regulation regimes are expectedly not uniform: for instance, China bans the implantation of genetically modified embryos in women but not the research with embryos.

Last year, a group of Chinese researchers conducted gene-editing experiments on non-viable human zygotes (fertilized eggs) using CRISPR.4 News that these experiments were underway prompted a group of leading U.S. geneticists to meet in March 2015 in Napa, California, to begin a serious consideration of ethical and legal dimensions of CRISPR and called for a moratorium on research editing genes in human germline.5 Disregarding that call, the Chinese researchers published their results later in the year largely reporting a failure to precisely edit targeted genes without accidentally editing non-targets. CRISPR is not yet sufficiently precise.

CRISPR reignited an old debate on human germline research that is one of the central motivations (but surely not the only one) for an international summit on gene editing hosted by the U.S. National Academies of Sciences, the Chinese Academy of Sciences, and the U.K.'s Royal Society in December 2015. About 500 scientists as well as experts in the legal and ethical aspects of bioengineering attended.6 Rather than consensus, the meeting highlighted the significant contrasts among participants about the ethics of inquiry, and more generally, about the governance of science. Illustrative of these contrasts are the views of prominent geneticists Francis Collins, Director of the National Institutes of Health, and George Church, professor of genetics at Harvard. Collins argues that the “balance of the debate leans overwhelmingly against human germline engineering.” In turn, Church, while a signatory of the moratorium called by the Napa group, has nevertheless suggested reasons why CRISPR is shifting the balance in favor of lifting the ban on human germline experiments.7

The desire to speed up discovery of cures for heritable diseases is laudable. But tinkering with human germline is truly a human concern and cannot be presumed to be the exclusive jurisdictions of scientists, clinicians, or patients. All members of society have a stake in the evolution of CRISPR and must be part of the conversation about what kind of research should be permitted, what should be discouraged, and what disallowed. To relegate lay citizens to react to CRISPR applications—i.e. to vote with their wallets once applications hit the market—is to reduce their citizenship to consumer rights, and public participation to purchasing power.8 Yet, neither the NAS summit nor the earlier Napa meeting sought to solicit the perspectives of citizens, groups, and associations other than those already tuned in the CRISPR debates.9

The scientific community has a bond to the larger society in which it operates that in its most basic form is the bond of the scientist to her national community, is the notion that the scientist is a citizen of society before she is a denizen of science. This bond entails liberties and responsibilities that transcend the ethos and telos of science and, consequently, subordinates science to the social compact. It is worth recalling this old lesson from the history of science as we continue the public debate on gene editing. Scientists are free to hold specific moral views and prescriptions about the proper conduct of research and the ethical limits of that conduct, but they are not free to exclude the rest of society from weighing in on the debate with their own values and moral imaginations about what should be permitted and what should be banned in research. The governance of CRISPR is a question of collective choice that must be answered by means of democratic deliberation and, when irreconcilable differences arise, by the due process of democratic institutions.

Patent disputes

More heated than the ethical debate is the legal battle for key CRISPR patents that has embroiled prominent scientists involved in perfecting this method. The U.S. Patent and Trademark Office initiated a formal contestation process, called interference, in March 2016 to adjudicate the dispute. The process is likely to take years and appeals are expected to extend further in time. Challenges are also expected to patents filed internationally, including those filed with the European Patent Office.

To put this dispute in perspective, it is instructive to consider the history of CRISPR authored by one of the celebrities in gene science, Eric Lander.10 This article ignited a controversy because it understated the role of one of the parties to the patent dispute (Jennifer Doudna and Emmanuelle Charpentier), while casting the other party as truly culminating the development of this technology (Feng Zhang, who is affiliated to Lander’s Broad Institute). Some gene scientists accused Lander of tendentious inaccuracies and of trying to spin a story in a manner that favors the legal argument (and economic interest) of Zhang.

Ironically, the contentious article could be read as an argument against any particular claim to the CRISPR patents as it implicitly questions the fairness of granting exclusive rights to an invention. Lander tells the genesis of CRISPR that extends through a period of two decades and over various countries, where the protagonists are the many researchers who contributed to the cumulative knowledge in the ongoing development of the method. The very title of Lander’s piece, “The Heroes of CRISPR” highlights that the technology has not one but a plurality of authors.

A patent is a legal instrument that recognizes certain rights of the patent holder (individual, group, or organization) and at the same time denies those rights to everyone else, including those other contributors to the invention. Patent rights are thus arbitrary under the candle of history. I am not suggesting that the bureaucratic rules to grant a patent or to determine its validity are arbitrary; they have logical rationales anchored in practice and precedent. I am suggesting that in principle any exclusive assignation of rights that does not include the entire community responsible for the invention is arbitrary and thus unfair. The history of CRISPR highlights this old lesson from the history of technology: an invention does not belong to its patent holder, except in a court of law.

Some scientists may be willing to accept with resignation the unfair distribution of recognition granted by patents (or prizes like the Nobel) and find consolation in the fact that their contribution to science has real effects on people’s lives as it materializes in things like new therapies and drugs. Yet patents are also instrumental in distributing those real effects quite unevenly. Patents create monopolies that, selling their innovation at high prices, benefit only those who can afford them. The regular refrain to this charge is that without the promise of high profits, there would be no investments in innovation and no advances in life-saving medicine. What’s more, the biotech industry reminds us that start-ups will secure capital injections only if they have exclusive rights to the technologies they are developing. Yet, Editas Medicine, a biotech start-up that seeks to exploit commercial applications of CRISPR (Zhang is a stakeholder), was able to raise $94 million in its February 2016 initial public offering. That some of Editas’ key patents are disputed and were entering interference at USPTO was patently not a deterrent for those investors.

Towards a CRISPR democratic debate

Neither the governance of gene-editing research nor the management of CRISPR patents should be the exclusive responsibility of scientists. Yet, they do enjoy an advantage in public deliberations on gene editing that is derived from their technical competence and from the authority ascribed to them by society. They can use this advantage to close the public debate and monopolize its terms, or they could turn it into stewardship of a truly democratic debate about CRISPR.

The latter choice can benefit from three steps. A first step would be openness: a public willingness to consider and internalize public values that are not easily reconciled with research values. A second step would be self-restraint: publicly affirming a self-imposed ban on research with human germline and discouraging research practices that are contrary to received norms of prudence. A third useful step would be a public service orientation in the use of patents: scientists should pressure their universities, who hold title to their inventions, to preserve some degree of influence over research commercialization so that the dissemination and access to innovations is consonant with the noble aspirations of science and the public service mission of the university. Openness, self-restraint, and an orientation to service from scientists will go a long way to make of CRISPR a true servant of society and an instrument of democracy.


Other reading: See media coverage compiled by the National Academies of Sciences.

1Nature: an authoritative and accessible primer. A more technical description of applications in Hsu, P. D. et al. 2014. Cell, 157(6): 1262–1278.

2For instance, see this reflection in Science, and this in Nature.

3More about ethical concerns on gene editing here: http://www.geneticsandsociety.org/article.php?id=8711

4Liang, P. et al. 2015. Protein & Cell, 6, 363–372

5Science: A prudent path forward for genomic engineering and germline gene modification.

6Nature: NAS Gene Editing Summit.

7While Collins and Church participated in the summit, their views quoted here are from StatNews.com: A debate: Should we edit the human germline. See also Sciencenews.org: Editing human germline cells sparks ethics debate.

8Hurlbut, J. B. 2015. Limits of Responsibility, Hastings Center Report, 45(5): 11-14.

9This point is forcefully made by Sheila Jasanoff and colleagues: CRISPR Democracy, 2015 Issues in S&T, 22(1).

10Lander, E. 2016. The Heroes of CRISPR. Cell, 164(1-2): 18-28.

Image Source: © Robert Pratta / Reuters
      
 
 




academic and careers

Alternative perspectives on the Internet of Things


Editor's Note: TechTakes is a new series that collects the diverse perspectives of scholars around the Brookings Institution on technology policy issues. This first post in the series features contributions from Scott Andes, Susan Hennessey, Adie Tomer, Walter Valdivia, Darrell M. West, and Niam Yaraghi on the Internet of Things.

In the coming years, the number of devices around the world connected to the Internet of Things (IoT) will grow rapidly. Sensors located in buildings, vehicles, appliances, and clothing will create enormous quantities of data for consumers, corporations, and governments to analyze. Maximizing the benefits of IoT will require thoughtful policies. Given that IoT policy cuts across many disciplines and levels of government, who should coordinate the development of new IoT platforms? How will we secure billions of connected devices from cyberattacks? Who will have access to the data created by these devices? Below, Brookings scholars contribute their individual perspectives on the policy challenges and opportunities associated with the Internet of Things.

The Internet of Things will be everywhere

Darrell M. West is vice president and director of Governance Studies and founding director of the Center for Technology Innovation.

Humans are lovable creatures, but prone to inefficiency, ineffectiveness, and distraction. They like to do other things when they are driving such as listening to music, talking on the phone, texting, or checking email. Judging from the frequency of accidents though, many individuals believe they are more effective at multi-tasking than is actually the case.

The reality of these all too human traits is encouraging a movement from communication between computers to communication between machines. Driverless cars soon will appear on the highways in large numbers, and not just as a demonstration project. Remote monitoring devices will transmit vital signs to health providers, who then can let people know if their blood pressure has spiked or heart rhythm has shifted in a dangerous direction. Sensors in appliances will let individuals know when they are running low on milk, bread, or cereal. Thermostats will adjust their energy settings to the times when people actually are in the house, thereby saving substantial amounts of money while also protecting natural resources.

With the coming rise of a 5G network, the Internet of Things will unleash high-speed devices and a fully connected society. Advanced digital devices will enable a wide range of new applications from energy and transportation to home security and healthcare. They will help humans manage the annoyances of daily lives such as traffic jams, not being able to find parking places, or keeping track of physical fitness. The widespread adoption of smart appliances, smart energy grids, resource management tools, and health sensors will improve how people connect with one another and their electronic devices. But they also will raise serious security, privacy, and policy issues.

Implications for surveillance

Susan Hennessey is Fellow in National Security in Governance Studies at the Brookings Institution. She is the Managing Editor of the Lawfare blog, which is devoted to sober and serious discussion of "Hard National Security Choices.”

As the debate over encryption and diminished law enforcement access to communications enters the public arena, some posit the growing Internet of Things as a solution to “Going Dark.” A recently released Harvard Berkman Center report, “Don’t Panic,” concludes in part that losses of communication content will be offset by the growth of IoT and networked sensors. It argues IoT provides “prime mechanisms for surveillance: alternative vectors for information-gathering that could more than fill many of the gaps left behind by sources that have gone dark – so much so that they raise troubling questions about how exposed to eavesdropping the general public is poised to become.”

Director of National Intelligence James Clapper agrees that IoT has some surveillance potential. He recently testified before Congress that “[i]n the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.”

But intelligence gathering in the Internet age is fundamentally about finding needles in haystacks – IoT is poised to add significantly more hay than needles. Law enforcement and the intelligence community will have to develop new methods to isolate and process the magnitude of information. And Congress and the courts will have to decide how laws should govern this type of access.

For now, the unanswered question remains: How many refrigerators does it take to catch a terrorist?

IoT governance

Scott Andes is a senior policy analyst and associate fellow at the Anne T. and Robert M. Bass Initiative on Innovation and Placemaking, a part of the Centennial Scholar Initiative at the Brookings Institution.

As with many new technology platforms, the Internet of Things is often approached as revolutionary, not evolutionary technology. The refrain is that some scientific Rubicon has been crossed and the impact of IoT will come soon regardless of public policy. Instead, the role of policymakers is to ensure this new technology is leveraged within public infrastructure and doesn’t adversely affect national security or aggravate inequality. While these goals are clearly important, they all assume technological advances of IoT are staunchly within the realm of the private sector and do not justify policy intervention. However, as with almost all new technologies that catch the public’s eye—robotics, clean energy, autonomous cars, etc.—hyperbolic news reporting overstates the market readiness of these technologies, further lowering the perceived need of policy support.

The problem with this perspective is twofold. First, greater scientific breakthroughs are still needed. The current rate of improvement in processing power and data storage, miniaturization of devices, and more energy efficient sensors only begin to scratch the surface of IoT’s full potential. Advances within next-generation computational power, autonomous devices, and interoperable systems still require scientific breakthroughs and are nowhere near deployment. Second, even if the necessary technological advancements of IoT have been met, it’s not clear the U.S. economy will be the prime recipient of its economic value. Nations that lead in advanced manufacturing, like Germany, may already be better poised to export IoT-enabled products. Policymakers in the United States should view technological advancements in IoT as a global economic race that can be won through sound science policies. These should include: accelerating basic engineering research; helping that research reach the market; supporting entrepreneurs’ access to capital; and training a science and engineering-ready workforce that can scale up new technologies.

IoT will democratize innovation

Walter D. Valdivia is a fellow in the Center for Technology Innovation at Brookings.

The Internet of Things could be a wonderful thing, but not in the way we imagine it.

Today, the debate is dominated by cheerleaders or worrywarts. But their perspectives are merely two sides of the same coin: technical questions about reliability of communications and operations, and questions about system security. Our public imagination about the future is being narrowly circumscribed by these questions. However, as the Internet of Things starts to become a thing—or multiples things, or a networked plurality—it is likely to intrude so intensely into our daily lives that alternative imaginations will emerge and will demand a hearing.

A compelling vision of the future is necessary to organize and coordinate the various market and political agents who will integrate IoT into society. Technological success is usually measured in terms set by the purveyor of that vision. Traditionally, this is a small group with a financial stake in technological development: the innovating industry. However, the intrusiveness and pervasiveness of the Internet of Things will prompt ordinary citizens to augment that vision. Citizen participation will deny any group a monopoly on that vision of the future. Such a development would be a true step in the direction of democratizing innovation. It could make IoT a wonderful thing indeed.

Applications of IoT for infrastructure

Adie Tomer is a fellow at the Brookings Institution Metropolitan Policy Program and a member of the Metropolitan Infrastructure Initiative.

The Internet of Things and the built environment are a natural fit. The built environment is essentially just a collection of physical objects—from sidewalks and streets to buildings and water pipes—that all need to be managed in some capacity. Today, we measure our shared use of those objects through antiquated analog or digital systems. Think of the electricity meter on a building, or a person manually counting pedestrians on a busy city street. Digital, Internet-connected sensors promise to modernize measurement, relaying a whole suit of indicators to centralized databases tweaked to make sense of such big data.

But let’s not fool ourselves. Simply outfitting cities and metro areas with more sensors won’t solve any of our pressing urban issues. Without governance frameworks to apply the data towards goals around transportation congestion, more efficient energy use, or reduced water waste, these sensors could be just another public investment that doesn’t lead to public benefit.

The real goal for IoT in the urban space, then, is to ensure our built environment supports broader economic, social, and environmental objectives. And that’s not a technology issue—that’s a question around leadership and agenda-setting.

Applications of IoT for health care

Niam Yaraghi is a fellow in the Brookings Institution's Center for Technology Innovation.

Health care is one of the most exciting application areas for IoT. Imagine that your Fitbit could determine if you fall, are seriously hurt, and need to be rushed to hospital. It automatically pings the closest ambulance and sends a brief summary of your medical status to the EMT personnel so that they can prepare for your emergency services even before they reach the scene. On the way, the ambulance will not need to use sirens to make way since the other autonomous vehicles have already received a notification about approaching ambulance and clear the way while the red lights automatically turn green. 

IoT will definitely improve the efficiency of health care services by reducing medical redundancies and errors. This dream will come true sooner than you think. However, if we do not appropriately address the privacy and security issues of healthcare data, then IoT can be our next nightmare. What if terrorist organizations (who are becoming increasingly technology savvy) find a way to hack into Fitbit and send wrong information to an EMT? Who owns our medical data? Can we prevent Fitbit from selling our health data to third parties? Given these concerns, I believe we should design a policy framework that encourages accountability and responsibility with regards to health data. The framework should precisely define who owns data; who can collect, store, mine and use it; and what penalties will be enforced if entities acted outside of this framework.

Authors

  • Jack Karsten
      
 
 




academic and careers

The benefits of a knives-out Democratic debate

Stop whining about Democrats criticizing each other. The idea that Democrats attacking Democrats is a risk and an avenue that will deliver reelection to Donald Trump is nonsense. Democrats must attack each other and attack each other aggressively. Vetting presidential candidates, highlighting their weaknesses and the gaps in their record is essential to building a…

       




academic and careers

What drove Biden’s big wins on Super Tuesday?

Brookings Senior Fellow John Hudak looks at the results of the Super Tuesday presidential primaries and examines the factors that fueled former Vice President Joe Biden's dramatic comeback, why former Mayor Bloomberg's unlimited budget couldn't save his candidacy, and which upcoming states will be the true tests of Biden and Bernie Sanders's competing visions for…

       




academic and careers

Bernie Sanders’s failed coalition

Throughout Bernie Sanders’s presidential campaigns in 2016 and 2020, he promised to transform the Democratic Party and American politics. He promised a “revolution” that would resonate with a powerful group of Americans who have not normally participated in politics: young voters, liberal voters, and new voters. He believed that once his call went out and…

       




academic and careers

Why Bernie Sanders vastly underperformed in the 2020 primary

Senator Bernie Sanders entered the 2020 Democratic primary race with a wind at his back. With a narrow loss to Hillary Clinton in 2016 and a massive political organization, Mr. Sanders set the tone for the policy conversation in the race. Soon after announcing, the Vermont senator began raising record amounts of money, largely online…

       




academic and careers

It is time for a Cannabis Opportunity Agenda

The 2020 election season will be a transformative time for cannabis policy in the United States, particularly as it relates to racial and social justice. Candidates for the White House and members of Congress have put forward ideas, policy proposals, and legislation that have changed the conversation around cannabis legalization. The present-day focus on cannabis…

       




academic and careers

In administering the COVID-19 stimulus, the president’s role model should be Joe Biden

As America plunges into recession, Congress and President Donald Trump have approved a series of aid packages to assist businesses, the unemployed, and others impacted by COVID-19. The first three aid packages will likely be supplemented by at least a fourth package, as the nation’s leaders better understand the depth and reach of the economic…

       




academic and careers

With Sanders out, what’s next for the Democratic presidential race?

Following the withdrawal of Sen. Bernie Sanders from the 2020 presidential race, the Democrats' presumptive nominee for president will be former Vice President Joe Biden. Senior Fellow John Hudak examines how Sanders and other progressives have shifted mainstream Democratic positions, and the repercussions for the Democratic convention in August. He also looks at the leadership…

       




academic and careers

Inspectors general will drain the swamp, if Trump stops attacking them

Over the past month, President Trump has fired one inspector general, removed an acting inspector general set to oversee the pandemic response and its more than $2 trillion dollars in new funding, and publicly criticized another from the White House briefing room. These sustained attacks against the federal government’s watchdogs fly in the face of…

       




academic and careers

‘Essential’ cannabis businesses: Strategies for regulation in a time of widespread crisis

Most state governors and cannabis regulators were underprepared for the COVID-19 pandemic, a crisis is affecting every economic sector. But because the legal cannabis industry is relatively new in most places and still evolving everywhere, the challenges are even greater. What’s more, there is no history that could help us understand how the industry will endure the current economic situation. And so, in many…

       




academic and careers

Marijuana

“Reefer Madness” to legal purchase at the corner store With long-time legal and social barriers to marijuana falling across much of the United States, the time has come for an accessible and informative look at attitudes toward the dried byproduct of Cannabis sativa. Marijuana: A Short History profiles the politics and policies concerning the five-leaf…

       




academic and careers

Five books you should read to better understand Islam


After a recent talk about my ISIS book, one of the audience members asked, “What can I read to help me not hate Islam?” I don’t think it’s a scholar’s job to persuade others to love or hate any culture. But the question was sincere, so I suggested some books that have helped me better understand Islam. I also put the question to Twitter. Below is some of what I and others came up with.

Two cautions before we dive in: First, the list is obviously not exhaustive and I’ve left out overly apologetic books—in my experience, they only increase the skeptical reader’s suspicion that she’s being suckered. Second, people on Twitter gave me great suggestions but I’ve only included those I’ve read and can vouch for:

Muhammad and the Quran: Two of the best books you’ll ever read about Muhammad and the Quran are also the shortest: The Koran: A Very Short Introduction and Muhammad, both by Michael Cook. He writes with great wit and deep scholarship.

Other scriptures: Most non-Muslims are unaware that Islamic scripture is more than the Quran. It includes a vast collection of words and deeds attributed to Muhammad by later authors. These scriptures are sort of like the Gospels, and Muslim scholars fight over their authenticity like Christian scholars debate about the accuracy of Matthew, Mark, Luke, and John. These extra Islamic scriptures contain most of the teachings that make modern people (Muslims included) uncomfortable about Islam. One of the world’s experts on these scriptures, Jonathan Brown, has written a terrific book about them, Misquoting Muhammad.

Rumi: The medieval mystic’s poems about life and death are beautiful and moving, no matter your belief system. I loved his poems so much as an undergrad that I went on to study Middle Eastern languages just so I could read his work in the original. I’m glad I first viewed Islam through the eyes of Rumi and not a group like ISIS. Neither is solely representative of Islam but both draw heavily on its scriptures and reach such different conclusions.

The Bible: Many people recommended reading the Bible to decrease hate of Islam. The nerd in me leapt to the least obvious conclusion, “Ah, good idea! Reading some of the rough stuff in the Hebrew Bible is a good way to put a kindred ancient religion like Islam in perspective.” But they meant something a little less complicated:

It’s a worthy perspective today no matter your faith.

Authors

Image Source: © David Gray / Reuters
     
 
 




academic and careers

Let’s resolve to stop assuming the worst of each other in 2016


Even before the eruption of anti-Muslim rhetoric in the past several weeks, I had a privileged position from which to observe the deep current of Islamophobia that ran beneath the crust of mainstream politics over the fourteen years since 9/11. Because I work on Islamist extremism, my dad often forwards emails about Americans Muslims he receives from friends to ask if they are true. I don’t blame him for asking: they’re truly scary. Muslims imposing Sharia law over the objections of their fellow Americans. Muslims infiltrating the U.S. government to subvert it. And so on.

But as with most Internet rumors circulated over email, the vast majority of the scary reports aren’t true. Take a peek at the “25 Hottest Urban Legends” on the rumor-busting website Snopes and you’ll see what I mean. The 11th on the list is about Muslim passengers on an AirTran flight that attempted a dry run to bring down a plane (they didn’t). The 15th is about an American Muslim who oversees all U.S. immigration (she just coordinates special naturalization ceremonies). The underlying message is that American Muslims are not to be trusted because of their religion.

One reason these rumors have currency is that most Americans don’t know many of their Muslim neighbors. For all the worry of a Muslim takeover, there are only around 4 million in this country, a little over 1 percent of the total population. Most of them do not live in Republican strongholds, where they are most feared.

[A]s with most Internet rumors circulated over email, the vast majority of the scary reports aren’t true.

Of course, familiarity does not always lessen fears or tensions. But it does complicate easy stories about an unfamiliar culture and those who identify with it. For example, because I’ve worked on counterterrorism in the U.S. government, I’ve never bought the story that American Muslims are infiltrating the U.S. government to subvert it. I’ve simply met too many Muslims in the government working impossible hours to keep this country and its Constitution safe.

American Muslims have their own easy stories to tell about non-Muslims that could use some complicating. Several of my Muslim friends have been surprised at the number of non-Muslim strangers who’ve come up to them and voiced their support. They’re surprised, presumably, because they assume that most non-Muslims in this country agree with Trump's rhetoric, which they don’t.

Some American Muslims view Islamophobia a natural outgrowth of white American racism, religious bigotry, and xenophobia. That easy story may account for some Islamophobia but it ignores something major: actions by Muslims to deliberately set non-Muslims against them. Jihadist groups like al-Qaida and ISIS carry out attacks in this country to create popular backlash against Muslims in hopes of recruiting those who are angered by the backlash. 

Even though most Muslims reject the siren call of the jihadists, the backlash still leads some Muslims to expect the worst of nonbelievers and of the American government. Like the anti-Muslim rumor mill, they spread half-truths about Christian vigilante violence and government plots. For example, at least one prominent religious leader in the American Muslim community has insinuated that the San Bernardino attackers were patsies in a government conspiracy against Muslims. 

My hope is that we’ll all try to be a little less suspicious of one another’s motives and a little more suspicious of the easy stories we tell.

Since it’s the holiday season, I shall indulge in a wish for the New Year. My hope is that we’ll all try to be a little less suspicious of one another’s motives and a little more suspicious of the easy stories we tell. I know the wish is fanciful given the current political climate but I’ve been struck by the number of Americans—Muslim and non-Muslim—who have been willing to confront their biases over the past few weeks and see things from the other side. If our enemies succeed by eroding our empathy for one another, we will succeed by reinforcing and expanding it.

Authors

     
 
 




academic and careers

Experts Weigh In: What is the future of al-Qaida and the Islamic State?


Will McCants: As we wind down another year in the so-called Long War and begin another, it’s a good time to reflect on where we are in the fight against al-Qaida and its bête noire, the Islamic State. Both organizations have benefited from the chaos unleashed by the Arab Spring uprisings but they have taken different paths. Will those paths converge again or will the two organizations continue to remain at odds? Who has the best strategy at the moment? And what political changes might happen in the coming year that will reconfigure their rivalry for leadership of the global jihad?

To answer these questions, I’ve asked some of the leading experts on the two organizations to weigh in over. The first is Barak Mendelsohn, an associate professor of political science at Haverford College and a senior fellow at the Foreign Policy Research Institute (FPRI). He is author of the brand new The al-Qaeda Franchise: The Expansion of al-Qaeda and Its Consequences.


Barak Mendelsohn: Al-Qaida attacked the U.S. homeland on 9/11, unprepared for what would follow. There was a strong disconnect between al-Qaida’s meager capabilities and its strategic objectives of crippling the United States and of bringing about change in the Middle East. To bridge that gap, Osama bin Laden conveniently and unrealistically assumed that the attack on the United States would lead the Muslim masses and all other armed Islamist forces to join his cause. The collapse of the Taliban regime and the decimation of al-Qaida’s ranks quickly proved him wrong.

Yet over fourteen years later al-Qaida is still around. Despite its unrealistic political vision and considerable setbacks—above all the rise of the Islamic State that upstaged al-Qaida and threatened its survival—it has branches in North Africa, the Arabian Peninsula, the Levant, Central Asia, and the Horn of Africa.

Down, but not out

Two factors explain al-Qaida’s resilience: changes in the environment due to the Arab revolutions and the group’s ability to take advantage of new opportunities by learning from past mistakes. The Arab awakening initially undercut al-Qaida’s original claims that change in Muslim countries cannot come peacefully or without first weakening the United States. Yet, the violence of regimes against their people in Syria, Libya, and elsewhere created new opportunities for al-Qaida to demonstrate its relevance. Furthermore, involved citizens determined to shape their own future presented al-Qaida with a new opportunity to recruit. 

But favorable conditions would be insufficient to explain al-Qaida’s resilience without changes in the way al-Qaida operates. Learning from its bitter experience in Iraq, al-Qaida opted to act with some moderation. It embedded itself among rebel movements in Syria and Yemen, thus showing it could be a constructive actor, attentive to the needs of the people and willing to cooperate with a wide array of groups. As part of a broader movement, al-Qaida’s affiliates in these countries also gained a measure of protection from external enemies reluctant to alienate the group’s new allies. 

[E]ven after showing some moderation, al-Qaida’s project is still too extreme for the overwhelming majority of Muslims.

At present, the greatest threat to al-Qaida is not the United States or the Arab regimes; it’s the group’s former affiliate in Iraq, the Islamic State. ISIS is pressuring al-Qaida’s affiliates to defect—while it has failed so far to shift their allegiance, it has deepened cracks within the branches and persuaded small groups of al-Qaida members to change sides. Even if al-Qaida manages to survive the Islamic State’s challenge, in the long term it still faces a fundamental problem that is unlikely to change: even after showing some moderation, al-Qaida’s project is still too extreme for the overwhelming majority of Muslims.

Up, but not forever

With the United States seeking retrenchment and Middle Eastern regimes weakening, the Islamic State came to prominence under more convenient conditions and pursued a different strategy. Instead of wasting its energy on fighting the United States first, ISIS opted to establish a caliphate on the ruins of disintegrating Middle Eastern states. It has thrived on the chaos of the Arab rebellions. But in contrast to al-Qaida, it went beyond offering protection to oppressed Sunni Muslims by promoting a positive message of hope and pride. It does not merely empower Muslims to fend off attacks on their lives, property, and honor; the Islamic State offers its enthusiastic followers an historic chance to build a utopian order and restore the early Islamic empire or caliphate.

ISIS opted to establish a caliphate on the ruins of disintegrating Middle Eastern states. It has thrived on the chaos of the Arab rebellions.

The Islamic State’s leaders gambled that their impressive warfighting skills, the weakness of their opponents, and the reluctance of the United States to fight another war in the Middle East would allow the group to conquer and then govern territory. The gamble paid off. Not only did ISIS succeed in controlling vast territory, including the cities of Raqqa and Mosul; the slow response to its rise allowed the Islamic State’s propaganda machine to construct a narrative of invincibility and inevitability, which has, in turn, increased its appeal to new recruits and facilitated further expansion.

And yet, the Islamic State’s prospects of success are low. Its miscalculations are threatening to undo much of its success. It prematurely and unnecessarily provoked an American intervention that, through a combination of bombings from the air and skilled Kurdish proxies on the ground, is limiting the Islamic State’s ability to expand and even reversing some of the group’s gains. 

ISIS could settle for consolidating its caliphate in the territories it currently controls, but its hubris and messianic zeal do not allow for such limited goals. It is committed to pursuing military expansion alongside its state-building project. This rigid commitment to two incompatible objectives is perhaps the Islamic State’s biggest weakness. 

[T]he slow response to its rise allowed the Islamic State’s propaganda machine to construct a narrative of invincibility and inevitability.

Rather than pursue an economic plan that would guarantee the caliphate’s survival, the Islamic State has linked its economic viability to its military expansion. At present, ISIS relies on taxing its population and oil sales to support its flailing economy. But these financial resources cannot sustain a state, particularly one bent on simultaneously fighting multiple enemies on numerous fronts. Ironically, rather than taming its aspirations, the Islamic State sees conquest as the way to promote its state-building goals. Its plan for growing the economy is based on the extraction of resources through military expansion. While this plan worked well at first—when the Islamic State faced weak enemies—it is not a viable solution any longer, as the self-declared caliphate can no longer expand fast enough to meet its needs. Consequently, this strategy is undermining ISIS rather than strengthening it. 

Unfortunately, even if the Islamic State is bound to fail over the long run, it has had enough time to wreak havoc on other states in the neighborhood. And while its ability to govern is likely to continue diminishing, the terror attacks in Paris, Beirut, and Sinai suggest that the Islamic State will remain capable of causing much pain for a long time.

Authors

     
 
 




academic and careers

Amid rising fears of ISIS, Obama must reassure


As President Obama prepares to give the final State of the Union address of his presidency tonight, he’s promised to stay away from the technocrat’s laundry list of to-do’s. Instead, he’s expected to deliver a speech that will remind his fellow citizens of their ability to “come together as one American family.” It’s going to be a tough sell, especially when the citizens are terrified of outsiders and suspicious of one another.

Most of the fear and paranoia revolves around the Islamic State group. Although the group poses far less of a threat to the United States than to our allies and friends in Europe and the Middle East, it is the sum of all fears in the minds of many Americans—an immigrant, terrorist, cyber, WMD, genocidal threat rolled into one. Its name alone can be invoked to indict Obama’s national security and immigration policies—substantive criticisms are unnecessary.

[T]he Islamic State group...is the sum of all fears in the minds of many Americans.

Most of those fears are overblown, but the president will want to tackle them each of them in his speech if he intends to calm fears and bring people together. He’ll explain why taking in refugees is not just living up to American values but also smart counterterrorism. He’ll showcase evidence that the military campaign against the Islamic State in the Middle East is bearing fruit. He’ll reassure Americans that the Islamic State can’t plant a skilled operative into this country and remind them that the best way to stop the unskilled lone wolf shooters inspired by the Islamic State is to close gun loop holes and monitor their behavior online before they act. He’ll demonstrate his commitment to blunting Islamic State recruitment, touting changes to how the government counters the Islamic State’s appeal online and in America’s big cities.

All of that is well and good, but it’s a bureaucrat’s (or think tanker’s) effort at reassuring the public. To truly succeed in mitigating America’s fears and bringing citizens together, our country’s leader has to acknowledge that their fears are real and explain what our enemies hope to gain by engendering them. While Americans’ fears may be overblown, they won’t be deflated by technocratic hot air.

Authors

     
 
 




academic and careers

Why the United States can't make a magazine like ISIS


Editors' Note: How can the U.S. government better counter ISIS propaganda? As the State Department overhauls its counter messaging program, Will McCants and Clint Watts examine what makes ISIS’s online magazine, Dabiq, so successful, and the obstacles to the U.S. government producing a publication that effective. This piece originally appeared on The Daily Beast.

The Obama administration attributes much of ISIS’s success at communicating to its technological savvy, which has elevated the group to a global media and terrorist phenomenon. The president has gone so far as to say that the Paris attackers were a “bunch of killers with good social media.”

Despite the praise heaped on the so-called Islamic State for its cutting-edge propaganda online, one of its most effective products is decidedly low tech. Dabiq, ISIS’s online news magazine, has a small but devoted readership that spans the globe. News of advances on the battlefield excite them—more evidence that God’s kingdom on earth has returned and grows. Stories of fighters inspire them—more models to emulate as they contemplate what role they can play in the divine drama unfolding.

Journalists and analysts read it with almost the same intensity as ISIS fans; the contents of each volume fill newspapers and think-tank reports soon after it’s released. And no wonder: the magazine clearly states the organization’s goals; provides news of its activities that advance those goals; showcases personal stories of the people engaged in the activities; and announces major developments in the organization’s fight against its enemies. It’s a wealth of information presented between two covers every few months.

Can you name a single U.S. government publication or online platform devoted to the anti-ISIS fight that is as informative or as widely-read as Dabiq? Is there anything that tells us what all these air sorties are for? Who’s fighting this fight on the ground? What advances the coalition has made and why we should we care? We couldn’t come up with one either.

That got us to thinking: why can’t the U.S. government publish something like Dabiq online? Lack of imagination isn’t the reason. A news magazine isn’t a very creative idea—Americans perfected the form, which ISIS copied. And if anything, folks inside the government have too many overly-imaginative ideas, most of them involving whiz-bang technology. If you’ve thought it, they’ve thought it. A social media campaign for youth to come up with ways to counter violent extremism? Check. Sock-puppetry? Check.

The only real obstacle impeding the U.S. government is itself. The executive branch’s complicated bureaucracy, legal strictures, and sensitivity to criticism from media and Congress make it tough to publish a Dabiq-style magazine. To see what we mean, let’s look at two of Dabiq’s regular features and see what would happen if the U.S. government tried to mimic them:

Attack Reports: Each issue of Dabiq details its attacks on its enemies. One entry in issue 12 chronicled ISIS’s efforts to capture an airbase in Dayr al-Zawr, Syria. Another described four suicide attacks on the Saudi-led coalition fighting southern Yemen. Pictures accompany most entries, some quite gruesome.

The U.S. government routinely writes these types of reports for internal consumption. But when they’re public—and thus under the scrutiny of Congress that holds the pursestrings and the media that holds the careerstrings—routine gives way to caution and quarreling.

If the president asks his government to write attack reports for the public, the U.S. Department of State and the Department of Defense will quarrel about who will take the lead in writing and publishing them. Then they and the intelligence agencies will quarrel over which reports should be included. Will this report counter the president’s insistence that we have no boots on the ground? Will that report make it look like our Iraqi partners aren’t carrying their weight? Does this one tell the enemy too much about our game plan? Does that picture make U.S. soldiers look too menacing? Will this report later be discredited by the media? Will these battlefield successes be reversed in the future? Does anyone know if another agency has said this or its opposite? Will anyone trust what we’re saying? Shouldn’t someone else be saying this?

When something finally slides off the serpentine conveyor belt months later, it will be a bland blob devoid of detail and relevance. Meanwhile, ISIS will have added twelve more volumes to its shelves.

Biographies of Fighters: Dabiq sometimes profiles its fighters, including the young men on the front lines dying for ISIS’s cause. The fighters tell their stories and explain their reasons for fighting. In issue 8, for example, there is a Q&A with the man who murdered a prominent politician in Tunisia. He explains why he did it and how it advances the greater goals of the Islamic State.

The United States military used to feature these sorts of stories, too—back when the American war in Iraq was a massive, overt affair. Now, that’s not the case. The identities of the Americans fighting in Syria and Iraq are a well-guarded secret because the government does not want them or their families to become targets. The government would also frown on them for nonchalantly talking about killing lest the American public get upset. And then there’s that boots on the ground thing.

Without personal stories, we’re left with drones buzzing in the sky, and buzz-cut officers droning through stale Pentagon briefings. The human cost on both sides is reduced to numbers on slides, which means Americans can’t appreciate the true costs of war and foreigners can’t appreciate the sacrifices Americans are making on their behalf.

Some readers might feel that the U.S. government should be constrained in these ways. They want the government to be sensitive to public opinion and exceedingly cautious when talking about war and violence. If so, they shouldn’t complain when the U.S. government explains its anti-ISIS fight in the vaguest possible terms—that’s the outcome of extreme caution compounded by bureaucratic bargaining on a mind-boggling scale. Others might feel we need to reform the way government does messaging. If so, don’t propose to change the system first. Rather, ask the system to perform a simple task like the one we’ve described and see where it breaks down. Then you’ll know what to fix.

Making a news magazine probably isn’t the high tech solution the government is looking for, at least judging by Friday’s pilgrimage of senior security officials to Silicon Valley and the revamping of State Department’s online counter messaging campaign. But if our byzantine, poll-sensitive government can’t do something so basic, it won’t perform better when it’s tasked with something more complicated no matter how much technology it uses.

Authors

Image Source: © Stringer . / Reuters
     
 
 




academic and careers

Experts weigh in (part 2): What is the future of al-Qaida and the Islamic State?


Will McCants: As we begin another year in the so-called Long War, it’s a good time to reflect on where we are in the fight against al-Qaida and its bête noire, the Islamic State. Both organizations have benefited from the chaos unleashed by the Arab Spring uprisings but they have taken different paths. Will those paths converge again or will the two organizations continue to remain at odds? Who has the best strategy at the moment? And what political changes might happen in the coming year that will reconfigure their rivalry for leadership of the global jihad?

To answer these questions, I’ve asked some of the leading experts on the two organizations to weigh in. First was Barak Mendelsohn, who contrasts al-Qaida’s resilience and emphasis on Sunni oppression with the Islamic State’s focus on building a utopian order and restoring the caliphate.

Next is Clint Watts, a Fox fellow at the Foreign Policy Research Institute. He offers ways to avoid the flawed assumptions that have led to mistaken counterterrorism forecasts in recent years. 


Clint Watts: Two years ago today, counterterrorism forecasts focused on a “resurgent” al-Qaida. Debates over whether al-Qaida was again winning the war on terror ensued just a week before the Islamic State invaded Mosul. While Washington’s al-Qaida debates steamed away in 2013, Ayman al-Zawahiri’s al-Qaida suffered unprecedented internal setbacks from a disobedient, rogue affiliate formerly known as al-Qaida in Iraq (AQI). With terror predictions two years ago so far off the mark, should we even attempt to anticipate what the next two years of al-Qaida and ISIS will bring?

Rather than prognosticate about how more than a dozen extremist groups operating on four continents might commit violence in the future, analysts might instead examine flawed assumptions that resulted in the strategic surprise known as the Islamic State. Here are insights from last decade’s jihadi shifts we should consider when making forecasts on al-Qaida and the Islamic State’s future in the coming decade. 

Loyalty is fleeting, self-interest is forever. Analysts that missed the Islamic State’s rise assumed that those who pledged allegiance to al-Qaida would remain loyal indefinitely. But loyalties change despite the oaths that bind them. Abu Bakr al-Baghdadi and the Islamic State’s leaders used technicalities to slip their commitments to al-Qaida. Boko Haram has rapidly gone from al-Qaida wannabe to Islamic State devotee. 

In short, jihadi pledges of loyalty should not be seen as binding or enduring, but instead temporary. When a group’s fortunes wane or leaders change, allegiance will rapidly shift to whatever strain of jihad proves most advantageous to the group or its leader. Prestige, money, manpower—these drive pledges of allegiance, not ideology. 

Al-Qaida and the Islamic State do not think solely about destroying the United States and its Western allies. Although global jihadi groups always call for attacks on the West, they don’t always deliver. Either they can’t or they have other priorities, like attacking closer to home. So jihadi propaganda alone does not tell us much about how the group is going to behave in the future. 

Zawahiri, for example, has publicly called on al-Qaida’s affiliates to carry out attacks on the West. But privately, he has instructed his affiliate in Syria to hold off. And for most of its history, the Islamic State focused on attacking the near enemy in the Middle East rather than the far enemy overseas, despite repeatedly vowing to hit the United States. Both groups will take advantage of any easy opportunity to strike the United States. However, continuing to frame future forecasts through an America-centric lens will yield analysis that’s off the mark and of questionable utility.

[J]ihadi propaganda alone does not tell us much about how the group is going to behave in the future.

Al-Qaida and the Islamic State don’t control all of the actions of their affiliates. News headlines lead casual readers to believe al-Qaida and the Islamic State command and control vast networks operating under a unified strategic plan. But a year ago, the Charlie Hebdo attack in Paris caught al-Qaida in the Arabian Peninsula (AQAP) completely by surprise—despite one of the attackers attributing the assault to the group. Al-Qaeda in the Islamic Maghreb's (AQIM) recent spate of attacks in Mali and Burkina Faso were likely conducted independently of al-Qaida’s central leadership. While the Islamic State has clearly mobilized its network and inspired others to execute a broad range of international attacks, the group’s central leadership in Iraq and Syria closely manages only a small subset of these plots. 

At no time since the birth of al-Qaida have jihadi affiliates and networks operated with such independence. Since Osama bin Laden’s death, al-Qaida affiliates in Yemen, the Sahel, Somalia, and Syria all aggressively sought to form states—a strategy bin Laden advised against. Target selections and the rapid pace of plots by militants in both networks suggest local dynamics rather than a cohesive, global grand strategy drive today’s jihad. Accurately anticipating the competition and cooperation of such a wide array of terrorist affiliates with overlapping allegiances to both groups will require examination by teams of analysts with a range of expertise rather than single pundits. 

At no time since the birth of al-Qaida have jihadi affiliates and networks operated with such independence.

Both groups and their affiliates will be increasingly enticed to align with state sponsors and other non-jihadi, non-state actors. The more money al-Qaida and the Islamic State have, the more leverage they have over their affiliates. But when the money dries up—as it did in al-Qaida’s case and will in the Islamic State’s—the affiliates will look elsewhere to sustain themselves. Distant affiliates will seek new suitors or create new enterprises. 

Inevitably, some of the affiliates will look to states that are willing to fund them in proxy wars against their mutual adversaries. Iran, despite fighting the Islamic State in Syria, might be enticed to support Islamic State terrorism inside Saudi Arabia’s borders. Saudi Arabia could easily use AQAP as an ally against the Iranian backed Houthi in Yemen. African nations may find it easier to pay off jihadi groups threatening their countries than face persistent destabilizing attacks in their cities. When money becomes scarce, the affiliates of al-Qaida and the Islamic State will have fewer qualms about taking money from their ideological enemies if they share common short-term interests. 

If you want to predict the future direction of the Islamic State and al-Qaida, avoid the flawed assumptions noted above. Instead, I offer these three notes: 

  1. First, look to regional terrorism forecasts illuminating local nuances routinely overlooked in big global assessments of al-Qaida and the Islamic State. Depending on the region, either the Islamic State or al-Qaida may reign supreme and their ascendance will be driven more by local than global forces. 
  2. Second, watch the migration of surviving foreign fighters from the Islamic State’s decline in Iraq and Syria. Their refuge will be our future trouble spot. 
  3. Third, don’t try to anticipate too far into the future. Since bin Laden’s death, the terrorist landscape has become more diffuse, a half dozen affiliates have risen and fallen, and the Arab Spring went from great hope for democracies to protracted quagmires across the Middle East. 

Today’s terrorism picture remains complex, volatile, and muddled. There’s no reason to believe tomorrow’s will be anything different.

Authors

     
 
 




academic and careers

Experts weigh in (part 2): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago.

Next up is Aymenn al-Tamimi, a Jihad-Intel research fellow at the Middle East Forum, who argues that internal documents show increasing challenges for the Islamic State. 


Aymenn al-Tamimi: There are a variety of ways to assess Islamic State (or ISIS) governance over its territories. One angle involves trying to talk to residents living within ISIS-controlled lands, and indeed this is the primary line of evidence Mara Revkin relies on in her piece assessing ISIS administration.

While oral testimony may produce some interesting observations on ISIS governance, it is also beset with difficulties in reliability and corroboration. The ISIS system of rule is a totalitarian dictatorship, on the lookout for anyone who could be deemed to be collaborating with the outside world. As such, residents may be reluctant to criticize, out of fear that they could be accused of leaking information harmful to ISIS. That can get a person disappeared or publicly executed. 

Last year, when I was speaking with a friend living in the western Anbar town of Rawa, he initially said that most residents preferred life under ISIS: 

“We are not content like before but I and most of the people here prefer living under the shade of the Islamic State, as no soldier comes upon our lands, and now I assure you that all the people of Rawa will fight in one rank against the [Iraqi] army if it tries to advance an inch because the army won’t have mercy on anyone…and this is the truth…and I give you knowledge of the sentiment among most of the people who were persecuted by the army but had committed no crime or fault, but we only lack [national grid] electricity.” 

At first glance, his sentiments seem quite understandable. Harassment, mass arrests, and disappearances in prisons of Iraqi Sunnis by the Baghdad government’s security forces were common grievances—maybe they have more weight than loss of access to public services like the national electricity grid, from which most areas under IS control have now been cut off. 

Yet in a subsequent conversation, in which I inquired about any publications ISIS had distributed in his area, the fear of ISIS became very apparent: 

“Brother, you know why I am cautious in giving you information: because the Internet is being monitored. And I want to know what you will do with it and whether this thing will harm the Dawla [ISIS], because after God Almighty and Exalted is He, we don’t have anything besides the Islamic State, and I fear having a [negative] effect on them.” 

Another resident of Rawa refused to discuss anything about life in the town, with the same concern about Internet communication being monitored by ISIS. 

These examples offer a glimpse into the challenges of understanding ISIS administration through local testimony. How can we be sure the testimony is not compromised on account of fear? It is of course possible to find people critical of ISIS living within its territories: for instance, a relative in Mosul told me a year ago that 90 percent of the city’s inhabitants prefer life before ISIS, but said fear prevents them from expressing their true feelings. But how does one even verify that claim? 

Cracks in the system

With clear shortcomings in oral testimony, I prefer to focus instead on internal ISIS documents to understand the evolution in governance—as well as problems facing ISIS that we don’t see in the endless streams of propaganda. To be sure, this method also has limitations: though I have managed to compile hundreds of documents so far, they likely constitute only a small fraction of the whole cache. Only if the ISIS project collapses with loss of major strongholds like Raqqa and Mosul—and hopefully the capture of tens of thousands of documents—will we get a fuller picture. 

Even so, the documents unearthed so far yield a number of important insights. The ISIS bureaucracy is ostensibly comprehensive and impressive, but it is clear that as time progresses, the state project is facing challenges due to pressure from its enemies. 

Only if the ISIS project collapses with loss of major strongholds like Raqqa and Mosul—and hopefully the capture of tens of thousands of documents—will we get a fuller picture.

For example, in mid-2015, the agricultural department issued a general notification urging people to conserve grain stocks on account of the “economic war” being waged by the coalition against ISIS, indicating that agricultural output in ISIS territories was in trouble. In addition, while ISIS makes no secret of its appeals for medical personnel to come to the caliphate, internal documents show that brain-drain is also a problem: multiple ultimatums have been issued, calling for medical professionals to return to ISIS lands or risk having their property confiscated. 

While ISIS would like to cultivate a new generation of professionals, the only real existing institution is Mosul University, which practically remains open only to Iraqi students. ISIS closed some departments on the grounds of contravening its ideology, and even those that remain open cannot function, likely owing to the wider issue of brain drain.

Documents also show great concern about the anti-ISIS coalition’s ability to launch airstrikes on high-profile targets. Worried about data security, the ISIS leadership increasingly attempts to restrict all broadcasting of information to its own channels. It has warned fighters and commanders not to open social media accounts or use mobiles, and recently banned satellite television.

Cash rules everything

Finally, for all the criticisms of the anti-ISIS coalition’s strategies, it is clear that they have significantly dented the group’s financial revenues. The Iraqi government no longer pays salaries of workers living under ISIS rule, airstrikes have hit ISIS-owned assets in the oil industry, Kurdish People's Protection Units (YPG) have taken the key Syria-Turkey border point of Tel Abyad, and Turkey has tightened security on remaining border areas under ISIS control. 

As a result, ISIS has reduced expenditures and increased taxation on its populations. In Mosul, for instance, ISIS imposed all costs for printing textbooks on school students. From Raqqa province, a memo dating to November/December 2015 established a 50 percent pay cut for all fighters, regardless of rank. The latter pointed to “the exceptional circumstances” ISIS is facing (referring, no doubt, to financial troubles). This is particularly significant as a financial budget I obtained from Deir az-Zor province shows that military upkeep—primarily in the form of fighters’ salaries—can be reasonably estimated to account for two-thirds of ISIS expenditures. These pay cuts may exacerbate problems of military cohesion in ISIS’s ranks—evidenced by a month-long general amnesty issued in October 2015 for deserters, and the failures of mobilization efforts to stop the Assad regime and Iran from breaking the ISIS siege of Kweiris airbase in Aleppo province.

Bring the fight home

For all of these insights into internal challenges for the ISIS project, I deem the prospect of collapse from an internal revolt unlikely. It is evident that internal opponents of ISIS face a stifling environment, and no one to date has offered them an alternative model of governance. Any internal uprisings that do occur—such as the Sha’itat revolt in Deir az-Zor province back in 2014—have been put down with ruthless efficiency. From the economic side, the group’s financial difficulties are unlikely to translate into total collapse, as it’s impossible to completely seal off cash flow between ISIS and the outside world. 

All of this shows that it will be up to outside forces to take the fight against ISIS to its heartlands.

Authors

     
 
 




academic and careers

Experts weigh in (part 3): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago.

Next up was Aymenn al-Tamimi, a Jihad-Intel research fellow at the Middle East Forum, who argued that internal documents show increasing challenges for the Islamic State. 

This time, we’ve asked Aaron Zelin, the Richard Borow Fellow at the Washington Institute for Near East Policy, to weigh in with a historical perspective.


Aaron Zelin: Attempts by salafi-jihadis to create states or govern territory are not a new phenomenon. Even for the Islamic State (IS), this is its second attempt at establishing a state and governing territories it controls. What sets it apart this time is the level of planning, sophistication, and capabilities compared to ten years ago.

Unlike the prior pieces in this series, I hope to present a historical perspective on IS governance, since I do not think one can be separate from the other.

The first state

In October 2006—when the Islamic State of Iraq (ISI) was declared—the leader of al-Qaida in the Land of Two Rivers (better known as AQI), Abu Ayyub al-Masri (Abu Hamza al-Muhajir) pledged allegiance to the new self-declared leader of the faithful, Abu ‘Umar al-Baghdadi. In a January 2007 book, ISI’s Shaykh ‘Uthman ‘Abd al-Rahman al-Tamimi explains the rationale for declaring the state. In it, he also outlines the state’s responsibilities for areas it controls: prosecuting criminals and sinners, implementation of the hudud (fixed punishments in the Qur’an and Hadith), mediating and resolving conflicts, providing security, distributing food and relief, and selling oil and gas. 

Although it called itself a state, the Islamic State of Iraq controlled only small amounts of territory, for limited periods of time—in no small part because of the American military occupation, but also due to insurgent and tribal competition for power. It attempted to show a veneer of legitimacy by establishing a cabinet of ministries in April 2007 and September 2009. Because of ISI’s limitations, it was nearly impossible to resolve conflicts, provide security, distribute food and relief, or sell oil and gas. Instead, it fell back on mostly only instituting hisba (moral policing) activities and targeting enemies as murtadin (apostates) and therefore legitimate to target and kill. Ten years ago, therefore, ISI did not live up to its own standards of governance excellence.

Ten years ago, therefore, ISI did not live up to its own standards of governance excellence.

ISI killed and kidnapped leaders from prior allies—such as the Islamic Army of Iraq, Ansar al-Sunnah, and other insurgent factions—because they were unwilling to pledge allegiance to al-Baghdadi. It required female residents to wear the niqab, burned down beauty salons and stores selling music, flogged individuals for drinking alcohol or smoking cigarettes, and banned barbers’ use of electric razors. ISI also banned positioning certain fruits next to one another at markets out of concerns over sexual innuendo, as well as banned the local bread (samun) and the use of ice. In town after town, this precipitated what eventually became known as the tribal sahwa, or awakening. That, along with the U.S. military surge in Iraq, tactically defeated ISI by 2009.

Towards a second state

Since ISI was only tactically and not strategically defeated, it used the American drawdown of troops that ended in December 2011, Sunni grievances with the Nouri al-Maliki regime in Baghdad, and most importantly the battlefield next door in Syria to rebuild its infrastructure and capabilities. As I noted in March 2013, a month before it changed its name to the Islamic State of Iraq and al-Sham (ISIS): “Through sectarian rhetoric, [ISI] will use the Syrian fight to try and gain more recruits in Iraq and redeem itself for its lost opportunity last decade.” Indeed it did. This time proved much different than a decade earlier. It also had a provisional position paper that outlined how it sought to take over territory and govern.

Prior to the infighting that began in January 2014 between ISIS and revolutionary, Islamist, and other jihadi factions in Syria, there was an understanding among the different insurgent forces against the Assad regime. As a consequence, ISIS was able to embed itself within the broader anti-Assad coalition even if other factions were wary of it—unlike now, when IS has pariah status. From April 2013 to January 2014, ISIS’s main focus was to present itself in a positive light to the Syrian population through da’wa (missionary) forums and by providing services. It also conducted softer moral policing, such as burning cigarettes or confiscating alcohol. But similar to a decade ago, it also killed other leaders from Syrian insurgent factions, prompting backlash. ISIS was pushed out of Latakia, Idlib, and parts of Aleppo governorates between January and March 2014. 

This led to ISIS’s independent consolidation of territory farther to the east in the Raqqa governorate and parts of Dair al-Zour governorate. It is also when more harsh punishments began to appear, such as cutting off hands for robbery or crucifying alleged apostates. In this period, ISIS also sought to appear as a state-like entity, showing off its various administrative departments including its da’wa offices, shariah courts, religious schools, police stations, and local municipalities, among others. It was an uneven process across its proto-wilayat (provinces) until its June 2014 declaration of the Caliphate, when ISIS changed its name again—to IS.

The second state

Since then, based on my review of thousands of IS media releases, a pattern emerged in IS attempts to expand, take over new territory, and consolidate its control. IS’s systematizing, bureaucratizing, and formalizing its governance structures allow it to operate consistently and in parallel across its various wilayat. This governance model can equally be applied in its core territory of Iraq and Syria as well as various other provinces. It is far more advanced than its prior incarnations, let alone al-Qaida branches (the closest instance being al-Shabab in Somalia).

IS’s systematizing, bureaucratizing, and formalizing its governance structures allow it to operate consistently and in parallel across its various wilayat.

My research demonstrates that IS state-building exhibits two stages: pre- or partial territorial control and full territorial control. Within these two categories are five phases of establishing control: intelligence, military, da’wa, hisba (consumer protection and moral policing), and governance. Although hisba would generally be considered part of IS’s governance apparatus, I separated the two—this helps distinguish the level of advancement and sophistication associated with meting out justice, versus that associated with actual services, administration, and economic activity, since the former is easier to implement than the latter. More details with specifics and case studies can be found here.

When compared with its first state as ISI and its building toward a second state as ISIS, the post-June 2014 IS structures, plans, and implementation are far superior.

When compared with its first state as ISI and its building toward a second state as ISIS, the post-June 2014 IS structures, plans, and implementation are far superior. Further, depending on the date and the particular province, IS did live up to its own standards of governance. That’s not to legitimize it, but rather to understand it on its own terms. This increased efficacy illustrates the organization’s ability to learn from past experiences. It also suggests that IS may apply lessons learned as more of its governance plays out in areas outside of Iraq and Syria—especially in Libya, but possibly even in Yemen or Afghanistan in the future. New knowledge will sharpen IS’s thinking and continue its growth and evolution as well as shorten its learning curve.

Therefore, aspects of the IS model could shift in the future. Moreover, since the American-led airstrikes began, its capabilities have been slowly diminished. As a result, it is currently difficult to determine whether IS is living up to its standards anymore.

Moreover, since the American-led airstrikes began, its capabilities have been slowly diminished. As a result, it is currently difficult to determine whether IS is living up to its standards anymore.

Watch and learn

Similar to IS, al-Qaida is in the process of learning lessons from the governance experience of the ISI in the mid-2000s. It is also looking back on its first attempted cases of governance activities by its own branches in the past several years in Somalia, Yemen, Mali, and Syria. Unlike IS, al-Qaida is attempting to root itself into local insurgencies in Libya, Syria, Yemen, and Mali, and not play a monopolizing role (at least for now). The second governance attempt by al-Qaeda in the Arabian Peninsula (AQAP) is still in its infancy, but its performance will provide more answers about the evolution in al-Qaida’s thinking on governance and how it differs from IS’s second governance attempt. 

The establishment of jihadi governance projects are a new normal. For now, it’s clear that IS has set a higher standard when compared to its earlier attempt a decade ago and to al-Qaida’s present governance. But the question going forward is whether either IS’s or al-Qaida’s models (or both) will be able to self-sustain in the long-term as they continue to incorporate lessons learned.

Authors

     
 
 




academic and careers

Experts weigh in (part 4): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance.

Now, we have Kamran Bokhari, a fellow with George Washington University's Program on Extremism, to argue that security—namely defending territory—is the foremost governance objective of ISIS in the short term.


Kamran Bokhari: Ascertaining the extent to which ISIS excels at governing requires, among other things, an understanding of its imperatives and capabilities. The most fundamental act of governance for any state is protecting its territory. With many of the world’s most powerful militaries now dedicating significant resources towards the Islamic State’s destruction, the group has its work cut out for it in this regard. Defending its current territorial holdings in Syria and Iraq (and expanding if and where possible) is the single most critical imperative for ISIS.

This is not to say that other aspects of governance, including those detailed by Mara Revkin, Aymenn al-Tamimi, and Aaron Zelin, are not priorities for ISIS. The polity erected by the transnational jihadist movement cannot hope to survive—much less expand—without the provision of essential services such as sanitation, utilities, healthcare, and education to its citizenry. However, ISIS can only focus so much on these functions when the areas it controls are under attack on multiple fronts. In the last few months, it has lost ground in certain areas—largely in Iraq—but its core turf in Syria remains intact. 

This resilience should sharpen the focus of U.S. and Western military and intelligence institutions. At present, analysts and policymakers focus too much on ISIS’s ideology and too little on its war-making tradecraft. Radicalization is necessary but not sufficient to produce violence—definitely not on the scale that ISIS has demonstrated. The geopolitical real estate directly under ISIS control in Syria and Iraq is about the size of the state of New York; if we include the swathes of land where it enjoys relative freedom of operation, it’s approximately as big as Great Britain. 

Defending such a wide expanse against ground assaults, airstrikes, special operations forces missions, as well as human and signals intelligence probes requires elaborate institutionalization. Aaron Zelin details how ISIS systematized bureaucratic structures between the fall of its first attempt at statehood (2006 to 2009) and its second incarnation (2011 to the present). During these periods, it crucially developed a multi-divisional conventional military and counter-intelligence. In addition to its primary need to defend its nascent state, the jihadist movement has spent most of its existence developing military and intelligence capabilities, which played a key role in its emergence as the most potent rebel force in post-Arab spring Syria. 

Where did ISIS leaders pick up their self-defense strategies? One answer is al-Qaida, though many analysts over-emphasize that linkage. ISIS leadership has also likely studied the rise and fall of the Islamic Emirate of Afghanistan. Run by the Afghan Taliban, the Emirate was the first and only contemporary jihadist movement to have established a state of any significance before ISIS. There are differences, of course. The Taliban emirate was based within the confines of the Afghan nation-state, and enjoyed active backing from Pakistan and other Gulf Arab states. Furthermore, ISIS leader Abu Bakr al-Baghdadi has denounced the movement founded by Mullah Mohammed Omar as a “deviant” entity. However, the experiences of the Afghan Taliban from 1996 to 2001 offer very valuable lessons for ISIS—all the more since the latter’s caliphate rejects national boundaries and lacks state sponsorship. 

Security first

ISIS leaders fear losing their nascent state in the face of growing economic and military pressures. They seek to avoid, in particular, the circumstances that allowed for the collapse of the Taliban regime following the September 11 attacks. Many have asked why ISIS would engage in transcontinental attacks in the West if its primary aim is the preservation of its polity. As Shadi Hamid has discussed, ISIS likely does not view its terrorist attacks like the one in Paris as undermining its state. I would actually argue that ISIS sees a U.S. ground intervention as only helping its cause. What it fears is a more complex approach from the Americans involving Syrian boots on the ground. 

Thus in many ways, ISIS’s caliphate today faces circumstances similar to the ones that the Taliban emirate did in late 2001. The U.S.-led coalition against the Taliban launched airstrikes, while intelligence and special operations forces supported an anti-Taliban militia coalition, the proverbial “boots on the ground.” Fast-forward 15 years, and the battlespace that ISIS finds itself in—though much more complex—has the same basic configuration. The ISIS leadership is now vigorously searching for ways to endure airstrikes, block intelligence efforts, and thwart special operations missions designed to take out critical leadership and infrastructure. 

Perhaps most pressing is the need to prevent the emergence of a critical mass of Kurdish and/or rival jihadist militias to whom ISIS could potentially lose significant tracts of land. In Afghanistan, anti-Taliban militiamen with U.S. support were able to stage a comeback from their bases in northern Afghanistan near the Tajikistan border, sweeping through Kabul and even seizing the Taliban’s home turf of Kandahar. ISIS does not want to experience something similar to that, with Syrian rebel forces turning toward its territory in eastern Syria, especially now that they have run into serious problems in western parts of the county. There, regime forces backed by Russian aircraft are gaining the upper hand in critical places in Aleppo and Idlib provinces. U.S. strategy, for its part, seems to be focused not on the collapse of the Assad regime but rather in equipping rebel forces to take on ISIS. Some rebels may do so in the hope of garnering greater Western support. 

For these reasons, ISIS needs to ensure that both those in its own ranks as well as the people over whom it rules have little incentive to desert or rebel. Coercion helps, but only to a certain extent. The Afghan Taliban learned this lesson the hard way, when the very same population that had initially welcomed it as protectors against anarchy turned against the movement and were instrumental in the implosion of its state. This is why the ISIS regime will try to balance coercion and the provision of quality services (which Mara Revkin highlights). But as Aymenn al-Tamimi notes, financial constraints seriously limit the organization’s ability to sustain public support by providing essential services without having to resort to tax increases. 

Civilian administration is a relatively new activity for ISIS, and it therefore will take time to improve its performance. In the short term, ISIS will focus more heavily on the security aspects of governance. It is better equipped and experienced in this sphere, given its own prior experience as non-state jihadist force. ISIS is likely to continue to focus on what it knows best, as doing so offers it a better chance of holding hard-fought ground against its opponents.

Authors

      
 
 




academic and careers

Experts Weigh In (part 3): What is the future of al-Qaida and the Islamic State?


Will McCants: As we continue onwards in the so-called Long War, it’s a good time to reflect on where we are in the fight against al-Qaida and its bête noire, the Islamic State. Both organizations have benefited from the chaos unleashed by the Arab Spring uprisings but they have taken different paths. Will those paths converge again or will the two organizations continue to remain at odds? Who has the best strategy at the moment? And what political changes might happen in the coming year that will reconfigure their rivalry for leadership of the global jihad?

To answer these questions, I’ve asked some of the leading experts on the two organizations to weigh in. First was Barak Mendelsohn, who analyzed the factors that explain the resilience and weaknesses of both groups. Then Clint Watts offered ways to avoid the flawed assumptions that have led to mistaken counterterrorism forecasts in recent years. 

Next up is Charles Lister, a resident fellow at the Middle East Institute, to examine the respective courses each group has charted to date and whether that's likely to change. 


Charles Lister: The world of international jihad has had a turbulent few years, and only now is the dust beginning to settle. The emergence of the Islamic State as an independent transnational jihadi rival to al-Qaida sparked a competitive dynamic. That has heightened the threat of attacks in the West and intensified the need for both movements to demonstrate their value on local battlefields. Having spent trillions of dollars pushing back al-Qaida in Afghanistan and Pakistan and al-Qaida in Iraq, the jihadi threat we face today far eclipses that seen in 2000 and 2001.

As has been the case for some time, al-Qaida is no longer a grand transnational movement, but rather a loose network of semi-independent armed groups dispersed around the world. Although al-Qaida’s central leadership appears to be increasingly cut off from the world, frequently taking many weeks to respond publicly to significant events, its word remains strong within its affiliates. For example, a secret letter from al-Qaida leader Ayman al-Zawahiri to his Syrian affiliate the Nusra Front in early 2015 promptly caused the group to cease plotting attacks abroad.

Seeking rapid and visible results, ISIS worries little about taking the time to win popular acceptance and instead controls territory through force.

While the eruption of the Arab Spring in 2010 challenged al-Qaida’s insistence that only violent jihad can secure political change, the subsequent repression and resulting instability provided an opportunity. What followed was a period of extraordinary strategic review. Beginning with Ansar al-Sharia in Yemen (in 2010 and 2011) and then with al-Qaida in the Islamic Maghreb (AQIM), Ansar al-Din, and the Movement for Unity and Jihad in West Africa (MUJAO) in Mali (2012), al-Qaida began developing a new strategy focused on slowly nurturing unstable and vulnerable societies into hosts for an al-Qaida Islamic state. Although a premature imposition of harsh Shariah norms caused projects in Yemen and Mali to fail, al-Qaida’s activities in Syria and Yemen today look to have perfected the new “long game” approach.

In Syria and Yemen, al-Qaida has taken advantage of weak states suffering from acute socio-political instability in order to embed itself within popular revolutionary movements. Through a consciously managed process of “controlled pragmatism,” al-Qaida has successfully integrated its fighters into broader dynamics that, with additional manipulation, look all but intractable. Through a temporary renunciation of Islamic hudud (fixed punishments in the Quran and Hadith) and an overt insistence on multilateral populist action, al-Qaida has begun socializing entire communities into accepting its role within their revolutionary societies. With durable roots in these operational zones—“safe bases,” as Zawahiri calls them—al-Qaida hopes one day to proclaim durable Islamic emirates as individual components of an eventual caliphate.

Breadth versus depth

The Islamic State (or ISIS), on the other hand, has emerged as al-Qaida’s obstreperous and brutally rebellious younger sibling. Seeking rapid and visible results, ISIS worries little about taking the time to win popular acceptance and instead controls territory through force and psychological intimidation. As a militarily capable and administratively accomplished organization, ISIS has acquired a strong stranglehold over parts of Iraq and Syria—like Raqqa, Deir el-Zour, and Mosul—but its roots are shallow at best elsewhere in both countries. With effective and representative local partners, the U.S.-led coalition can and will eventually take back much of ISIS’s territory, but evidence thus far suggests progress will be slow.

Meanwhile, ISIS has developed invaluable strategic depth elsewhere in the world, through its acquisition of affiliates—or additional “states” for its Caliphate—in Yemen, Libya, Algeria, Egypt, Afghanistan, Pakistan, Nigeria, and Russia. Although it will struggle to expand much beyond its current geographical reach, the growing importance of ISIS in Libya, Egypt, and Afghanistan-Pakistan in particular will allow the movement to survive pressures it faces in Syria and Iraq. 

As that pressure heightens, ISIS will seek to delegate some level of power to its international affiliates, while actively encouraging retaliatory attacks—both centrally directed and more broadly inspired—against high-profile Western targets. Instability breeds opportunity for groups like ISIS, so we should also expect it to exploit the fact that refugee flows from Syria towards Europe in 2016 look set to dramatically eclipse those seen in 2015.

Instability breeds opportunity for groups like ISIS.

Charting a new course?

That the world now faces threats from two major transnational jihadist movements employing discernibly different strategies makes today’s counterterrorism challenge much more difficult. The dramatic expansion of ISIS and its captivation of the world’s media attention has encouraged a U.S.-led obsession with an organization that has minimal roots into conflict-ridden societies. Meanwhile the West has become distracted from its long-time enemy al-Qaida, which has now grown deep roots in places like Syria and Yemen. Al-Qaida has not disappeared, and neither has it been defeated. We continue this policy imbalance at our peril.

In recent discussions with Islamist sources in Syria, I’ve heard that al-Qaida may be further adapting its long-game strategy. The Nusra Front has been engaged in six weeks of on/off secret talks with at least eight moderate Islamist rebel groups, after proposing a grand merger with any interested party in early January. Although talks briefly came to a close in mid-January over the troublesome issue of the Nusra Front’s allegiance to al-Qaida, the group’s leader Abu Mohammed al-Jolani now placed those ties as an issue on the table for negotiation. 

Al-Qaida has not disappeared, and neither has it been defeated.

The fact that this sensitive subject is now reportedly open for discussion is a significant indicator of how far the Nusra Front is willing to stretch its jihadist mores for the sake of integration in Syrian revolutionary dynamics. However, the al-Nusra Front's leader, Abu Mohammed al-Jolani, is a long-time Al-Qaeda loyalist and doesn't fit the profile of someone willing to break a religious oath purely for the sake of an opportunistic power play. It is therefore interesting that this secret debate inside Syria comes amid whispers within Salafi-jihadi and pro-al-Qaida circles that Zawahiri is considering “releasing” his affiliates from their loyalty pledges in order to transform al-Qaida into an organic network of locally-inspired movements—led by and loosely tied together by an overarching strategic idea.

Whether al-Qaida and its affiliates ultimately evolve along this path or not, the threat they pose to local, regional, and international security is clear. When compounded by ISIS’s determination to continue expanding and to conduct more frequent and more deadly attacks abroad, jihadist militancy looks well-placed to pose an ever present danger for many years to come. 

Authors

      
 
 




academic and careers

Beyond 2016: Security challenges and opportunities for the next administration


Event Information

March 1, 2016
9:00 AM - 4:15 PM EST

Falk Auditorium
Brookings Institution
1775 Massachusetts Avenue NW
Washington, DC 20036

Register for the Event

The Center for 21st Century Security Intelligence seventh annual military and federal fellow research symposium



On March 1, the seventh annual military and federal fellow research symposium featured the independent research produced by members of the military services and federal agencies who are currently serving at think-tanks and universities across the nation. Organized by the fellows themselves, the symposium provides a platform for building greater awareness of the cutting-edge work that America’s military and governmental leaders are producing on key national security policy issues.

With presidential primary season well underway, it’s clear that whoever emerges in November 2016 as the next commander-in-chief will have their hands full with a number of foreign policy and national security choices. This year’s panels explored these developing issues and their prospects for resolution after the final votes have been counted. During their keynote conversation, the Honorable Michèle Flournoy discussed her assessment of the strategic threat environment with General John Allen, USMC (Ret.), who also provided opening remarks on strategic leadership and the importance of military and other federal fellowship experiences.

 

Video

Audio

      
 
 




academic and careers

Experts weigh in (part 5): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance. And Kamran Bokhari argued that security—namely defending territory—is the foremost governance objective of ISIS in the short term.

Below is an analysis from Quinn Mecham, Assistant Professor of Political Science at Brigham Young University. He focuses on the need to provide alternative, positive models of governance for the populations living under ISIS control.


Quinn Mecham: The Islamic State group (ISIS), despite clear pretentions to statehood in the form of the “caliphate” it declared in June 2014, does not preside over a particularly successful “state.” It faces numerous challenges from both within and without, challenges that accelerated in 2015 with increasingly systematic airstrikes on ISIS fighters and facilities by numerous external actors. 

However, the governing institutions over which the Islamic State presides currently represent the best approximation of institutionalized governance for the millions of people in Iraq and Syria under its rule. Though international actors unanimously refuse to acknowledge the Islamic State as a legitimate state in the international system, it nevertheless provides many of the functions of a state for those living within its territory. The fulfillment of these state functions is critical to the lives and livelihoods of those governed in territory controlled by the Islamic State. An effective policy to challenge the Islamic State must take the group’s governance agenda into account by constructing appealing alternatives to Islamic State governance rather than simply seeking to undermine it. 

The Islamic State’s ambitious state-building efforts present a challenging policy problem for the array of states now fighting the Islamic State group. France, Britain, Russia, and the United States, among others, regularly articulate the urgent need to destroy the group and they have increasingly acted to do so. Airstrikes that accelerated in the later half of 2015 have put substantial pressure on the Islamic State’s institutions, killing off thousands of Islamic State fighters and destroying a substantial amount of military and economic infrastructure, most notably the capacity to refine and distribute oil resources. Ground operations, such as the one that retook the Iraqi city of Ramadi in December, have also ratcheted up the pressure. 

[I]n addition to degrading the organization, the attacks on ISIS are also degrading the only current form of effective governance for civilians.

While these efforts help fulfill the primary goal of degrading or destroying ISIS by targeting the group’s military and operational infrastructure, they also harm the coalition’s ultimate goal of creating regional stability. This is because, in addition to degrading the organization, the attacks on ISIS are also degrading the only current form of effective governance for civilians, leading to very negative consequences for the populations living under Islamic State rule. As governing capacity is degraded without providing an effective substitute for ISIS governance, many of the coalition’s objectives in the region will become more elusive in the medium term. Additionally, certain aspects of the Islamic State’s state-building goals, which outside groups would like to prevent, may actually be enhanced as a result of the conflict. 

War, what is it good for?

As military pressure mounts on the Islamic State, significant parts of its project are in danger, including its financing, military success, and leadership capacity. However, it is not certain that all aspects of its state capacity will decline. Scholarship on state-building makes it clear that although war can destroy states, it can also help to build them. Although the Islamic State is often viewed externally simply as a rebel group, its domestic state-building agenda follows the historical path of many developing states in that it has benefitted from some of the effects of being at war.

[A]lthough war can destroy states, it can also help to build them.

War helps to build states in a number of ways. First, it creates an environment where the state can much more efficiently extract resources from the population in the form of taxation, military conscription, or extortion. When security is at stake, people are more willing to give up other goods for protection; a state at war also has a high degree of readiness for violence, which can be applied to extract resources from its own people. 

Second, state survival during war requires a high degree of institutional efficiency, including the creation of new bureaucratic structures such as taxation systems, governance mechanisms, information networks, and other institutions designed to control and manage conquered territory. Finally, the pressures of constant warfare for those under threat and on the front lines can also solidify group commitments and strengthen aspects of the military culture, bureaucracy, and ideology that have contributed to the group’s success.

Scaling back

Certainly warfare also can degrade state capacity, and it has done so across Islamic State territory over the past year. Much of that degraded capacity is military in nature, but the process has also reduced state capacity on which civilians directly depend. There is substantial evidence now to suggest that military pressure on the Islamic State group has negatively impacted a variety of core state functions for civilians. While most coalition airstrikes to date have sought to avoid dominantly civilian targets, economic infrastructure has been actively targeted, leading to a significant decline in the resources devoted to civilian concerns.

Compared with only a year ago, the group is now a less effective distributor of resources and has also become more dependent on resource extraction from the populations that it controls. For example, as the group’s revenues from oil and the initial spoils from captured territory have declined, both its social service provision and its ability to pay salaries have severely deteriorated. This is harmful not just because of concerns over civilian protection, but also because it reduces social stability and plays into the group’s narrative that its enemies are making people’s lives much worse. While it is difficult to measure the extent to which civilians blame the group for these new difficulties, a current media crackdown in ISIS territory means that the dominant ISIS narrative of blaming external aggressors is the only one disseminated and likely has significant impact on public opinion.

After airstrikes accelerated in the autumn, an internal Islamic State memo revealed that due to a loss of revenue, the salaries of Islamic State fighters were being cut by a dramatic 50 percent from the original promised payments. These cuts have also affected non-military employees of the Islamic State, spreading to all civil servants. At the same time, the prices for basic goods have been dramatically increasing. Financial infrastructure has also been targeted, making basic economic transactions much harder, while declining soldier salaries make it more likely that those with guns will look to civilian resources to supplement their incomes. Popular policies such as subsidies for bread have been difficult to finance and in some areas under external pressure, essentials such as wheat have become very scarce. This pressure on the food supply impacts civilians in unpredictable ways because the Islamic State has tightly regulated agricultural markets and has failed to allow free market mechanisms to efficiently distribute food resources. 

In the realm of health and education, student registration fees have gone up dramatically while subsidies have declined, scaling back access to a key service designed to systematically socialize students into the ideology of the Islamic State. Professionals are also fleeing Islamic State territory, as exemplified by physicians who have been leaving the Islamic State in large numbers. Despite apparently having significant physical resources for basic medical care, such as vaccinations, the new labor shortage of physicians has made it impossible to keep up regular vaccination schedules within the civilian population. More recently, pressure on obtaining key medical supplies has also increased. 

Two sides of the coin

Attacks on the Islamic State have therefore both strengthened and degraded different components of state capacity. Some aspects of state capacity have actually increased under conditions of war, such as taxation, extortion, conscription, and coercive institutions that control civilians. Military attacks have degraded other aspects of the state, however, such as the resources of ISIS fighters and civil servants, resource distribution capacity, and institutions that support economic development. 

It is not yet clear what these changes in military and state capacity will have on the overall trajectory of Islamic State survival and the stated goal to destroy the Islamic State. While the Islamic State could ultimately be destroyed by a coalition military campaign that proactively takes and governs territory, under the present strategy it is much more likely that the Islamic State will persist and continue to preside over a fragile and increasingly marginal system of governance that is neither good for the group, for the people that live within its territory, or for long-term stability in the Middle East. 

Costs and benefits of a military campaign

This creates a set of difficult policy choices because there are also many good reasons for the military campaign against the Islamic State. The group has demonstrated its capacity and will continue to launch violent attacks on a range of international targets, providing external actors with clear justification to destroy the group’s military capacity in an effort to maintain global security. Likewise, the group’s military success and territorial control are central to its attractiveness to foreign fighters. The ideology that drives the Islamic State depends in part on its continued ability to challenge the current international system. Delivering sustained military defeats is therefore critical to puncturing the group’s apocalyptic narrative of ever greater success and expansion. 

Much of the Islamic State’s domestic control is also maintained through fear, and military defeats confirm in the public imagination that the group can be beaten, from without and potentially from within. Although significant local challenges have not yet materialized, as the Islamic State’s coercive capacity becomes weaker, defections to other groups may occur, and domestic opponents may begin to recalculate their odds of a successful challenge. 

[U]nder the present strategy it is much more likely that the Islamic State will persist and continue to preside over a fragile and increasingly marginal system of governance.

The clear need for military action must, however, be weighed against the serious costs to both civilian populations and to the long-term war effort of harming existing state capacity on which civilians depend. The largely aerial campaign against the Islamic State group has had painful effects on the populations it controls. The reduction of fuel availability, the collapse in salaries, the removal of food and educational subsidies, and the deep insecurity that comes from a constant fear of bombardment has likely done very little to endear civilian populations to the cause of the coalition’s military activity, which is often seen as supporting the Syrian regime. 

Degrading state capacity through military action also feeds into the group’s narrative that both the West and Arab leaders have no concern for Muslim civilians, and that the group is the only possible one that can act as a protector against external enemies. Dozens of recent Islamic State videos paint the anti-ISIS coalition as a Russian, Syrian, Jewish, or U.S. conspiracy designed to harm civilians. While it is difficult to determine the extent of civilian casualties as a result of the campaign to date, the heightened deprivation resulting from the coalition military campaign, coupled with a glaring lack of alternative models of good governance, is unlikely to break the dependence of civilians on the Islamic State. 

Wanted: Alternatives

When one takes the Islamic State’s substantive role in governance into account in formulating a strategy to destroy the group, it becomes increasingly clear that an effective military strategy must be coupled with a much more robust agenda to build alternative governance mechanisms if it is to be successful at permanently displacing the group from its territory. 

Challenging civilian dependence on the Islamic State requires alternative forms of governance that are more appealing to the populations currently governed by the group. Even if the quality of Islamic State governance declines in relative terms, a substantively more appealing option must be available if those currently under the Islamic State’s control will be willing to support it. The great current challenge is to formulate a policy that can meet or exceed the Islamic State’s ability to build governing institutions, not just tear them down. At this point in the tragic narrative, those craving good governance are likely to be much less interested in regime type than in institutions that can provide consistent levels of security, economic growth, and the rule of law.

The great current challenge is to formulate a policy that can meet or exceed the Islamic State’s ability to build governing institutions, not just tear them down.

While the Islamic State adeptly uses theatrical violence and fear to exercise control within its territory, a large portion of its success in maintaining control should also be attributed to the poor alternative options for the populations that reside within it. For many Sunnis in Iraq and Syria, the imaginable alternative models of governance are currently deeply unappealing. These include:

  • re-absorption into the repressive cruelties of the Syrian state, 
  • control by violent and corrupt Syrian rebel groups without a track record of effective governance, 
  • governance by a deeply sectarian, Shiite-dominated Iraqi government that is dependent on ideological sectarian militias to maintain security, or 
  • rule by ethnic Kurdish militias that have a poor reputation for their treatment of Arab communities. 

When compared with these options, the Islamic State group often comes across as more authentic, less corrupt, more committed to the rule of law, and a better provider of state services. Its current basic governance failures, while many, are also increasingly attributable to the effects of the military campaign waged by its enemies. 

Let's build

Despite its deep, persistent flaws, an alternative, better system of governance is more likely to come from the Iraqi state (in the case of large population centers such as Mosul), or from existing informal tribal governance (in Syria and more rural areas) than it is to come from other sources. The key actions that currently need to be taken are thus two-fold:

  1. First, in territory already reclaimed from the group—such as in the devastated city of Ramadi—the anti-ISIS coalition should extend every effort to distribute needed resources, infuse the economy with ready employment options, reaffirm property rights and judicial institutions, and severely punish those pursuing violent retribution. Unfortunately, little in this direction has been accomplished in the months since the capture of Ramadi, as the rebuilding of civilian infrastructure has been treated as secondary to lingering security concerns. A clear investment of institutional and economic resources that helps to demonstrate the ability to maintain security and equal treatment under the rule of law will send a more powerful signal of the Islamic State’s weakness than the results of an aerial bombing campaign. 
  2. Second, a greater external commitment to support the best in existing institutions within the Iraqi state as well as in areas with the potential for effective non-state tribal governance is a critical investment in the long-term stability of Islamic State territory. In other words, external resources should increasingly focus not just on training and equipping local military allies, but also in supporting high quality civilian institutions of local and regional governance. 

Unfortunately, it takes much longer to build effective state institutions than to destroy them.

Aggressively pursuing a governance strategy will be much more difficult than pursuing an air war against a proto-state without anti-air defenses, but it is a necessary one if the persistent appeal of the group’s state-building project is to be overcome. Because the Islamic State has powerfully distinguished itself from other jihadist competitors through its governance agenda, its support cannot be eliminated through a strategy solely dependent on destroying the governance upon which local populations depend. 

Unfortunately, it takes much longer to build effective state institutions than to destroy them. The faster that a serious, resource-intensive commitment to building alternative governing institutions in areas bordering Islamic State territory begins, the more likely we are to see the group that calls itself the Islamic State lose control of its narrative, its territory, and the civilian support upon which it relies.

Authors

      
 
 




academic and careers

Experts weigh in (part 6): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, and Egypt indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance. Kamran Bokhari argued that security—namely defending territory—is the foremost governance objective of ISIS in the short term, while Quinn Mecham focused on the need to provide alternative, positive models of governance for the populations living under ISIS control.

Next up, Nelson Kasfir, Professor of Government Emeritus at Dartmouth College, and Zachariah Mampilly, Associate Professor of Political Science and Director of Africana Studies at Vassar College, compare ISIS’s governance choices with how other armed groups have governed civilian populations. 


Nelson Kasfir and Zachariah Mampilly: Now that the Islamic State (ISIS) claims to be a state, any useful analysis of how it rules should rest on a systematic conception of governance by insurgents who hold populated territory, a surprisingly common phenomenon. If we are to understand what ISIS is doing, how long it is likely to stick around and indeed why some civilians in its domain prefer its government to what they had experienced from either Baghdad or Damascus, it would be a good idea to compare its choices of governance with other armed groups that have captured territory and governed civilian populations. All of them must administer territory without the advantages conferred by sovereignty—an important resource available to even the weakest internationally recognized states.

In our new book, Rebel Governance in Civil War, we offer a framework to explain how rebels govern. We bring together leading scholars to explore specific issues and cases from all over the globe. While single-factor hypotheses don't help much, there are broad patterns describing how and why armed groups govern that fit ISIS.

By rebel governance, we mean decision-making, the provision of services and the regulatory framework that armed groups establish to produce a social order within a specific territory they control. Rebel governance activities can be separated into those that concern how decisions are made, what social services are provided and how the production or taxation of economic rents is organized. Symbolic practices and ideologies, including religious creeds, have significant effects in supporting any system of rebel rule.

Armed groups differ widely in their approach to governance.

Armed groups differ widely in their approach to governance, as the case studies in our book demonstrate. Few armed groups that control territory can ignore civilian governance, short of expelling civilian populations altogether. The vast majority of insurgent organizations range from governing minimally, by assuming few regulatory functions, to maximally by ruling everything, including the provision of public goods.

For example, although the leaders of the National Patriotic Front (NPFL) in Liberia were primarily interested in personal profit, they still created the veneer of government to seek international recognition and to ensure the proceeds of commercial enterprises went into their pockets. Both types of insurgents were active during the Greek civil war, the conservatives limiting their governance activities, while the communists tried to regulate all aspects of social life.

Despite the many Western press accounts that dwell on ISIS’ penchant for flamboyant displays of callous cruelty, it would be a mistake to think that ISIS does not engage in civilian governance. As Charles Lister notes: "By perceiving and presenting itself as a state, IS [ISIS] has sought to control and govern territory and maintain a cabinet of ministers responsible for a broad range of 'ministries,' incorporating military, civil, political, and financial duties." As a caliphate, ISIS has opted primarily for a hierarchical top-down administration. It demands strict obedience, but it is also intent on building infrastructure and running it effectively. By basing governance on its revival of the "Caliphate according to the prophetic method," that is, re-establishing institutions on the basis of what it understands the Prophet Mohammed to have insisted, ISIS leaders appear to have demanded control over most facets of social and personal life.

As a caliphate, ISIS has opted primarily for a hierarchical top-down administration.

As early as 2007, ISIS published a booklet outlining its plans for governance. In 2013, it issued pamphlets that laid out the exact governance activities the organization would undertake once in control of specific territories. Immediately after capturing various towns in Syria and Iraq, ISIS set about taking control over key industries and services including the distribution of electricity, water, and fuel as well as the production and distribution of food. ISIS monopolized service provision and proved sophisticated in using it to balance its brutality. As a result, "Sunni civilians have been more likely to accept the imposition of harsh norms," as Lister has written.

Symbolic processes are powerful tools of governance that legitimate rebel groups or signal their coercive capability. These processes are often influenced by specific ideological concerns. Like nation-states, rebels create distinctive symbolic repertoires by producing their own flags, currencies, mausoleums and staging parades and rallies. The leaders of ISIS are well aware of the importance of symbols. "The Islamic State was signaling that its flag was not only the symbol of its government and the herald of a future caliphate; it was the harbinger of the final battle at the End of Days," writes Will McCants in The ISIS Apocalypse.

The leaders of ISIS are well aware of the importance of symbols.

Explaining varying approaches

What factors shape these different traits of rebel governance? In our book, we identify four clusters: causes arising before the rebellion; causes arising during the rebellion; those emanating from attributes or behavior of the rebels; and finally those developing from responses of civilians.

First, pre-conflict factors involving the relations between state and society shape subsequent patterns of rebel governance. History matters because insurgents mostly acquire their cultural values, education, and ideas about governance, while growing up in the society they later defy. These experiences shape them even as they rebel. How they resolve these contradictions will vary from case to case. Thus, the Forces Nouvelles that occupied northern Côte d'Ivoire after 2002 "adopted—or rather adapted—procedures from the former state administration." Since they did not hold unchallenged authority, they chose to share the maintenance of security with neo-traditional hunters' associations who were deeply trusted by local residents. In a different case, General Padiri's Mai-Mai militia in the Democratic Republic of the Congo adopted the administrative pattern of offices of the Congolese government while adding "Bureau Six" to incorporate commonly held autochthonous magico-religious beliefs that greatly deepened the legitimacy of the militia's leaders.

Because ISIS takes an uncompromisingly radical stance, it is difficult to identify its continuities with prior governance. Still, a closer examination of ISIS’ involvement in food distribution provides an illustrative example of its links with the practices of past regimes. As one recent academic study (by José Ciro Martínez and Brent Eng, in a still-unpublished manuscript) points out, food production has long been understood as a key element of the weak social contract binding pre-conflict regimes in Syria and Iraq to their people. In pre-conflict Syria, the Baath Party had long understood direct control over the bread market as an integral task of the social welfare pact it struck with the population. Recognizing the importance of bread distribution to the Syrian population, ISIS undertook numerous efforts to control and ensure the production of bread within its territories. In a 2013 pamphlet published in Aleppo that outlines ISIS’ governance strategy, a promise to ensure bread distribution stands out alongside more conventional governance activities. Importantly, considering the propagandistic nature of many ISIS communications, the group went far beyond rhetorical positions in their commitment to policies concerning bread. Instead of merely mandating the manner in which bread would be produced and distributed in ISIS-controlled areas of Aleppo and Raqqa, the group also “subsidized the cost of flour, accelerated the opening of bakeries and distributed bread itself when necessary,” as Martínez and Eng write.

[W]artime contextual factors...affect rebel governance.

Second, wartime contextual factors—those circumstances that emerge during rebellion— also affect rebel governance. As rebels fight and as they engage with civilians, they often change their practices of governance. The military threat of the incumbent and other military rivals as well as the broader wartime political economy often significantly impact insurgents’ approaches toward civilians. With regard to military capacity, Stathis Kalyvas shows that as the communist insurgents lost territory towards the end of the Greek civil war, they became more coercive. In Latin America as well, there have been many cases in which rebel governance decayed when insurgent groups failed to protect their civilian populations from either internal or external violence, or in response to expansion of electoral opportunities by the incumbent state.

Similarly, a comparison of ISIS’ governance in Raqqa and Mosul, the two largest cities under its control, suggests that external military pressure has made the government more intimidating and sometimes less willing to abide by its own rules. After ISIS took control of each city, it quickly imposed its authority and provided more efficient administration than its predecessors had. In Raqqa the regime acted on the basis of its posted rules until American-led air strikes caused its leaders to become somewhat “more paranoid and prone to kidnapping people randomly.” In Mosul, residents, who originally regarded ISIS as “liberators,” became more dissatisfied as their taxes greatly increased and their nonpayment was met with physical punishments and fines. The failure of ISIS to protect its citizens from collateral damage from air strikes is certain to have increased their discontent.

After ISIS took control of each city, it quickly imposed its authority and provided more efficient administration than its predecessors had.

Material rewards also affect rebel governance. Rebels often change their pattern of governance when they begin to accumulate significant rents through the exploitation of natural resources. The National Union for the Total Independence of Angola (UNITA) changed after it began to export diamonds and the Revolutionary Armed Forces of Columbia (FARC) stopped following some of its Marxist principles after it began to export cocaine.

Usually, rebels cannot defend oil wells from attacks by incumbent states. ISIS has been an exception, making a daily income of $3 million in September 2014. After the recent steep fall in crude oil prices and air strikes, internal taxation (or extortion) may have become a more significant source of revenue. ISIS has also profited from kidnapping and bank robberies. Its reliance on oil production has proven both a boon and curse as the value of ISIS-produced oil shifts dramatically due to both the challenge of ensuring production and fluctuations in oil prices globally. The income permitted ISIS to pay generous salaries to civilians to keep sanitation and utility services functioning.

Third, rebel attributes and behavior—organizational structure and ideological orientation—affect rebel governance. Ideologies often provide rebels with political identities, coherent frameworks for political and social action and a sense of disciplined commitment to an overriding purpose. The Greek communists learned their Marxism before they rebelled. Ethnic secessionists, such as the Naga in India, knew whom they were going to exclude from their imagined polity in advance of taking up arms.

Establishing a legal code is a social service that often demonstrates the influence of ideology on rebel governance.

Establishing a legal code is a social service that often demonstrates the influence of ideology on rebel governance. Rules that rebels create and civilians obey can help provide legitimate authority, whether out of trust (as in the case of the Shining Path in Peru) or out of fear (as inspired by the Taliban in Afghanistan).

ISIS bases not only its fundamental character, but also its plan of governance, almost entirely on its peculiar interpretation of Islamic doctrine. Abu Bakr al-Baghdadi, the ISIS leader, received both a masters and a doctorate in Islamic rhetoric from the University of Islamic Sciences in Baghdad. As the caliph, some of the Islamic rationales that have been supplied to justify specific ISIS regulations can be traced to his earlier education.

The influence of Islam on ISIS’ ideology is most evident in its attempts to establish a legal system. The rebellion "sees itself as creating a distinctive and authentic legal order for the here and now, one that is based not only on a literal (if selective) reading of early Islamic materials but also on a long-standing [Islamic] theory of statecraft and legal authority." Andrew March and Mara Revkin identify laws governing land, trade, taxation and treatment of prisoners and slaves, all derived from ISIS’ interpretation of scripture. In addition, they assert "the theory of the caliphate implies a law-based social contract with reciprocal obligations and rights between the caliph and the people." The extent to which this legal order actually results in enforceable rights that protect civilians is unclear. However, there is evidence that ISIS officials engaged in dispute resolution among civilians, even punishing its fighters when they took bribes or harmed civilians.

[C]ivilian responses to the insurgent group affect rebel governance.

Finally, civilian responses to the insurgent group affect rebel governance. We examine both individual reactions to armed groups as well as how varying social groups—such as traders, religious orders, ethnic groups, and civil society organizations—engage with or challenge an armed group’s governance efforts. ISIS is challenging to study since it is perceived as denying civilians’ agency completely. But even under the most autocratic governance arrangements, civilians have found ways to influence and even challenge armed groups. For example, during the war in Sri Lanka, the Liberation Tigers of Tamil Eelam had numerous methods for incorporating civilian feedback despite its deserved reputation as an autocratic and brutal organization. The education system in Tiger-ruled areas emerged as a result of civilian pressure and meaningfully incorporated civilians into its daily operations.

Indeed, a surprising number of rebel groups have shared decision-making with civilians. The African Party for the Independence of Guinea-Bissau and Cape Verde (PAIGC) created democratic village councils, as did the National Resistance Army during its war in Uganda. On the other hand, summary justice and brutal punishments can increase legitimacy among civilians when meted out to thieves and rapists. Residents gave strong support to rebels who took over neighborhoods in Medellín, Colombia and provided instant justice to those the community regarded as criminals.

It appears that ISIS does not share decision-making with civilians, similar to other rebels that take Islam as the doctrinal basis for their revolt such as the Taliban in Afghanistan or Boko Haram in Nigeria. But discerning whether civilian responses affect ISIS governance would require difficult (though not impossible) field visits to ISIS-controlled territory. The fact that the group frequently needs to rely on civilians in order to provide services suggests that there may be greater scope for civilian involvement than is commonly recognized.

[W]hile ISIS may appear unique, it is not an exception from the pressures that shape rebel governance patterns generally.

Taken together, the above discussion shows that while ISIS may appear unique, it is not an exception from the pressures that shape rebel governance patterns generally. Armed groups do not determine the outcome of their governance efforts in a vacuum. Rather, civilian governance outcomes are established by the behavior of a variety of actors each interacting in a shifting and complex environment. While ISIS may be distinctive in its commitment to implementing a form of civilian governance based on its understanding of Islamic modes of governance, it is still subject to these dynamics. Analyzing it through the four clusters of factors discussed above show how its governance of civilians compares with other rebel groups.

The sustainability question

What does this tell us about the future of civilian governance under ISIS? Because ISIS has established a caliphate, it is committed to governing the people in the territories it conquers. As discussed above, ISIS leaders have adopted an approach to law that creates room for some protections for civilians and an approach to social welfare that provides space for a limited social pact. Yet, these rulers have fashioned an uncompromising notion that civilians must be governed within their strict interpretation of Islamic doctrine. In addition, they depend on foreign military recruits to buttress their rule.

These factors create contradictions that may cause regime instability that might either increase regime brutality, if leaders remain constant to their principles, or result in regime decay, if they lose their sense of purpose. ISIS may eventually be “hamstrung by its radicalism.” During the short time that ISIS has ruled civilians, it has insisted that its decisions cannot be questioned. The relevant lesson from studying other rebellions is that groups better able to accommodate different political actors through a process of political negotiation are more likely to endure. If ISIS leaders remain obstinate, refusing to compromise in favor of a principled ideological stand, civilians will continue to suffer and either fight or flee if they can. Alternately, if the group’s leaders are tempted by the wealth the regime has accumulated, they may give in to corruption and fashion a more predatory regime.

ISIS has also become a magnet for foreign fighters. No one really knows how many there are, but an early (2014) estimate is 15,000 from 90 countries. Although the flow has decreased recently, cultural interactions and political disputes among these foreigners and civilians are certain to remain problematic. As the external military threats faced by ISIS grow, its leaders are likely to rely on the loyalty and morale of their foreign fighters at the expense of the civilian population. Civilian governance will probably decay, resulting in greater instability and perhaps sowing the seeds of ISIS' own demise.

Authors

      
 
 




academic and careers

The French connection: Explaining Sunni militancy around the world


Editors’ Note: The mass-casualty terrorist attacks in Paris and now in Brussels underscore an unsettling truth: Jihadis pose a greater threat to France and Belgium than to the rest of Europe. Research by Will McCants and Chris Meserole reveals that French political culture may play a role. This post originally appeared in Foreign Affairs.

The mass-casualty terrorist attacks in Paris and now in Brussels underscore an unsettling truth: Jihadists pose a greater threat to France and Belgium than to the rest of Europe. The body counts are larger and the disrupted plots are more numerous. The trend might be explained by the nature of the Islamic State (ISIS) networks in Europe or as failures of policing in France and Belgium. Both explanations have merit. However, our research reveals that another factor may be at play: French political culture.

Last fall, we began a project to test empirically the many proposed explanations for Sunni militancy around the globe. The goal was to take common measures of the violence—namely, the number of Sunni foreign fighters from any given country as well as the number of Sunni terror attacks carried out within it—and then crunch the numbers to see which explanations best predicted a country’s rate of Sunni radicalization and violence. (The raw foreign fighter data came from The International Centre for the Study of Radicalisation and Political Violence; the original attack data came from the University of Maryland’s START project.)

What we found surprised us, particularly when it came to foreign fighter radicalization. It turns out that the best predictor of foreign fighter radicalization was not a country’s wealth. Nor was it how well-educated its citizens were, how healthy they were, or even how much Internet access they enjoyed. Instead, the top predictor was whether a country was Francophone; that is, whether it currently lists (or previously listed) French as a national language. As strange as it may seem, four of the five countries with the highest rates of radicalization in the world are Francophone, including the top two in Europe (France and Belgium).

Knowledgeable readers will immediately object that the raw numbers tell a different story. The English-speaking United Kingdom, for example, has produced far more foreign fighters than French-speaking Belgium. And fighters from Saudi Arabia number in the several thousands. But the raw numbers are misleading. If you view the foreign fighters as a percentage of the overall Muslim population, you see a different picture. Per Muslim resident, Belgium produces far more foreign fighters than either the United Kingdom or Saudi Arabia. 

[W]hat could the language of love possibly have to do with Islamist violence? We suspect that it is really a proxy for something else: French political culture.

So what could the language of love possibly have to do with Islamist violence? We suspect that it is really a proxy for something else: French political culture. The French approach to secularism is more aggressive than, say, the British approach. France and Belgium, for example, are the only two countries in Europe to ban the full veil in their public schools. They’re also the only two countries in Western Europe not to gain the highest rating for democracy in the well-known Polity score data, which does not include explanations for the markdowns.

Adding support to this story are the top interactions we found between different variables. When you look at which combination of variables is most predictive, it turns out that the “Francophone effect” is actually strongest in the countries that are most developed: French-speaking countries with the highest literacy, best infrastructure, and best health system. This is not a story about French colonial plunder. If anything it’s a story about what happens when French economic and political development has most deeply taken root.

An important subplot within this story concerns the distribution of wealth. In particular, the rate of youth unemployment and urbanization appear to matter a great deal too. Globally, we found that when between 10 and 30 percent of a country’s youth are unemployed, there is a strong relationship between a rise in youth unemployment and a rise in Sunni militancy. Rates outside that range don’t have an effect. Likewise, when urbanization is between 60 and 80 percent, there is a strong relationship.

These findings seem to matter most in Francophone countries. Among the over 1,000 interactions our model looked at, those between Francophone and youth unemployment and Francophone and urbanization both ranked among the 15 most predictive. There’s broad anecdotal support for this idea: consider the rampant radicalization in Molenbeek, in the Parisbanlieus, in Ben Gardane. Each of these contexts have produced a massively disproportionate share of foreign fighters, and each are also urban pockets with high youth unemployment.

As with the Francophone finding overall, we’re left with guesswork as to why exactly the relationships between French politics, urbanization, youth unemployment, and Sunni militancy exist. We suspect that when there are large numbers of unemployed youth, some of them are bound to get up to mischief. When they live in large cities, they have more opportunities to connect with people espousing radical causes. And when those cities are in Francophone countries that adopt the strident French approach to secularism, Sunni radicalism is more appealing.

For now, the relationship needs to be studied and tested by comparing several cases in countries and between countries. We also found other interesting relationships—such as between Sunni violence and prior civil conflict—but they are neither as strong nor as compelling.

Regardless, the latest attacks in Belgium are reason enough to share the initial findings. They may be way off, but at least they are based on the best available data. If the data is wrong or our interpretations skewed, we hope the effort will lead to more rigorous explanations of what is driving jihadist terrorism in Europe. Our initial findings should in no way imply that Francophone countries are responsible for the recent horrible attacks—no country deserves to have its civilians killed, regardless of the perpetrator’s motives. But the magnitude of the violence and the fear it engenders demand that we investigate those motives beyond just the standard boilerplate explanations.

Authors

Publication: Foreign Affairs
      
 
 




academic and careers

Experts weigh in (part 7): Is ISIS good at governing?


Will McCants: ISIS-claimed attacks in Paris, Beirut, Egypt, and Brussels indicate the organization wants to take the fight to its enemies abroad. One reason might be that all is not well in ISIS-land. The nascent state in Syria and Iraq has lost around 25 percent of its territory and tens of thousands of fighters in the year since America and its allies began to their campaign to defeat it. While the state still endures for now, it's under tremendous pressure because of the costs of ceaseless war.

To explain the troubles ISIS faces at home, we have invited a group of scholars to comment on its governance over the past years and speculate on what they might face in the year ahead. First was Mara Revkin, who examined how opinions towards ISIS have changed since it captured Mosul more than a year ago. Then Aymenn al-Tamimi argued that internal documents show increasing challenges for the Islamic State. Next, Aaron Zelin weighed in with a historical perspective, analyzing the extent to which ISIS has lived up to its own standards of governance. And Kamran Bokhari argued that security—namely defending territory—is the foremost governance objective of ISIS in the short term. Quinn Mecham focused on the need to provide alternative, positive models of governance for the populations living under ISIS control, and most recently, Nelson Kasfir and Zachariah Mampilly compared ISIS’ governance choices with how other armed groups have governed civilian populations.

Next up is Hassan Hassan, a resident fellow at the Tahrir Institute for Middle East Policy and co-author of ISIS: Inside the Army of Terror. He assesses ISIS’ model of governance before and after coalition airstrikes against the group began. Before the strikes, he argues, ISIS had a freer hand to implement its policies, and has used savagery and governance to both deter and incentivize communities under its control.


Hassan Hassan: Abu Sameh, a Syrian in his late twenties, joined the Syrian al-Qaida-affiliated Nusra Front as a fighter in early 2013. He fought for the group in Deir Ezzor and northeastern Syria until the Islamic State (ISIS) began to dominate there in the summer of 2014. That’s when he switched sides.

He was drawn to ISIS through one of his relatives, a commander of a small armed faction operating near the Iraqi border. With ISIS, battle-hardened Abu Sameh landed a job related to his undergraduate major for the first time since graduating college in 2009. He became an accountant working in the group’s oil industry.

As with many like Abu Sameh, ISIS benefited from local expertise to run its state-building enterprise in the areas it conquered in northwestern Iraq and northeastern Syria in 2013 and 2014. It also re-opened institutions that ceased to operate after the collapse of provisional governments—former employees, for instance, had continued to receive salaries from Baghdad and Damascus, but they typically sat at home and enjoyed the kickbacks, without being made to work by armed groups in control of the areas. When ISIS took over, many of them were forced back to work.

Enforcement of strict rules helped ISIS establish a semblance of order, which appealed to local communities plagued by kidnapping, highway robbery, theft, and warlordism. After ISIS took control, crime disappeared overnight and people could travel unarmed from Aleppo to Mosul. Through savagery and governance, ISIS both deterred and incentivized communities under its control.

Through savagery and governance, ISIS both deterred and incentivized communities under its control.

Local perception

Assessments of ISIS’ model of governance should distinguish between the periods before and after coalition airstrikes. Priority should be given to the period that preceded the airstrikes—between June and November 2014 in most areas—when the group had a freer hand to implement its policies. Assessments must also consider how ISIS fared in comparison to the armed groups and governments which preceded it. In some cases, ISIS appeared to have gone even further than previous governments in extending its writ to rural areas of Iraq and Syria. 

In this context, local perception is key to the evaluation of ISIS’ performance. According to weekly or sometimes daily conversations I have had with residents in eastern Syria—where I am originally from—people living under ISIS rule equally blame airstrikes or government bombings for the worsening economic situation in their areas, not just ISIS. The desire to link ISIS’ inability to deliver services with the failure of its model is understandable, it allows one to undermine its appeal and wholly blame it for the deteriorating situation in ISIS-held areas. But properly understanding the way ISIS ruled during this specific period with an emphasis on local perceptions is vital not only for academic objectivity but also to fully grasp the unintended consequences of the current coalition campaign against ISIS.

Referring to the destruction of Ramadi after the expulsion of ISIS in December, Col. Steven H. Warren, a Pentagon spokesman in Iraq, told The New York Times: “One hundred percent of this is on ISIL [another acronym for ISIS] because no one would be dropping any bombs if ISIL hadn’t gone in there.” In reality, however, many in those areas see the causes of destruction with a little more nuance than “no ISIS, no bombs.” First, ISIS entered most of those towns with little confrontation with civilians; it was political grievances and the failure of other armed groups that partly enabled ISIS to occupy certain areas to begin with. Moreover, the air campaign targeted bridges and oil facilities, which made life harder for civilians and disrupted a wartime economy that preceded ISIS rule.

Beyond violence 

ISIS is a manager and not a distributor of resources. In the Syrian context, nationalist, Islamist, and jihadist groups have generally sought to win hearts and minds primarily through the free or cheap provision of basic resources. ISIS, however, opts for managing what it has under its control. Even as it charges the population for services, the model remains more effective than the ones in southern and northern Syria for a simple reason. Because ISIS seeks to function as a state, local communities obtain essential benefits in return: safety and security, effective courts, and unified rule. Elsewhere, like in Eastern Ghouta outside Damascus or in Aleppo, provision of services is trumped by chaos, uncertainty, and ineffective courts, because local groups do not have exclusive or unchallenged control over territory.

Because ISIS seeks to function as a state, local communities obtain essential benefits in return: safety and security, effective courts, and unified rule.

Other forces that ruled in Syria prior to ISIS aimed to establish order based on consent. Even the Nusra Front, which was far more powerful and disciplined than other forces up until the rise of ISIS, retracted some of its decisions, seeking to avoid clashes with local families. The Nusra Front (and other Islamist groups as well) typically shied away from enforcing their rules to avoid alienating the population. In most court cases, for instance, whether a ruling would be enforced or not would hinge on whether the criminal or his family had voluntarily accepted the court’s judgment in the first place.

Conversely, under ISIS, courts have a high enforcement mechanism. This was true even when ISIS was a minor player operating from bases in rebel-controlled areas in early 2013. ISIS would encourage people to seek its help when they had a complaint about a person and would forcefully resolve the issue, even if that meant confrontation with powerful groups or individuals. This occurred numerous times ahead of ISIS’ rise to prominence in late 2013. This partly explains why many villagers either travelled outside their towns to fight for ISIS even after it was driven out of their areas in that period or accepted it when it returned later.

ISIS’ model was high-risk. The group was consistent and determined about enforcing its rules, and would not tolerate rivalry in its territory or recognize Sharia commissions other than its own. It demanded uniformity at any cost. One of the most claimed “advantages" of ISIS’ rule in its territories is that it “gets the job done.” Unlike the Free Syrian Army and other Islamist groups, ISIS would send a patrol to fetch someone if another person filed a complaint about him (these complaints typically involved financial fraud or unsettled commercial disputes). According to one resident who was involved in such a case, even if the complaint in question dated back to the years before the uprising, ISIS would settle the situation, provided that the complainant had proof.

ISIS...demanded uniformity at any cost.

“If you’re an FSA commander and you have a civilian relative, [FSA and other rebels] would accept mediation,” Hassan al-Salloum, a former rebel commander from Idlib, told me, referring to the time when ISIS was still a marginal player in 2013. “But with ISIS, if I complain about an FSA member, they go and bring him in for interrogation. They would not accept mediation. People then started to go to complain to ISIS, looking for help and asking them to intervene.”

Regulations and price controls are other areas in which ISIS’ governance proved successful. It banned fishermen from using dynamite and electricity to catch fish. It also prohibited residents from using the chaos of war to stake new land claims. This was especially true in the Syrian desert, where residents had attempted to build new homes or establish new businesses in public lands, much to the chagrin of their neighbors. ISIS also limited the profit margins on oil by-products, ice, flour, and other essential commodities. It also prohibited families from setting up refineries close to private residences, under the threat of confiscation, a policy that led some families to quit the oil business altogether, according to residents I interviewed.

A state—and more

In certain cases, ISIS governed areas more comprehensively than the governments of Baghdad and Damascus. Whether in delivery of services or management of people and resources under its control, ISIS makes it clear it is the only ruler in town, and once residents recognize that, they are often allowed to help govern their areas. There have been instances, according to tribal sources from Iraq and Syria I spoke to, of “deputization” whereby ISIS re-armed specific tribesmen to control their own area, though that process remained extremely limited.

Before, other groups and previous governments would use tribal leaders as intermediaries between them and local communities. ISIS, by contrast, acts as an intermediary between different tribes and even within the same tribe to resolve disputes, some of which date back to the 1970s and 1980s. Furthermore, it has systematically disarmed local communities that came under its rule in a way that previous governments failed to do over decades. 

The group is the only one in the two countries that employs an extensive network of staff exclusively dedicated to dealing with tribal affairs. The man in charge of tribal affairs is a Saudi national by the name of Daygham Abu Abdullah, locally known to be well-versed in tribal lineage and dynamics. He oversees a bureau that receives tribal delegations from across the self-styled caliphate that desire to resolve conflict or appeal for clemency. After ISIS asserts control over an area, tribal outreach helps it engage with local tribes and act as a social arbiter. Even though the organization carried out mass atrocities against certain tribes, the group often has other members of those same tribes fighting in its ranks, including members of Albu Nimr and Albu Fahad in Iraq, and Al Shaytat in Syria. ISIS employs a seemingly contradictory strategy of divide-and-rule. It first attempts infiltrate an area, and follows up with an outreach policy after consolidating control. The office that handles amending tribal disputes is known as Public Relations Bureau.

Whereas Islamic inheritance laws stipulate that women are to receive half of that received by a male sibling, tribal society often deprives women even of that half share. Unlike governments, which rarely enforce Sharia-based inheritance laws, ISIS sent out instructions to local communities to provide women with their due share and some women who complained to ISIS judges would receive their shares retroactively from their brothers.

These measures suggest that the group, in some instances, is more vigorous and micro-managerial than previous governments that ruled these predominantly rural areas in Iraq and Syria.

These measures suggest that the group, in some instances, is more vigorous and micro-managerial than previous governments that ruled these predominantly rural areas in Iraq and Syria. Lawlessness, kidnappings, arbitrary killings, and highway robbery are greater sources of grievance for people living outside regime areas than poor services, something that ISIS has dealt with by providing security based on brutal justice and policing. The semblance of order established by ISIS remains a strong advantage for the group, despite its diminished ability in other aspects of governance, and forces that will take over from ISIS will be judged accordingly.

Conclusion

There is little doubt that the group has lost the initial appeal it had when it conquered large swaths of territory in Iraq and Syria in the summer of 2014. The U.S.-led air campaign has blunted the group’s ability to generate income from oil and war spoils that usually come from rapid expansion. It has also reduced the group’s capacity to provide sufficient services for communities under its rule. The air campaign has also resulted in an interesting trend: it has strengthened the role of ISIS’ security and intelligence core in the towns, villages and cities the group controls, a development that has led to mounting complaints about their harsh and crude behavior.

ISIS associates, too, complain of the group’s security apparatus to the extent that it has become common to hear of clerics explaining to ISIS members that the state that Prophet Mohammed founded also included munafiqun, or “hypocrites,” and that this should not be a reason to abandon it, according to interviews I conducted, including with members. (Connoting someone who only feigns belief in public, the term munafiqun is a heavy accusation to levy at a fellow Muslims, and such people are condemned in the Quran.)

[T]argeting the economy of ISIS-controlled areas can make matters worse.

But all that will not translate into a rebellion against ISIS. Additionally—and more importantly—targeting the economy of ISIS-controlled areas can make matters worse. In some cases, airstrikes led families to send their children to join ISIS as the only way to generate income. Iraqi officials have warned that choking off ISIS’s economic routes might result in “collateral damage.” While they may see this as necessary evil, it also runs the risk of helping ISIS tighten its grip by driving residents closer to it as the only employer or provider in town.

The unintended consequences of the air campaign are a serious concern, especially if ISIS is to be defeated strategically. This is something I have discussed with everyone involved, from civilians to ISIS members to Western officials involved in the anti-ISIS campaign. Residents often complain that they are suffering collective punishment by inconsiderate foreign forces. ISIS, meanwhile, tells the communities under its rule that it would have brought more prosperity to their towns had it not been for the airstrikes. A high-level American official involved in the campaign acknowledged to me that officials were aware of the possibility of unintended consequences but insisted that airstrikes targeting the economy in eastern Syria and western Iraq will only intensify. 

Authors

      
 
 




academic and careers

Rethinking Political Islam


      
 
 




academic and careers

American attitudes on refugees from the Middle East


Event Information

June 13, 2016
2:00 PM - 3:30 PM EDT

The Brookings Institution
Falk Auditorium
1775 Massachusetts Ave., N.W.
Washington, DC 20036

Register for the Event

On June 13, Brookings launched a new public opinion survey focusing on American attitudes toward refugees from the Middle East and from Syria in particular.



With violence in the Middle East and the associated refugee crisis continuing unabated, these issues remain prominent in Washington policy debates. It is therefore increasingly important for U.S. policymakers, political candidates, and voters to understand the American public’s attitudes toward the conflicts in the Middle East and the refugees fleeing those crises.

On June 13, Brookings launched a new public opinion survey focusing on American attitudes toward refugees from the Middle East and from Syria in particular. Conducted by Nonresident Senior Fellow Shibley Telhami, the poll looks at a range of questions, from whether Americans feel the United States has a moral obligation to take in refugees to whether these refugees pose a threat to national security. The national poll takes into account an expanded set of demographic variables and includes an over-sized sample of millennials.  

Telhami was joined in discussion by POLITICO Magazine and Boston Globe contributor Indira Lakshmanan. William McCants, senior fellow and director of the Project on U.S. Relations with the Islamic World at Brookings, provided introductory remarks and moderated the discussion.

This event launched the Brookings Refugees Forum, which will take place on June 14 and 15.

Join the conversation on Twitter using #RefugeeCrisis.


Video

Audio

Transcript

Event Materials

      
 
 




academic and careers

Realist or neocon? Mixed messages in Trump advisor’s foreign policy vision


Last night, retired lieutenant general Michael Flynn addressed the Republican convention as a headline speaker on the subject of national security. One of Donald Trump’s closest advisors—so much so that he was considered for vice president—Flynn repeated many of the themes found in his new book, The Field of Fight, How We Can Win the Global War Against Radical Islam and Its Allies, which he coauthored with Michael Ledeen. (The book is published by St. Martin’s, which also published mine.)

Written in Flynn’s voice, the book advances two related arguments: First, the U.S. government does not know enough about its enemies because it does not collect enough intelligence, and it refuses to take ideological motivations seriously. Second, our enemies are collaborating in an “international alliance of evil countries and movements that is working to destroy” the United States despite their ideological differences.

Readers will immediately notice a tension between the two ideas. “On the surface,” Flynn admits, “it seems incoherent.” He asks: 

“How can a Communist regime like North Korea embrace a radical Islamist regime like Iran? What about Russia’s Vladimir Putin? He is certainly no jihadi; indeed, Russia has a good deal to fear from radical Islamist groups.” 

Flynn spends much of the book resolving the contradiction and proving that America’s enemies—North Korea, China, Russia, Iran, Syria, Cuba, Bolivia, Venezuela, Nicaragua, al-Qaida, Hezbollah, and ISIS—are in fact working in concert.

No one who has read classified intelligence or studied international relations will balk at the idea that unlikely friendships are formed against a common enemy. As Flynn observes, the revolutionary Shiite government in Tehran cooperates with nationalist Russia and communist North Korea; it has also turned a blind eye (at the very least) to al-Qaida’s Sunni operatives in Iran and used them bargaining chips when negotiating with Osama bin Laden and the United States. 

Flynn argues that this is more than “an alliance of convenience.” Rather, the United States’ enemies share “a contempt for democracy and an agreement—by all the members of the enemy alliance—that dictatorship is a superior way to run a country, an empire, or a caliphate.” Their shared goals of maximizing dictatorship and minimizing U.S. interference override their substantial ideological differences. Consequently, the U.S. government must work to destroy the alliance by “removing the sickening chokehold of tyranny, dictatorships, and Radical Islamist regimes.” Its failure to do so over the past decades gravely imperils the United States, he contends.

The book thus offers two very different views of how to exercise American power abroad: spread democracies or stand with friendly strongmen...[P]erhaps it mirrors the confusion in the Republican establishment over the direction of conservative foreign policy.

Some of Flynn’s evidence for the alliance diverts into the conspiratorial—I’ve seen nothing credible to back up his assertion that the Iranians were behind the 1979 takeover of the Grand Mosque in Mecca by Sunni apocalypticists. And there’s an important difference between the territorially-bounded ambitions of Iran, Russia, and North Korea, on the one hand, and ISIS’s desire to conquer the world on the other; the former makes alliances of convenience easier than the latter. Still, Flynn would basically be a neocon if he stuck with his core argument: tyrannies of all stripes are arrayed against the United States so the United States should destroy them.

But some tyrannies are less worthy of destruction than others. In fact, Flynn argues there’s a category of despot that should be excluded from his principle, the “friendly tyrants” like President Abdel-Fatah el-Sissi in Egypt and former president Zine Ben Ali in Tunisia. Saddam Hussein should not have been toppled, Flynn argues, and even Russia could become an “ideal partner for fighting Radical Islam” if only it would come to its senses about the threat of “Radical Islam.” Taken alone, these arguments would make Flynn realist, not a neocon. 

The book thus offers two very different views of how to exercise American power abroad: spread democracies or stand with friendly strongmen. Neither is a sure path to security. Spreading democracy through the wrong means can bring to power regimes that are even more hostile and authoritarian; standing with strongmen risks the same. Absent some principle higher than just democracy or security for their own sakes, the reader is unable to decide between Flynn’s contradictory perspectives and judge when their benefits are worth the risks. 

It’s strange to find a book about strategy so at odds with itself. Perhaps the dissonance is due to the co-authors’ divergent views (Ledeen is a neocon and Flynn is comfortable dining with Putin.) Or perhaps it mirrors the confusion in the Republican establishment over the direction of conservative foreign policy. Whatever the case, the muddled argument offered in The Field of Fight demonstrates how hard it is to overcome ideological differences to ally against a common foe, regardless of whether that alliance is one of convenience or conviction. 

Authors

      
 
 




academic and careers

Global economic and environmental outcomes of the Paris Agreement

The Paris Agreement, adopted by the Parties to the United Nations Framework Convention on Climate Change (UNFCCC) in 2015, has now been signed by 197 countries. It entered into force in 2016. The agreement established a process for moving the world toward stabilizing greenhouse gas (GHG) concentrations at a level that would avoid dangerous climate…

       




academic and careers

Policy insights from comparing carbon pricing modeling scenarios

Carbon pricing is an important policy tool for reducing greenhouse gas pollution. The Stanford Energy Modeling Forum exercise 32 convened eleven modeling teams to project emissions, energy, and economic outcomes of an illustrative range of economy-wide carbon price policies. The study compared a coordinated reference scenario involving no new policies with policy scenarios that impose…

       




academic and careers

Leading carbon price proposals: A bipartisan dialogue

Economists overwhelmingly recommend a price on carbon as a way to control the risk of climatic disruption. A fee on carbon dioxide and other greenhouse gas emissions would shift the relative prices of different sources of energy and other goods by an amount that depends on how damaging they are to the earth’s climate. A…

       




academic and careers

My Climate Journey podcast episode 17: Adele Morris

       




academic and careers

The risk of fiscal collapse in coal-reliant communities

EXECUTIVE SUMMARY If the United States undertakes actions to address the risks of climate change, the use of coal in the power sector will decline rapidly. This presents major risks to the 53,000 US workers employed by the industry and their communities. 26 US counties are classified as “coal-mining dependent,” meaning the coal industry is…

       




academic and careers

Columbia Energy Exchange: Coal communities face risk of fiscal collapse

       




academic and careers

The risk of fiscal collapse in coal-reliant communities

       




academic and careers

Why local governments should prepare for the fiscal effects of a dwindling coal industry

       




academic and careers

The Neoliberal Podcast: Carbon Taxes ft. Adele Morris, David Hart & Philippe Benoit

       




academic and careers

Adele Morris on BPEA and looking outside macroeconomics

Adele Morris is a senior fellow in Economic Studies and policy director for Climate and Energy Economics at Brookings. She recently served as a discussant for a paper as part of the Spring 2019 BPEA conference.Her research informs critical decisions related to climate change, energy, and tax policy. She is a leading global expert on the design…