19 August 2016

Defence university: Why INDU might end up as just another bureaucratic coup

http://www.firstpost.com/india/defence-university-why-indu-might-end-up-as-just-another-bureaucratic-coup-2959316.html
Prakash Katoch Aug 16, 2016 

The Draft Indian National Defence University (INDU), 2015 has been placed online for public comments. The Ministry of Defence website among other things says that the Bill proposes: to establish a world class fully autonomous institution of national importance under defence ministry; it will be a teaching and affiliating university for the existing training institutions of the three Services, which will develop and propagate higher education in National Security Studies, Defence Management and Defence Technology and promote policy oriented research on all aspects relating to national security, both internal and external. It would also cater for open and distance learning program for service personnel deployed in far flung areas and it will inculcate and promote coordination and interaction between the Armed Forces and other government agencies including friendly foreign countries.

Considering that the idea of INDU was first conceived in 1967, endorsed by the K Subhramanyam headed Committee on the National Defence University (CONDU) in 2002, and the fact that it was to be established in seven years time (by 2008), passage of the Bill will be a feather in the cap of the Modi government, akin to sanctioning OROP notwithstanding controversy whether a single OROP or multiple OROPs was granted. Public comments on the Draft INDU Bill 2015 are reportedly being sought after it has already been approved by the defency ministry, Ministry of External Affairs and Ministry of Home Affairs. It would have been useful if public comments were asked before approval of these ministries. In all probability, the defence ministry will seek Cabinet Committee on Security (CCS) approval of the Draft Bill without making any worthwhile changes and then table it in Parliament during the forthcoming winter session. Land for INDU was acquired at Manesar, Gurgaon in September 2012 and infrastructure development has reportedly commenced in December 2015.

The Ministry of Defence would naturally maintain that discussions on INDU have been held with the Services, which is true. But what the public will never know is what was discussed, what the military recommended and how much of it was rejected by the bureaucracy. For example while the National Defence College (NDC) under the defence ministry is to be affiliated to INDU, military wanted the Institute for Defence Studies and Analyses (IDSA) also functioning under the ministry also be affiliated to INDU but this was rejected. But then the defence ministry is adept in such stonewalling. The military’s recommendations for the 7th Central Pay Commission were shot down at the defence secretary level. On the behest of the defence ministry the 7th Pay Commission sought recommendations from Institute for Defence Studies and Analyses (IDSA) but used only a miniscule percentage of what IDSA recommended. The service chiefs combined letter protesting acceptance of 7th Pay Commission bringing armed forces below civil services has been palmed off to some committee without ever having addressed anomalies of 6th Pay Commission. These are routine bureaucratic ploys endorsed by the polity by default or design.

** No, Indians Don’t Lack The ‘Sports Genes’ Because There Is No Such Thing

http://swarajyamag.com/culture/no-indians-dont-lack-the-sports-genes-because-there-is-no-such-thing-2
Satyajit Sadanandan - August 16, 2016, 

Our country has produced world-class athletes like Milkha Singh and PT Usha, so any suggestion that Indians are not suited for international sports is laughable and needs to be nipped in the bud.
Dipa Karmakar created history as the first Indian gymnast to secure the fourth position in any Olympics. Her story follows a familiar script of many other Indian athletes, a saga of dedication overcoming severe lack of resources in her sporting journey.
Karmakar caught the nation’s attention after qualifying for the Olympics though she had some success at international events earlier. In coming so close to the medal, she has shown that Indian gymnasts can measure up to the world’s best and there is not so much an issue of lack of talent, as one of lack of facilities and coaching.
The winner of Karmakar’s event, Simone Biles is also rewriting history. And how! This was the 3rd Olympic gold for Biles, the first female gymnast from the US to do so in a single Olympics. Such is her dominance of the sport that many in the field are already proclaiming her as one of the greatest. By virtue of being an Afro-American and dominating the sport that saw a black woman win for the first time only in 2012 (Biles’s teammate Gabrielle Douglas), Biles is shattering long held stereotypes about the genetic ability of coloured gymnasts.
Her compatriot and namesake, Simone Manuel shattered a similar taboo in swimming on day seven by becoming the first black female swimmer to win at the Olympics. Swimming events are globally dominated by White or Chinese swimmers which has led to the stereotype that black swimmers are not good at the sport but Manuel’s success also proves that it is not so much the lack of a genetic ability for swimming among blacks, as much as the lack of access to the right resources and the socio-economic reasons behind it.
This brings me to this familiar coffee-table myth that usually pops up around every Olympics – Indians are genetically not suited to excel in certain sports. My previous article on fan attitudes to Indian Olympians generated the following comment:

Indians are simply not suited to international sports. They are ZERO at athletics (track and field), the prime sports grouping. Can Indians swim at all to acceptable standards? Sports failure is not just due to corruption and political interference. It is also attitudes, diet, stamina.
Attitude is a complex area which has internal (self-drive) and external dimensions and needs to be addressed separately.
Some people criticise the vegetarian diet of Indians and attribute that to lack of success. Not true. If this was the case, we wouldn’t have won medals in a physical sport like wrestling, where quite a few of our wrestlers like Sushil Kumar are vegetarians. The vegetarian diet may lack proteins or some vitamins (like B12) but even weekend runners these days know how to get them through supplements and we have a growing number of good sports nutritionists in India. In any case, many of our athletes are not vegetarian but the point is that this is not a factor in success. The bigger challenge for us going forward is to make sure that our athletes get the right nutritional advice and access from a very young age.

The idea of genes playing a big role in sporting success has been around since ages. It is an offshoot of the longstanding argument that certain ethnic groups are incapable of certain types of work. This theory has influenced history leading to racial stereotypes right upto the Second World War.

It is also a pillar of the eternal nature vs nurture debate that has spawned much research worldwide.
So far all such myths of genetic superiority have been steadily broken in most sports, as in the cases of swimming and gymnastics above with the success of the coloured athletes (and of course Dipa Karmakar). China and Japan have also been fairly successful in both sports, so it is hard to believe that only Indians would be left out by nature.

Google Rules The West, Baidu Top In China

by Felix Richter, Statista.com
-- this post authored by Martin Armstrong
In the USA and Europe, Google absolutely dominates the search engine market with the likes of Yahoo and Bing left to play mere bit parts.
From its Mountain View headquarters in California, Google can also lay claim to predominantly being the search market leader in the rest of the world.
There are, however, some exceptions. In China, Baidu is the undisputed number one. In 2010, Google withdrew from the country due to censorship issues and has since then had no access to one of the largest advertising markets in the world. According to a forecast from the Statista Digital Market Outlook, 26.5 percent of all search engine advertising revenue is generated in China. That adds up to more than 24 billion US dollars.

This infographic shows search engine market shares based on traffic in July 2016



You will find more statistics at Statista.

A Proxy War Between India And Pakistan Is Under Way In Afghanistan

http://www.forbes.com/sites/charlestiefer/2016/08/13/war-between-india-with-the-us-and-pakistan-started-this-week-in-afghanistan-proxy-war-that-is/#2a2e21c52b0b

General Larry Nicholson (L) shakes hands with an Afghan provincial official in Helmand Province in Afghanistan. (ANPREET ROMANA/AFP/Getty Images)

Important but overlooked news this week: the U.S. command in Afghanistanhas asked India to step up military aid to Afghan forces. India provided four attack helicopters to the Afghan military in Dec. 2015; the U.S. and the Afghans want more, as well as spare parts for Russian-made military equipment, to be used in part against the Islamist network built up by Pakistan called the Haqqanis.
Every aspect of this cries: “Proxy War.” To New Delhi came General John Nicholson, a four-star general serving as the commander in charge of U.S. forces in Afghanistan. When I was in Afghanistan in 2011 while serving on the Commission on Wartime Contracting in Iraq and Afghanistan, I met Nicholson’s predecessor, and saw his immense scope of military and diplomatic responsibility. Who met with Nicholson: India’s National Security Adviser Ajit Doval, Foreign Secretary S. Jaishankar, and Defense Secretary G. Mohan Kumar. This is a joint war command for deciding India’s course in the proxy war.

Second, a very ingenious opening wartime mode of supply has been arranged. The Afghan Air Force still uses MI-25 Russian attack copters (among others), because many of their air and ground crews trained on copters inherited in the 1980s from the puppet Russian regime, for which parts are scarce. As General Nicholson said: “The Afghans have asked for more of these helicopters. There is an immediate need for more. When these aircraft come in, they immediately get into the fight.” Note twice the term “immediate.” When the U.S. military commander in charge, the four-star general, says “immediate” twice, he is telling his troops that their butts will be in a sling unless it gets done yesterday, if not earlier.
General Nicholson went on: “We are building the Afghan Air Forces as a critical component of security. That [the Afghan air force] is built on several airframes. Some are older Russian models integrating newer ones. We need more aircraft, and we are looking at how we can meet that need.”

Nicholson also said that military training by India to thousands of Afghan security personnel had helped that country in significantly enhancing its military capability, which is in tune with the objective of NATO and the U.S. I saw the problem, going to Kandahar in 2011 to review training there being done by the U.S.-paid contractor Dyncorp. A large part of the Afghan recruits are, bluntly, illiterate. Training has to be elementary and complete. Do not get me wrong, the Afghan trainees are brave, great armed police and soldiers. Often they have excellent fighting spirit, they know guns like we know cars, and frequently they lost close relatives in fighting that has gone on nonstop since the Soviets took over in the 1970s. But they need an enormous amount of training. It looks like India is shouldering some of that key part of the proxy war.

POK-Ing Pakistan: Why It Must Amount To More Than Just Bluster & Optics

http://swarajyamag.com/politics/pok-ing-pakistan-why-it-must-amount-to-more-than-just-bluster-and-optics
R Jagannathan - August 16, 2016, 
Now that Prime Minister Modi has brought up POK not once, but twice, in recent times, we should look to get both our strategy and articulation right.
Strategy must flow from end-goals, our known or future capabilities and a realistic assessment of the enemy’s capabilities and motivations and so on.
Most important, though, is that we tie J&K inextricably to India’s growth story in such ways as education and job creation.

Now that Prime Minister Narendra Modi has decided to up the ante with our self-destructive neighbour, it is important to get both our strategy and articulation right. Not once, but twice, including in his Independence Day speech, Modi raised India’s concerns about human rights violations in Pakistan-occupied Kashmir (POK), Balochistan and Gilgit-Baltistan. In the short run, this will certainly worsen Pakistani belligerence and terrorism, and so we must brace for it.
But what exactly is our strategy? If it is mere tit-for-tat simply because Pakistan is creating trouble for us in Jammu & Kashmir, then it will not go far. It may even become counter-productive. Reason: Pakistan has its terror network up and running while we may be all bluster and no plan. For a strategy to work, it must be long-term in nature, capable of being accepted as reasonable by the international community and must have exit options in case things go wrong.
Strategy must flow from end-goals, whether articulated or covert, and also our known or future capabilities, a realistic assessment of the enemy’s capabilities and motivations, and an overarching clarity about why we are taking this position now.

The reason for us to up the ante should be this: you can’t meet the challenge of an unreasonable and rabid, anti-status-quo power by offering compromises and goodwill. You have to defeat it both psychologically and militarily. You don’t win against a fascist force by signing “peace in our time” deals. With Pakistan, which is dedicated to bleeding us with a thousand cuts, peace is not even an option – except for the photo-ops, which have their own value. So far the war has been fought on Pakistan’s terms; it is time to prosecute the war on more even terms.
The first thing to understand is that there is no hurry. This is going to be a long war of attrition, and direction, not speed, will be of the essence. And our first priority must be to protect our flanks and weak spots - which means dealing with the violence in the Kashmir Valley politically and economically. This does not mean more concessions to the “azaadi” stone-pelters. It means engaging with all actors – Kashmiris, including POK residents, Jammu residents, Ladakhis and Pandits – and emphasising that India will never relinquish Jammu & Kashmir.

2016s Tech Billionaires

by Felix Richter, Statista.com
-- this post authored by Martin Armstrong
A report released this week by Forbes has revealed the 100 richest people in the tech world.
The chart below takes a look at the top ten from this list, revealing the sheer scale of wealth being created in this sector - tech, as recently highlighted by Statista, is the new oil.
Sitting on top of the pile is Bill Gates. With a net worth of 78 billion U.S. dollars, Gates is not only comfortably the richest man in tech, but also the richest man in the world. In second place is Jeff Bezos, the man behind Amazon who has according to Forbes now amassed a net worth of over 66 billion dollars. Rounding off the top three is Facebook founder and CEO, Mark Zuckerberg, with a total of 54 billion dollars.
While the list is dominated by US companies, Chinese e-commerce giant Alibaba and its executive chairman Jack Ma make an appearance at place eight. In 2016, Ma has a net worth of almost 26 billion dollars. Not too far behind him is Tencent CEO, Ma Huateng with 22 billion dollars.
This chart shows the net worth and main source of wealth of the ten richest tech billionaires in the world.



You will find more statistics at Statista.

How To Stop The World's 3.1 Billion Young People Being Left Behind

from The Conversation
-- this post authored by Jo Boyden, University of Oxford
There are more young people in the world than ever before. While some see the planet's 3.1 billion under 25-year-olds as a threat, others see the true potential of this demographic dividend. On International Youth Day on August 12, it's clear that radical action is needed to help disadvantaged young people around the world fulfil their hopes.
Our ongoing study, Young Lives, has been following 12,000 children in Ethiopia, India, Peru and Vietnam from childhood into young adulthood since 2001. One of the most heartening things about the project has been hearing from parents about just how much their children's lives have improved since they were young. By the age of 12, for example, nearly every child in the study was in school.

But one of the most disheartening findings has been revealing just how much difference poverty makes to a child's life from the moment they are born. Despite the gains of the last 15 years, the poorest children in all four countries remain much more likely to be physically stunted due to long-term malnutrition, and the poorest children and those in rural areas are still the least likely to have access to safe water and sanitation. Young people from poor backgrounds are also at the greatest risk of leaving school early.
Build opportunity, the ambition is there
At the age of 12, between 75% (Ethiopia) and 92% (Peru) of children in our study aspired to study to a level beyond school, with a high proportion expecting to reach their goal. Children from disadvantaged backgrounds see education as their best chance to live a better life than their parents. Both the children and their families devote energy and resources to getting the education their parents never had. But too often children's hopes are thwarted by poor-performing education systems, family misfortunes like crop failure or illness, and severely limited job opportunities.
According to the charity Solutions for Youth Employment, young people around the world are up to four times more likely to be unemployed than adults, and up to a third of young people who are employed have an income below the national poverty line. Where young people see opportunity, they seize it. Where they don't, they lose heart.
In the words of one young man in urban Ethiopia who our researchers have followed since the age of eight, this means he has ended up "simply counting [his] age". Creating decent jobs, and ensuring these can be accessed by young people and particularly young women, is the challenge of our times.
Too many cliff edges

The years leading up to young adulthood are full of transitions, but for young people from poor families they are rarely straightforward. Work often starts well before adulthood, progress through school is sometimes halting, and many older children are still struggling with early grades late into their school career.

Read the CIA’s Simple Sabotage Field Manual: A Timeless, Kafkaesque Guide to Subverting Any Organization with “Purposeful Stupidity” (1944)

http://www.openculture.com/2015/12/simple-sabotage-field-manual.html
December 1st, 2015 
I’ve always admired people who can successfully navigate what I refer to as “Kafka’s Castle,” a term of dread for the many government and corporate agencies that have an inordinate amount of power over our permanent records, and that seem as inscrutable and chillingly absurd as the labyrinth the character K navigates in Kafka’s last allegorical novel. Even if you haven’t read The Castle, if you work for such an entity—or like all of us have regular dealings with the IRS, the healthcare and banking system, etc.—you’re well aware of the devilish incompetence that masquerades as due diligence and ties us all in knots. Why do multi-million and billion dollar agencies seem unable, or unwilling, to accomplish the simplest of tasks? Why do so many of us spend our lives in the real-life bureaucratic nightmares satirized in the The Office and Office Space?

One answer comes via Laurence J. Peter’s 1969 satire The Peter Principle—which offers the theory that managers and executives get promoted to the level of their incompetence—then, David Brent-like, go on to ruin their respective departments. The Harvard Business Review summed up disturbing recent research confirming and supplementing Peter’s insights into the narcissism, overconfidence, or actual sociopathy of many a government and business leader. But in addition to human failings, there’s another possible reason for bureaucratic disorder; the conspiracy-minded among us may be forgiven for assuming that in many cases, institutional incompetence is the result of deliberate sabotage from both above and below. The ridiculous inner workings of most organizations certainly make a lot more sense when viewed in the light of one set of instructions for “purposeful stupidity,” namely the once top-secret Simple Sabotage Field Manual, written in 1944 by the CIA’s precursor, the Office of Strategic Services (OSS).

Now declassified and freely available on the CIA’s website, the manual the agency describes as “surprisingly relevant” was once distributed to OSS officers abroad to assist them in training “citizen-saboteurs” in occupied countries like Norway and France. Such people, writes Rebecca Onion at Slate, “might already be sabotaging materials, machinery, or operations of their own initiative,” but may have lacked the devious talent for sowing chaos that only an intelligence agency can properly master. Genuine laziness, arrogance, and mindlessness may surely be endemic. But the Field Manual asserts that “purposeful stupidity is contrary to human nature” and requires a particular set of skills. The citizen-saboteur “frequently needs pressure, stimulation or assurance, and information and suggestions regarding feasible methods of simple sabotage.”

You can read and download the full document here. To get a sense of just how “timeless”—according to the CIA itself—such instructions remain, see the abridged list below, courtesy of Business Insider. You will laugh ruefully, then maybe shudder a little as you recognize how much your own workplace, and many others, resemble the kind of dysfunctional mess the OSS meticulously planned during World War II.

For US Politicians, Overcoming the Fear of Terrorism is Easier Done Than Said

http://www.defenseone.com/ideas/2016/08/us-politicians-overcoming-fear-terrorism-easier-done-said/130749/?oref=d_brief_nl
BY URI FRIEDMANTHE ATLANTIC 
AUGUST 15, 2016

We don’t resign ourselves to car accidents, learning from what went wrong and funneling those insights back into prevention.
In his investigation for The Atlantic into whether America is safer now than it was before the 9/11 attacks, Steven Brill rejects the “fantasy” that the threat of terrorism can be eliminated. And he credits the Obama administration with taking steps not only to prevent terrorist attacks, but also to reduce the damage they cause and enable Americans to rapidly recover when attacks occur. “[T]error is destined to become, yes, routine—a three- or four-times-a-year headline event,” Brill writes. The U.S. homeland will never be entirely secure.
For years now, Barack Obama has differed from most political leaders by saying, in public, that jihadist terrorism is a manageable threat rather than an existential one. The best response to terrorist attacks, he argues, isn’t to panic, which only compounds the problem. It’s to be resilient. “[F]rom Boston to San Bernardino to Orlando, we’ve seen how important it is for communities and first responders to be ready if and when tragedy strikes,” the U.S. president tells Brill.
There’s a reason many politicians don’t say these things. Obama has been ridiculed by critics who claim he is dismissing people’s legitimate fears, underestimating a grave danger, and effectively surrendering to terrorists.

What’s striking, however, is that other world leaders have been echoing Obama in recent months. “The times have changed, and France is going to have to live with terrorism,” French Prime Minister Manuel Valls said after a Tunisian man in a truck plowed into revelers in Nice, sparking debate over whether France’s security services could have done more to prevent or neutralize the attack. “Besides organized terrorist attacks, there will be new threats from perpetrators not known to security personnel,” German Chancellor Angela Merkel said after a series of attacks by asylum-seekers, including an axe-wielding Afghan teenager on a train. Germany wouldn’t stop welcoming refugees just because a few ungrateful asylum-seekers had sought to sow fear, she added, though the government would implement reforms to make such attacks less likely. Germans, she declared, must “live with the danger of terrorism.”
These blunt statements could be interpreted as realistic assessments of the surge in terrorist activity around the world since the emergence of ISIS and the slippery, protean nature of today’s terrorism threat—no longer 19 trained, synchronized assassins who have commandeered Boeing jets, but one guy with access to the internet and an axe. They could also be interpreted as politicians trying to shield themselves from blame for their policies and for future attacks.

Regardless, they may indicate that some governments are poised to embrace a more expansive approach to counterterrorism that pairs efforts to stop terrorist attacks with new initiatives to make societies more resilient to terrorism. National and international authorities hoping to counteract climate change have gradually adjusted their focus in similar ways: Whereas they once prioritized policies to reduce greenhouse-gas emissions (so-called “mitigation”), they’re now also pursuing policies to help people adjust to a warming world (“adaptation”). Mitigation, for example, produces international pledges to limit global temperature increases and national regulations on cars or coal-fired power plants; adaptation leads to genetically engineered drought-tolerant crops and early-warning systems for natural disasters.

In word and in deed, Obama has emphasized resilience to terrorism more than many other U.S. leaders, said Stephen Flynn, a national-security expert at Northeastern University. But the shift Obama embodies actually began during the second term of the George W. Bush administration, as U.S. officials came to recognize that their overseas war against al-Qaeda had splintered the terrorist threat, rather than defeating it as initially intended. This fragmentation made a 9/11-scale attack less likely, but lesser-scale attacks more likely. And these less-sophisticated attacks are often very difficult, if not impossible, to thwart.

On the subject of human consciousness, there is no better book than Douglas Hofstadter’s cult classic


Gödel, Escher, Bach: When logic flies out of the window
Sandipan Deb
http://www.livemint.com/Sundayapp/umPh3ARDU4D1XzsobuUQ4J/Gdel-Escher-Bach-When-logic-flies-out-of-the-window.html
Ever since its publication in 1979, Douglas Hofstadter’s Gödel, Escher, Bach: An Eternal Golden Braid (GEB) has been a cult book like hardly any other. For my generation, the one that grew up in the 1980s, it was an endless source of intellectual stimulation—you could dip into it whenever and wherever you liked, and it was like a drug trip. If you were actually on drugs when you opened the book, it was possibly even better.
Hofstadter is an American professor of cognitive science—a discipline that spans many fields, from psychology to neurology to the fine arts to gaming to artificial intelligence. And GEB cuts across all these areas to study human consciousness, in a vastly entertaining and intriguing way, for the layman.
I used the word “intriguing”, because GEB is itself structured as a giant puzzle, with many smaller puzzles cocooned inside it. There are entire chapters which are mind-bending puzzles in their structure, and most of them have no answers, because our brains are not capable of answering them.
GEB deals with the limitations of the mind and logic. Take this old unsolvable riddle: “All Cretans are liars. I am a Cretan.” So, are all Cretans liars? Or consider a card, on both sides of which is printed this sentence: “The statement on the other side of this card is false.” Or change the lines. On one side of the card is printed: “The statement on the other side of this card is false.” And on the flip side: “The statement on the other side of this card is true.” So, what is true? And what is false?
OK, these are playful little conundrums.

"One Belt, One Road" Initiative Will Reshape Asia's Geography

http://www.paragkhanna.com/home/2016/8/15/br-initiative-to-reshape-regional-geography
B&R initiative to reshape regional geography
 
Editor's note:
Parag Khanna (Khanna), senior research fellow at the Center on Asia and Globalization at the Lee Kuan Yew School of Public Policy, National University of Singapore, has suggested in his new book Connectography that the China-proposed Belt and Road (B&R) initiative is promoting regional integration, which will help reshape the meaning of geography, steering the globe into a new form of integration and unification through supply chains. How can the B&R initiative achieve that? Global Times (GT) reporter Li Aixin recently talked with Khanna about these issues in an exclusive interview.

GT: What does the new form of integration and unification look like in your opinion? And why do you think the B&R initiative will play a vital role in it?

Khanna: A lot of people think about integration as governments fusing together, creating a new supra-national entity like the EU or the UN. That's not what infrastructural integration looks like. Infrastructural integration is what I call functional integration. You don't have to bring your governments together, you have to bring your utilities together. 

Supply and demand are the most powerful forces in the world. Supply and demand are what connect China through infrastructure to its neighbors. So it will reshape geography, because geography is a friction, geography is a barrier, geography slows things down. But with functional integration with infrastructure, the things like B&R initiative and the Asian Infrastructure Investment Bank (AIIB), that friction will become less. 

GT: What influence will the B&R initiative have on geopolitics?

Khanna: Geopolitics is the relationship between power and space. In geopolitics, power can take many forms. Infrastructural and economic reach is a kind of power. The AIIB and the projects of the B&R embody China's infrastructural power and commercial power. So this institution, the more it extends, the more Chinese influence extends at the same time. 

You cannot influence what you are not connected to. The US said Iran must not be connected, we will not trade with or invest in Iran. But other countries like Russia, Turkey, India and China, they will engage with Iran, they will trade with Iran. The more you connect to Iran, the more you will have influence in Iran. So geopolitics changes based upon degree of connectivity.

GT: What challenges do you think the B&R will face?

Khanna: There are two categories. There are post-Soviet countries, like Uzbekistan, Kazakhstan, Tajikistan, Kyrgyzstan, where infrastructure is very bad. In those countries there is very little rule of law, so when you do a contract or a project, you don't know whether the deals will be cancelled or not. When I was here in June, Chinese President Xi Jinping was in Tashkent, Uzbekistan. Why was he there? Because you have to get government-to-government agreement support to make sure that this project will happen. 

The other kind of countries are post-colonial countries like Pakistan and Afghanistan, which are very unstable politically. And the US has a strong influence in those countries. So the challenges are strategic and geopolitical in terms of diplomatic maneuvering. And then there are challenges of security. There are Chinese workers that have been kidnapped or killed, Chinese facilities that have been attacked. The bigger the project, the bigger the risk.

China accused of launching 'cyber war' over contested islands

http://fedscoop.com/china-accused-of-launching-cyber-war-over-contested-islands
Security experts and former officials say the attacks on computer networks at airports and government ministries are designed to demonstrate China's cyber power and deter online retaliation.
By Shaun Waterman, AUGUST 15, 2016

China, in pursuit of its territorial claims in the resource-rich South China Sea, is resorting to low-level cyber warfare against the Philippines and Vietnam — the two nations who recently won an international legal case against the Communist government.
Reports in local media and by regional cybersecurity companies have attributed a rash of cyber vandalism attacks in the past two weeks to a Chinese hacktivist group calling itself 1937cn — an apparent reference to the Japanese invasion of China that year.
In the highest profile attack at the end of July, hackers took over the website of Vietnam's national airline and the display screens in the country's two largest airports and displayed pro-Chinese, anti-Vietnam and anti-Philippine messages.
Websites in the Philippines were also attacked, with local security companies saying the hacks were part of a long-running campaign aimed at the computer networks of government agencies and critical infrastructure owners and operators.

Vietnamese sources have blamed China and linked the attacks to last month's ruling by the Permanent Court of Arbitration in The Hague, which denied Beijing's extensive territorial claims in the South China Seas. About $5 trillion worth of shipping trade passes each year through the seas' waters — which abut China, Malaysia, the Philippines, Taiwan and Vietnam, and are believed to house huge fish stocks as well as vast deposits of undersea oil and gas.
The self-described leader of 1937cn told Chinese state media the group is a patriotic non-government organization, but didn't entirely deny responsibility.
Security experts and former officials in the region say the plausible deniability of using patriotic hacktivists as a cut-out for government-inspired or -directed online attacks is straight out of China's cyber playbook.
"China’s strategic cyber doctrine is the basis of the current [cyber] operations against Vietnam and the Philippines," wrote S. D. Pradhan, the former chairman of Delhi's Joint Intelligence Committee, in a Times of India op-ed.

In Russian doctrine, security analysts have identified cyberwarfare a part of a "hybrid warfare" strategy, in which information operations and deniable military forces (the "little green men" of Ukraine fame) are fused to leverage Russian strategic might and advance national goals.
But in China's military thinking, Pradhan states, cyber-operations are aimed at deterrence and are also seen as potentially part of "no contact warfare" — "winning war without casualties," and projecting power over great distances "to achieve a quick decisive victory by disrupting, denying and destroying the enemy’s war waging potential and its command and control systems through remote delivery of destructive kinetic energy and effective cyber operations."
In China's concept of "‘integrated strategic deterrence,' cyber operations have the central role," he noted, adding, "Deterrence is achieved by projecting its capabilities for infiltration of critical infrastructure of adversaries," such as the computer networks at a major airport.
By successfully attacking the national airline's website and airport announcement systems, Pradhan added, "China has conveyed her capabilities to infiltrate into [an] adversary's ... most critical and secured infrastructure."

*** Inside the Real US Ground War On ISIS



https://www.buzzfeed.com/mikegiglio/inside-the-real-us-ground-war-on-isis?utm_term=.eax5xwwRR#.hhxaPMMgg
As the US and its allies prepare to launch a major offensive for Mosul, US service members are on the ground in growing numbers — and increasingly in harm’s way. Mike Giglio reports from the bases and front lines where they work around northern Iraq. 
Reporting From Erbil, Iraq posted on Aug. 17, 2016,
ERBIL, Iraq — The Black Hawk helicopter pushed into ISIS territory through the pre-dawn sky. Joshua Wheeler, a veteran master sergeant with US special operations, was taking his men deep behind enemy lines. As the chopper descended on the ISIS stronghold of Hawija in northern Iraq, back in Washington, US president Barack Obama, who had been notified of the mission, waited for word of its fate.
Wheeler and his team were at the forefront of the hidden war US special operations troops are waging against ISIS. With him in the chopper were fellow members of the US Army’s elite Delta Force and some of the local commandos they had trained. Decked in desert camouflage and equipped with high-tech automatic weapons and night vision, the US and local soldiers looked almost identical.

Their mission, carried out on Oct. 22, was more dangerous than most. It called for the men to infiltrate a guarded compound that ISIS had converted into a prison and rescue dozens of men who, according to intelligence reports, were scheduled to be executed that day.
ISIS militants began firing on the helicopter as it lowered toward the compound. Wheeler shot back from the bay, recalled one of the local soldiers who was beside him, a captain with a specialized Kurdish force called the Counter-Terrorism Unit (CTU), which is run by the security council of Iraq’s semi-autonomous Kurdish region.
Then — as Wheeler often did, his Kurdish partners said — he led the way.

Wheeler hit the ground first, said the 29-year-old captain, the ranking CTU officer on the chopper. Gunshots and calls of “Allahu Akbar” rang out as the militants tried to repel the commandos, firing with everything they had. The captain said he and Wheeler advanced together, “fighting side by side.”
On risky missions like Hawija, the US commandos often have a simple command, said a CTU lieutenant: “Let us go first.”
By the time the operation was over three hours later, around 20 ISIS militants had been killed and 69 prisoners had been saved. And Wheeler was dead, struck down by an ISIS bullet, making him the first US service member to lose his life in the ISIS fight.

When his death became public, US officials painted the combat role of the US commandos on the mission as an anomaly. The Pentagon’s press secretary called it “a unique circumstance.” Defense Secretary Ashton Carter said Wheeler’s engagement with the enemy “wasn’t part of the plan.” These comments pushed Wheeler’s death into line with the narrative Obama had presented to the public when the new fight began. “I ran for this office in part to end our war in Iraq and welcome our troops home, and that’s what we’ve done,” he said in August 2014 as US airstrikes against ISIS began. “And so even as we support Iraqis as they take the fight to these terrorists, American combat troops will not be returning to fight in Iraq, because there’s no American military solution to the larger crisis in Iraq.”

WASHINGTON’S SUNNI MYTH AND THE CIVIL WARS IN SYRIA AND IRAQ

http://warontherocks.com/2016/08/washingtons-sunni-myth-and-the-civil-wars-in-syria-and-iraq/
AUGUST 16, 2016
In the first of two articles, a Westerner with extensive on-the-ground experience in Syria and Iraq explains how the West’s understanding of sectarian identity in the Middle East is fatally flawed. He reveals new information on these civil wars and their participants.
Editor’s Note: This author is writing under a pen name. I know the author’s identity and while his arguments are surely controversial, I am confident in his sourcing and subject matter expertise. I have decided to allow him to write under a pen name because he can reasonably fear for his safety and professional employment. -RE
In Iraq, the senior Shia leaders of the Popular Mobilization Forces (P.M.F.) recently gathered for a meeting. Among them was a leading Sunni P.M.F. commander, who later recounted this story to me. When the men broke for prayer, a Shia leader noticed they were not being joined by their Sunni comrade, who remained seated. The Shia leader asked, “Why don’t you join us?”

He responded, “I don’t pray.”
“What do you mean, you don’t pray?” asked his Shia counterpart.
“If I prayed,” answered the Sunni leader, “I would be with the Islamic State fighting you.”
If you read Western media outlets, including War on the Rocks, you might think that most of the problems in the Middle East can be traced to Sunni disenfranchisement, especially in Syria and Iraq. The broader Western debate about the ongoing civil wars in the Middle East is plagued by a false understanding of sectarian identities. Washington elites imagine a broader Sunni sense of identity that does not exist outside the confines of Saudi Arabia and territories held by jihadist groups. This has the malign effect of encouraging polices that add fuel to the fires consuming Syria and parts of Iraq. Alongside this narrative exists another that portrays Iraq’s Popular Mobilization Forces as bloodthirsty sectarian militias engaged in constant abuses against Iraq’s Sunni Arabs — but this is simply not the case.

Similarly, these same voices describe the Syrian government as an “Alawite regime” that rules and oppresses Sunnis. However, Sunnis are heavily represented at all levels of leadership in Assad’s government. The territory it controls at this point in the war and at all points past is majority Sunni. And the Syrian armed forces are still majority Sunni. Alawites may be overrepresented in the security forces, but all that means is that they get to die more than others. It if it is an “Alawite regime,” isn’t it odd that includes and benefits so many non-Alawites?
Sunnis not only have political power in Syria, but they also have social power, more opportunities, and a greater range of choices in life compared to other states in the region ruled by Sunni heads of state. At the heart of this negligent misapprehension of what is actually happening in the Middle East is an acceptance and mainstreaming of notions of Sunni identity propagated by the most extreme voices in the Sunni world: Saudi Arabia, al Qaeda, and the Islamic State in Iraq and the Levant (ISIL).

Number of Refugees to Europe Surges to Record 1.3 Million in 2015

http://www.pewglobal.org/2016/08/02/number-of-refugees-to-europe-surges-to-record-1-3-million-in-2015/
AUGUST 2, 2016
Recent wave accounts for about one-in-ten asylum applications since 1985
A record 1.3 million migrants applied for asylum in the 28 member states of the European Union, Norway and Switzerland in 2015 – nearly double the previous high water mark of roughly 700,000 that was set in 1992 after the fall of the Iron Curtain and the collapse of the Soviet Union, according to a Pew Research Center analysis of data from Eurostat, the European Union’s statistical agency.


Today, Eastern European countries like Kosovo and Albania still contribute to the overall flow of asylum seekers into the EU, Norway and Switzerland, but about half of refugees in 2015 trace their origins to just three countries: Syria, Afghanistan and Iraq. Conflicts, both fresh and long-standing, in each of these states have led to the displacement of hundreds of thousands of people. Some have been displaced within their homelands; others have sought refuge in neighboring countries; and still others have made the often perilous journey to Europe (and elsewhere) to seek asylum.
Since 2012, Germany has been the primary destination country for asylum seekers in Europe, receiving 442,000 asylum applications in 2015 alone. Following Germany, Hungary (174,000 applications) and Sweden (156,000) received the highest number of asylum applications in 2015. Meanwhile, France (71,000) and the UK (39,000) received roughly the same number of applications in 2015 as in years just prior to the refugee surge in 2015.

The Subatomic Race to Harness Quantum Science

http://www.defenseone.com/technology/2015/09/subatomic-race-harness-quantum-science/120260/
PATRICK TUCKER, SEPTEMBER 3, 2015

US, China are betting millions on the promise of this newish field, but the real-world potential remains a mystery.
An assortment of super powers awaits the superpower that harnesses quantum science: unhackable communications, radars that see underground, supercomputers that make today’s biggest machines look like first-generation Ataris. But which of those goals are achievable in the near future, and at what cost?

Earlier this summer, the Pentagon announced a $45 million research effort into quantum networking. Meanwhile, China hopes to complete construction of the world’s largest quantum communication network and become the first nation to put a quantum communications satellite into orbit. But other military-funded research has suggested that quantum comms and cryptography may prove too complicated to warrant the effort, while quantum computing will remain out of reach for a decade or more. (Some argue that’s being very optimistic.)
All of this power, and all of this hype, emerges from a source almost unfathomably small: atomic and subatomic particles that behave differently than larger objects, especially at very cold temperatures. It’s enormously difficult even to study quantum objects; simply observing them generally changes their behavior.
The Holy Grail of applied quantum science is quantum computation, which is as different from regular computers as humans are from jellyfish. Whereas conventional computing uses electrical impulses running through transistors to manipulate bits, or binary values of one or zero, quantum machines track the strange behavior of ultracold atoms that can exist in two states at once — a one, a zero, or both. If you’ve got two qubits in the same so-called superposition, you have what’s called an entanglement gate. They’re atomically linked even if they’re miles apart. And this opens up the possibility of massive parallel calculating. What would you use that for? Think about cracking a code: you try one combination after another after another. But if you can try all the possible combos at once, you arrive at the solution instantly.

KILLER ROBOTS: OUR ETHICS AREN’T THE PROBLEM

http://warontherocks.com/2016/08/killer-robots-our-ethics-arent-the-problem/
KEVIN SCHIEMAN, AUGUST 16, 2016

“If we must act in accordance with our interests, driven by our fears of one another, then talk about justice cannot possibly be anything more than talk.”

-Michael Walzer, Just and Unjust Wars

Are our overly precious ethics standing in the way of getting autonomous weapons into the fight? That is what three authors would have you believe in an article published last week at War on the Rocks. Brecher, Niemi, and Hill claim that “self-imposed and self-important legal and ethical constraints on autonomous weapons” place U.S. forces “at risk of suffering a decisive military disadvantage.” Autonomy will play an important role in shaping the success of future military forces, but their argument commits the United States to a false choice between values and operational relevance. The authors are mistaken in their claim that U.S. policy prohibits the development of lethal autonomous weapon systems. Likewise, they are wrong to suggest that adherence to the laws of war and applicable international treaties is either inappropriate or harmful to U.S. interests. Beyond obvious moral concerns, lamenting Western adherence to such principles runs risk of distracting attention from the institutional and procedural barriers that actually place the U.S. at strategic disadvantage with respect to fielding lethal autonomous weapon systems.

Far from impeding the development of lethal autonomous systems, DoD Directive 3000.09 offers a framework for ensuring the safe development of mission capable systems consistent with the laws of war. Brecher, Niemi, and Hill argue for this directive to be updated so that it “allows the full development and use of robotics.” As they point out, the policy is explicit in limiting routine development of fully autonomous weapon systems to applications involving non-lethal, non-kinetic force. What their argument overlooks, however, is that the directive also specifies guidelines for the development of lethal autonomous weapon systems.
By policy, lethal autonomous weapons and other non-routine autonomous systems must undergo additional review and approval by two under secretaries of defense and the Chairman of the Joint Chiefs of Staff prior to formal development and again before fielding. Among other considerations, the additional review must determine whether the system design incorporates “the necessary capabilities to allow commanders and operators to exercise appropriate levels of human judgment in the use of force.” Even then, the secretary of defense may waive the majority of these requirements in the case of “urgent operational need.” The directive sets a clear framework for developing autonomous capabilities without committing the Pentagon recklessly beyond its current understanding of the technology and its ramifications.

America’s Spies Want to Speed UpIBM’s Quest for a Quantum Computer

http://www.defenseone.com/technology/2015/12/americas-spies-want-speed-ibms-quest-quantum-computer/124334/
BY MIKE MURPHY,QUARTZ
DECEMBER 9, 2015
IBM has been working on quantum computers for decades, and now it has the support of IARPA, the U.S. intelligence community’s research agency.
As we approach the physical limits of shrinking the components on computer chips, it’s getting harder to attain more computing power. But quantum computers—which rely on the strange properties of atom-sized logic gates—could have exponentially more power than even today’s most advanced supercomputers. These machines could be used to develop new drugs, crack codes, or potentially even create true artificial intelligence.
IBM has been working on quantum computers for decades, and now it has the support of the US intelligence agencies. On Nov. 8,IBM announced that IARPA, the intelligence community’s research arm, had awarded the company a multi-year grant to continue its research into building quantum computers.

Classical computers—everything from the giant mainframes that used to take up entire rooms, to the smartphone in your pocket—consist of billions of tiny transistors. Those are switches, essentially, that can be turned on or off, represented on computers as 1 or 0. Every, tweet, text, document, and photo is composed of a series of those 1s and 0s, known as bits. In quantum computing, a transistor consists of a single atom, which can exist as a sort of combination, or “superposition,” of 1 and 0 at the same time. These quantum bits, or qubits, in essence allow a computer to perform multiple parts of a calculation at once, making it far more powerful.
But that’s assuming you can get enough qubits working in one place. These qubits are much less stable than traditional bits, and need to be isolated in large machines that can cool them to almost absolute zero. IBM has a few such machines, and the most powerful contains a mere eight qubits.
Right now, IBM is working on correcting errors that are thrown up during its quantum computing tests—due to the fragility of the qubits—and assuming it’s able to wrangle thousands of qubits in one place, all computing as desired, it would potentially have a computer far more powerful than one with a similar number of traditional bits.

iStock As India Gears Up for Cybersecurity Challenges, Threats Are Multiplying

BY AMIT KUMAR, • AUGUST 16, 2016
Content Lead, IBM

Amit is worldwide Content Lead for IBM Security. He has about 10 years of experience in technology marketing. He has worked in a variety of roles in content management, campaign
India is gearing up to bring in new encryption and privacy policies to take on growing cybersecurity challenges. It may also amend the existing laws to make cyberspace more secure.
Digital India Marches On
In recent times, India has launched a series of cybersecurity initiatives to digitally empower its citizens and safeguard cyberspace. As the Digital India initiative progresses,cyberattacks have doubled year over year, and Indian businesses and government sites have become more vulnerable.
In the wake of increasing cyberthreats, India appointed its first chief information security officer (CISO). The appointment underlines India’s commitment to combating cyberattacks. It will help India develop the vision and policy to fight cybercrime and manage cybersecurity more effectively.
India is also in the process of setting up national cybersecurity architecture. The architecture will provide a framework for designated agencies to monitor, certify and fortify India’s networks in accordance with the law.
However, there is currently no national agency to assess the nature of cyberthreats and respond to them effectively. Some analysts recommend the creation of a National Cyber Security Agency (NCSA) as an answer to the challenge. An NCSA would improve India’s resilience and defense systems. It would also be responsible for a wide range of cybersecurity transformations in the area of policy formulation and its implementation at the national level.
Global Cooperation

India and the U.S. agreed to cooperate on cybersecurity issues during Prime Minister Narendra Modi’s recent trip to the U.S. As a part of the U.S.-India Cyber Relationship Framework, both countries agreed to share cybersecurity best practices, share threat information on a real-time basis, promote cooperation between law enforcement agencies and encourage collaboration in the field of cybersecurity research. India and the U.S. will also establish joint mechanisms to mitigate cyberthreats and protect internet infrastructure and information.
In 2015, India and the U.K. made a joint statement about cooperation in the cybersecurity space. The two countries agreed to work together to provide professional development and establish a Cyber Security Training Centre of Excellence. The U.K. also agreed to help launch the proposed National Cyber Crime Coordination Centre in India.
India has also entered into cybersecurity cooperation with Malaysia and the European Union. There is a strong case for India to collaborate with more countries, but in the meantime, these partnerships are a great foundation.
Growing Cybersecurity Challenges

Though India has taken a series of steps to harden its security posture, the number of cyberattacks and average cost of a data breach have increased significantly.
The “2016 Cost of Data Breach Study: India” reported that the average total cost of a data breach paid by Indian companies increased by 9.5 percent, while the per capita cost increased by 8.7 percent and the average size of a breach grew by 8.1 percent. Additionally, 41 percent of Indian companies experienced a data breach as a result of a malicious or criminal attack — the most common root cause of a data breach.
India needs a comprehensive cybersecurity law to be prepared to tackle cybersecurity challenges more effectively. Singapore’s proposed Cyber Security Bill will offer a good template. A new cybersecurity law would enable India to protect critical infrastructure more effectively. It would also empower cybersecurity agencies to manage incidents quickly and mandate reporting of significant cybersecurity incidents. Additionally, it would create a stronger cybersecurity culture among businesses and Indian government agencies.

Establishing a national cybersecurity command center, such as the recently announced National Cyber Security Centercreated by IBM for Australia, would boost India’s cybersecurity defenses, make Indian businesses globally competitive and create a safer Digital India.

Cyber Terrorism a Major Concern for U.S. Businesses

http://www.claimsjournal.com/news/national/2016/08/15/272825.htm
By Denise Johnson | August 15, 2016

U.S. businesses focused on addressing crisis management in the event of an on premise terrorist attack may be leaving their information systems vulnerable to a cyber attack.
According to The Global Risks Report 2016, compiled through a strategic partnership between Marsh & McLennan Companies and Zurich Insurance Group, cyber attacks are expected to be the top tech risk most likely to occur in the US, and according to the World Economic Forum’s “2016 Global Risk Report”, terrorism is one of the top three risk concerns for companies doing business here.
Liars Lie. You don't have to chase premium away to know where the fraud is in your book. Use vehicle sightings at underwriting and renewal to identify bad addresses, validate VIN information and verify registration state. Don't wait to find out at claim. Download the eBook.

Defining what constitutes cyber terrorismcan be difficult, said Matthew McCabe, senior vice president of Marsh’s Cyber Practice, who spoke during a recent New Reality of Risk webcast on managing terrorism risk hosted by Marsh.
“Under U.S. law, generally speaking, there are three major elements to a terrorist’s act. First, it’s an act that is violent or potentially jeopardizes human life. Second, the act will violate criminal law in the United States…and third, the act is motivated by some ideological basis,” McCabe said.
He explained that a hacker from Kosovo was charged with accessing personal information of more than a thousand U.S. service members and federal employees and releasing the information to a terrorist group.

“The Justice Department confirmed that this was the first case which a hacker has been prosecuted in the U.S. on terrorism charges. Physical consequence is not prerequisite for an act of terrorism,” McCabe said.
Disruption of a computer system is enough to constitute cyber terrorism, according to some cyber insurance policies.
“If you look for the definition of cyber terrorism under a cyber insurance policy, the standard changes significantly. Instead of a violent or potentially life threatening act, cyber policy generally applies to disruptive activities against a computer system, McCabe said.

The next world war is going to be fueled by state-sponsored hacking

http://www.businessinsider.in/The-next-world-war-is-going-to-be-fueled-by-state-sponsored-hacking/articleshow/53715799.cms

Battles in the next world war will be fought in the air, on the ground, and online.
"We've grown used to the fight being in just one domain," Dr. Peter Singer, a strategist at the think tank New America and coauthor of "Ghost Fleet," told Business Insider. "[But] we have these new domains that we've never fought in before, and that's outer space, and cyber space."
While the US has gotten somewhat used to fighting insurgencies and irregular wars, Singer believes the world may be swinging back toward the conventional path, especially as China continues to ramp up its military capabilities.
Singer and August Cole's "Ghost Fleet" put forth a story of what could potentially happen if the US, China, and Russia went to war, and hacking and electronic warfare played a big part in it. Though the book was fictional, all the technology the authors used was drawn from the real world, whether it was currently deployed or in a prototype stage - and it has become recommended reading by the military's top leaders.
"If you're not able to operate the way you want to in cyberspace," Singer said. "That means you can lose battles on land and sea."

Interestingly, the shift to using cyber means of attack instead of conventional ones has already been happening for some time, as Singer explained. We've seen a "micro version" of this new age of warfare playing out recently in Ukraine, Syria, and elsewhere.
Or as one Army officer put it during a 2015 training exercise, "future fights aren't going to be guns and bullets. They're going to be ones and zeroes."
World War 3.0
Singer explained that states can do only four things in cyberspace: Collect, steal, block, and change information. And all of them are happening right now, but not at a scale large enough to consider it a global cyberwar.
"That's what any future cyber conflict is going to involve," Singer said. "A mix of these things."
For example, intelligence agencies already collect mountains of data that's out in the open, and those in the offensive hacking space try to steal more. China, for example, seeks out information on classified military projects like the F-35 fighter so it can develop its own, very similar, counterpart.
Then there's the idea of blocking information from flowing. In a cyber context, that means major distributed denial-of-service campaigns that take websites offline, or website defacements.

How Nazi Germany's Fighter Planes Saved Israel

http://nationalinterest.org/blog/the-buzz/how-nazi-germanys-fighter-planes-saved-israel-17371?page=show
August 16, 2016 
When Israel declared independence from British colonial rule in May 1948, it immediately went to war with the neighboring Arab states. One of the first weapons Israel acquired was a fighter plane designed by a country that had sought the extinction of the Jewish people.
The German Messerschmitt Bf.109 — later re-designated Me.109 — was the most advanced fighter plane of its time when it first saw combat in 1937 in the Spanish Civil War. Flown by German pilots in support of General Franco’s Nationalists, Bf. 109s secured air superiority over Spain and allowed Fascist bombers to terror bomb cities nearly unopposed.

The Bf.109E model was upgraded with 20-millimeter cannons and a new Daimler Benz 601 engine that increased its speed to 354 miles per hour. It swept its opponents from the skies in the invasion of Poland and the Battle of France.
Only when it met large numbers of Royal Air Force Spitfires in the Battle of Britain did it meet its match — resulting in the Nazi war machine’s first major defeat.
While superior fighter aircraft began entering service on all sides by 1942, Nazi Germany continued upgrading and producing 109s until the end of the war. Much of this production took place in heavily industrialized Czechoslovakia, which had been annexed by Germany in 1938. After the defeat of Nazi Germany, the Czechs decided to reopen production by making their own version of the 109, the Avia S-199.

The Czechs planned on using their stock of Daimler Benz 605 engines intended for use in 109 aircraft. However, a factory fire destroyed the engines, forcing the Czechs to find an alternative. They settled on tapping a stockpile of Jumo 211F engines and propellers used by Nazi Heinkel-111 twin-engine bombers.
Needless to say, the 211F wasn’t designed to be a fighter engine — and caused endless problems when fitted to the 109's airframe. Not only were the engines underpowered, but the 109’s original nose-hub cannon was incompatible with it, so the Czechs instead strapped MG 151 cannons under the wings using World War II-era Rüstsatz VI add-on kits. These worsened the S-199’s flight performance.

18 August 2016

NAVIC: India’s eye in the sky

http://www.livemint.com/Opinion/nvUxIhQveytvMNQKADl3wM/NAVIC-Indias-eye-in-the-sky.html
The indigenous global navigation satellite could boost India’s credentials as a regional collaborative partner
Kira HujuAnanth Padmanabhan

NAVIC (Navigation with Indian Constellation), India’s indigenous global navigation satellite system, is expected to become fully operational from this month. Consisting of a constellation of three geostationary, four geosynchronous and two on-standby satellites, NAVIC will facilitate accurate real-time positioning and timing services over India and the region around it extending to 1,500km. While India is joining a club of global powers—the US, EU, China and Russia—who control their own navigation satellite systems, NAVIC’s reach is regional. This is an auspicious occasion for South Asian cooperation.
While the Narendra Modi administration has sought to primarily draw attention to the benefits of NAVIC to Indian citizens, dedicating the acronym to Indian fishermen and navigators, its full operationalization carries profound implications and opportunities for the South Asian region at large. At a time when neighbours like Sri Lanka and Nepal harbour misgivings over Indian interference in their internal affairs and question the Indian commitment to a balanced regional order, sharing the benefits of NAVIC could countenance India’s credentials as a collaborative partner in the region.

“Net security providers” are states that deploy their surplus national assets for the safety and stability of other countries, including by way of responding to natural and man-made disasters. Having a global navigation system bolsters the ability of a nation to serve as a net security provider, especially through the guarantee of such assurance policies. The US equivalent, Global Positioning System (GPS), played a significant role in relief efforts post disasters such as the tsunami in the Indian Ocean region in 2004 and the Pakistan-India earthquake in 2005, and has delivered significant strategic and economic benefits to the US.
Through land-area mapping, yield monitoring and precision-planting of crops, NAVIC allows for the development of civic capabilities in food and livelihood security. In the wake of the 2015 earthquake in Nepal, NAVIC also arrives as an instrument for environmental and meteorological monitoring, as well as climate research. These capabilities can be leveraged to design reliable and efficient response mechanisms for natural disasters, alleviating the devastation they wreak through well-managed disaster relief.