28 March 2018
Are You Ready for the Third Digital Revolution?
US power grid needs defense against looming cyber attacks
Threat From Cyber Hackers Is Growing, U.S. Grid Regulator Says
Ari Natter
Hackers increasingly threaten sites in the U.S. ranging from nuclear power plants to water processing systems, according to a member of the Federal Energy Regulatory Commission, adding his voice to warnings from several agencies and officials in recent weeks. "Cyberattacks have the potential to cause significant, widespread impacts on energy infrastructure," Commissioner Neil Chatterjee said Friday in an emailed response to questions. "Sophisticated hacking tools are becoming more widely available, and cyber threats are constantly evolving, making such attacks more versatile." Chatterjee’s remarks underscore the alarm growing after the FBI and the Department of Homeland Security issued a report earlier this month saying that Russian hackers have been attacking the electric grid, power plants, air transportation facilities and targets in the commercial and manufacturing sectors -- attempting to gain remote access or install malware or make spear phishing attempts.
This KGB Chief Rang the Alarm About Russia-U.S. Cyberwars. No One Listened.
By SIMON SHUSTER

Was Destructive ‘Slingshot’ Malware Deployed by the Pentagon?
By JASON C. DITZ
Cambridge Analytica Scandal And Facebook
from Challenger Gray and Christmas
Comparing The 25 Most Notable Cryptocurrencies
While Bitcoin remains the undisputed bellwether for digital currencies, it's also fair to say that the entire crypto landscape has been changing dramatically over the last year. New coin and token offerings have raised billions of dollars, innovative ideas are capturing the attention of investors, and there are now 20+ cryptocurrencies that have at least $1B in market capitalization.
These Countries Generate The Most Electronic Waste
by Felix Richter
Technology plays an increasingly large role in our day-to-day lives and many people constantly strive to own the latest and shiniest gadgets. But what happens to the devices once they're no longer up-to-date? Some are sold, some are properly recycled, but many just end up as undocumented e-waste. According to The Global E-waste Monitor, a report published by the United Nations University, the International Telecommunication Union and the International Solid Waste Association, humanity generated 44.7 million metric tons of e-waste in 2016, which is equivalent to 6.1 kilograms per person.
27 March 2018
India Struggles With Its Strategy to Becoming a Great Power
By Sarang Shidore

The rise of China and a dangerous impasse with Pakistan pose new challenges to New Delhi and are pushing a reluctant India into a closer partnership with the United States.
Despite key successes, India's economic problems are huge, and they remain the biggest barrier to rising to great power status.
India’s most vital hub city isn’t in India
Afshin Molavi
Look up at the departures screens at any major Indian airport and you are likely to see a familiar pattern: Dubai and Abu Dhabi appear repeatedly on the flickering displays. Roughlyone in three international passengers in India are either heading to or arriving from the United Arab Emirates. Yachts dock at the Dubai Marina in Dubai, UAE. Dec. 11, 2017. Many Indian passengers use Dubai, Abu Dhabi or, increasingly, Sharjah as hub airports, connecting in the UAE to flights bound for Europe, North America, or elsewhere in Asia. Now that the UAE has become India’s gateway to the world, the two countries are also developing a strategic alliance that could reshape geopolitics across South Asia and the Middle East.
Is Strategic Alliance Between Iran And Pakistan Possible? – Analysis
By Hesamoddin Hojjatzadeh*
To answer this question, we must first see what the concept of “strategic alliance” is. According to some definitions, those people or countries are called strategic allies, who have commonalities in one of several financial, political, military and cultural fields and are willing to take advantage of each other’s potentialities and achievements in these fields and benefit each other. The key point in a strategic alliance is that while benefitting by that alliance, the two sides must have mutual confidence in each other. It is also assumed that they should not be affected by pressures and suggestions from other parties and should take no steps against their strategic ally.
Joint Chiefs chairman Joseph Dunford says that he sees signs of progress in Afghan war. But where?
In fits and starts, for nearly a decade, the U.S. has talked about and struggled to make progress on building an Afghan military that can take control of its own nation’s security and lay the groundwork for a stable government.
This time, they think they have it right.
After five days criss-crossing Afghanistan, meeting with everyone from the Afghan president to the new American trainers on the ground, Marine Gen. Joseph DunfordJr. headed home Friday with a palpable sense of optimism.
How Much Have the Chinese Actually Taken?
James Andrew Lewis
President Trump plans to announce at least $50 billion worth of tariffs and other penalties on China for its theft of intellectual property (IP), technology, and trade secrets. The administration says this theft has cost the U.S. economy billions of dollars in revenue and thousands of jobs. These assertions of loss are correct. Until recently, the United States probably lost between $20 billion and $30 billion annually from Chinese cyber espionage. This does not count the losses from traditional espionage (e.g., using agents). The cumulative cost may reach $600 billion, since this kind of espionage has been going on for more than two decades. Any estimate has to take into account that some stolen IP cannot be turned into products, making the loss in these instances zero. In other cases, however, the victim company suffers revenue losses for years to come. Chinese companies are getting an illegal “subsidy”; they can spend less on R&D, since they can access U.S. research. The range of Chinese economic espionage, from simple household goods like wooden furniture and house paint to the most advanced high-tech products, is part of the explanation for China’s rapid growth.
China's National People's Congress Confirms the Era of Xi
By Bao Pu

Xi's steady consolidation of power marks a return to one-man rule in Chinese politics.
Though the current president arguably commands more authority than almost any other leader in the history of the People's Republic of China, his chief objective is the same as that of his predecessors: to preserve the power of the Chinese Communist Party.
Can the Chinese Communist Party Learn from Chinese Emperors?
Yuhua Wang
In 1912, at the age of 19, Mao Zedong’s high school teacher gave him a book that became his lifelong favorite. He read it during the Long March, in his cave house in Yanan, and during his train rides across China. A copy of the book could always be found on his bedside table so he could read it before sleep. He told people that he had read it seventeen times, and he frequently referred to the book during conversations with Party officials. The book is Comprehensive Mirror in Aid of Governance, which was edited by Sima Guang, an intellectual and politician in the Northern Song dynasty, and published in 1084. It is a 294-volume, three-million-word chronological narrative of China’s history from 403 BCE to 959 CE. The emperor asked Sima to write this book to examine the lessons learned from previous emperors, so that future emperors could learn from them, avoid their mistakes, and become better rulers.
Chinese Troops On Border With India Will Now Be Controlled By Its Army

Is Abdulla Yameen Handing Over the Maldives to China?

The War in Iraq Isn’t Done. Commanders Explain Why and What’s Next
BY KEVIN BARON
ISIS isn’t defeated, yet. The U.S. shouldn’t leave, yet. Fifteen years on, and Iraq still isn’t done, yet.
But where are we? What’s left to do? And will anything be different this time around?
“I honestly don’t know,” says Col. James Kaio. An officer in the New Zealand Army, Kaio is in charge of training Iraqi forces for the ISIS war, better known as Operation Inherent Resolve. But he was one of about a dozen senior U.S., Iraq, and coalition commanders here who gave a strong view of Iraq’s immediate security future, if perhaps less so of the country’s political future.
South Korea’s Civilian Vulnerabilities in War
By Anthony Cordesman
The Broader Range of North Korean Threats
Any effort to look beyond North Korea’s nuclear threat must address the fact that we live in an age of unconventional and asymmetric warfare, and one in which that warfare may take a political and/or economic form or be prolonged and a war of attrition. It must also consider the grim lessons of recent wars. The cost to civilians may go far beyond the number of dead and wounded from direct military attacks in some relatively brief, intense conflict. It may be economic, it may be the impact of being turned into refugees and displaced persons, and it may be a tremendous loss of national wealth, security, and the services that support modern urban life, education, and health.
To Russia With Caution
H.R. McMaster Worked for Me. His Retirement From the Military Reveals A Lot About President Trump
By JAMES STAVRIDIS

Toward Effective Air Defense in Northern Europe
Philip Breedlove contends that while NATO has taken important steps in northern Europe to respond to Russia’s recent assertiveness, these efforts are insufficient without additional enablers. Indeed, he believes that the establishment of an integrated and robust air defense for the Baltic Sea region is the next logical step to increase defense and deterrence in the region. What’s more, he here outlines seven recommendations on what the Alliance and the Baltic states could do to help achieve this goal.
Climate Conflicts: Myth or Reality?
By Hayley Stevenson

Too Close for Comfort: European Geostrategy and the Transatlantic Alliance
By Jeremy Shapiro

The world is descending into tyranny
By Ralph Peters

NATO’s Achilles Heel: Russian Political Warfare
LeAnne N. Howard, Derek Reveron
The Facebook breach makes it clear: data must be regulated
Roger McNamee and Sandy Parakilas

Air Force "Hardens" Satellites to Prepare for Space War
By Kris Osborn - Warrior Maven
MARK ZUCKERBERG TALKS TO WIRED ABOUT FACEBOOK’S PRIVACY PROBLEM

Cambridge Analytica, Facebook, and the Revelations of Open Secrets
By Sue Halpern

Cambridge Analytica and Our Lives Inside the Surveillance Machine
By Adrian Chen

COUNTERING RUSSIAN AGGRESSION IN THE TWENTY-FIRST CENTURY
Lionel Beehner and Liam Collins

The New Military-Industrial Complex of Big Data Psy-Ops
Tamsin Shaw

26 March 2018
Corbusier’s Modernism to the Needs of India
By Samanth Subramanian

China’s Forced Labor Problem
By Peter Bengtsen

Subscribe to:
Posts (Atom)