31 December 2015

OPEN LETTER Full text: Facebook's Free Basics will limit internet freedom, say 50 faculty of IITs and IISc

http://scroll.in/article/778805/full-text-facebooks-free-basics-will-limit-internet-freedom-say-50-faculty-of-iits-and-iisc
The service isn't really free and violates user privacy, the scientists say.
Scroll Staff ·
Close to 50 faculty members of the Indian Institutes of Technology and Indian Institute of Science on Tuesday released a statement highlighting flaws in Facebook's controversial Free Basics programme.
Free Basics is a subsidised internet platform that gives users Facebook and a few other services for free. Facebook says this will help connect India’s poor people to the internet. However, critics claim that it works against the rules of net neutrality, according to which all material on the Internet should be treated equally by internet service providers. Only a few products and websites, including Facebook, can be accessed through Free Basics.

The debate about the platform has been especially heated over the past few days because the Telecom Regulatory Authority of India set Wednesday as a deadline for the public to submit their opinions about whether the service should be allowed.
On Tuesday, a group of academics weighed in, claiming that Free Basics will limit the freedom with which Indians can use their own public utility, the internet.

Here is the full statement:
Allowing a private entity
- to define for Indian Internet users what is “basic”,
- to control what content costs how much, and
- to have access to the personal content created and used by millions of Indians
is a lethal combination which will lead to total lack of freedom on how Indians can use their own public utility, the Internet. Facebook's “free basics” proposal is such a lethal combination, having several deep flaws, beneath the veil of altruism wrapped around it in TV and other media advertisements, as detailed below.

Flaw 1: Facebook defines what is “basic”.
The first obvious flaw in the proposal is that Facebook assumes control of defining what a “basic” service is. They have in fact set up an interface for services to “submit” themselves to Facebook for approval to be a “basic” service. This means: what are the “basic” digital services Indians will access using their own air waves will be decided by a private corporation, and that too one based on foreign soil. The sheer absurdity of this is too obvious to point out.

2015: A Year of Work-in-Progress for Defence

http://idsa.in/idsacomments/2015-work-in-progress-for-defence_acowshish_291215
Amit Cowshish, December 29, 2015

One does not know what the Ministry of Defence (MoD) set out to achieve in the calendar year 2015 or the current financial year that will draw to a close in another three months. But if one were to hazard a guess, the objective would have been to take steps, if not to completely resolve, at least address the issues that kept the MoD in the news throughout the year. A quick survey of where we stand on those issues at the end of the year would be instructive.

To cut to the chase, the issues confronting the defence establishment at the beginning of the year broadly related to defence policy, human resource management and operational preparedness, though not necessarily in that order.
The policy-related issues are not new. Questions about India’s national security objectives and defence strategy, in all their manifestations, have persisted for long. To be fair, these larger issues were not in the forefront at the beginning of the year but a related issue was. It concerned the appointment of a Chief of Defence Staff (CDS) or Permanent Chief of the Chiefs of Staff Committee (PC COSC). The year has gone by without one being appointed. If anything, the excitement seems to have somewhat ebbed over the past few months.

It will take some doing to create this institution with clearly defined responsibilities and an appropriate support structure. Assuming that the present system of three-tiered defence planning will continue and, among other things, the CDS/PC COSC will be responsible for defence planning, it is time the issue is taken up on priority as the 13th Defence Five-year Plan is to commence from April 1, 2017.

Arunachal Pradesh is no ordinary state, it is a hyper-sensitive bone of diplomatic contention with China and with the winds of local insurgency sweeping the Northeast, it is also susceptible to

http://wwv.asianage.com/columnists/lessons-itanagar-956
Bhopinder Singh
Arunachal Pradesh is no ordinary state, it is a hyper-sensitive bone of diplomatic contention with China and with the winds of local insurgency sweeping the Northeast, it is also susceptible to errors of omission and commission on the free-flowing democratic and constitutional impulses of the border state. History is replete with unfortunate instances of playing partisan politics and compromising on constitutional freedom (e.g. Jammu and Kashmir in the ’80s and ’90s) that had triggered local separatist tendencies in the veritable tinderbox of any border state. Therefore, it is even more important to demonstrate our finest constitutional commitment and guarantees as a nation to ward of any external and internal questions on the correctness of all political and executive actions.

The gubernatorial disquiet in Arunachal Pradesh begets a more profound inquiry than the one that often gets mired in the legalities and technicalities of constitutional articles and clauses. J.P. Rajkhowa was the preferred choice of the prevailing political dispensation at the Centre and, therefore, chosen to replace the incumbent midterm as the 19th governor of Arunachal Pradesh. Questions were raised at the time about an Assamese in the Itanagar Raj Bhawan, given the fractious sentiment and scepticism of the Arunachalese with regard to Assam and its unresolved border disputes that are felt locally to be even more important, than the ones with China on the McMahon Line.

But every Central government is in its democratic right to select and appoint the person it deems most appropriate to uphold the tenets and spirit of the Indian Constitution and rise beyond partisan politics, thus, the filter of not selecting an incumbent from the state, or one who has participated in active politics recently, has ideally detached him/herself from local politics of the state.

PSU beats Anil's Defence

http://www.telegraphindia.com/1151230/jsp/frontpage/story_61130.jsp#.VoQug7YrLIU
SUJAN DUTTA
New Delhi, Dec. 29: In Prime Minister Narendra Modi's showpiece "Make in India" project to be opened this Sunday, a public sector firm has beaten Anil Ambani's Reliance Defence that was lobbying to make Russian helicopters.
Moscow announced last night that the Russian state arms export agency, Rosoboronexport, and the chopper-maker, Rostec, have chosen the Indian defence undertaking Hindustan Aeronautics Ltd (HAL) to make the Kamov 226t "Sergei" light utility helicopters for the military.

India's army and air force have a requirement of 200 such reconnaissance and surveillance helicopters immediately to replace the Cheetah and Chetak machines that currently undertake the task. The initial order is estimated to be worth $1 billion.
Most of the Cheetah and Chetak helicopters are more than 40 years old and have a high rate of accidents. Earlier this year, the wives and widows of military officers who fly/have flown the Cheetahs and Chetaks urged the government to replace them.

The total order for Sergeis could go up to 400 with the navy also projecting the requirement.
The process of replacement has taken more than 10 years. The Prime Minister, who returned from Russia last week, is scheduled to lay the foundation stone of a HAL facility to make helicopters at Tumkur, 100km from Bangalore, this Sunday.

*** Brave New War A new form of conflict emerged in 2015—from the Islamic State to the South China Sea.

http://www.theatlantic.com/international/archive/2015/12/war-2015-china-russia-isis/422085/
Peter Pomerantsev, Dec 29, 2015

From China in Asia to Russia in Europe and the Middle East, and ISIS just about everywhere, 2015 has seen the flourishing of conflicts that exist in a gray zone, one which is not quite open war but more than regular competition, which is attuned to globalization, which liberal democracies are ill-equipped to deal with, and which may well be the way power is exercised and conflict conducted in the foreseeable future.

Described by scholars as “hybrid,” “full-spectrum,” “non-linear,” “next-generation,” or “ambiguous”—the variations in the description indicate the slipperiness of the subject—these conflicts mix psychological, media, economic, cyber, and military operations without requiring a declaration of war.
In the case of Russia’s ongoing campaign in Ukraine, for example, hyper-intense Russian propaganda has cultivated unrest inside the country by sowing enmity among segments of Ukrainian society and confusing the West with waves of disinformation, while Russian proxy forces and covert troops launch just enough military offensives to ensure that the Ukrainian government looks weak. The point is not to occupy territory—Russia could easily annex rebel-held eastern Ukraine—but to destabilize Ukraine psychologically and advance a narrative of the country as a “failed state,” thus destroying the will and support inside Ukraine and internationally for reforms that would make Kiev more independent from Moscow and might, in the longer term, create hope for democratic reform inside Russia.

China’s doctrine of the Three Warfares pushes these non-physical aspects even further, using “legal,” “psychological,” and “media” warfare to, in the words of the analyst Laura Jackson, who directed a Cambridge University and U.S. Defense Department research project on the subject, “undermine international institutions, change borders, and subvert global media, all without firing a shot. The Western, and especially American, concept of war emphasises the kinetic and the tangible—infrastructure, arms, and personnel—whereas China is asking fundamental questions: ‘What is war?’ And, in today’s world: ‘Is winning without fighting possible?’”

An immediate aim of the Three Warfares is to spread China’s dominion over the South China Sea, extending the country’s maritime borders beyond boundaries recognized by the UN Convention on the Law of the Sea in order to control massive energy reserves and strategic sea-lanes worth $5 trillion dollars; ultimately, the hope is to supplant the United States as the security guarantor in the region. The military strategy was first adopted in 2003, but many of its consequences only became apparent to the media in 2015.

First China has ramped up the construction of artificial islands in contested waters. Then it has used “lawfare” to claim that since these islands are now its territory, it owns the surrounding seaways under maritime law. This claim is reinforced by “psychological” warfare, which involves threatening economic sanctions against states that protest China’s moves and intimidating anyone who strays into the area. Recently, a BBC reporter who flew in international airspace near a Chinese military airstrip constructed off the coast of the Philippines was bombarded by calls over the airwaves stating: “Foreign military aircraft in northwest of Meiji Reef, this is the Chinese Navy, you are threatening the security of our station.” And then there’s “media warfare”: Developments such as Japan beefing up its military, or the U.S. insisting on sailing its ships through waters the UN considers neutral, are depicted in China’s ever-expanding international news networks as examples of the aggression of China’s rivals, rather than a response to Chinese expansion.

Beijing, Xinjiang and the Press China shows its lack of confidence by expelling a foreign journalist.

http://www.wsj.com/articles/beijing-xinjiang-and-the-press-1451430039
Dec. 29, 2015
The Chinese Foreign Ministry’s Dec. 26 decision not to renew the credentials of French journalist Ursula Gauthier, the first such expulsion in three years, suggests that Beijing is escalating pressure on foreign journalists. It also shows how sensitive the Communist Party is to criticism of its harsh policies against ethnic minorities.

Under Party General Secretary Xi Jinping, plainclothes police increasingly manhandle foreign reporters, and the Foreign Ministry holds up visa applications for publications that have reported on the wealth of top leaders. Ms. Gauthier’s offense was writing, five days after the Nov. 13 Paris terrorist attacks, about the Chinese government’s attempt to draw a parallel to violence in the Muslim-majority region of Xinjiang. The Beijing correspondent for the newspaper L’Obs questioned China’s claim that a Sept. 18 incident that claimed 50 lives in the town of Baicheng was comparable to Paris massacre.

Beijing wants to justify its human-rights abuses in Xinjiang as a necessary response to the rise of Islamic fundamentalism and separatism. But as Ms. Gauthier pointed out, central-government policies are driving the native Uighur population, which practices a moderate form of Islam, to desperate acts of violence. The state tightly restricts Uighurs’ practice of religion, freedom of movement and even the use of their own language.
While some Uighur violence against Han Chinese is terrorism, the attacks have little in common with those carried out by fanatical jihadists elsewhere. As Ms. Gauthier told the Guardian newspaper, “Nobody is saying there is no terrorism in Xinjiang. But they want us to say there is only terrorism in Xinjiang. This is the problem.”

* New Year’s Resolutions on Terrorism: Panic, Politics, and the Prospects for Honesty in 2016

https://csis.org/publication/new-years-resolutions-terrorism-panic-politics-and-prospects-honesty-2016
By Anthony H. Cordesman, Dec 28, 2015
Broken resolutions are one of the key features of every American New Year’s celebration, and calling for integrity in an election year may be a particularly good way to ensure that any resolutions that follow will be broken early and often. Ever since the ISIS attacks in Paris, however, politics, the struggle for media visibility, and the business side of “selling” counterterrorism have all combined to turn a real but limited threat from terrorism into a form of panic.

Worse, they have combined to turn some aspects of counterterrorism into prejudice and bigotry against Muslims and Arabs. The end result has been calls for new measures that will actually serve the key objectives that movements like ISIS and Al Qaeda have in launching such attacks on the West. They will divide the West from the Muslim world and key Arab and Muslim partners in the fight against terrorism, and alienate the Muslim minorities in the United States and other Western and secular states.
This kind of opportunism not only mischaracterizes and exaggerates the threat, it aids terrorists and extremists, and this is one case where the United States and other Western states need to take the following four New Year’s resolutions seriously:

Stop exaggerating the threat: Terrorism is all too real and no one can deny that it repeatedly ends in tragedy. At the same time, it needs to be kept in proportion. The real world risks of terrorism in the United States fall short of virtually any other common cause of injury, death, and economic loss. To put these risks in perspective, the number of deaths from terrorism in the United States since 9/11 have been so low that Americans may well face a higher cumulative probability of dying from traffic accidents, food poisoning, crime and other causes if they celebrate a single New Year’s Eve than they do from terrorism over an entire year.

Kurdistan: The Permanent Solution to Daesh

http://smallwarsjournal.com/jrnl/art/kurdistan-the-permanent-solution-to-daesh
Journal Article | December 27, 2015 - 10:57pm
Introduction

History has taught us that when an armed conflict arises between two belligerents, countries with interests in the outcome of that conflict either need to pick a winner, a loser, or stay out of the conflict. If containment or maintaining the status quo is chosen it naturally results in perpetual conflicts, e.g., Israel and the Palestinian Liberation Organization (PLO) /Hezbollah. In this scenario, the weaker belligerent is never defeated through armed conflict or forced to recognize that eventuality. They are allowed to carry on in the conflict. The weaker belligerent never has reason to seek peace terms as a part of their surrender, and is free to continue to harass its opponent because a state or non-state actor, like the United Nations, maintains the status quo regardless of how chaotic that is for regional or international stability. The best choice a state can make is to decide which side it supports and give war a chance, in order to remove the other belligerent so that true stability can be achieved.[1]

The United States (U.S.) is currently seeking a solution to the problem ‘ad-Dawlah al-Islamiyah fi ‘I-‘Iraq wa-sh-Sham’ (Daesh; aka ISIS, ISIL, the Islamic State) poses to U.S. security, its allies, and civilization in general. The answer: recognize and support the state of ‘Kurdistan’. Pick a winner, Kurdistan, and a loser, Daesh, and give war a chance. This decision has two affects. In the short-term, this solution halts Daesh’s growth and freedom of movement in the region, thus ending their threat to regional stability. In the long-term, it thwarts Russia’s influence in the region. In the absence of this support for Kurdistan, Russia will be the victor. Russia will expand its sphere of influence over the entire Middle East because they have chosen a winner in Syria. It is clear that Putin’s final goal is not just to save the Assad regime, but “He [Putin] also means to forge a counter-alliance [against the U.S] consisting of Russia, Iran, Iraq, Syria, and Lebanese Hezbollah and demonstrate that his coalition is more effective than the West’s.”[2]

Why Kurdistan?

As political commentator David Webb noted, “If we [the U.S.] take out ISIS, we have Assad. If we take out Assad, we have ISIS. If we take out both, we have a vacuum.”[3] It’s clear from U.S. leaders, whether they be executive, congressional, or presidential hopefuls, that U.S. troops on the ground are not the solution the U.S. is seeking. Senator Rand Paul speaking more broadly on terrorism said, “If we want to defeat terrorism…the boots on the ground need to be Arab boots on the ground.”[4] NATO General Secretary Jens Stoltenberg revealed to Reuters that NATO will not send any ground troops to combat Daesh.[5] As a result, if the U.S. wants to defeat Daesh, the boots on the ground need to be Kurdish boots, a viable ally for the U.S. to support. There is no need for the U.S. to roll the dice on supporting “moderate” jihadist groups when it has a known partner it has been working with for over a decade in Iraq. This paper discusses Kurdistan’s demographics, economy, and, most importantly, its military capabilities which will demonstrate Kurdistan’s viability as a permanent regional partner. It also examines the effects recognizing Kurdistan as an independent state to defeat Daesh will have on Turkey, Iraq, other regional allies, and Russia’s burgeoning Shia alliance.

The Islamic State: Why It Is Staying, Why It Is Expanding, and Why No

One Is Really Fighting It
By Ammar Abdulhamid Monday, December 28, 2015,
Why do all the powers supposedly arrayed against the terrorist organization calling itself the Islamic State (IS) seem incapable to date of effectively hitting its strongholds in Syria?

Is it fear of civilian casualties, which are unavoidable in any large-scale military operation? This might indeed be a factor in the case of the United States, France and the UK, which have scrupulous legal rules and militaries that actually care about such things. But this cannot explain the behavior of Russia and the Assad regime which, it should be clear by now, care not a whit for such “modern” and “Western,” not to mention “impractical,” concerns. Indeed, the willingness of both to inflict such casualties, often intentionally, is on display every day and is well-documented.

I do not believe that fear of civilian casualties fully explains Western behavior either. After all, there are quite a few installations where IS maintains a presence that are located outside densely populated areas and that could, I suspect, be targeted with minimal human collateral damage. But striking these installations carries risks and costs far beyond any immediate loss to IS.

So, what is it that lurks behind the near universal decision to avoid bombing these installations and IS strongholds, except on a minimalist basis? The short answer, I suspect, is something quite sinister that is worth airing openly: the Islamic State has a kind of doomsday threat that has all of the intervening powers over a barrel.

China Commissions New Spy Ship

December 29, 2015, China commissions three vessels into South Sea Fleet
Ridzwan Rahmat
IHS Jane’s Navy International, December 29, 2015




China’s third Dongdiao-class intelligence gathering vessel, Neptune (852), was commissioned into the PLAN’s South Sea Fleet on 26 December 2015. Source: via PLA Daily
Key Points
China has commissioned its third Dongdiao-class general intelligence vessel
The vessel will bolster the service’s intelligence gathering and surveillance capabilities

The People’s Liberation Army Navy (PLAN) has commissioned three vessels, including a Dongdiao-class (Type 815) auxiliary general intelligence (AGI) ship, into its South Sea Fleet, the semi-official PLA Daily reported on 28 December.

The vessels were commissioned in a ceremony held at an unspecified naval port, said to be in the South China Sea, on 26 December.

The Dongdiao-class vessel (which PLA Daily refers to as the ‘Type 815G’) has been named Neptune and given the pennant number 852. IHS Jane’s reported in April 2014 that the vessel was launched at the Hudong Zhonghua Shipbuilding Group’s yard in Shanghai in March the same year.

Neptune is the third known Dongdiao-class vessel in service with the PLAN. First-of-class Beijixing (851) is based in the service’s East Sea Fleet while second ship Tianwangxing (853) is also based in the South Sea Fleet.

According to IHS Jane’s Fighting Ships , the 6,096-tonne platform has an overall length of 130 m, an overall beam of 16.4 m, and a hull draught of 6.5 m. The ship has a top speed of 20 kt and can carry a crew of 250 and one medium helicopter. The Dongdiao-class is armed with one 37 mm and two 14.5 mm guns.

ISIS is Not a Terrorist Organization by Ajit Maan

Journal Article | December 29, 2015 
Ajit Maan
Given the climate of U.S. public opinion about U.S. intervention in the Middle East it is not surprising that the current administration has focused its foreign policy objectives on counter-terrorism.
But that priority limits our position to a defensive one. Further, the term “terrorist organization” offers little insight and limits our understanding and approach. ISIS is an insurgent organization using terrorism as a tactic.

The American public is wary of getting into what it views as quagmires, particularly in the Middle East, but is less hesitant when it comes to fighting terrorists who we view as a direct threat to the US. As a result, we have intervened in Syria to fight ISIS but not Assad.
While ISIS certainly employs terrorism as a tactic, and the label is one that de-legitimizes an opponent, the label also obscures the facts. To call it a terrorist organization is to mislabel it.

Traditionally, groups were identified as terrorist groups if their goal was ultimately to effect policy through intimidation. The policies in question were regionally specific: Ireland, Israel, even as specific as the green line separating Muslims and Christians in Beirut. What we are witnessing now is something closer to criminal psychopathology than terrorism. And the aims of these groups are not regionally specific but often international in scope. Moreover, the tactics have gone beyond intimidation to affect policy.

A CONFLICT OF INTEREST IN CONFLICT COVERAGE

http://www.dailypioneer.com/columnists/oped/a-conflict-of-interest-in-conflict-coverage.html
Wednesday, 30 December 2015 | Finian Cunningham | in Oped 

To understand Western media’s near-blackout of the war in Yemen, see its major advertisers: Etihad, the Emirates, Qatar Airways, Turkish Airlines and Bahrain Government
Multi-million-dollar advertising money has long been suspected as an unspoken filter for Western news media coverage. If the news conflicts with advertising interests then it is simply dropped. An example of this is coverage of the conflict in Yemen. Take three major Western media outlets BBC, CNN, France 24. All are notable for their dearth of news coverage on the bloody conflict in Yemen. It also turns out not coincidently that major advertisers on these same news channels include Qatar Airways, Emirates and Etihad. The latter two feature celebrities Jennifer Aniston and Nicole Kidman, posing as satisfied customers of these Gulf state-owned companies. Other prominent advertisers on BBC, CNN and France 24are Turkish Airlines and the Government of Bahrain’s Business Friendly Bahrain campaign.

This advertising complex has a direct bearing on why the three mentioned Western news channels do not give any meaningful coverage of Yemen. The poorest country in the Arab region is being bombed by a coalition of states that include Saudi Arabia, Qatar, the United Arab Emirates and Bahrain and is backed by the US and Britain. Thousands of Yemeni civilians have been killed, half of the population is in dire humanitarian conditions from lack of food, water and medicine, according to the United Nations. Due to Western involvement in the humanitarian disaster unfolding in Yemen, one might think that Western media would cover the conflict extensively but not if you watch BBC, CNN or France 24.

There are reliable reports that ground forces fighting against the rebels in Yemen are comprised of Western mercenaries in addition to troops from Saudi Arabia, Bahrain and the UAE. According to Lebanon's Al Manar news outlet, foreign mercenaries from France, the UK, Australia, Colombia and some Latin American countries have been killed. The mercenaries are first sent to the UAE for training before dispatch to Yemen.

Italy’s Shaky Financial Future

Stratfor, 18 December 2015
Summary
As with many aspects of modern banking, the word “bankrupt” has its roots in Renaissance Italy. The original banks were Florentine merchants who would sit in the open street behind benches (bancas in Italian) upon which their money would be stacked. If trading went against them and their capital was reduced to nothing, their bench would be said to be broken, or banca rotta. It is fitting then that, 500 years later, the European country with the most worrying debt problem is Italy.
Analysis

This may be surprising to some, since Italy does not top the tables as worst offender by any of the usual metrics. It does not have the highest levels of debt to gross domestic product in Europe: That dubious honor belongs to Greece, whose debt to GDP ratio rests more than 40 points higher than Italy’s 132%. Nor are Italian banks afflicted with the highest quantities of nonperforming loans as a percentage of GDP. Cyprus wins that contest easily; at a staggering 137%, it relegates Ireland (23%) to a distant second place and far exceeds Italy at 17%.

But though Italy is not the worst offender, its size still makes it the most potentially problematic. Italy has the third largest economy in the eurozone after Germany and France, and it is 1.5 times bigger than fourth-ranked Spain. So even without having the highest ratios, in actual numbers Italy has the biggest debt mountain: 2.3 trillion euros (roughly $2.4 trillion) of government debt compared with Greece’s 392 billion euros. Thus the three recent Greek bailouts, though giant in relation to the Greek economy, were just a sliver of the European economy as a whole, and in their wake the eurozone carried on more or less unaffected. The same would not be true of Italy. A bailout would be a massive undertaking that would greatly stretch the union’s finances.

Of course, this is not an altogether new phenomenon. Italy’s debt to GDP ratio has been over 100% since the early 1990s, and GDP growth since then has been fairly stagnant. But the fact that Italy’s debt has been large for a long time does not mean it is not dangerous. It was the threat of Italy defaulting that drove much of the market panic during the sovereign debt crisis in 2011 and 2012, when weakness in Europe’s banks had prompted bailouts from their national governments, calling into question the solvency of the governments themselves.

Prospects for the Global Economy in 2016

http://www.cfr.org/global/prospects-global-economy-2016/p37400
Authors: Kenneth S. Rogoff, Senior Fellow for Economics, Council on Foreign Relations Barry J. Eichengreen, George & Helen Pardee Professor of Economics & Political Science, University of California, Berkeley Varun Sivaram, Douglas Dillon Fellow, Council on Foreign Relations James Pethokoukis, Dewitt Wallace Fellow, American Enterprise Institute Robert Kahn, Steven A. Tananbaum Senior Fellow for International Economics, Council on Foreign Relations 
Interviewer(s): James McBride, Online Writer/Editor, Economics 
December 28, 2015

The world will face economic challenges on multiple fronts in 2016. As the U.S. Federal Reserve begins its monetary tightening, Europe is struggling to manage migrant and debt crises, China's financial stability is in doubt, and emerging economies are increasingly fragile.

The global economy "could be doing much worse," writes CFR Senior Fellow and Harvard economist Kenneth Rogoff. Low oil prices and weak currencies are keeping the European and Japanese economies afloat, but Rogoff warns of "a slowing Chinese economy, collapsing commodity prices, and the beginning of the U.S. Federal Reserve's rate-hiking cycle."

Emerging economies like Brazil, South Africa, Thailand, and Turkey, rather than China, will be the real sources of concern in 2016, argues U.C. Berkeley's Barry Eichengreen. With their high levels of short-term debt, these countries are vulnerable to currency crisis, "potentially leading to economic collapse."
Greece's Prime Minister Alexis Tsipras faces major challenges in 2016. (Photo: Francois Lenoir/Reuters)

For CFR's Varun Sivaram, new investments announced at the Paris climate talks are reason for optimism in the energy sector. In particular, the $20 billion earmarked for clean energy research and development "could make it more likely for breakthrough technologies to emerge."

In the United States, meanwhile, steady GDP and job growth has been constrained by weak productivity gains, writes American Enterprise Institute's James Pethokoukis. Without increased productivity delivering higher living standards, the United States could face decades of "unhealthy economic populism."

Europe continues to face the risk of debt crises, writes CFR's Robert Kahn, but the most dangerous economic risk for the continent in 2016 is "a growing populist challenge from both the Left and Right," which could create economic policy uncertainty and constrain policymakers.

2015 was a tipping point for six technologies that will change the world

https://www.washingtonpost.com/news/innovations/wp/2015/12/28/2015-was-a-tipping-point-for-six-technologies-which-will-change-the-world/
By Vivek Wadhwa December 28 

To the average person, it may seem that the biggest technology advances of 2015 were the larger smartphone screens and small app updates. But a lot more happened than that. A broad range of technologies reached a tipping point, from cool science projects or objects of convenience for the rich, to inventions that will transform humanity. We haven’t seen anything of this magnitude since the invention of the printing press in the 1400s. Here are the six:


(Atta Kenare/AFP/Getty Images) 1. The Internet and knowledge
In the developed world, we have become used to having devices that connect and inform us and provide services on demand, and the developing world has largely been in the dark. As of 2015, however, nearly half of China’s population and a fifth of India’s population have gained Internet connectivity. India now has more Internet users than does the U.S., and China has twice as many.
Smartphones with the capabilities of today’s iPhone will cost less than $50 by 2020. By then, the efforts of Facebook, Google, OneWeb, and SpaceX to blanket the Earth with inexpensive Internet access through drones, balloons, and microsatellites will surely bear fruit. This means that we will see another three billion people come on line. Never before has all of humanity been connected in this way.
This will be particularly transformative for the developing world. Knowledge has always been a privilege of the rich; tyrants rule by keeping their populations ignorant. Soon, everyone, everywhere, will have access to the ocean of knowledge on the Internet. They will be able to learn about scientific advances as they happen. Social media will enable billions of people to share their experiences and help one another. Workers in the remotest villages of Africa will be able to offer digital services to the elite in Silicon Valley. Farmers will be able learn how to improve crop yields; artisans will gain access to global markets; and economies based on smartphone apps will flourish everywhere.


(iStock) 2. Doctors in our pockets
All of this has been made possible by advances in computing and networks. In a progression called Moore’s Law, computers continually get faster, cheaper, and smaller, doubling in speed every 18 months. Our $100 smartphones are more powerful than the supercomputers of the 1970s—which cost millions of dollars. With faster computers, it becomes possible to design more powerful sensors and artificial-intelligence (A.I.) systems. With better sensors, we can develop sophisticated medical devices, drone-based delivery systems, and smart cities; and, with A.I., we can develop self-driving cars, voice-recognition systems, and digital doctors. Yes, I am talking about applications that can diagnose our medical condition and prescribe remedies.
In 2015, smartphone-connected medical devices came into the mainstream. Most notably, Apple released a watch that, using a heart-rate sensor and accelerometer, can keep track of vital signs, activity, and lifestyles. Through its free Research Kit app, Apple provided the ability to monitor, on a global scale, the use of medicines and their efficacy. Microsoft, IBM, Samsung, and Google too, as well as a host of startups, are developing sensors and A.I.-based tools to do the work of doctors. These technologies are expensive and geared for the developed world; but companies in China, India, and Africa are working on inexpensive versions. The sensors that these devices use, and the computing and storage that A.I. systems need cost very little. Previous generations of medical advances were for the rich; now all can benefit.

Mobile mashup: The military's proliferating mix of smartphones and tablets

https://defensesystems.com/Articles/2015/03/23/Military-unconventional-mix-smartphone-tablets.aspx?p=1
By Terry Costlow , Mar 23, 2015 
The Air Force is using tablets as electronic flight bags to replace bulky paper-based maintenance and flight manuals.
Smartphones and tablets are rapidly making their way into military operations, trimming costs and giving warfighters tightly focused capabilities. But these benefits raise a host of challenges, ranging from security and the need for ruggedization, to requirements for peripherals that link to devices designed for consumers, not soldiers. 
Military leaders are endorsing the role of these handheld systems, though their implementation may evolve slowly, as technical specialists grapple with myriad issues. Military electronics have always been designed for specific roles and given to select personnel. Now, technology experts must grapple with the emerging bring your own device (BYOD) movement, in which rapidly-changing equipment from Apple and a range of Android suppliers must all be connected in compatible networks. 

The spectrum of challenges is as varied as the systems themselves. Security and reliability are foremost among them. These traits span many fields, from supplying peripherals such as secure GPS receivers to securing equipment and managing apps developed by suppliers and warfighters.
Tablets and smartphones are self-contained devices that can be operated without additional hardware, but many military users will need peripherals that augment built-in equipment. For example, commercial equipment suppliers don’t worry much about security when they incorporate GPS receivers. But military users need GPS data that’s accurate and reliable. 

Moving Internet of Things to the tactical edge

http://www.c4isrnet.com/story/military-tech/blog/net-defense/2015/12/29/internet-of-things-tactical-edge/78014856/
MG Dennis Moran, Harris December 29, 2015

If the defense marketplace operated like the commercial world, everyone from the acquisition experts to troops on the ground could expect to be wowed with nearly every new procurement of technology and equipment. Given the unique requirements for tactical products, however, things tend to move more incrementally. New technology capabilities developed for commercial purposes are consistently being implemented in areas such as location-based services, imagery analysis, logistics and mobile computing. This is often occurring on a more ad hoc basis or through pilots that aren't tied to an overall strategy designed to meet the military’s stringent requirements for security, reliability, connectivity and interoperability.

With rapid advancements in technology, there is a renewed opportunity to increase the pace of adoption and push for continued innovation. Now is the time for the Department of Defense to develop a more holistic plan to accelerate the move of commercial technologies to the tactical edge. Providing a strategic vision across the services can accelerate the efficient integration of commercial off-the-shelf (COTS) equipment into existing systems and help industry partners understand where research and development investments are needed.

For example, take the multitude of connected technologies that are creating the Internet of Things (IoT). Many benefits of IoT networks are self-evident, appearing all around us in the commercial world for personal or industrial use: connected home security, personal health, mobile sensors for remote monitoring of equipment, automated communication between vehicles, and even environmental monitoring.
Some of these offer substantial benefits to military missions in terms of both capabilities and cost effectiveness. And certainly, there is an increase in military units training and deploying with COTS equipment and systems.

Here's why some people believe Mark Zuckerberg's plan to bring cheap internet to the world is deeply flawed

http://www.techinsider.io/internet-org-free-basics-2015-12
Dave Smith, Dec. 28, 2015,

Not everyone is a fan of Internet.org, Facebook's non-profit that aims to introduce cheap internet access to "the most disadvantaged" parts of the world.
Since its February rollout in India, several big companies from that country, including a giant media firm and a major travel portal, have withdrawn from the service, claiming it conflicts with the spirit of net neutrality. 
According to the BBC, “the issue has certainly galvanized the Indian public — more than 800,000 people have sent emails to India’s telecom regulator demanding a free and fair internet.”

Responding to the backlash in India, Zuckerberg has defended Internet.org and its Free Basics internet service numerous times — once in an April article for the Hindustan Times (and in a Facebook post with the same text), and later again in a November post on Facebook. He says "net neutrality and universal connectivity must co-exist."

On Monday, Zuckerberg penned a blog post for the Times of India, declaring "Free Basics protects net neutrality."
"In every society, there are certain basic services that are so important for people’s wellbeing that we expect everyone to be able to access them freely," Zuckerberg said. "We have collections of free basic books. They’re called libraries. They don’t contain every book, but they still provide a world of good... That’s why everyone also deserves access to free basic internet services."

*** Congress Has Embraced Unconventional Warfare: Will the US Military and The Rest of the US Government?

Journal Article | December 29, 2015 

With the passage of the National Defense Authorization Act of 2016 the United States Congress has embraced what Russia, Iran, China, Al Qaeda and even ISIS have long known and that is unconventional warfare (UW) is a form of warfare that is optimized for achieving national objectives in the space between peace and war. Congress, in Section 1097, has directed the Secretary of Defense to develop a strategy to counter unconventional warfare being conducted by adversaries of the US. Congress recognizes the US has a strategy gap between peace and war and the directive to the SECDEF is the forcing function necessary to develop a strategy and to bring new and creative thinking to the national security challenges we face.

What is Unconventional Warfare?
In Section 1097 and in joint US military doctrine it is defined as “activities conducted to enable a resistance movement or insurgency to coerce, disrupt, or overthrow a government or occupying power by operating through or with an underground, auxiliary, or guerrilla force in a denied area.”

However, our adversaries employ their own unique forms of unconventional warfare by effectively integrating conventional and special operations forces, all elements of their national power, and in particular psychological warfare, while exploiting conditions, to include resistance, in countries and regions around the world to counter the west and often the US directly in order to achieve their political and security objectives. They take a more holistic approach to unconventional warfare and are willing to employ it as a matter of course. In contrast the US has long viewed unconventional warfare as something only Special Forces conduct and then only to be used in very rare situations when there are no other alternatives. In short, in the past the US has shown it does not have the stomach for unconventional warfare. Fortunately, Congress has recognized this shortfall in US security strategy.

Directive from Congress
DOD has 180 days to provide to Congress a strategy to counter unconventional warfare. The clock is ticking. It will be interesting to read the response to Section 1097. One possible bureaucratic course of action would consist of reviewing what the Department is already doing and showing the metrics of terrorists removed from the battlefield and listing all the capabilities the Department has that are and can be used to counter-unconventional warfare. The Department will even tout the new joint unconventional warfare doctrine from the United States Special Operations Command (USSOCOM) the Joint Chiefs of Staff approved in September 2015. The purpose of this course of action would be to meet the Congressional requirement with minimal disruption to the department and thus get Congress off its back. Another course of action would be to view this as an opportunity for Congressional support of a new strategy that would be based on a thorough understanding of our adversaries’ strategies and how they are employing unconventional warfare. The question is how with the department respond?

Social Media Screening For Terrorism Needs Multiple Lenses

December 29, 2015 
Stuart N. Brotman | December 22, 2015 
Since the recent tragic terrorist attack in San Bernardino, California-where a radicalized Muslim couple gunned down 14 people at a holiday office party-much attention has been focused on the wife, Tashfeen Malik, a Pakistani national. She was allowed into the US in 2014 on a type of visa for people who plan to marry American citizens.

Malik passed two background checks before she was admitted to the United States and a third one in the summer of 2015, when she was given a green card. In the intensive post-attack analysis, federal investigators initially concluded that she had discussed violent jihad on social media prior to her visa approval. Subsequently, FBI Director James B. Comey noted that a further review indicated
Malik’s jhadist messages were direct, private ones rather than communicated through social media. Mr. Comey also spoke more broadly about the role social media played in the recruitment of extremists.

“Twitter works as a way to sell books, as a way to promote movies, and it works as a way to crowdsource terrorism – to sell murder,” he said.
Consequently, reforming the visa screening process has become a high priority in Washington, DC, where both the Department of Homeland Security (DHS) and the State Department have indicated they are considering tighter scrutiny of applicants’ social media activities. Several bipartisan measures also are under way in the House and the Senate that would mandate increased social media screening protocols in the visa approval process.
Insights from Twitter

Obama’s ‘Boots on the Ground’: U.S. Special Forces Are Sent to Tackle Global Threats



http://www.nytimes.com/2015/12/28/world/middleeast/more-and-more-special-forces-become-obamas-military-answer.html?smprod=nytcore-iphone&smid=nytcore-iphone-share
By MARK MAZZETTI and ERIC SCHMITTDEC. 27, 2015 
 
An American Special Operations soldier in Parwan in 2014. Such forces are taking on a larger combat role in Afghanistan. Credit Diego Ibarra Sanchez for The New York Times
WASHINGTON — They are taking on a larger combat role in Afghanistan, where the war was supposed to be over. They are headed to Syria to help fight the Islamic State in its stronghold. And President Obama recently ordered nearly 300 of them to Cameroon to assist African troops in their battle against a militant group that has pledged loyalty to the Islamic State.
With the Middle East in tumult, radical groups holding swaths of territory in Africa, and a presidential campaign fanning fears of a growing terrorism threat, the White House has steadily expanded the global missions of American Special Operations troops.

Even as Mr. Obama has repeatedly said that he opposes American “boots on the ground” in far-flung parts of the world, his administration continues to carve out exceptions for Special Operations forces — with American officials often resorting to linguistic contortions to mask the forces’ combat role.
The Obama administration long ago showed its inclination to rely on Special Operations troops and clandestine missions as an alternative to large wars of occupation. But the spread of the Islamic State over the past year — from its hubs in Syria and Iraq to affiliates in Africa and South Asia — has led the White House to turn to elite troops to try to snuff out crises in numerous locations.

These deployments, as well as other missions being considered, have upended the Obama administration’s goal of withdrawing from countries that for more than a decade have been crucibles of combat for the American military.
The White House is now considering a Pentagon proposal to maintain at least one base in Afghanistan for years to come, according to American military officials. Senior officials spoke about issues related to Special Operations forces only on the condition of anonymity because most of the specifics of their missions are classified.

Biggest Cyber Security Threats To Watch For In 2016; Gartner Forecasts 6.8B Devices Connected To Internet Of Things In 2016

December 29, 2015 

Harriet Taylor, in a December 28, 2015 article on CNBC’s website is the latest in a series of articles on the evolving cyber threat and what may be the top cyber threats next year. “Headless worms, machine-to-machine attacks, jailbreaking, ghostware, and two-faced malware,” top the list of key cyber threats to prepare for next year.” In the coming year,”hackers will launch increasingly sophisticated attacks on everything from critical infrastructure, to medical devices,” said Fortinet Global Security Strategist, Derek Manky. “We are facing an arms race in terms of security. Every minute we sleep, we are seeing about a half a million [cyber] attack attempts that are happening in cyber space,” he added.

Here’s How The 2016 Cyber Threat Landscape Looks To Some Experts:
The rise of machine-to-machine attacks: Research company Gartner predicts there will be 6.8B connected devices in use in 2016; a 30 percent increase over 2015. By 2020, that number will jump to more than 20B connected devices, the company forecasts. That would mean an average of two to three Internet-connected devices for every human being on the planet. The sheer number of connected devices, or ‘Internet of Things (IoT), presents an unprecedented opportunity for hackers. “We’re facing a massive problem moving forward for growing attack surface,” said Manky.

“That’s a very large playground for attackers, and consumer and corporate information is swimming in that playground,” he said. In its 2016 Planning Guide for Security and Risk Management, Gartner said: “The evolution of cloud and mobile technologies, as well as the emergence [maturation?] of the IoT,’ is elevating the importance of security and risk management foundations.”
http://www.thehindu.com/opinion/lead/crony-connectivity-and-internet-for-us/article8042342.ece?homepage=true
If the objective is to connect the whole world to the Internet, then Free Basics by Facebook (previously known as internet.org) is a controversial method to achieve it. The company wants to provide a subset of the Internet free of charge to consumers, with mobile telecom operators bearing the costs of the traffic. Facebook acts as the unpaid gatekeeper of the platform.

This kind of arrangement has come to be called “zero rating” and attracted criticism from Internet civil society groups like the Electronic Frontier Foundation. It argues that the Free Basics scheme has “one unavoidable, inherent flaw: Facebook’s central role, which puts it in a privileged position to monitor its users’ traffic, and allows it to act as gatekeeper (or, depending on the situation, censor)... there is no technical restriction that prevents the company from monitoring and recording the traffic of Free Basics users. Unfortunately, this means there is no guarantee that the good faith promise Facebook has made today to protect Free Basics users’ privacy will be permanent.”

Monopolists vs free market
In India, Internet civil society activists are opposing Facebook’s scheme for additional reasons. While the attempt to introduce new users to the Internet is a good thing, they argue, the scheme risks breaking the network into many smaller ones and skewing the playing field in favour of apps and services that enjoy privileged pricing.
Zero rating in general and Free Basics by Facebook in particular has many defenders among advocates of free markets and capitalism. They argue that if the mobile operator wishes to lose money or cross-subsidise some users at the cost of others, then it should be allowed to do so. Government intervention in pricing usually has bad unintended consequences, and it should be no different in the case of Internet traffic.

Can virtualization help mobile device management?

https://defensesystems.com/microsites/2014/Snapshot-Mobile-Warrior/05-Can-virtualization-help-mobile-device-management.aspx

As the Defense Department and its workforce become more dependent on mobile devices, mobile device management is emerging as the vehicle to ensure devices are secured and managed in a cost-effective way.
MDM enforces policy for end user devices at the application and user levels by instituting end-user permissions for approved functions on the device. “MDM also supports malware detection, electronic software distribution of applications, remote data-wipe capabilities, remote device configuration management and asset/property management capabilities that protect against data compromise,” according to the Defense Information Systems Agency, the lead agency for the DOD Mobility Program.

In essence, a unified MDM architecture secures, monitors, manages and supports accredited mobile devices across a range of DOD agencies and services.
Virtualization can play an important role in this arena by providing an effective way to segregate and compartmentalize corporate data from personal assets on mobile devices such as smartphones. The intent is to ease the mobile management burdens on organizations while giving users the freedom to use their phones as they see fit.

Although MDM is strong in the enforcement of corporate policies on mobile devices, it doesn’t differentiate between personal and business data. As a result, new technologies have emerged to help IT organizations better manage mobile—and employee-owned mobile—devices. The options include mobile virtual desktop infrastructures, containers, app wrapping and device virtualization.

Winning Hearts and Minds in Ramadi

by Foreign Policy
SWJ Blog Post | December 29, 2015
Winning Hearts and Minds in Ramadi by Paul McLeary, Foreign Policy

With Iraqi forces claiming victory in Ramadi, Baghdad finds itself facing a pair of difficult tests: retaking the Islamic State-held cities of Fallujah and Mosul and then persuading jittery Sunnis that they can trust Iraq’s Shiite-led government enough to return home and begin rebuilding the war-shattered region.

The months-long siege of Ramadi — which the Islamic State captured in May in a humiliating defeat for Baghdad — finally came to an end in recent days after Iraqi ground forces managed to breach the rings of improvised explosive devices and other obstacles methodically assembled by well-entrenched Islamic State fighters. U.S. warplanes carried out more than 630 airstrikes on Islamic State targets throughout the city since July, but for once the success of the final assault didn’t rely on American air power or an influx of battle-hardened Shiite militias. Instead, regular Iraqi military units led the way using some relatively low-tech, non-lethal American equipment that helped turn the tide of the fight. The conquest of Ramadi, in other words, shows how often conventional wisdom can be mistaken when it comes to combat…