VOlUME 05 ISSUE 03 MARCH 2022
Donald L. Buresh, Ph.D., J.D., LL.M.
Morgan State University
Google Scholar Download Pdf
Abstract
The issue considered in this article is whether the United States is prepared adequately to address the cyber activities of the Taliban in the future in light of the recent American departure from Afghanistan. The first section defines and discusses cyber espionage, cyber sabotage, cyber terrorism, and cyber warfare. The following section outlines the notion of network-centric warfare and its relationship to the various cyber-attacks. The third section contains a brief history of the Taliban, cumulating in assessing the current political situation in Afghanistan. The paper’s final section describes what adequate preparedness means for individuals, corporations, and the government. The paper concludes that the Taliban are not likely to be a cyber threat to the United States in the short term. However, as time progresses and the Taliban consolidates their political power, effectively defeating the Islamic State and insurgents in Panjshir, the United States will likely experience cyber attacks from the Taliban.
KEYWORDS:Afghanistan, Cyber Espionage, Cyber Sabotage, Cyber Terrorism, Cyberwar, Network-Centric Warfare, Taliban
REFERENCES:
1) Lindsay Maizland, The Taliban in Afghanistan, THE COUNCIL OF FOREIGN RELATIONS (Sep. 15, 2021), available at https://www.cfr.org/backgrounder/taliban-afghanistan.
2) Press Release, SEN. MARCO RUBIO, Rubio Introduces Bill to Designate Taliban As a Foreign Terrorist Organization (Sep. 15, 2021), https://www.rubio.senate.gov/public/index.cfm/2021/9/rubio-introduces-bill-to-designate-taliban-as-a-foreign-terrorist-organization.
3) MICHAEL N. SCHMITT ( GEN. ED.), TALLINN MANUAL 2.0 ON THE INTERNATIONAL LAW APPLICABLE TO CYBER OPERATIONS ( Cambridge University Press 2017).
4) RICHARD A. CLARKE, & ROBERT K. KNAKE, CYBER WAR: THE NEXT THREAT TO NATIONAL SECURITY AND WHAT TO DO ABOUT IT (HarperCollins Publishers 2010).
5) Patrick Clark, The Hotel Hackers Are Hiding in the Remote Control Curtains, BLOOMBERG BUSINESSWEEK (Jun. 26, 2019), available at https://www.bloomberg.com/news/features/2019-06-26/the-hotel-hackers-are-hiding-in-the-remote-control-curtains.
6) JENS DAVID OHLIN, KEVIN GOVERN, & CLAIRE FINKELSTEIN, CYBERWAR: LAW AND ETHICS FOR VIRTUAL CONFLICTS (Oxford University Press 2015).
7) UNITED STATES DEPARTMENT OF DEFENSE, LAW OF ARMED CONFLICT DESKBOOK (CreateSpace Independent Publishing Platform 16th ed. Aug. 17, 2018).
8) Jens David Ohlin, Kevin Govern, & Claire Finkelstein, supra, note 11.
9) Donald L. Buresh, Russian Cyber-Attacks on Estonia, Georgia, and Ukraine Including Tactics, Techniques, Procedures, and Effects, 1 JOURNAL OF ADVANCED FORENSIC SCIENCES 2, 15-26 (Aug. 2021), available at DOI: 10.14302/issn.2692-5915.jafs-21-3930.
10) LIANG QIAO, & XIANGSUI WANG, UN-RESTRICTED WARFARE (Echo Point Books & Media 1999).
11) Jens David Ohlin, Kevin Govern, & Claire Finkelstein, supra, note 11.
12) THOMAS RID, CYBER WAR WILL NOT TAKE PLACE (Oxford University Press 2013).
13) Michael A. Warren, (Nov. 2010) (unpublished Master of Science thesis, Ohio University), available at https://etd.ohiolink.edu/apexprod/rws_etd/send_file/send?accession=ohiou1289446353&disposition=inline.
14) Thomas Rid, supra, note 18.
15) Parliamentary Office Staff, Assessing the Risk of Terrorist Attacks on Nuclear Facilities, PARLIAMENTARY OFFICE OF SCIENCE AND TECHNOLOGY (Jul. 2004), available at
https://www.parliament.uk/globalassets/documents/post/postpr222.pdf.
16) Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, & Julia Spiegel, The Law of Cyber Attack, 100 CALIFORNIA LAW REVIEW 4, 817-85 (Aug. 2012), available at https://www.jstor.org/stable/23249823.
17) Thomas Rid, supra, note 18.
18) Catalin Cimpanu, New Iranian Data Wiper Malware Hits Bapco, Bahrain's National Oil Company, ZDNET ( Jan. 09, 2020), available at https://www.zdnet.com/article/new-iranian-data-wiper-malware-hits-bapco-bahrains-national-oil-company/.
19) Thomas Rid, supra, note 16.
20) NIST Staff, Red Team, COMPUTER SECURITY RESOURCE CENTER (n.d.), available at https://csrc.nist.gov/glossary/term/red_team.
21) Thomas Rid, supra, note 18.
22) Id.
23) ROBERT W. TAYLOR, TORI J. CAETI, D. KALL LOPER, ERIC J. FRITSCH, & JOHN LIEDERBACH, DIGITAL CRIME AND DIGITAL TERRORISM (Pearson Education, Inc. 2006).
24) Peter W. Singer, The Cyber Terror Bogeyman, BROOKINGS INSTITUTE (Nov. 01, 2012), available at https://www.brookings.edu/articles/the-cyber-terror-bogeyman/.
25) Marin Ivezic, The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks, MARIN IVEZIC (Mar. 31, 2015), available at https://cyberkinetic.com/cyber-kinetic-security/cyber-kinetic-risks/.
26) HEDIEH NASHERI, ECONOMIC ESPIONAGE AND INDUSTRIAL SPYING (Cambridge University Press 2005).
27) Lee Rainie, Janna Anderson, & Jennifer Connolly, Cyber Attacks Likely to Increase, PEW RESEARCH CENTER (Oct. 29, 2014), available at https://www.pewresearch.org/internet/2014/10/29/cyber-attacks-likely-to-increase/.
28) BRANDON VALERIANO, & RYAN C. MANESS, CYBER WAR VERSUS CYBER REALITIES: CYBER CONFLICT IN THE INTERNATIONAL SYSTEM (Oxford University Press 2015).
29) Foreign Cyber Threats to the United States, HEARING BEFORE THE COMMITTEE ON ARMED SERVICES: UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION (Jan. 05, 2017), available at https://www.govinfo.gov/content/pkg/CHRG-115shrg33940/html/CHRG-115shrg33940.htm.
30) Donald L. Buresh, A Critical Evaluation of the Estonian Cyber Incident, 1 JOURNAL OF ADVANCED FORENSIC SCIENCES 2, 7-14 (Nov. 03, 2020), available at DOI 10.14302/issn.2692-5915.jafs-20-3601.
31) Michael N. Schmitt, supra, note 3.
32) RICHARD STIENNON, THERE WILL BE CYBERWAR: HOW TO MOVE TO NETWORK-CENTRIC WARFIGHTING SET THE STAGE FOR CYBERWAR (IT-Harvard Press 2015).
33) Richard A. Clarke, & Robert K. Knake, supra, note 6.
34) Thomas Rid, supra, note 18.
35) Matthew Weaver, Teenage Hackers Motivated by Morality Not Money, Study Finds, THE GUARDIAN (Apr. 21, 2017), available at https://www.theguardian.com/society/2017/apr/21/teenage-hackers-motivated-moral-crusade-money-cybercrime.
36) SUSAN W. BRENNER, CYBERCRIME: CRIMINAL THREATS FROM CYBERSPACE (Praeger 2010).
37) Jens David Ohlin, Kevin Govern, & Claire Finkelstein, supra, note 11.
38) Darien Pun, Rethinking Espionage in the Modern Era, 18 CHICAGO JOURNAL OF INTERNATIONAL LAW. 1, 353-91 (Jul. 2017), available at https://chicagounbound.uchicago.edu/cjil/vol18/iss1/10/.
39) Thomas Rid, supra, note 18.
40) Alex Schmid, Terrorism - The Definitional Problem, 36 CASE WESTERN RESERVE JOURNAL OF INTERNATIONAL LAW 2, 375-419 (2004), available at
https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1400&context=jil.
41) Matthew J. Littleton, INFORMATION AGE TERRORISM: TOWARD CYBERTERROR, (Dec. 1995) (unpublished Master of Science thesis, Naval Postgraduate School), available at
https://fas.org/irp/threat/cyber/docs/npgs/terror.htm#TOC.
42) FRED KAPLAN, DARK TERRITORY: THE SECRET HISTORY OF CYBER WAR (Simon & Schuster 2016).
43) Thomas Rid, supra, note 18.
44) Shamsuddin Abdul Jalil, Countering Cyber Terrorism Effectively: Are We Ready To Rumble?, SANS INSTITUTE (Jun. 2003), available at https://www.giac.org/paper/gsec/3108/countering-cyber terrorism-effectively-ready-rumble/105154#:~:text=The%20most%20common%20objective%20of,on%20particular%20targets%20%5B2%5D.
45) Jordan Robertson, Is There Really a Cyberwar? Term Might Be Misused, PHYS.ORG (May 05, 2010), available at https://phys.org/news/2010-05-cyberwar-term-misused.html.
46) Chris Colvin, Daniel B. Garrie, & Siddartha Rao, Cyber Warfare and the Corporate Environment, 2 JOURNAL OF LAW & CYBER WARFARE 1, 1-24 (Spring 2013), available at https://www.jstor.org/stable/26441239.
47) Paul Strassman, Asymmetric Cyberwarfare Demands a New Information Assurance Approach, ARMED FORCES COMMUNICATIONS AND ELECTRONICS ASSOCIATION (Jul. 01, 2013), available at https://www.afcea.org/content/asymmetric-cyberwarfare-demands-new-information-assurance-approach.
48) Chris Colvin, Daniel B. Garrie, & Siddartha Rao, supra, note 73.
49) FREDERICK A. HAYEK, LAW, LEGISLATION AND LIBERTY: A NEW STATEMENT OF THE LIBERAL PRINCIPLES OF JUSTICE AND POLITICAL ECONOMY (Routledge Classics 2012).
50) William Owens, The Emerging U.S. System of Systems, INSTITUTE FOR NATIONAL STRATEGIC STUDIES, 63 (Feb. 1996), available at http://www.dtic.mil/get-tr-doc/pdf?AD=ADA394313.
51) Corporate Initiatives Group, C4ISR Forward . . . A Vision of the Future. SAN DIEGO, CALIFORNIA: NAVAL COMMAND (Jul. 1997), available at https://www.dtic.mil/dtic/tr/fulltext/u2/a434155.pdf.
52) Arthur K. Cebrowski, & John H. Garstka, Network-Centric Warfare - Its Origin and Future, UNITED STATES NAVAL INSTITUTE ( Jan. 1998), available at https://www.usni.org/magazines/proceedings/1998/january/network-centric-warfare-its-origin-and-future.
53) DAVID ALBERTS, JOHN GARSTKA, & FREDERICK STEIN, NETWORK CENTRIC WARFARE: DEVELOPING AND LEVERAGING INFORMATION SUPERIORITY (Department of Defense: Command and Control Research Program 2nd. ed. 2003), available at http://www.dodccrp.org/files/Alberts_NCW.pdf.
54) DAVID ALBERTS, JOHN GARSTKA, RICHARD HAYES, R., & DAVID A. SIGNORI, UNDERSTANDING INFORMATION AGE WARFARE (Department of Defense: Command and Control Research Program 2001), available at https://www.voltairenet.org/IMG/pdf/Understanding_Information_Age_Warfare-2.pdf.
55) DAVID ALBERTS, JOHN GARSTKA, RICHARD HAYES, R., & DAVID A. SIGNORI, UNDERSTANDING INFORMATION AGE WARFARE (Department of Defense: Command and Control Research Program 2001), available at https://www.voltairenet.org/IMG/pdf/Understanding_Information_Age_Warfare-2.pdf.
56) DAVID S. ALBERTS, INFORMATION AGE TRANSFORMATION: GETTING TO A 21ST CENTURY MILITARY (Department of Defense: Command and Control Research Program 2002), available at http://dodccrp.org/files/Alberts_IAT.pdf
57) MARIUS VASSILIOU, DAVID S. ALBERTS, & JONATHAN R. AGRE, C2 RE-ENVISIONED: THE FUTURE OF THE ENTERPRISE (Chemical Rubber Company Press 2015).
58) Clay Wilson, Network Centric Operations: Background and Oversight Issues for Congress, CONGRESSIONAL RESEARCH SERVICE (Mar. 15, 2007), available at
https://www.researchgate.net/publication/235121618_Network_Centric_Operations_Background_and_Oversight_Issues_for_Congress.
59) MICHAEL E. WHITMAN, & HERBERT J. MATTORD, PRINCIPLES OF INFORMATION SECURITY (Cengage Learning 2016).
60) Gustavus J. Simmons, Symmetric and Asymmetric Encryption, 11 ACM COMPUTING SURVEYS 4, 305-30 (Dec. 1979), available at https://doi.org/10.1145/356789.356793.
61) Id.
62) RYAN RUSSELL, TIMOTHY MULLEN, & JOHNNY LONG, STEALING THE NETWORK: THE COMPLETE SERIES COLLECTOR’S EDITION (Elsevier Publishing 2009), available at
https://books.google.com/books?id=4csyeZaEP4cC&pg=PA651&lpg=PA651&dq=stealing+a+computer+that+uses+asymmetric+encryption&source=bl&ots=tJLyiwwBiI&sig=ACfU3U1y2COvwBkp5fsPZwhdcuYDacPSww&hl=en&sa=X&ved=2ahUKEwjbzs2kwrbyAhWKbs0KHXU3Ck4Q6AF6BAg5EAM#v=onepage&q=stealing%20a%20computer%20that%20uses%20asymmetric%20encryption&f=false.
63) DAVID MOWRY, GERMAN CIPHER MACHINES OF WORLD WAR II (National Security Agency: Center for Cryptologic History rev. ed. 20014), available at https://www.nsa.gov/Portals/70/documents/about/cryptologic-heritage/historical-figures-publications/publications/wwii/german_cipher.pdf.
64) Gustavus J. Simmons, supra, note 97.
65) Henry Kamradt, & Douglas MacDonald, The Implications of Network-Centric Warfare for United States and Multinational Military Operations, UNITED STATES NAVAL WAR COLLEGE (Dec. 31, 1998), available at https://apps.dtic.mil/sti/pdfs/ADA430553.pdf.
66) Clay Wilson, supra, note 90.
67) KIMBERLY S. YOUNG, & CRISTIANO NABUCO, DE ABREU (EDS.), INTERNET ADDICTION: A HANDBOOK AND GUIDE TO EVALUATION AND TREATMENT (John Wiley & Sons, Inc. 2011), available at http://www.ssu.ac.ir/cms/fileadmin/user_upload/Moavenatha/MBehdashti/ravan/pdf/faaliyatha/pptfiles/INTERNET_ADDICTION.pdf#page=39
68) Henry Kamradt, & Douglas MacDonald, supra, note 102.
69) Joseph H. Scherrer, Risks and Vulnerabilities of Network-Centric Forces: Insights from the Science of Complexity, NAVAL WAR COLLEGE (Feb. 03, 2003), available at https://apps.dtic.mil/sti/citations/ADA415474.
70) Clay Wilson, supra, note 90.
71) David L. Peeler, Jr., & Michael P. Dahlstrom, Network Centric Warfare: Advantages and Disadvantages, STRATEGIC IMPACT NO. 3 (2003), available at https://www.proquest.com/openview/364a2a648a2241267b93979755e55788/1?pq-origsite=gscholar&cbl=1876337.
72) Joseph H. Scherrer, supra, note 113.
73) Clay Wilson, supra, note 90.
74) David L. Peeler, Jr., & Michael P. Dahlstrom, supra, note 115.
75) Terri Moon Cronk, Biden Announces Full U.S. Troop Withdrawal from Afghanistan by Sept. 11, UNITED STATES DEPARTMENT OF DEFENSE (Apr. 14, 2021), available at
https://www.defense.gov/Explore/News/Article/Article/2573268/biden-announces-full-us-troop-withdrawal-from-afghanistan-by-sept-11/.
76) Madeleine Ngo, Biden Defends Decision to Pull Out of Afghanistan, THE NEW YORK TIMES (Aug. 18, 2021), available at https://www.nytimes.com/live/2021/08/16/us/politics-news.
77) Paul D. Shrinkman, Chaos, Violence at Kabul Airport as U.S. Tries to Complete Afghanistan Evacuation, U.S. NEWS & WORLD REPORT (Aug. 16, 2021), available at https://www.usnews.com/news/world-report/articles/2021-08-16/chaos-violence-at-kabul-airport-as-us-tries-to-complete-afghanistan-evacuation.
78) Juliegrace Brufke, Biden team vague on evacuating Americans, allies from Afghanistan after Aug. 31, THE NEW YORK POST (Aug. 17, 2021), available at https://nypost.com/2021/08/17/biden-team-vague-on-evacuating-americans-allies-from-afghanistan/.
79) Mark Moore, David Petraeus calls Afghanistan a ‘Dunkirk Moment’, THE NEW YORK POST (Aug. 17, 2021), available at https://nypost.com/2021/08/17/david-petraeus-calls-afghanistan-a-dunkirk-moment/.
80) Miriam Jordan, Thousands Who Helped the U.S. in Afghanistan Are Trapped. What Happens Next?, THE NEW YORK TIMES (Aug. 16, 2021), available at https://www.nytimes.com/2021/08/16/us/afghanistan-visa-refugees-us.html.
81) Robert Clark, As NATO Allies Flounder, British Troops Are Leading by Example at Kabul Airport, THE TELEGRAPH (Aug. 18, 2021), available at https://www.telegraph.co.uk/news/2021/08/19/nato-allies-flounder-british-troops-leading-example-kabul-airport/.
82) James R. Webb, As US Military Sticks to Airport, British and French Forces Are Rescuing their Citizens in Kabul: Reports, MILITARY TIMES (Aug. 19, 2021), available at https://www.militarytimes.com/flashpoints/afghanistan/2021/08/19/as-us-military-sticks-to-airport-british-and-french-forces-are-rescuing-their-citizens-in-kabul-reports/.
83) Loveday Morris, Amid Sharp Criticism, Germany Stumbles in Late Efforts to Rescue Afghan Support Staff, THE WASHINGTON POST (Aug. 22, 2021), available at https://www.washingtonpost.com/world/germany-afghans-evacuation/2021/08/21/d33941ce-0202-11ec-ba7e-2cf966e88e93_story.html.
84) Robert Fife, Canadian special forces may be used to rescue Afghan interpreters, support staff from Kabul: Sajjan, THE GLOBE AND MAIL (Aug. 22, 2021), available at https://www.theglobeandmail.com/politics/article-canadian-special-forces-may-be-used-to-rescue-afghan-interpreters/.
85) Victor Davis Hanson, Victor Davis Hanson: If Biden were a Republican, Dems in Congress would have impeached him. They should, FOX NEWS (Aug. 22, 2021), available at https://www.foxnews.com/opinion/biden-republican-democrats-congress-impeached-victor-davis-hanson.
86) Ryan Morgan, US Has No Plans to Rescue Americans, Afghans Stranded behind Taliban Lines Outside Kabul A, Airport, AMERICAN MILITARY NEWS (Aug. 18, 2021), available at https://americanmilitarynews.com/2021/08/us-has-no-plans-to-rescue-americans-afghans-stranded-behind-taliban-lines-outside-kabul-airport/.
87) CHRISTOPHER R SMITH, NETWORK CENTRIC WARFARE, COMMAND, AND THE NATURE OF WAR (Land Warfare Studies Centre (Australia) 2010), available at
https://researchcentre.army.gov.au/sites/default/files/sp318ncwcommandandnatureofwarchristopher_smith.pdf.
88) PAUL KRUGMAN, & ROBIN WELLS, ECONOMICS (Worth Publishers 5th ed. 2017).
89) Paul Murdock, Principles of War on the Network-Centric Battlefield: Mass and Economy of Force, 32 THE US ARMY WAR COLLEGE QUARTERLY: PARAMETERS 1 (Spring 2002), available at
https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=2082&context=parameters.
90) Paul Krugman, & Robin Wells, supra, note 133.
91) JOHN MAYNARD KEYNES, THE GENERAL THEORY OF EMPLOYMENT, INTEREST, AND MONEY (Palgrave Macmillan 1936).
92) Kalpana Jain, The History of the Taliban Is Crucial in Understanding Their Success Now – And Also What Might Happen Next, THE CONVERSATION (Aug. 26, 2021), available at https://theconversation.com/the-history-of-the-taliban-is-crucial-in-understanding-their-success-now-and-also-what-might-happen-next-166630.
93) History.com Editors, Soviet Union InvadesAfghanistan, HISTORY.COM (Nov. 24, 2009), available at https://www.history.com/this-day-in-history/soviet-tanks-roll-into-afghanistan.
94) Kalpana Jain, supra, note 138.
95) Colin Price, Pakistan: A Plethora of Problems, 3 GLOBAL SECURITY STUDIES 1, 53-62 (Winter 2012), available at https://www.semanticscholar.org/paper/Pakistan%3A-A-Plethora-of-Problems-Price/b7c99634746e77be1bfb50346198b5d4779214f5.
96) History.com Editors, supra, note 147.
97) John Sifton, Blood-Stained Hands: Past Atrocities in Kabul and Afghanistan’s Legacy of Impunity, HUMAN RIGHTS WATCH (Jul. 6, 2005), available at https://www.hrw.org/report/2005/07/06/blood-stained-hands/past-atrocities-kabul-and-afghanistans-legacy-impunity#.
98) NEAMATOLLAH NOJUMI. THE RISE OF THE TALIBAN IN AFGHANISTAN: MASS MOBILIZATION, CIVIL WAR, AND THE FUTURE OF THE REGION (Palgrave 1st ed. 2002 1st ed.).
99) AMIN SAIKAL, MODERN AFGHANISTAN: A HISTORY OF STRUGGLE AND SURVIVAL (I.B. Tauris & Co.1st ed. 2006).
100) John Sifton, Blood-Stained Hands: Past Atrocities in Kabul and Afghanistan’s Legacy of Impunity, HUMAN RIGHTS WATCH (Jul. 6, 2005), available at https://www.hrw.org/report/2005/07/06/blood-stained-hands/past-atrocities-kabul-and-afghanistans-legacy-impunity.
101) AMIN SAIKAL, MODERN AFGHANISTAN: A HISTORY OF STRUGGLE AND SURVIVAL (I. B. Tauris & Co. 2006).
102) Lindsay Maizland, The Taliban in Afghanistan, COUNCIL ON FOREIGN RELATIONS (Sep. 15, 2021), available at https://www.cfr.org/backgrounder/taliban-afghanistan.
103) Robert Nichols, Afghan Historiography: Classical Study, Conventional Narrative, National Polemic, 3 HISTORY COMPASS 1 (Dec 21, 2005), available at https://doi.org/10.1111/j.1478-0542.2005.00141.x.
104) AHMED RASHID, AHMED (2000), TALIBAN: MILITANT ISLAM, OIL AND FUNDAMENTALISM IN CENTRAL ASIA 65 (Yale University Press 2000).
105) Id. at 71.
106) ReliefWeb Staff, MSF and Other Aid Organizations Evicted from Kabul, RELIEFWEB (Jul. 21, 2998), available at https://reliefweb.int/report/afghanistan/msf-and-other-aid-organizations-evicted-kabul.
107) Katherine Haddon, Afghanistan Marks 10 Years Since War Started, YAHOO! NEWS (Oct. 6, 2011), available at https://web.archive.org/web/20111010055026/http://news.yahoo.com/afghanistan-marks-10-years-since-war-started-211711851.html.
108) JEANNE K. GIRALDO, & HAROLD A. TRINKUNAS, TERRORISM FINANCING AND STATE RESPONSES : A COMPARATIVE PERSPECTIVE 96 (Stanford University Press 2007).
109) Ahmed Rashid, supra, note 162.
110) DANIEL BYMAN, DEADLY CONNECTIONS: STATES THAT SPONSOR TERRORISM 195 (Cambridge University Press 2005).
111) EDWARD GIRARDET. KILLING THE CRANES: A REPORTER'S JOURNEY THROUGH THREE DECADES OF WAR IN AFGHANISTAN 416 (Chelsea Green Publishing. 2011).
112) Piotr Balcerowicz, The Last Interview with Ahmad Shah Masood, HOJA BAHAUDDIN (early August 2001), available at
https://web.archive.org/web/20060925043421/http://www.orient.uw.edu.pl/balcerowicz/texts/Ahmad_Shah_Masood_en.htm.
113) John F. Burns, Threats And Responses: Assassination; Afghans, Too, Mark a Day of Disaster: A Hero Was Lost, THE NEW YORK TIMES (Sep. 9, 2002), available at https://www.nytimes.com/2002/09/09/world/threats-responses-assassination-afghans-too-mark-day-disaster-hero-was-lost.html.
114) Peter L. Bergen, September 11 Attacks, ENCYCLOPEDIA BRITANNICA (n.d.), available at https://www.britannica.com/event/September-11-attacks.
115) George W. Bush, Text: President Bush Addresses the Nation, THE WASHINGTON POST (Sep.20, 2001) available at https://www.washingtonpost.com/wp-srv/nation/specials/attacked/transcripts/bushaddress_092001.html.
116) Press Release, NORTH ATLANTIC TREATY ORGANIZATION, Statement by the North Atlantic Council (Sep. 12, 2001), https://www.nato.int/docu/pr/2001/p01-124e.htm.
117) John F. Burns, A Nation Challenged: Last Chance; Taliban Refuse Quick Decision Over bin Laden, THE NEW YORK TIMES (Sep. 18, 2001), available at https://www.nytimes.com/2001/09/18/world/a-nation-challenged-last-chance-taliban-refuse-quick-decision-over-bin-laden.html.
118) CNN Staff, Afghanistan Wakes After Night of Intense Bombings, CABLE NEWS NETWORK (CNN) (Oct. 7, 2001), available at http://edition.cnn.com/2001/US/10/07/gen.america.under.attack/.
119) George W. Bush, Presidential Statement: Bush Announces Military Action Against Terrorist Infrastructure in Afghanistan, CQ ALMANAC (Oct. 7, 2001), available at
https://library.cqpress.com/cqalmanac/document.php?id=cqal01-106-6369-328096.
120) https://www.theguardian.com/world/2001/oct/14/afghanistan.terrorism5.
121) Michael Moran, The ‘Airlift of Evil’, NBC NEWS (Dec. 10, 2003), available at
https://www.nbcnews.com/id/wbna3340165/.
122) AHMED RASHID, DESCENT INTO CHAOS: THE UNITED STATES AND THE FAILURE OF NATION BUILDING IN PAKISTAN, AFGHANISTAN, AND CENTRAL ASIA. UNITED STATES, (Viking Press 2008).
123) Editors of Encyclopedia Britannica, Hamid Karzai: President of Afghanistan, ENCYCLOPEDIA BRITANNICA (Dec. 20, 2021), available at https://www.britannica.com/biography/Hamid-Karzai.
124) Julian Borger, Bonn Conference Could Mark Formal Start of Afghan Peace Process, THE GUARDIAN (Jun. 20, 2011), available at https://www.theguardian.com/world/julian-borger-global-security-blog/2011/jun/20/afghanistan-taliban-talks-bonn.
125) Scott Baldauf, & Owais Tohid, Taliban Appears to Be Regrouped and Well Funded, THE CHRISTIAN SCIENCE MONITOR (May 8, 2003), available at http://www.csmonitor.com/2003/0508/p01s02-wosc.html.
126) Pamela Constable, U.S. Troops Fired at Mob After Kabul Accident, THE SPOKESMAN-REVIEW (Jun. 6, 2006), available at https://www.spokesman.com/stories/2006/jun/01/us-troops-fired-at-mob-after-kabul-accident/.
127) Saeed Ali Achakzai, Taliban Reject Afghan President's Peace Talk Offer, REUTERS (Sep. 30, 2007), available at https://www.reuters.com/article/us-afghan-talks-idUSISL26606720070930.
128) Gareth Porter, US Silent on Taliban's al-Qaeda Offer, SOUTH ASIA (Dec. 17, 2009), available at https://web.archive.org/web/20091219213931/http://www.atimes.com/atimes/South_Asia/KL17Df02.html.
129) Olivier Laurent, When War Is Just Another Day in Afghanistan, TIME (Jul. 8, 2016), available at https://time.com/4402071/afghanistan-war-everyday/.
130) Ryan Browne, Carter visits Afghanistan as Obama Plans Handoff of 15-Year War, CABLE NEWS NETWORK (CNN) (Dec. 9, 2016), available at https://edition.cnn.com/2016/12/09/politics/ash-carter-afghanistan-visit/index.html.
131) James Griffiths, Trump Calls Out Pakistan, India as He Pledges to 'Fight to Win' in Afghanistan, CABLE NEWS NETWORK (CNN) (Aug. 24, 2017), available at https://edition.cnn.com/2017/08/21/politics/trump-afghanistan-pakistan-india/index.html.
132) James Rothwell, Mohammad Zubair Khan, & Bilal Sarwary, Taliban Holds ‘Informal’ Talks with Afghanistan, THE TELEGRAPH (Oct. 18, 2016), available at https://www.telegraph.co.uk/news/2016/10/18/taliban-holds-informal-peace-talks-with-afghanistan/.
133) Shereena Qazi, Afghanistan’s Taliban, US Sign Agreement Aimed at Ending War, AL JAZEERA (Feb. 29, 2020), available at https://www.aljazeera.com/news/2020/2/29/afghanistans-taliban-us-sign-agreement-aimed-at-ending-war.
134) Hamid Shalizi, Abdul Qadir Sediqi, Rupam Jain, Taliban Step Up Attacks on Afghan Forces Since Signing U.S. Deal: Data, REUTERS (May 1, 2020), available at https://www.reuters.com/article/us-health-coronavirus-afghanistan-taliba/taliban-step-up-attacks-on-afghan-forces-since-signing-u-s-deal-data-idUSKBN22D5S7.
135) Bill Roggio, Taliban Squeezes Afghan Government by Seizing Key Border Towns, FDD’S LONG WAR JOURNAL (Jul. 9, 2021), available at https://www.longwarjournal.org/archives/2021/07/taliban-squeezes-afghan-government-by-seizing-key-border-towns.php.
136) Ava Batrway, Afghan President Latest Leader on the Run to Turn Up in UAE, ASSOCIATED PRESS NEWS (Aug. 19, 2021), available at https://apnews.com/article/europe-middle-east-39610b0102a926c1a573da3d6feb0eea.
137) Emma Graham-Harrison, ‘Panjshir Stands Strong’: Afghanistan’s Last Holdout Against the Taliban, THE GUARDIAN (Aug. 18, 2021), available at https://www.theguardian.com/world/2021/aug/18/panjshir-stands-strong-afghanistans-last-holdout-against-the-taliban.
138) David Zucchino, The U.S. War in Afghanistan: How It Started, and How It Ended, THE NEW YORK TIMES (Oct. 7, 2021), available at https://www.nytimes.com/article/afghanistan-war-us.html.
139) John McCormack, Why Did the United States Abandon Bagram Airfield?, NATIONAL REVIEW (Aug. 18, 2021), available at https://www.nationalreview.com/2021/08/why-did-the-united-states-abandon-bagram-airfield/.
140) Barbara Sprunt, There's A Bipartisan Backlash To How Biden Handled The Withdrawal From Afghanistan, NATIONAL PUBLIC RADIO (Aug. 17, 2021), available at https://www.npr.org/2021/08/16/1028081817/congressional-reaction-to-bidens-afghanistan-withdrawal-has-been-scathing.
141) Zolan Kanno-Youngs, & Annie Karni, Series of U.S. Actions Left Afghan Allies Frantic, Stranded and Eager to Get Out, THE NEW YORK TIMES (Aug. 29, 2021), available at
https://www.nytimes.com/2021/08/18/us/politics/afghanistan-refugees.html.
142) Juliegrace Brufke, supra, note 122.
143) Associated Press, EXPLAINER: What Happened to the Afghanistan Evacuation?, U.S. NEWS AND WORLD REPORT (Nov. 26, 2021), available at https://www.usnews.com/news/politics/articles/2021-11-26/explainer-what-happened-to-the-afghanistan-evacuation.
144) Glenn Kessler, No, the Taliban Did Not Seize $85 Billion of U.S. Weapons, THE WASHINGTON POST (Aug. 31, 2021), available at https://www.washingtonpost.com/politics/2021/08/31/no-taliban-did-not-seize-83-billion-us-weapons/.
145) SIGAR Staff, Section 2 Reconstruction Update, SPECIAL INSPECTOR GENERAL FOR AFGHANISTAN RECONSTRUCTION 29 (Jul. 30, 2021), available at https://www.sigar.mil/pdf/quarterlyreports/2021-07-30qr-section2-funding.pdf#Page=9.
146) Glenn Kessler, supra, note 207.
147) Zolan Kanno-Youngs, & Annie Karni, supra, note 203.
148) Converstation Staff, What’s Next for Afghanistan? Two Experts Make Predictions, THE CONVERSATION (Nov. 30, 2021), available at https://theconversation.com/whats-next-for-afghanistan-two-experts-make-predictions-170684.
149) Colin Clarke, & Jonathan Schroden, Brutally Ineffective: How the Taliban Are Failing in Their New Role as Counter-Insurgents, WAR ON THE ROCKS (Nov. 19, 2021), available at https://warontherocks.com/2021/11/brutally-ineffective-how-the-taliban-are-failing-in-their-new-role-as-counter-insurgents/.
150) Boy Scout Oath, Law, Motto and Slogan and the Outdoor Code, US SCOUTING SERVICE PROJECT (n.d.), available at http://usscouts.org/advance/ScoutsBSA/oathlaw.asp. The Boy Scout web site contains the changes made to the principles of Scouting after January 01, 2019.
151) See generally, Adequate Prepardedness, MERRIAM-WEBSTER DICTIONARY (n.d.), available at https://www.merriam-webster.com/dictionary/preparedness.
152) See generally, Adequate Prepardedness, THE LAW DICTIONARY FEATURING BLACK’S LAW DICTIONARY (n.d.), available at https://thelawdictionary.org/adequate-preparation/.
153) The Cadmus Group LLC, Cybersecurity Prepardedness Evaluation Tool, NATIONAL ASSOCIATION OF REGULATORY UNITITY COMMISSIONERS (Jun. 2019), available at https://pubs.naruc.org/pub/3B93F1D2-BF62-E6BB-5107-E1A030CF09A0.
154) ‘State of Surveillance’ with Edward Snowden and Shane Smith (VICE on HBO: Season 4, Episode 13), YOUTUBE.COM (January 08, 2016), available at https://www.youtube.com/watch?v=ucRWyGKBVzo.
Dodge v. Ford Motor Company, 204 Mich. 459 (1919).
VOlUME 05 ISSUE 03 MARCH 2022
There is an Open Access article, distributed under the term of the Creative Commons Attribution – Non Commercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting and building upon the work for non-commercial use, provided the original work is properly cited.