22 February 2018

As China concerns grow, India looks to build military presence in Seychelles

By Steve George and Manveena Suri

New Delhi (CNN)The Seychelles is not typically associated with geopolitics. But beyond the white sandy beaches and tropical jungles, the tiny archipelago nation is emerging as a key player in India's battle to counter growing Chinese influence in the Indian Ocean.

Late last month, India and the Seychelles signed a revised agreement granting India permission to construct a military base on the Seychelles' Assumption Island, roughly 1,650 kilometers (1,025 miles) east of mainland East Africa.

Jammu terror attack: Does India have a game plan to counter Pakistan's misadventures?

Raj Chengappa 

Pakistan is like the bounceback toys sold in subcontinental markets. Hit them hard enough and they appear to topple, only to rebound and, if you are not watchful, whack you. As he nears the end of his fourth year as prime minister, Narendra Modi must be both exasperated and frustrated with the way his efforts to deal with Pakistan have turned out. Whatever he has thrown at Pakistan to bring it around, it never seems to learn, and keeps coming back for more punishment.

Indian investors offered dinner with Donald Trump Jr

Michael Safi

Prospective investors in a Trump Tower project near Delhi are being offered a conversation and dinner with Donald Trump Jras part of a marketing campaign that has drawn criticism from corruption watchdogs.

Full-page advertisements reading “Trump is here. Are you invited?”featured on the front page of three Indian national newspapers at the weekend ahead of a visit by the US president’s son to India this week.

From Make In India To Making In India: Q And A With Baba Kalyani

by Anupama Airy

Babasaheb Neelkanth Kalyani, chairman and managing director of the Kalyani group, speaks with Swarajya on indigenous defence production, Make in India, the guns and and engines developed by his group, and much more, in this interview.

When most top Indian defence companies were seen vying for orders under the government’s new “Make In India” initiative, this company seemed in no rush, and continued to invest and innovate. Today, the Kalyani Group — flagship company, the Rs 4,000-crore Bharat Forge Ltd — boasts of having developed a highly sophisticated indigenous gun to enable our artillery force to fight Indian wars with Indian solutions. The gun has successfully completed trials in deserts and is now under trial in hilly terrain.

The Risks of the China-Saudi Arabia Partnership

Source Link
By Samuel Ramani

Geopolitical factors, as well as Saudi Arabia’s own domestic landscape, could limit the relationship’s potential.

On January 18, Chinese Ambassador to Saudi Arabia Li Huaxin praised Saudi Arabia’s Vision 2030 project and called for tighter integration between Saudi Arabia’s economic diversification efforts and the Belt and Road Initiative (BRI). Li also expressed enthusiastic support for Saudi Crown Prince Mohammed bin Salman’s anti-corruption campaign, claiming that his efforts to strengthen the rule of law in Saudi Arabia would increase the country’s attractiveness as an investment destination for Chinese businesses.

China’s Alleged ‘Stealth Fighter’ Beset by Host of Technical Problems


Although China declared that its J-20 stealth fighter had officially entered service in September 2017 production of the J-20 appears stalled. The manufacturer had planned to build three a month initially but since mid-2017 production appears to have been zero. There are several potential problems with the J-20 but the main ones have to do with stealth (the delicate materials on the airframe that make radar detection less effective) and engines. The most obvious problem is the engines. The WS-10s currently installed are a stopgap and not efficient enough to support supercruise (go supersonic without using the afterburner and becoming easier to spit). China has had persistent problems developing high-performance jet engines. China has been developing the more powerful (and supercruise ready) WS-15 engine since the 1990s for a larger aircraft like the J-20 but has not been able to get the engine to work. Officials also confirmed rumors that a WS-15 exploded during a 2015 static (on the ground) test. That failure had been a secret but when an engine this big fails by blowing up the incident is difficult to hide.

Information Wants to Be Chinese

BY MOIRA WEIGEL

In November, while Donald Trump was on his first state visit to Beijing, Republican Senator John Cornyn and Democrat Dianne Feinstein introduced a bill that would dramatically expand the government’s ability to block foreign investment in U.S. technology companies. The bill was directed at the Committee on Foreign Investment in the United States, or CFIUS, an interagency panel that scrutinizes purchases by “potential adversaries” that go against “national interests.” It was clear which adversary most concerned them: China had received more CFIUS reviews than any other country, according to the most recent data.

Exposed: Why China Would Lose a War against America

Harry J. Kazianis

When it comes to a war with the U.S. how well would Beijing be able to use all that stuff? The real question seems pretty simple: yes, China is certainly developing all the military and technology goodies to field a potent force. However, how well can it operate all that equipment in the pressure filled situation of a war? Sure, Beijing is certainly developing a world-class military, but can its soldiers operate all that equipment competently? Just how well trained are they? You can have the best military in the world but if you don’t know how to use it, well, you get the idea.

Xi Jinping May Turn to Top Ally to Handle US Pressure

By Don Tse and Larry Ong

Wang Qishan (right) receives a fire helmet in recognition of his "fire brigade chief" nickname during a 2011 meeting with then-U.S. Treasury Secretary Timothy Geithner .

Wang Qishan, Xi’s right-hand man, may reemerge as vice president after stepping down from his CCP position. 

Under President Donald Trump, the United States has adopted a hawkish stance on China. The Trump administration’s new national security and defense strategies identify China as a strategic competitor, and a threat to domestic security and the global order. More importantly, the Trump administration plans to contest China’s “unfair trading practices,” cyber intrusions, and expansionism in the Indo-Pacific.

Threat Assessment #Fail: Al-Qaida Quietly Growing, By Design


The annual accounting to Congress of global threats to the United States made it sound like al-Qaida’s separate branches were managing to thrive independently of one another, said Bruce Hoffman, Cipher Brief expert and Council on Foreign Relations visiting senior fellow, in comments to The Cipher Brief. But Hoffman believes the Worldwide Threat Assessment presented to Congress Tuesday failed to acknowledge that al-Qaida is following a very careful and deliberate strategy to establish its separate branches as pillars on which to build future growth.

WHAT SYRIA REVEALS ABOUT THE FUTURE OF WAR


So this is what the Syrian war suggests about future conflicts: They will be intricately complex; they will involve conflict-specific configurations of participants; there will be no humanitarian intervention to stop them; and the United Nations will be a nonfactor. But that isn’t all. It gets even worse. Next week’s column will explain how.

NORTH KOREA IS NOT AN INTELLIGENCE FAILURE


Last month, David Sanger and William Broad’s article in the New York Times, “How U.S. Intelligence Agencies Underestimated North Korea,” ranked the failure to predict the recent breakout pace of North Korea’s nuclear program as “among America’s most significant intelligence failures.”

As two career military intelligence officers we appreciate Sanger and Broad’s tough critique on US intelligence agencies—especially considering one of us is a former student of Sanger’s. However, the tone and tenor that Sanger and Broad use is exaggerated and counterproductive to informing the public on the roles and capabilities of intelligence. More fundamentally, calling US intelligence on North Korea an “intelligence failure” is simply wrong.

North Korean Cyber-Attacks and Collateral Damage


WannaCry was incredibly destructive. The attackers made about $150,000 – but the total damage caused by WannaCry has been estimated in the billions of dollars.

There is strong evidence linking WannaCry to a group of hackers known as ‘Lazarus’, reportedly operating out of the DPRK (North Korea). Whilst WannaCry is perhaps the most famous attack by Lazarus, it isn’t the only ‘collateral damage’ caused by the DPRK’s cyber actions.

U.S. Revives Concerns About European Defense Plans, Rattling NATO Allies

By Steven Erlanger

MUNICH — After years of encouraging European nations to work together to provide more of their own defense, the United States is having second thoughts, driven by concerns about NATO and possible protectionism in defense industries.

The new American skepticism has been the big surprise of the high-level security conference held this past week in Munich. And it has puzzled and disconcerted NATO officials, who have welcomed the European Union’s new commitment, after the Russian annexation of Crimea, to do more for its own defense.

Russia's shadowy world of military contractors: independent mercenaries, or working for the Kremlin?

By SABRA AYRES

Russian President Vladimir Putin, right, and Syrian President Bashar Assad in December watch the troops marching at the Hemeimeem air base in Syria. Putin's government denies Russian mercenaries killed in Syria worked on behalf of Russia. 

Stanislav Matveev left his home in the Ural Mountains in September to join a Russian private military company. Five months later, Matveev was dead, killed in a U.S. airstrike on Feb. 7 in eastern Syria.

Europe Held Leading Positions in Terms of Real Defense Spending in 2017 - Report

LONDON (Sputnik) - Europe became a global leader in terms of growth in real defense spending — spending adjusted for inflation — in 2017, the International Institute for Strategic Studies (IISS) said Wednesday in its annual report that assesses the military capabilities of countries.

"Europe was fastest-growing region for real-terms defense spending in 2017. While this could be the result of US pressure, it also reflects changing threat perceptions," the report was quoted as saying on the IISS Twitter page.

US wasting billions on nuclear bombs that serve no purpose and are security liability – experts

Julian Borger

A B61-12 model at the Arnold Engineering Development Center in Tennessee. Photograph: National Nuclear Security Administration/Nevada Site Office

The US is to spend billions of dollars upgrading 150 nuclear bombs positioned in Europe, although the weapons may be useless as a deterrent and a potentially catastrophic security liability, according to a new report by arms experts.

These Chinese military innovations threaten U.S. superiority, experts say

by ERIC BACULINAO

BEIJING — The Chinese New Year began with the traditional lighting of firecrackers on Friday, but the country's military has been working on incendiaries on an entirely different scale.

Over the past year, the nation that invented gunpowder has been rolling out an array of high-tech weapons that some experts say could threaten the global superiority of the United States.

Waiting for Depression to Lift

By Effy Redman

It’s late morning on a balmy September day. I try to summon the will to run from the bench where I’m sitting on Broadway and dive under the massive wheels of one of the trucks roaring past. Which section of my body, I wonder, should I hurl beneath the tires. Where would hurt the least, and soonest erase my suffering. I clutch my cellphone, hating its potential for rescue signals.

After nine or 10 trucks pass me by, an unkempt man in his mid-50s sits on the bench beside me, plastic cup of lager in one hand, half-smoked self-rolled cigarette in the other. He looks me up and down and grins. Go away, jerk, I think to myself, shooting him an icy glance. Leave me be.

Russia by Cyber, North Korea by Nuke: A New Batch of Grim Warnings from US Intel


Questioning on Russian election interference and how the Trump White House handles staff clearances dominated the worldwide threat hearing Tuesday, as the Senate intelligence committee grilled leaders of the FBI, CIA, NSA, DNI, DIA and NGA over the contents of the 2018 Worldwide Threat Assessment of the U.S. Intelligence Community.

CYBER-WAR NIGHTMARES: HOW CAN IRAN, HEZBOLLAH USE CYBER TO FIGHT ISRAEL?

BY YONAH JEREMY BOB

With this weekend’s events shifting the country’s attention to envisioning the next potential war risks, the cyber-war playing field may once again come front and center.

Unfortunately, in estimating the cyber dangers potentially posed by Israeli adversaries, the danger list may be so long, that it might be easier to assume they can do almost anything and only mention the few things they cannot do.

The U.S. Invented the Internet. The Russians Weaponized It and Used It Against America to Help Donald J. Trump Get Elected

Nancy Scola 

The indictment released Friday by special counsel Robert Mueller makes plain how prosecutors believe Russia pursued its multiyear scheme to undermine the 2016 presidential election — by wielding the social media-driven internet that the United States itself did so much to create. 

They had help, digital experts say, from decades of accepted U.S. policy about how to help the internet thrive: The U.S. government has taken a largely hands-off approach, while the anonymity that protects people’s privacy and liberty online also allowed Russian trolls to deceive overly trusting Americans. And the same freedom to innovate that has made Silicon Valley wealthy and powerful meant that there were few eyes on the ball as Russian actors began figuring out how to manipulate the internet’s few dominant platforms, such as Facebook, Twitter and the Google-owned YouTube. 

Russia and China Racing to Get Satellite Jammers, Report Finds


A painting of a Defense Support Program satellite from the Air Force Art collection. DSP provides a variety of national security capabilities. Its flagship mission of launch detection was made famous during the Cold War. 

Weapons capable of jamming or destroying U.S. military and commercial satellites will reach initial operational capability in the next few years, according to a new intelligence report.

Winning the Digital Transformation Cyberwar


The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end users, break through inadequate security systems, and infect people wandering around the web in places they probably shouldn’t go.

For decades, fighting these cyber threats has been the primary job of cybersecurity professionals. Establishing controls, setting up a perimeter, hardening edge devices, inspecting traffic, regular patching and replacing protocols, and controlling access points are all security fundamentals that every security team practices, and that most traditional security devices are designed to support. Unfortunately, that didn’t always happen and we often resorted to buying the latest and greatest tools when a new threat emerged, reverted back to hard-wiring the integration of these new technologies, and then hoping it all worked together seamlessly to detect and mitigate threats. Cyber threats were real but manageable – and usually more disruptive than destructive.

No Easy Answers, Just More Questions in Major Encryption Report

By Joseph Marks

Anyone looking for a quick fix to the years-long debate over encryption systems that protect people’s personal information but frustrate law enforcement tracking criminals and terrorists won’t find it in a long-awaited study from the National Academies of Sciences, Engineering and Medicine released Thursday.

The consensus report, produced by a panel of tech industry, law enforcement and academic experts, spends roughly 100 pages laying out the problems posed by warrant-proof encryption systems and by law enforcement’s efforts to access them.