8 December 2017

How “Cyber” Sidelined “Development” at the ITU’s World Telecommunication Development Conference

Samantha Dickinson

Cybersecurity has made the World Telecommunication Development Conference another political battleground for digital policy, threatening to sideline the very real problems that developing countries need to solve. Every four years or so, the International Telecommunication Union (ITU) holds the World Telecommunication Development Conference (WTDC), and this year’s conference was held in Buenos Aires, Argentina. You would be forgiven for thinking that discussing information and communication technologies (ICTs) and how they can contribute to social and economic development would be relatively uncontroversial. However, contentious issues like cybersecurity have made WTDC another political battleground for digital policy, threatening to sideline the very real problems that developing countries need to solve. 

WHEN ROUTINE ISN’T ENOUGH: WHY MILITARY CYBER COMMANDS NEED HUMAN CREATIVITY

MAX SMEETS

I was largely disappointed in Cyber Command’s effectiveness against ISIS. It never really produced any effective cyber weapons or techniques. When CYBERCOM did produce something useful, the intelligence community tended to delay or try to prevent its use, claiming cyber operations would hinder intelligence collection. This would be understandable if we had been getting a steady stream of actionable intel, but we weren’t. The State Department, for its part, was unable to cut through the thicket of diplomatic issues involved in working through the host of foreign services that constitute the Internet. In short, none of our agencies showed very well in the cyber fight.

How to Save (Or Destroy) the Royal Navy

James Holmes

Talk about role reversal. A long century ago, starting in 1909, Great Britain entreated its Pacific dominions—Canada, New Zealand, Australia—to construct “fleet units” to supplement a Royal Navy that confronted multiple challengers in multiple theaters. A fleet unit was a modular task force composed of a cruiser and its coterie of destroyers. Naval potentates such as Adm. Jacky Fisher expected each dominion to construct and maintain one. It would serve as the national navy while doubling as a module in an imperial navy. In peacetime each fleet unit could perform routine functions on its own, acting as a standalone armada. Or dominion navies could merge into a grand Pacific fleet alongside Royal Navy forces when storm clouds gathered. Having massed for action, the imperial fleet would face down some predator—presumably the Imperial Japanese Navy, a force casting covetous eyes on maritime Asia.

Deja Vu All Over Again: US Military Toying With the Already Tried-and-Failed Idea of Setting Up Another Pro-Afghan Government Militia to Fight Taliban

Suzanne Schmeidl

For long-time observers of Afghanistan, déjà vu happens with such frequency that one feels trapped in a never-ending farcical nightmare. This is why news of a mid-September visit to India by a joint US-Afghan military delegation to see whether the model of the Indian Territorial Army could work in Afghanistan was met with horror and disbelief. Surely standing up yet another militia was not being seriously considered? Afghanistan already has, and has had, several versions of such a force to support the struggling Afghan National Security Forces (ANSF), among them the Afghan Local Police created in 2010 by US Special Forces after toying with several prototypes since 2005, and the more recent ‘National Uprising Groups’ set up in 2015 by Afghanistan’s National Directorate for Security (NDS). The mandate of the proposed new force seems identical to these groups: to provide security in areas where the ANSF has not managed to do so.

Why the AK-47 is the World's Most Feared Firearm (75 Million Guns in Nearly 100 Nations)

Blake Franko

The AK first saw widespread military use in Vietnam. American soldiers saw its effectiveness firsthand, as farmers armed with the rifle proved a tenacious foe. Washington would take this experience to heart and go on to design the AR-15 (what would become the M-16) with such lessons in mind. In doing so, the United States ended up arming its troops with a rifle that was lighter and capable of suppressing fire as well. In effect, America was saying goodbye to large-caliber rifles like the M-14 as standard infantry rifles, moving closer to the Soviet model. The reach of the AK and weapons inspired by it would go on to provide the fuel for much of the violent encounters of the Cold War.

The Army's plan to stop soldiers from staring at their tablets

By: Mark Pomerleau 

The tablets, known as Nett Warrior systems, often provide the location of friendly forces and other mapping data. Now that information is being moved to a heads up display available with a soldier’s helmet. This would allow soldiers to look forward and on alert as opposed to focusing, head down, on a tablet. What the Army wants to prevent is what is sometimes pejoratively termed the “Nett Warrior stare.”. “Anytime you’ve got a potential shooter looking down, when he’s looking down he’s not lethal,” Lt. Col. Ray Gary, Army Communications-Electronics Research, Development and Engineering Center (CERDEC) Night Vision and Electronic Sensors Directorate military deputy, said during a visit to its Fort Belvoir facility.

The US Army Knows It’s Vulnerable to Space Attack. Here’s What They Want to Do About It

BY CAROLINE HOUCK

The Pentagon is well aware that its modern way of war is vulnerable to disruption, thanks to its reliance on satellites for communications, navigation, and timing. This has led the Army to reintroduced training with paper maps, and the Navy to break out its sextants. (Even Russian forces reportedly practiced map-based land navigation during the large-scale Zapad-17 exercise that simulated a full-scale conflict with the West.) But the U.S. military’s efforts to harden itself against space-based disruption hardly end with folded-up charts, said Col. Rick Zellmann, the commander of the U.S. Army’s 1st Space Brigade.

7 December 2017

Andaman and Nicobar: Vital Islands, Vanishing Tribes

By Sudha Ramachandran

India’s plans for “development” on the Andaman and Nicobar Islands are threatening the survival of the archipelago’s already endangered indigenous populations. One of the projects that has been approved for implementation in the archipelago is a railway line linking Port Blair, the capital of the island chain, with Diglipur, the largest town on North Andaman Island. The 240-kilometer-long railway line will cut through a protected forest reserve where the native Jarawa live. This would increase the exposure of the Jarawa to outsiders – mainly non-tribal settlers and tourists – and impact their culture, health, and way of life, even their survival as a group.

Digital China: Powering the economy to global competitiveness

By Jonathan Woetzel, Jeongmin Seong, Kevin Wei Wang, James Manyika, Michael Chui, and Wendy Wong


China, already a global force in digital technologies, is set to experience huge shifts in revenue and profits as businesses digitize, boosting the economy’s international competitiveness. China has become a force to be reckoned with in digital technologies at home and around the world. As a major worldwide investor in digital technologies and one of the world’s leading adopters of the technologies, it is already shaping the global digital landscape and supporting and inspiring entrepreneurship far beyond its own borders. 

New Geopolitics in the Middle East?

By Joshua Krasna

The possible creation of a new geopolitical reality in the Middle East may have snuck under the radar this holiday weekend. The continuing spectacle of the investigations into Russia’s possible involvement in the 2016 Election and the continued naming and shaming of corporate leaders and politicians involved in sexual harassment (as well as Thanksgiving), may have overshadowed the summit in Sochi between the Presidents of Russia, Turkey, and Iran, shortly after Syrian President Bashar al-Assad visited President Putin in the same city (and thanked him for “saving Syria”).

What is Sufism?

Mubaraz Ahmed

A Pakistani devotee dances at the shrine of a Sufi saint at an annual festival in Lahore, 2014. Sufism may be best described as Islamic mysticism or asceticism, which through belief and practice helps Muslims attain nearness to Allah by way of direct personal experience of God. While there are other suggested origins of the term Sufi, the word is largely believed to stem from the Arabic word suf, which refers to the wool that was traditionally worn by mystics and ascetics.Belief in pursuing a path that leads to closeness with God, ultimately through encountering the divine in the hereafter, is a fundamental component of Islamic belief. However, in Sufi thought this proximity can be realised in this life.

OPEC: Oil Production Deal Still Has Gas in the Tank, For Now


Major oil producers have seen enough success to stick with their current strategy. Where previous meetings of OPEC and non-OPEC nations were surrounded by uncertainty, all signs suggested that the recent meeting in Vienna would lead to an extension of the current deal cutting oil production. That extension would leave two major questions: How long would the extension run and would an exit strategy be put in place. On Nov. 30, OPEC and non-OPEC producers agreed to extend the deal until the end of 2018, with a review of the duration scheduled for June. The deal will continue, but the strategy for how and when it will end remains murky.

The Story of How South Africa Voluntarily Gave Up Its Nuclear Weapons

Robert Farley
Source Link

The Republic of South Africa is the only country in the world to build a nuclear weapons program, then unbuild that program after domestic and international conditions changed. Why did South Africa decide to build nukes, how did it build them and why did it decide to give them up? The answers are largely idiosyncratic, although they may hold some lessons for the future of nuclear weapons development on the Korean Peninsula and elsewhere.

Origins of Program

IDF-LINKED THINK TANK ADMITS ISRAEL, ISIS ARE ALLIES IN CONFRONTING IRAN IN SYRIA


A new Meir Amit Intelligence and Terrorism Information Center report says that ISIS and Israel are temporary allies against Iran.A new report suggests that in the area of countering Iran’s presence in Syria, ISIS and Israel’s interests may converge, which in a way makes them allies. Despite suggesting no formal alliance between ISIS and Israel, an IDF affiliated think tank Meir Amit Intelligence and Terrorism Information Center reports that interests of both ISIS and Israel align, making them allies against Iran.

What We Really Know About North Korea’s Nuclear Weapons

By Siegfried S. Hecker

In January 2004, the director of North Korea’s Yongbyon Nuclear Scientific Research Center handed me a sealed glass jar with plutonium metal inside in an effort to convince me that his country had a nuclear deterrent. To make the same point last week, Pyongyang lofted a missile 2,800 miles into space and declared it had a nuclear-tipped missile that could reach all of the United States. Has the country’s nuclear program really come that far? As global anxiety over North Korea grows and the war of words between U.S. President Donald Trump and North Korean leader Kim Jong Un escalates, it is more important than ever to be precise about what we know, and what we don’t, about Pyongyang’s nuclear weapons program and delivery systems. In 2004, nothing I saw on my visit persuaded me that Pyongyang could build a bomb and deliver it. But more recent visits, along with several kinds of open-source analysis, leave little doubt of North Korea’s impressive progress in producing bomb fuel, building powerful nuclear devices, and test-launching a wide variety of missiles—and its determined efforts to integrate all three into a nuclear-tipped missile.

Go After North Korea’s Money!

Nitsana Darshan-Leitner

The news last week from the Korean Peninsula about yet another ballistic missile launch was déjà vu all over again. This one had an estimated range of 8,100 miles — long enough to hit Washington, D.C., or anywhere else in the continental United States. President Trump responded with angry tweets, but Kim Jong-un has good reason to be cocky. The strongman knows all too well that a military response is highly unlikely. There are some 8,000 North Korean cannons and rocket launchers aimed at Seoul, in effect holding the approximately 10 million inhabitants of that city hostage. All sides realize that the human and economic costs of another Korean war are simply unfathomable.

Redouble Our Whole Of Government Efforts To Fix Perfect Storm Of Strategy Goobledygook!

By MARK CANCIAN and MATTHEW CANCIAN

Mark Cancian is a former Office of Management and Budget official. Unlike many of that ilk, he sometimes exhibits the ability to write a sentence in clear and simple English. As he and his son, Matthew, looked out across the national security landscape, they saw it pocked with large lumps of nearly meaningless verbiage. In advance of the release of the Trump Administration’s first National Security Strategy, they penned an article modestly titled: It’s Time to Retire These Meaningless Policy Phrases. We like our headline much more, but you get the point. Perhaps this will lead to an exit strategy for this wicked problem. Read on! The Editor.

The Surveillance Operative Lurking In The Living Room


The holiday shopping season is here once again. And this year, surveillance and espionage products have made it to the top of a surprising number of wish lists in the guise of digital home assistants. The devices already have brought microphones into as many rooms of our houses as we're willing to allow. Now, many of them come equipped with cameras as well. Despite concerns about the threat to privacy that earlier generations of the devices have posed - one product from Amazon's Alexa line carried the unfortunate name of Dox - enhanced video capability appears to be the next big thing in digital home assistants.

North Korea’s Military Capabilities, In Review

BY ELEANOR ALBERT

Introduction

The United States and its Asian allies regard North Korea as a grave security threat. It has one of the world’s largest conventional military forces, which, combined with its escalating missile and nuclear tests and aggressive rhetoric, has aroused concern worldwide. But world powers have been ineffective in slowing its path to acquire nuclear weapons. The North’s leader, Kim Jong-un, sees the nuclear program as the means to sustain his regime. While it remains among the poorest countries in the world, North Korea spends nearly a quarter of its GDP on its military, according to U.S. State Department estimates. Its brinkmanship will continue to test regional and international partnerships aimed at preserving stability and security.

What are North Korea’s nuclear capabilities? 

Mind the Millennial Training Gap

By Margaret S. Marangione

As the need for new analysts continues to grow, the intelligence community is looking to add millennials, the largest generation in the U.S. work force. These young people—born between about 1980 and 2000—bring a new perspective, but teaching them the necessary skills for analysis must be done differently than it was in even the recent past. Their attitudes and thought processes are vastly different from their predecessors, requiring a new approach to intelligence training and education to make the best use of their abundant skills.

Use What’s Known to Get to the Unknowns

JASON MATHENY

The U.S. intelligence community has long considered its mission as the gatherer of secrets. But sometimes insights are hiding in plain sight among tweets, blog posts, online videos, newspaper articles, academic journals and public records. Leveraging such open source information can greatly enhance our understanding of the world and critical events with national security implications. The Cipher Brief’s Levi Maxey spoke with Jason Matheny, the director of Intelligence Advanced Research Projects Activity (IARPA), the U.S. intelligence community’s over-the-horizon research and development wing, about the value the intelligence community places on open source data.

Securing Cyber in the Sky Layered cybersecurity needed to protect aviation ecosystem


When the WannaCry ransomware warning popped up on the arrival-and-departure signs of Germany's national rail system, experts in aviation security took notice. While the now-infamous attack did not affect travel, it did show how easily malicious code can infiltrate mass transit systems. And with thousands of attacks on aviation systems every month, Raytheon, a company with expertise in both cybersecurity and air traffic management, is taking steps to mitigate cyber attacks in the skies.

As AI and Cyber Race Ahead, the State Department Is Falling Behind

BY JOSH KIRSHNERSENIOR

There has been considerable interest in the direction of Secretary of State Rex Tillerson’s ongoing “reimagining” of the State Department, but for all the conversations about the future of American diplomacy, what has been underaddressed is how our oldest Cabinet agency is preparing to deal with the new, but foreseeable, diplomatic challenges presented by emerging technology.

FIFTH GENERATION WARFARE AND OTHER MYTHS: CLARIFYING MUDDLED THINKING IN OUR CURRENT DEFENSE DEBATES

By Dave “Sugar” Lyle

When you are talking about the command and control of forces that could potentially destroy human society as we know it, you owe it to the rest of humanity to be very precise with your terms and concepts – matters of such extreme importance require the greatest degree of conceptual due diligence that we can collectively muster. But the reality is that much of the debate over future force structure, command and control, and strategy writ large is littered with unexplored assumptions and muddled thinking, often cloaked in buzzwords that members of an organization become obligated to use once their leadership has adopted and promulgated them as guidance. We will always need “bumper stickers” to spread new ideas, but as we do that, we must be very careful which ones we use, and be very aware of their inherent limitations, before they are used to justify dangerous courses of action built on conceptual foundations of sand.

Rethinking Sun Tzu

By John F. Sullivan

The author James Clavell once wrote that if he were ever put in charge of the U.S. military, he would require all generals to take an annual written and oral exam covering the tenets of Sun Tzu—with those scoring below 95 percent being summarily dismissed.[1] Predictably, the proposal never gained much traction within the Pentagon, but the hypothetical exam raises an interesting question. Would we even be able to agree on a common, testable understanding of the principles inherent in The Art of War? The number of prominent Western military strategists who consistently attribute to Sun Tzu phrases never a part of his work suggests the Chinese sage suffers the same fate as his Prussian counterpart.[2] That is, he is the author of a book “well-known but little read.”[3] As a result, we too readily ascribe to Sun Tzu contemporary views bearing little resemblance to the cultural and historic milieu that ultimately grounds the text. In short, we stray too far from the original document we are attempting to interpret for a modern audience.

The F-35 Can Now Fight a Ground War

Dave Majumdar

The United States Air Force is adding the ability to attack moving targets to its new Lockheed Martin F-35A Joint Strike Fighter with the addition of the 500lbs Raytheon GBU-49 Enhanced Paveway II laser-guided bomb. "Fielding the GBU-49 for use on the F-35A is a key milestone in delivering combat capability to the warfighter," Brig. Gen. Todd Canterbury, director of the Air Force F-35 Integration Office, said in a statement. 

The U.S. Army Might Just Have a 'Secret Weapon' to Win the Next Big War



Kris Osborn
Source Link

Rapid access to historical databases and sensor information, made available by AI-driven computer automation such as that used by IBM’s Watson, allows commanders to quickly identify and anticipate mechanical failures, equipment functionality and service life details. As a result, wireless connectivity and more AI-driven conditioned-based maintenance expedites analysis and allows for near real-time decision-making, Army developers explained. Army weapons developers recently completed a "proof-of-principle" exercise with Stryker vehicles using wireless devices, faster computer processing speed, cloud technology and artificial intelligence to expedite vehicle health monitoring and anticipate future needs for the platform.

6 December 2017

*** The New American Way of War

By W.J. Hennigan

The convoy of weather-beaten trucks and Toyota Land Cruisers kicked up dirt as it streaked across the wooded West African terrain toward the hazy horizon. A joint team of 12 U.S. Army Special Forces and 30 Nigerien troops were making the trek back to base after a two-day reconnaissance mission to a remote area along Niger’s border with Mali. The weary commandos had just spoken to elders near the village of Tongo Tongo after sifting through a deserted campsite, seeking intelligence on an elusive terrorist operative. But it was a dry hole; whoever was there had since moved along. As the mid-morning sun bore down, the commandos settled in for the 110-mile drive.

Despite Beijing’s Denials, Proof Emerges Of China Planning Diversion Of Brahmaputra Waters

by Jaideep Mazumdar

The economic, military and demographic benefits of this project for China far outweigh the costs it will incur and the censure it will earn from India and other countries. Since early October, people living on the banks of the Siang (as the Yarlung Tsangpo is called once it enters India in Arunachal Pradesh’s Upper Siang district) have found the usually crystal clear waters of the river turning turbid and slushy. The Siang, teeming with fish, turned unsuitable to even bathe in. And soon, the water level of the river also started falling appreciably.

CHINESE MARITIME STRATEGY FOR THE INDIAN OCEAN

By David Scott

Chinese maritime strategy for the Indian Ocean reflects a couple of simple inter-related planks; espousal of a “two ocean” navy and espousal of the Maritime Silk Road. 2017 has witnessed important consolidation of each maritime plank. Each plank can be looked at in turn.

“Two Ocean” Navy

Will Pakistan's Support for Terrorists Destroy Its Relationship with America?

Michael Kugelman
Source Link

On December 3, U.S. Secretary of Defense James Mattis will visit Islamabad. It’s expected to be a short sojourn; he likely won’t be there for more than a few hours. This isn’t particularly surprising. Neither side has been in the mood for long and warm conversations lately, and especially since August, when U.S. President Donald Trump announced a new South Asia strategy that demanded—in no uncertain terms—that Pakistan go after militants on its soil, such as the Afghan Taliban and Haqqani Network that target Americans in Afghanistan, and that called on rival India to step up its role in Afghanistan. Predictably, Islamabad was not pleased.

Pakistan’s Emboldened Islamists

Mubaraz Ahmed

Hardline Islamists brought the Pakistani capital to a standstill for several weeks in November in protest against amendments to the country’s electoral oath. The government pointed out that the change, which was subsequently reversed, was due to nothing more than a clerical error. Those leading the charge, however, felt the move was part of a calculated, coordinated conspiracy to undermine Pakistan’s fundamental Islamic values.

Will Pakistan's Support for Terrorists Destroy Its Relationship with America?

Michael Kugelman

On December 3, U.S. Secretary of Defense James Mattis will visit Islamabad. It’s expected to be a short sojourn; he likely won’t be there for more than a few hours. This isn’t particularly surprising. Neither side has been in the mood for long and warm conversations lately, and especially since August, when U.S. President Donald Trump announced a new South Asia strategy that demanded—in no uncertain terms—that Pakistan go after militants on its soil, such as the Afghan Taliban and Haqqani Network that target Americans in Afghanistan, and that called on rival India to step up its role in Afghanistan. Predictably, Islamabad was not pleased.

Interreligious Tension in South and Southeast Asia

By Sabina Stein for Center for Security Studies (CSS)

Interreligious tensions between Buddhist majorities and Muslim minorities in Myanmar, Sri Lanka and Thailand remain high. So how should domestic and international actors respond to further peace? In this still topical piece, Sabina Stein suggests that efforts that just focus on strengthening the rule of law and security in the region will not be enough. Indeed, she suggests a more fruitful approach might lie in greater engagement with Buddhist nationalism to understand its concerns and address its fears.

China has a plan to rule the world

By David Ignatius 

The friendly words exchanged between Presidents Trump and Xi Jinping this month softened the edge of a Chinese economic and military buildup that a recent study commissioned by the Pentagon described as “perhaps the most ambitious grand strategy undertaken by a single nation-state in modern times.” At the Beijing summit on Nov. 9, Xi repeated his usual congenial injunction for “win-win cooperation,” and Trump responded in kind, calling Xi “a very special man.” Trump also complained about the Chinese trade surplus, but the visit was mostly a serenade to Sino-American cooperation.