Wednesday, August 25, 2010

The Guizhou University Kurt Vonnegut Book Club

Originally posted 12 May 2008...

In light of all of the ultra-nationalist rhetoric from both the CCP and angry young Chinese men regarding the Tibet riots and the Olympic torch relay, this give me hope for our relations with China, and for China's future.  Students at Guizhou University not only smuggle in copies of Kurt Vonnegut books to read and discuss in a very serious manner.  They seem to want a better understanding of the United States.
“We don’t understand all of what Vonnegut wrote,” the club’s president, Isabel Yuan, told me, “But we think reading him helps us understand America.” Isabel and I spoke over a steaming pot of bitter pu’ er tea in a restaurant not far from the Gui Da campus. She sat upright, her black eyes focused on the porcelain cup in her hand. “Vonnegut,” she continued, “is our window into the American mind.”
The students give each other writing assignments before meetings in a way that students at elite American schools are reputed to, but that I have a hard time imagining of my community college or university undergrads.
KC members had posed these questions at last month’s meeting, and each member had prepared a written answer, which they took turns reading, occasionally correcting each other’s pronunciation of uncommon English words (“paradigm,” “subversion,” “granfalloon”).
The most insightful essay came from the only male in the club, a 23-year-old with thick, wire-framed glasses. He went by the name Little Dragon (in honor of martial arts actor Bruce Lee), and read in slow, halting English: “Intellectuals in America and intellectuals in China serve different roles. In China, the role is to serve the state. In America, the role is to serve the truth.” Little Dragon paused, looked nervously at me while pushing his glasses up his nose, and continued. “But it is said that individual Americans feel lost. They have material excess but no equality, and democracy but no power. So Vonnegut sees there is no truth worth serving, and simply behaves ridiculous.”
Among the most interesting items are that few students have an awareness of the Great Firewall of China, which censors Internet traffic in and out of the PRC, unless you are savvy enough to use a proxy server or VPN to get around it.  That, and that the leader of the Kurt Club believes that Chinese students need to learn to mock their leaders in the way that Americans mock theirs.  I would suggest the British model myself, as it seems more tolerant of dissent than our own ultra-nationalistic and partisan mode.

Tuesday, August 24, 2010

Recruiting "Hackers"

We'll leave aside the whole issue of nomenclature - the hackers/crackers dichotomy - and just get to the meat of the problem.  The DoD, the entire U.S. government really, is in desperate need from experts in information security - the folks commonly known as hackers.  That need led to the creation of CYBERCOM to act as the nation's defensive bulwark against computerized intrusion and to develop some sort of offensive capability.  To attract young people with the right skills, the DoD sponsors competitions to find and develop potential recruits.

All that is fine.  The problem is that the military doesn't really get how to recruit and retain the people it needs.  Adam Weinstein points this problem out, but at the same time manages to minimize the problem by bringing Private Bradley Manning into his argument.  Manning is a good example of poor screening for security clearances, but not exactly a paragon of computing virtuosity.  Unless I've missed something critical, my 86 year-old grandmother has all the skills (but none of the desire) Manning needed.  He isn't so much an example of a "cyber-savvy intel weenie", but the traditionally dangerous disaffected insider.

Both Weinstein and West Point researcher Lt. Col. Gregory Conti miss the point when they address the problem of recruiting and retaining infosec capable geeks.  Weinstein argues that you have to show potential recruits that CYBERCOM is doing good things for the world as opposed to promoting death and destruction, while Conti argues that the DoD just needs to be ubercool to attract and keep "hackers".  Both arguments show that neither Weinstein or Conti (or the DoD) get the culture of the people they need (or think they need, which is a whole different story).

18 year-old Michael Coppola illustrates the problem to a small degree.  He rejected the idea of enlisted because he associates the military lifestyle with regimentation and lack of creativity.  While Conti argues that the culture of CYBERCOM is still malleable, I don't buy it.  The US Army just ordered Special Forces troops in Afghanistan without ongoing interactions with Afghans to shave their beards despite knowing that facial hair is an important cultural tool in that environment - a fact we've known since the Templars grew beards and cut their hair to gain the respect of their Muslim neighbors. 

That was a thousand years ago.

So we're supposed to expect that the DoD will allow a creative and libertarian culture at CYBERCOM, when the Special Forces guys in combat have to shave?  That's a joke, right?  Do these people even know what kind of tools CYBERCOM needs?  Look at the difficulty Weinstein reports at getting terminals that could access Facebook, and then tell me that CYBERCOM will provide its recruits with the unfettered access to the Internet they need to find new exploits in the wild, develop their own, and test them out.  Is that a realistic expectation when it seems like the approach is to make it seem like a cool job for young men?

In my old career as a Systems Administrator, I knew a few guys with the types of skills and a desire to serve in the military (they couldn't due to health issues) and appreciation of the military culture.  Most of the folks that the DoD would want to recruit, though, are interested in hierarchical organizations, want the freedom to dress as they want, wear their hair however they feel, work flexible hours, and expect to not only modify their machines at will, but to have free run of networks and the Internet.  That's a large part of the reason they want to work for companies like Google.  Maybe one percent of the potential "hackers" the DoD tries to recruit are likely to fit the bill.

I'm not even convinced by the numbers they say they need.  Does DoD really need 10-30,000 of them?  Or do they need a few hundred exceptional folks and a whole bunch of homegrown guys like me - who aren't coders, but are smart, interested, and determined to both secure and penetrate networks given the opportunity, time, and the tools.  Think of it this way - how many guys like Michael Jordan, Magic Johnson, and Larry Bird does a basketball team need?  You need both stars and role players to win the championship.  To me, you need some brilliant guys, along with some guys who are good to get the infosec job done.  Just like in team sports. 

The Dream Team is not what DoD needs, just guys who can get the job done.

Sunday, August 22, 2010

Books - New Acquisitions on Gender & History

As part of preparing for PhD comprehensive exams, I'm sitting in on Dr. Holly Grout's pro-seminar on Gender in European History.  My dissertation research about French and American soldiers in Vietnam has a large gender (masculinity) component, so this helps on multiple levels.

  1. Mary Poovey, Uneven Developments: The Ideological Work of Gender in Mid-Victorian England
     
  2. Judith Surkis, Sexing the Citizen: Morality and Masculinity in France, 1870-1920
     
  3. Judith Walkowitz, City of Dreadful Delight: Narratives of Sexual Danger in Late-Victorian London
     
  4. Ann Stoler, Carnal Knowledge and Imperial Power: Race and the Intimate in Colonial Rule
     
  5. Joan Scott, Only Paradoxes to Offer: French Feminists and the Rights of Man
     
  6. Mary Louise Roberts, Disruptive Acts: The New Woman in fin-de-siècle France
     
  7. Whitney Chadwick and Tirza Latimer eds., The Modern Woman Revisited: Paris Between the Wars

Saturday, August 21, 2010

Vietnam War Reading

Every time Dr. Jones teaches his Vietnam War class, I get several requests from other grad students about what their options are for his book review assignments (they should really ask his PhD candidate Becky).  Each year I give them a basic list based on their preferences, but this time around, I'm going for a  master list that covers a little bit of everything.

Here's what I have so far, and it is by no means exhaustive, just what I have here in Tuscaloosa:

  1. Bing West, The Village
  2. Harold Moore and Joseph Galloway, We Were Soldiers Once... And Young
  3. Bernard Fall, Hell in a Very Small Place
  4. Bernard Fall, Street Without Joy
  5. Frances Fitzgerald, Fire in the Lake
  6. Stanley Karnow, Vietnam: A History
  7. John Nagl, Learning to Eat Soup With a Knife
  8. Philip Caputo, A Rumor of War
  9. Neil Sheehan, A Bright Shining Lie
  10. William Duiker, Ho Chi Minh: A life
  11. Rick Newman and Don Shepperd, Bury Us Upside Down
  12. Tom Mangold and John Penycate, The Tunnels of Cu Chi
  13. H.R. McMaster, Dereliction of Duty
  14. James Olson and Randy Roberts, Where the Domino Fell
  15. Truong Nhu Tang, A Viet Cong Memoir
  16. William Duiker, Sacred War: Nationalism and Revolution in a Divided Vietnam
  17. Mark Moyar, A Triumph Forsaken
  18. David Anderson, Facing My Lai: Moving Beyond the Massacre
  19. Kendrick Oliver, The My Lai Massacre in American History and Memory
  20. James R. Ebert, A Life in a Year: The American Infantryman in Vietnam, 1965-1972
  21. Deborah Nelson, The War Behind Me
  22. Frederik Longevall, Choosing War: The Lost Chance for Peace and the Escalation of War in Vietnam
  23. Michael Lind, Vietnam: The Necessary War
This list is light on the air war and naval warfare, so that needs to be fixed.  Any comments or suggestions for what might be missing?

Tuesday, August 10, 2010

Misusing History, Max Boot Style

Last Wednesday Jason Sigger at Armchair Generalist took Max Boot to task for his argument that decreasing American armed forces was directly correlated to foreign aggression, so we have to maintain or grow the military to maintain peace and stability despite the increasing cost and outsized effect on the Federal budget.  As Jason points out, Boot ignores all of the social, economic, and cultural factors related to war.  Of course, that's as far as he goes.

Boot's argument is actually worse that Jason makes out. Taking every major conflict the United States fought in turn, Boot argues that merely maintaining a large standing military would have prevented or reduced all those wars, and provides numbers to prove his point.  The problem is that he does so by completely ignoring the context in which those conflicts occurred, and goes off the rails almost immediately.

In his theory, Boot contends that if only the young American republic had kept the standing army at 35,000 men instead of reducing it to a paltry 10,000, the Whiskey Rebellion, War of 1812, Quasi War, and conflict with the Barbary pirates would have all been avoided.  Of course, this requires us to ignore the Founding Fathers' fundamental ideology against standing armies and the ideology of the Revolution arguing that it was both the right and duty of citizens to resort to arms to defend against oppression.  It also assumes that keeping soldiers would have been effective against Great Britain, or would have somehow translated into strength at sea (against Great Britain, France, and Barbary).

The Civil War gets similar, if even less nuanced treatment.  Arguing that 50,000 troops were too few to effectively enforce Reconstruction in the defeated Confederacy, Boot ignores that fact that many in the North simply did not have the political will or interest to radically redraw the political and social order of the South over the long term.  Northerners also had no interest in paying the taxes needed to support large bodies of troops - one of the debates featured in the 1876 Presidential election was over the Federal budget and cost of maintaining a large standing Army.  If Boot thinks that large bodies of Union troops could have forced permanent social, economic, and political change in just 11 years after the end of the Civil War, he is sadly mistaken.  Fighting the pro-Confederate insurgency would have required a permanent Federal presence lasting generations.

Despite all of this, Boot's argument runs into its biggest problems when he addresses the 20th century.  Boot has completely taken leave of his senses if he truly believes that Woodrow Wilson, who could barely drag his nation to war by relying on the Zimmerman Telegram, sinking of the Lusitania, and the Creel Commission, and could not get a Republican Senate to join the League of Nations at the end of the war, could have persuaded them to maintain a force much larger than the 250,000 man force that still existed in 1928.  When arguing that American forces in France or Poland would have somehow deterred Hitler in 1939, Boot conveniently ignores American isolationism in the interwar period and the hoops FDR had to jump through to provide aid to England with the Lend-Lease Acts of the 1930s, which were a response to the cost of America's involvement in World War I.

The fact of the matter is that the size of our Armed Forces is not the only factor leading to these conflicts or how quickly or easily they were ended.  We do need to have a national conversation about the size military we need, and what we need to use it for, what the threats we face are, and how to pay for it all.  But, in having this conversation, we should not be distracted by false assertions and emotional arguments about the past.  Hard as it is to do, we need to examine this complex and serious issue as rational and responsible citizens.  That means accepting that the world is a complicated place, and that mere numbers of troops won't solely determine whether we are secure, or not.

Monday, August 9, 2010

Containing China

There's more going on in East Asia re: containing China's influence in the region. 

While the Clinton State Department works to increase ties to Vietnam, Defense Secretary Gates is working to increase military cooperation with Indonesia, in moves designed to show U.S. commitment in the South China Sea and to bolster efforts to defend freedom of the seas in the face of Chinese territorial claims.

At the same time, the United States agreed to sell Taiwan two Oliver Hazard Perry class frigates for anti-air and anti-sub work, bolstering the island's defense against the PRC, which continues to claim that Taiwan is historically part of China.  Other regional powers are also working to build defenses against a potential sea threat from the PRC.  Japan is building supersonic anti-ship missiles that it can launch from fighter aircraft to counter Chinese carriers, destroyers, and cruisers, and increasing the size of its submarine fleet to counter the larger number of submarines deployed by the People's Liberation Army Navy.

What I find interesting is that the label "containment" doesn't appear in these discussions.  Instead Clinton and Gates are working to maintain the "balance of power" in East and Southeast Asia by building partnerships with regimes that are liberalizing and modernizing while still trying to push them on human rights issues.  On the surface this is different from Cold War containment, in which any opponent to the Soviet Union was our friend, no matter how nasty that "ally" might be, but containment it is, and our partners are still folks who fear an aggressive larger neighbor. 

The change in labels from "containment" to "balance of power" makes some PR sense.  Given America's Cold War efforts at containment, China might see it as an aggressive move against them, and the Obama administration's efforts are not so much a move to isolate China completely, as to keep the PRC in check.  To my mind, though, the phrase "balance of power" recalls the 19th and early 20th century European diplomacy leading up to World War I, and we all know how that worked out.

Sunday, August 8, 2010

Desert Shield, Desert Storm, Desert Stuck...

That's how my Dad described it when he got back from Bahrain Mother's Day of 1991. 

It's hard to believe that 20 years ago, President George Herbert Walker Bush deployed the 82nd Airborne Division and the First Air Wing to Saudi Arabia to deter Saddam Hussein from invading Saudi Arabia.  At the time I was a sophomore at USF, starting my first semester of Army ROTC, and arguing with my soon to be ex-girlfriend about the deployment.  She had joined the National Guard to get money to pay for school and was upset about the prospect of having to deploy to the desert (that didn't happen since she spent the next 8 weeks in Basic Training at Ft. Dix, followed by a year at Ft. Sam Houston).  My unfeeling response to her was to ask her exactly what she had expected when joining the Army...

Desert Shield and Desert Storm were an interesting experience in Tampa.  An anti-war group on campus tried to prevent us from wearing our uniforms, when there were rallies at the campus flea market the cadre warned us to not start anything (we promptly went over wearing our gold and black t-shirts), the campus police stopped to investigate our early morning ruck-run, and when our color guard participated in parades, SGM McLaughlin reminded us to defend the colors from protesters.  The flag-bearers were specifically reminded that they were carrying a spear.

The one thing that really gave us pause was the deployment directive posted in the cadet lounge.  It specified that in the event of a full-scale call-up of all forces, cadets who had finished Advanced Camp would be commissioned, that cadets in their third year would finish training before commissioning, and scholarship cadets would be enlisted in the ranks.  The rest of us would stay in school, assuming we didn't volunteer on our own.

These days I teach college students, mostly freshmen and sophomores, who are 18 or 19 years old, but nothing has made me feel quite so old as this anniversary.

Saturday, August 7, 2010

Feds Paying for Outsourcing?

When this story first arrived, I tweeted my amazement and left it at that.  How could the Federal government be paying for folks in developing countries to learn IT skills and improve their English language skills to make it easier for American companies to outsource decent paying jobs?  This goes far beyond abusing H1-B visas for IT workers or having a tax code that stupidly encourages American companies to outsource IT work and call centers, but actively encourages outsourcing by having the American taxpayer pay to teach people in other countries the skills they need to take jobs out of an economy with 9.5% employment.

I was going to let it rest, but Matther Yglesias wrote at both The Progressive Realist and Think Progress that this program is little different from building schools or clinics because those bit of foreign aid might also encourage outsourcing by teaching skills (math and languages) and keeping people alive.  He also argues that it is natural for foreign workers with IT and English language skills to seek work with vendors providing outsourcing solutions.  His point is that looking at this particular program as a threat to American jobs is overly simplistic and that government efforts that lower trade barriers and improve conditions in the rest of the world are inherently good.

I think, though, that he misses the point.  Even if you accept the free trade ideology that free trade improves the lives of people everywhere, that jobs that move overseas will be replaced by value-added jobs here, and that free trade also spreads democracy and capitalist ideals, spending taxpayer money while running gigantic budget, trade, and current accounts deficits with 35 million Americans out of work is fundamentally stupid unless it somehow promises to quickly help fix any of those problems.  This program promises to do quite the opposite.

Beyond that, the whole idea that an advanced job skills program to teach is far different from programs that provide basic services such as elementary education or vaccinations.  They are an order of magnitude difference, and shouldn't be in the same conversation.  The only way the three types of foreign aid might reach some sort of equivalence is in prevention of terrorism, and that's a big stretch since many analyses of the sources of terrorists from the Middle East is that a significant fraction are highly trained engineers that are frustrated by lack of opportunity at home.  If that's the case, then this could have the opposite effect by producing a surplus of trained workers with no jobs (although this program does place them with outsourcing vendors).

Airpower and COIN Update

Last weekend Air Force Times carried an article about converting A-10 Warthogs to drones for use in combat.  The idea is that a JTAC (Joint Terminal Attack Controller) would designate targets and coordinate weapons release with an A-10 pilot in order to increase accuracy on the battlefield.  Since current COIN doctrine is worker hard to limit civilian casualties, the idea is that this would reduce accidents, and be more useful than the current fleet of MQ-1 Predator and MQ-9 Reaper drones due to speed and ordnance flexibility.  DARPA program manger Stephen Waller contends that the A-10 in question could have a pilot in it, or not, but that his vision is that a soldier could use his JTAC computer to attack targets just like he uses his M-16.

Depending on the implementation, this may be a good idea, or even a good temporary solution until USAF gets some dedicated COIN aircraft in the inventory.  I'm not in favor of a drone-only A-10 solution, even paired with a JTAC controller on the ground, having an A-10 pilot in a trailer many miles away reproduces some of the same problems with drones - a highly destructive weapons system, flying at high speed, that may crash on take-off or landing, or due to enemy fire because a desk chair pilot doesn't have the same situational awareness as a pilot in the aircraft.  Instead of losing at least a third of the drones we fly, we'll be losing the more expensive, more capable A-10s at a high rate.  we just may not be hitting as many of the wrong targets while doing it.

Don't get me wrong, this solution, if it works when demonstrated in 2014, looks a damn site better than the Reaper or planned follow-on aircraft, and infinitely better than dropping a JDAM from 30,000 feet from a B-1.  However, I can't help but think that this is just a stop-gap until funding for a real turboprop aircraft for COIN comes through.  New CentCom head Marine Corps Gen. James Mattis and ISAF Commander Gen. David Petraeus both want a replacement for the old A-1 Skyraider and OV-10 Bronco, but since the leading candidate comes from Brazil's Embraeur, funding is proving hard to come by.

Thursday, August 5, 2010

Lebanon, too...

The Blackberry ban is official in Saudi Arabia, and now Lebanon is examining the device's potential threat to security.  Combine that with the lackluster launch of the Blackberry Torch with data that says that 58% of Blackberry users (like me) are planning on moving to an iPhone or Android based device like the DROID X, and things look grim for Research in Motion.

Update: RIM and Saudi Arabia have come to an accord over monitoring.

Containment Redux?

Maybe it's just me, but looking back at the past few weeks of U.S. activity in East Asia, I can't help but wonder if we have a quiet sort of containment policy against China going in the region. There just seems a pattern, not just of the United States being more assertive in Asia, but of making moves to counter Chinese influence.

The first item to get my attention was the Obama administration completely ignoring China's objections to the joint U.S. - South Korea Invincible Spirit exercises that followed the Cheonan incident with North Korea. While the obvious purpose of the war games was deterring North Korean aggression (a tepid response to their sinking of a South Korean vessel, if there ever was one), it also serves to remind China that their are other powers with not only interests in the region, but with the ability to project enough power to protect their interests.

A second tidbit was the United States' offer to mediate territorial disputes in the South China Sea.  The PRC claims sovereignty over all of the waters and small islands in this highly populated area, and like with Tibet and Taiwan tries to fall back on a dubious historical basis to bolster its claims.  The Chinese government magnanimously says it will allow interested parties access to the sea lanes, but, of course, it is going to decide who has legitimate interests.  As much as an effort to reduce tension in the South China Sea, this is also a way for the United States to gain influence by supporting the smaller regional powers against China's territorial ambition.

The third puzzle piece showed up today.  The United States is negotiating a deal to help Vietnam develop nuclear power, including its own fuel enriching facilities.  For its part, Vietnam says it does not want to develop weapons-grade nuclear material because that would make China nervous, inviting it to become militarily involved in Vietnam.  While the Vietnamese won their border war with China in 1979, the outcome these days is far from certain, and you don't ask for a war you just can't win.  Still, the American negotiators indicate that China is not part of the nuclear power discussions since the deal is between Vietnam and the United States.  I find the negotiators' bluntness in saying that it wasn't any of China's business really interesting, almost provocative.

Combine this with renewed engagement in Thailand and our traditional defensive partnership with Australia, and you might see an outline of a Chinese containment regime.  The question is whether this combination is just happenstance, or if the President's advisers see the PRC as a competitor that needs closer watching?

Wednesday, August 4, 2010

When a Mosque Isn't Just a Mosque

The politicians, pundits, and citizens that are in an uproar over the Cordoba Initiative's new Muslim Cultural Center in lower Manhattan have one thing right: the mosque on one of the floors isn't just a mosque, it's a symbol.

Sarah Palin and her supporters would have us believe that the project, which was approved by local authorities, is an affront to all Americans because the World Trade Center was attacked by Muslims.  In their interpretation, the wars in Iraq and Afghanistan and the "Global War on Terror" are Samuel Huntington-style clashes of civilizations rather than conflicts between states (in Iraq), against outlaw regimes and insurgents (Afghanistan), or ideologically motivated criminals (GWOT).  Their reading of the situation is based on the mistaken belief that all Muslims accept the Salafist view that there is one narrow interpretation of Islam as opposed to the broader view accepting various cultural influences found through most of history and the modern world.

Because they accept this ridiculous world view in which all Muslims are the enemy, Palin and associates claim that the Cordoba House is a symbol of Muslim attacks on the United States, and should be blocked.  That Muslims serve with honor in the United States military and are embedded in all part of American society makes no difference.  All that matters to them is that this symbol of the cultural enemy be kept far, far away from the site of the World Trade Center.

However, since the Cordoba House project was approved by the borough of Manhattan and enjoys the support of New York Mayor Michael Bloomberg, it is a symbol of something else - a symbol of the American Promise.  The America that I learned about in school back in the 1970s was that of the Melting Pot, where people from everywhere came and once here were magically Americans regardless of color or creed.  Religious freedom was part of the Melting Pot mythology.

The first Europeans to settle North America arrived in Massachusetts seeking freedom from religious persecution in England.  The Puritans had a radically different vision of religious freedom than we do since they merely wanted a place where they could create John Winthrop's vision of the City on the Hill, and they excluded those who didn't toe the line like Roger Williams and Anne Hutchinson.  They were followed by other religious dissidents, seekers of fortune, and even criminals, but the idea of religious freedom didn't die with the Puritans.

Benjamin Franklin, Thomas Jefferson, George Washington, and Tom Paine all advocated for religious liberty and toleration, with Jefferson believing that his greatest accomplishment was Virginia's statute ensuring religious freedom.  These men, who arguably gave birth to our national philosophy, believed that religious belief was a private matter, not one for public debate.  Although we've had problems implementing this idea in practice over time, we fundamentally have accepted the idea that people of all faiths could worship in their own way as long as it didn't hurt anyone.

Despite this long tradition, Sarah Palin, Glenn Beck, and others, have decided that because the 19 men that attacked the World Trade Center and Pentagon on September 11, 2001, were Muslims, all Muslims are the enemy.  Not only does this fly in the face of our ideals, but it reinforces Ossama bin Laden's claim that we are engaging in an anti-Muslim Crusade at the side of Israel.  Not only does this fuel the flame of conflict, but makes our soldiers' efforts in Iraq and Afghanistan more difficult to accomplish because it declares that all Muslims are the enemy.

Rather than merely being a place of worship, the mosque at Cordoba House is thus a symbol of religious freedom and our own domestic battles with ourselves - a symbol of the American challenge of trying to live up to our own ideals in a complicated and frightening world.

Tuesday, August 3, 2010

Blackberry, Encryption, and National Security

I've been following the progress of Blackberry vendor Research in Motion's conflicts with Saudi Arabia, the UAE, and India over the strong encryption used by its devices for instant messaging, email, and web browsing.  All three nations want access to Blackberry users' data as part of their anti-terror operations, but both Saudi Arabia and the UAE want to restrict access to certain types of information, including pornography.

These governments argue that they not only face diverse terror threats (they do), but that they are just asking for the same access that Western governments routinely have.  Both the American and British governments have had access to Internet and telecommunications services within their borders for decades, though most telephone calls, emails, and other Internet traffic is not secure - email is generally sent in clear text, phone calls are rarely scrambled (and the U.S. Government reportedly has access to individual phone switches produced by American companies), and text messages are similarly insecure.  Blackberry services are different - part of the company's appeal to businesses is that Blackberry Messenger (the platform's proprietary instant messenger) and Blackberry email are both secure.  India, Saudi Arabia, and the UAE don't have the native technical ability to crack RiM's encryption.

Their solution is to inform RiM and Blackberry users that some functions will be blocked.  After years of negotiation, the UAE gave the company a Friday deadline, and local service providers offered users iPhones or other devices that the government could snoop without difficulty because unlike RiM, Apple and Google don't use dedicated secure servers to store and forward user data.

Research in Motion caved, offering to block porn sites and allow governments to snoop user data.  Better to give up the security that users pay for than lose the users entirely.  This episode should serve as a warning to businesses and consumers alike that electronic communications are insecure unless you provide your own security (and probably not even then given the ease most commercially available security protocols are cracked).

The problem is that this is not just an issue of national security for any of these countries, nor, indeed, those in the West that already had this access.  Access to user data may also be used to suppress political dissidents or steal trade secrets.  These are issues even in the liberal democracies of the West - France is known for its efforts to use intelligence services for industrial espionage, and in the United States Quaker peace activists have been the targets of domestic intelligence gathering.  In less free countries, political reformers and foreign businesses will likely become targets of these enhanced snooping capabilities.

Meanwhile, the terrorists that India, Saudi Arabia, and the UAE fear will adapt.  Users of Blackberries, iPhones, and Android devices already have access to technologies that make their communications more secure - TOR clients to provide secure browsing and other Internet Services, PGP clients can encrypt messages and documents, and a plethora of secure instant messaging clients for the three platforms are readily available.  The highly public nature of this conflict will drive terrorists and criminals to adopt these measures, which will be all the harder for India, Saudi Arabia, and the UAE to counter due to the sheer variety of options available.  All three nations may end up being less secure for their efforts.