27 September 2016

What cybersecurity leaders say we can do now to advance the cybersecurity workforce

SEPTEMBER 21, 2016 

The cybersecurity talent shortage is no secret. Here are ways experts are working to fix it.

It’s a dream scenario for any senior cybersecurity leader: given $100 million tomorrow, what would you do? 

Air Force Major General Christopher Weggeman didn’t hesitate.

Asked how he’d spend a sudden surge of new funds, the Air Force’s cyber commander told the Billington Cybersecurity Conference in Washington, D.C. last week that his request would be clear and direct: new talent and new training.

“The thing I need the most in terms of capacity is trained, ready manpower,” Weggeman said. “I need a persistent training environment … And I think this is really, really important because it’s said [that] the most critical element in cybersecurity operations isn’t silicon or copper — it’s carbon. It’s manpower.”

But just as clearly as Weggeman targeted cyber talent as his main need, so too did many other Billington attendees point to the glaring deficiencies in cybersecurity talent and then clear paths forward to fixing them.

Admiral Michael Rogers, commander of US Cyber Command, offered up a major idea around helping build a more robust cybersecurity workforce: training that doesn’t take limited talent away from the mission for six months or more at a time.

Rogers called out new training capabilities among three game-changers he’s looking for to advance the government’s cybersecurity mission.

“What are the capabilities that industry can help us with that will help us ensure an adaptive, learning workforce over time?” he asked.

In the private sector, industry experts agreed that developing more talent will move more quickly when industry leaders work together.

Analysis: Chengdu J-20, The Chinese Raptor?


BY FELIX ALLEN
25th September 2016

Putin’s cyber warriors the Fancy Bears targeted government websites and the BBC in the run-in to last year’s election 

A RUSSIAN cyber attack on British government departments and TV broadcasters in the run-up to last year’s general election was thwarted by intelligence agencies, it emerged today.

GCHQ boffins halted the “imminent threat” by Kremlin-backed hackers Fancy Bears – the group behind the leak of Olympic athletes’ doping files.

5 Russian hackers targeted government departments and broadcasters including the BBC in the run-up to the 2015 general election


5 Boffins at the GCHQ spy agency thwarted the cyber attack by Putin’s cyber warriors Fancy Bears

How Far Can the U.S. Military Go to Building a Technology-Enhanced ‘Super Soldier’?

Sept. 23, 2016

How Far Can the U.S. Military Go to Building a Technology-Enhanced ‘Super Soldier’?

Technology that will have a profound, potentially revolutionary impact on the U.S. military is on the way. Some innovations—like new materials, new fuels, automation, autonomy, new manufacturing methods, 3-D printing and better energy storage—will simply make military machines faster, lighter, smarter, cheaper and more accurate. But other technologies have the potential to change and enhance humans themselves.

“We want our warfighters to be made stronger, more aware, more durable, more maneuverable in different environments,” ethicist Patrick Lin wrote in the Atlantic in 2012. Neuroscience, biotechnology, nanotechnology, robotics, artificial intelligence and new drugs may pave the way for dramatic human enhancements, whether by external devices like exoskeletons; implants that expand endurance, cognitive ability and communication; or new drugs that enhance endurance, strength, perception and cognitive ability. “Somewhere in between robotics and biomedical research,” Lin argued, “we might arrive at the perfect future warfighter: one that is part machine and part human, striking a formidable balance between technology and our frailties.” 

U.S. defense officials and military leaders are understandably interested in producing “super soldiers” using human-enhancement technology. When the United States became a global power in the 20th century, it looked for ways to exercise influence around the world and project military power with as few troops and American casualties as possible. To do this, Washington built networks of allies and partners; fielded ever-more precise weapons and better information systems; and stressed qualitative superiority over adversaries, both in human factors like training and leadership, and in technology. Qualitative superiority offset the advantages that America’s adversaries had, whether the numerical superiority of the Soviet Union during the Cold War or, more recently, the advantage that violent Islamic extremists gained by operating close to home and in familiar cultures.

Attribution of Malicious Cyber Incidents: From Soup to Nuts

September 20, 2016

Attribution of malicious cyber activities is a deep issue, about which confusion and disquiet can be found in abundance. Attribution has many aspects, and a variety of well-researched and well-executed papers cover one or more of these aspects; these papers are referenced in the body of the paper and are called out again in the Acknowledgments section. This paper tries to synthesize the best aspects of these works with some original thoughts of the author’s own into a coherent picture of how attribution works, why it is both important and difficult, and how the entire process relates to policymaking.

The primary takeaway messages of this paper are that (1) attribution has a different meaning depending on what a relevant decision-maker wants to do (i.e., attribution of malicious cyber activity can be to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity); (2) attribution is a multidimensional issue that draws on all sources of information available, including technical forensics, human intelligence, signals intelligence, history, and geopolitics, among others; (3) all attribution judgments are necessarily accompanied by some measure of uncertainty; and (4) an adversary cannot be fully confident of its ability to conceal its identity from the victim.

Fiction for the Strategist


Army Strategist Lieutenant Colonel Aaron Bazin recently posted an article on what successful strategists should read. His inclusion of fiction pieces sparked some debate. In a rebuttal, T. Greer argued that, “[s]trategic theory is in essence a theory of decision making…A strategic actor oriented around incorrect narratives or ideas (or a strategic actor which cannot update these ideas to match changing conditions) faces a severe disadvantage in competitive environments like international relations or war. My concern is that too many of the models and ideas we use to orient ourselves are complete fictions.”

I disagree. Vehemently.

I haven’t read all the fiction pieces on Colonel Bazin’s list. I’d offer a slightly modified list, but his inclusion of War and Peace, Killer Angels and Once an Eagle, Catch-22, and 1984 earn my sincere applause. My list would also include The Godfather and The Game of Thrones (whose film adaptations have been enormously successful).
STRATEGY IS NOT JUST DECISION-MAKING; ITS THE ART OF OUT MANEUVERING OTHER HUMANS.

Strategy is not just decision-making; its the art of out maneuvering other humans. And, in order to out maneuver humans, you must know them very well. So, what is the point of a story? Stories are one of the most important parts of the human experience. Humans have been telling stories since the beginning of time. Human culture is inundated with people telling stories. When you watch a show in television — its a story. When you read the newspaper — you read a story. Read a book — its a story. Go to church — hear a story. Listen to music — its a story. While works of fantasy and fiction are notreal, they are conceptualized by humans. The greatest fictions of this world are the pinnacle of human thought and imagination.

Analysis: Chengdu J-20, The Chinese Raptor?

SEPTEMBER 24, 2016

Nate “Buster” Jaros says China will have a fifth generation fighter, and its development of the J-20 (amongst other fifth gen platforms) is significant.

If you haven’t been paying much attention to the jet fighter news lately, you may have missed something big. In fact, it doesn’t get a lot of press and over the past couple of years this new emerging threat really hasn’t been on anyone’s, ahem…radar, much at all.

We’re talking about the Chinese Chengdu J-20. What some are calling “the Chinese F-22 Raptor.” Also known in some circles as the “Black Eagle.”

The J-20 is still shrouded in secrecy, and the political closed doors of modern China are not saying much either. I don’t blame them. They are catching up in technology, and in this case fighter technology, and are committed to not being left behind. China will have a fifth generation fighter, and its development of the J-20 (amongst other fifth gen platforms) is significant.

Let’s take a closer look at the J-20, based on what little information is out there today.

At first glance the J-20 looks kind of like an F-22 Raptor. Why wouldn’t it? The Chinese have beencopying Russian and American technology for decades. In some cases they have even improved on the designs. In the case of the J-20, you may have forgotten that a few years ago, terabytes of classified US documents were lost or stolen by the Chinese. These documents were essentially the “blueprints” for the F-35, and U.S. stealth technology. From that breach, it is surmised that China has been able to piece together the basic tenets of stealth technology and apply them to its modern aircraft designs.

Basics

What we currently know about the J-20 is that it is a single seat, twin engine, canard/delta design, stealthy fighter platform. There are just four copies being tested right now, with fully operational fighters predicted to be ready by 2018.

The Black Eagle has two Saturn AL-31 engines producing about 30,000 lbs of thrust each. With the possibility of more powerful Xian WS-15 engines currently in development, those are speculated to produce 44,000 lbs of thrust each. For reference, the F-22 has roughly 35,000 lbs of thrust per engine.

Is the “military mind” compatible with the values that make innovation possible?

By Brad DeWees
http://cimsec.org/


This article originally featured at The Strategy Bridge and is republished with permission. Read it in its original form here

In 1957 Samuel Huntington defined the “military mind,” or how the military sees the world and interacts with it. His definition of the military mind formed the cornerstone of his broader work on civil-military relations—The Soldier and the State. In that work Huntington claimed the ideal soldier is conservative in the classical sense. That is, the military mind emphasizes the “permanence, irrationality, weakness, and evil in human nature.”[1] More focused on vice than virtue, the military mind is suspect of human cooperation and skeptical of change. For the soldier time is the primary measure of value; the military mind favors the status quo. It is “pessimistic” and “historically inclined…It is, in brief, realistic, and conservative.”[2]
Samuel P. Huntington at the 2004 meeting of the World Economic Forum in Davos, Switzerland (Peter Lauth, World Economic Forum, Creative Commons)

Today the military mind finds itself in the company of another mind—the “innovative mind.” While the military mind is conservative the innovative mind is open to experimentation with new ideas. The military mind doubts human nature while the innovative mind trusts in collaboration. The two do not naturally mix, and yet they depend on each other, especially so the military mind on the innovative mind. The paradox of the military mind is that it is increasingly reliant on, yet incompatible with, the innovative mind. This article explores the paradox and how to manage it.

The Military Mind versus the Innovative Mind

26 September 2016

***Afghanistan's Unending Civil War

Despite Western backing, the government has been unable to suppress the Taliban and gain control of the country.
Summary

To say that Afghanistan’s security forces are weak is an understatement. But the country’s real problem is that it lacks a social contract between its various stakeholders and a government that’s able to govern. As a result, what exists is a chaotic situation in which the faction with the most power dominates the battlefield. Opposition to the Taliban is the only real factor that binds together the various factions of the current beleaguered political system, and that is not enough to prevent them from devolving into militias.Introduction

*** Coping with China’s slowdown



The China head of leading global elevator maker Kone says the country’s days of double-digit growth may be past, but market prospects there remain bright. 

When Kone entered China’s elevator market, in 1996, the Finnish multinational was embarking on a journey of extraordinary growth, with high-rises proliferating across China’s urban landscape. Today, the country provides around 35 percent of Kone’s annual revenue, which in 2015 hit €8.6 billion. Bill Johnson began serving as country manager of Kone’s China division in 2004 and in 2012 became the executive vice president in charge of the company’s newly formed Greater China division. In this interview with McKinsey’s Allen Webb and Jonathan Woetzel, Johnson shared his thoughts on China’s next phase of development, on the growth of services, and on the growing role of digitization throughout Kone’s Chinese business. 

The Quarterly: Tell us a little bit about your personal experience with the Chinese growth slowdown. 

Bill Johnson: There clearly has been a slowdown in the economy over the last 12 to 18 months, and it’s really begun to impact the elevator business. Last year was down about 5 percent in terms of units ordered, and this year we see another 5 to 10 percent decline coming in our market. 

** Pay heed to India's sensitivites including NSG and ban on Azhar Masood: Chinese politician to Xi Jinping

By Rajeev Deshpande

"Your(Jinping) ability to see beyond the curve has ensured that our party and people adjusted to the new normal of 6 per cent growth without significant discomfort," says Jeichi.

Respected President, 

The near and long term prospects for China present a unique opportunity to bring to fruition the dedication and sacrifices of the Communist Party, and realise your visionary and bold efforts to make our nation the leading economic and military power in the next decade. It is therefore time to evaluate the true worth of key partnerships and pursue strategies that will make the "China dream" a reality. 

Your ability to see beyond the curve has ensured that our party and people adjusted to the new normal of 6 per cent growth without significant discomfort. China's $11 trillion economy generates sufficient resources to protect national sovereignty in the neighbourhood and secure geo-political interests thousands of miles away. 

The courageous decision to crack down on corruption irrespective of rank and privilege and getting state owned enterprises to recognise primacy of market principles reflect your strong belief in preserving the party's legitimacy in the public eye and displays an insightful understanding of the global economy. 

** Germany Again

By George Friedman

The results of state elections in Berlin may be another indicator of an economic downturn.

My apologies for constantly returning to Germany but for the moment it is the pivot of the world. Germany is the fourth largest economy in the world, the largest economy in Europe, the lender of last resort and the foundation of European stability. If Germany weakens or destabilizes, Europe destabilizes, and it is not too extreme to say that if Europe destabilizes, the world can as well. I am confident in saying I am not making too much of a small thing. In Sunday’s state election in Berlin, the Social Democratic Party (SPD) got 21.6 percent of the vote. Chancellor Angela Merkel’s Christian Democratic Union (CDU) got 17.6 percent. A party called Die Linke (or The Left) got 15.6 percent and the Greens got 15.2 percent, while the liberal Free Democrats garnered 6.7 percent. The anti-immigration party Alternative for Germany (AfD) won 14.2 percent.

The difference between AfD and the party that got the highest percentage of the vote was just 7.4 percent. Three other parties were jammed between these two. In other words, the electorate in the Berlin region is completely fragmented. Put another way, the mainstream SPD and CDU together got a little over a third of the vote. The rest went to anti-establishment parties, with the two left-wing parties, Die Linke and the Greens, getting over 30 percent combined and the anti-immigration party getting just under 15 percent.

Arunachal Pradesh - Govt Prepares Plans For Key Border Road-Link To Tawang


A government body has approved the construction of a road along the Indian border with China in the Indian state of Arunachal Pradesh. The road, apart from improving accessibility to border areas, will connect Tawang in western Arunachal Pradesh to Vijaynagar in the south-eastern part of the state.

Informing a group of journalists about the decision, Union Minister Kiren Rijiju stated that a final approval from the cabinet will be sought after the Transport Ministry prepares a detailed project report. He also added that the Defence Ministry has cleared the project, realigning the road in two portions namely Mago to West Kameng and Tuting-Singa-Anini.

During the last decade, the central largely government neglected infrastructure development along the border. The road will provide better access to areas that are inaccessible and help in reducing Chinese incursions into Arunachal that have increased in recent years.

With Pratham Launch, India Will Demonstrate Advances In Space Technology Yet Again


The Indian space agency, Indian Space Research Organisation (ISRO), will launchthe ‘Pratham’ satellite, designed and made by IIT-Bombay students, along with seven other satellites on Monday (26 September). Of the eight satellites, five are foreign, and the three domestic ones include the weather satellite SCATSAT-1.

The eight satellites will be launched from a single Polar Satellite Launch Vehicle (PSLV) rocket that will blast off from ISRO’s rocket port at Sriharikota in Andhra Pradesh on Monday morning.

The satellite programme at IIT-B was conceptualised in 2008 with the aim of making the institution a centre for space science and technology research. The objective of this programme at IIT-B is to empower students with the skill sets required to develop a satellite.

Pakistan’s Tactical Nuclear Warheads and India’s Nuclear Doctrine

Gurmeet Kanwal

In an endeavour to preserve strategic stability, India, a reluctant nuclear power, has demonstrated immense restraint despite grave incitement from Pakistan. In stark contrast, ever since it became a nuclear-armed state, Pakistan’s behaviour has been marked by brinkmanship, with provocation bordering on actions that could lead to large-scale conventional conflict with nuclear overtones. Recent developments in Pakistan’s nuclear arsenal have been of the same destabilising pattern.

As part of its quest for ‘full spectrum deterrence’, Pakistan has developed the Hatf-9 (Nasr) short-range ballistic missile (SRBM). Pakistan claims the Hatf-9 is equipped with a tactical nuclear warhead (TNW) and is intended for battlefield use as a weapon of warfighting. The Pakistan Army appears to believe that a few TNWs can stop the advance of Indian forces across the International Boundary (IB) into Pakistan. By employing TNWs on the battlefield, the Pakistan Army hopes to checkmate India’s ‘Proactive Offensive Operations’ doctrine, which is colloquially called the ‘Cold Start’ doctrine.

This brief analyses the efficacy of TNWs as weapons of warfighting. It examines the likely impact of its use by Pakistan on the columns of the Indian Army advancing across the IB and, consequently, on India’s nuclear doctrine.

The Explosive India–Pakistan Situation

WALTER RUSSELL MEAD

The explosive situation in Kashmir is getting worse, and India and Pakistan, the two nuclear powers most likely to find themselves at war with each other, are closer to armed conflict now than in many years. The New York Times reports:

Escalating tension over the contested Kashmir region is presenting a challenge to Prime Minister Narendra Modi of India, who needs regional peace to reach his principal goal of economic revival there. But Indian citizens have been clamoring for a response to what they say is a provocation by Pakistan.

The tension reached a boiling point on Sunday when militants attacked an army base in the Indian-controlled side of Kashmir and killed, at last count, 18 soldiers, setting off a war of words between the two nuclear powers, which have fought three wars in recent decades. India accuses the militants of having links to Pakistan.

The situation not only risks economic growth but could also send two nations skidding into a nuclear war.

Why India Must Follow Kshatriya Dharma To Defeat ‘Adharmi’ Pakistan

David Frawley 

India today is faced with a hostile Pakistan. In the face of such dire challenges, a strong Kshatriya Dharma is required, which obviously means not only diplomacy but also the possible use of force.

Chhatrapati Shivaji Maharaj was practising Lord Krishna’s ahimsa when his armies fought against the tyrannical rule of Aurangzeb in the seventeenth century. The Hindu resistance to foreign rule that continued for over a thousand years, from the first Arab invasion in the eighth century to the British rule in the twentieth century, was rooted in the true meaning of Vedic ahimsa – which is actively working to remove the forces of adharma from the world, even if force is required.Ahimsa as merely avoiding the use of force, or not using weapons, is something any coward can do.

True ahimsa does not mean non-violence under all circumstances, nor does it require surrender to the forces of darkness in order to avoid conflict. It means reducing the amount of harm going on in the world, which requires a proactive policy. It does not imply only passive resistance but also empowers active resistance when necessary. In this regard, the Indian freedom fighters that used force against the unrighteous British rule were also practising ahimsa, though perhaps not of the Gandhian variety.

America Must Stand by India—and Pressure Pakistan

C. Christine Fair

Washington’s mistake is indulging Pakistan’s bad behavior, while putting the squeeze on India.

This week, Pakistan-backed militants attacked a military base in Uri, Kashmir. It was the deadliest attack that India has suffered in decades. It has come after months of Pakistan-backed unrest in Kashmir following the killing of a well-known Pakistan-backed terrorist commander, Burhan Wani, by Indian security. Wani worked for the Hizb-ul-Mujahideen (HM), which the United States, the European Union and India have designated as a terrorist organization. Pakistan’s civilian-led government denounced his killing as “deplorable and condemnable” in yet another exhibit of Pakistan’s wanton and indefatigable support of terrorism. Pakistan’s Prime Minister Nawaz Sharif debased himself by praising the terrorist on the floor of the United Nations during his address to the General Assembly, calling him a symbol of the Kashmiri “intifada.”

Water Availability in Pakistan

By Col Harjeet Singh


There appears to be a growing perception of Indian wrongdoing on water in Pakistani minds. While India–Pakistan relations are not on even keel, another canard can only add to the already strained situation. That the issue needs to be understood objectively and shorn of the hype, on both sides of the border, is self-evident.

The Case for Isolating Pakistan

Vivek Mishra

The international isolation that Pakistan currently faces is unprecedented by most measures. Its misdeeds include its: inability to control terrorist activities both inside and outside the country; the nexus of government, intelligence, terrorists and the army; terrorist spillover to neighboring countries; army and intelligence-backed infiltration bids; and most subtly, its all-weather bonhomie with China.

Consider: the United States, which has been hinting for some time now that the bilateral grants flowing from it to Pakistan under the Coalition Support Fund are contingent on its abilities and effectiveness to reign in terror emanating from its soil, has blocked $300 million in concessional military aid to Pakistan. The Pentagon is not happy with Pakistan’s approach to containing the dreaded Haqqani network, which has been carrying attacks on civilians and also targeting U.S. interests in Afghanistan. In a recent example, the United States has added the Pakistani militant outfit Jamaat-ur-Ahrar to its list of global terrorists, triggering sanctions against a group that has staged multiple attacks on civilians, religious minorities and soldiers. These steps by the United States have been read by most not just as a financial obstruction, but also as tightening of the diplomatic noose on Pakistan by the United States. This was preceded by the United States making it clear that it was not willing to sell subsidized F-16 fighter aircraft to Pakistan under the foreign military sales program. As an almost immediate follow-up, India struck a deal with the U.S. defense major Lockheed Martin to avail “most advanced” F-16 fighter jets by 2019-20. Under the deal, the company will be manufacturing the latest version of the jets – F-16 Block 70/72 – “exclusively” in India.

Pentagon Official Admits Taliban Still Control About 30% of Afghanistan After 15 Years of War


U.S.-backed forces control 70 percent of Afghanistan, U.S. military chief says

Local security forces control 70 percent of Afghanistan, a senior U.S. military official said on Thursday, suggesting that the Taliban and other militants hold almost a third of that nation after 15 years of U.S. and NATO efforts to secure it.

Gen. Joseph Dunford Jr., chairman of the Joint Chiefs of Staff, told members of the Senate Armed Services Committee that Afghan security forces had taken more casualties “than we’re comfortable with” and said they remained behind in what was required in key areas including air power, special operations and intelligence.

The U.S. military did not immediately provide figures for how many Afghan soldiers and police have died as they battle a still-powerful Taliban.

“On balance, I would call what is going on right now between the Afghan national defense security forces and the Taliban [as] roughly a stalemate,” Dunford, who commanded U.S. and NATO forces in Afghanistan from 2013-2014, told lawmakers.

Dunford also said that Afghan security forces would likely be able to secure the country if they receive continued support from the United States and its partners. Even though its combat role is officially over, the U.S. military has repeatedly expanded its mission in Afghanistan to ensure that local forces can beat back militants.

Afghan Government Signs Peace Deal With Taliban Warlord Gulbuddin Hekmatyar

By Ivan Watson

Kabul, Afghanistan (CNN)After months of delays, Afghan government negotiators signed a peace deal Thursday with an insurgent faction led by one of the country's most notorious warlords.

The deal was signed at a ceremony attended by negotiators, the President's national security adviser, and representatives of the Hezb-i-Islami faction of Gulbuddin Hekmatyar.

Afghan and US officials applauded the agreement, but a prominent human rights organization strongly criticized the deal.

In a statement, the US Embassy called Thursday's accord "a step in bringing the conflict in Afghanistan to a peaceful end."

Zika And Health Security In Southeast Asia – Analysis

By Sunil Unnikrishnan and Mely Caballero-Anthony* 
SEPTEMBER 22, 2016

This is a transmission electron micrograph (TEM) of Zika virus, which is a member of the family Flaviviridae. Virus particles are 40 nm in diameter, with an outer envelope, and an inner dense core. Photo Credit: CDC/ Cynthia Goldsmith, Wikipedia Commons.

As Southeast Asia continues to see reports of new Zika outbreaks, this latest case of public health threat underscores the importance of continued vigilance to new emerging diseases, as well as deepening regional cooperation in ensuring health security for states and societies in ASEAN and beyond.

Since the World Health Organisation (WHO) declared Zika – a hitherto little-known virus – as a Public Health Emergency of International Concern (PHEIC) in February 2016, Zika cases have spread in over 70 countries and territories. Brazil recorded the highest number of cases: 78000 confirmed infections. Southeast Asia has not been spared.

Singapore has already reported 383 cases, including 8 pregnant women, while cases have also been reported in Philippines and Thailand. The Zika outbreak once again highlights the need for continued disease surveillance and control in the region, while underscoring the importance of having a clear and comprehensive public health strategy in dealing with the threat of emerging diseases to health security.
Impact of Zika

Illness due to the Zika virus is relatively mild in most cases. But it is of serious concern to pregnant women: in about 1% of Zika-affected pregnancies, the infants are born with microcephaly (unusually small heads). Microcephaly is typically accompanied by neurological damage, resulting in lifelong health burden. In rare cases, the infection leads to Guillain-Barré syndrome, a severe neurological condition that can require long periods of hospitalisation. Furthermore, uncertainty about sexual transmission complicates family planning for couples, foreshadowing potential demographic problems for a country.

India’s Grand Strategy to counter Chinese aggression

By Bharat Lather


Fifty four years ago, on October 20, 1962, with the world’s terrified gaze fixed firmly on the U.S.-Soviet nuclear standoff in Cuba, China attacked India. Provoked by a territorial dispute and tensions over Tibet, the war was brief and China emerged victorious. Beijing declared a unilateral ceasefire on November 21, and the PLA withdrew to its pre-war positions.

India still sees China as a nationalist, aggressive power which seeks to dominate Asia and one that might once again strike unexpectedly, just as it did in 1962.

Chinese space station to fall out of sky. Who regulates these things anyway?

By Ben Rosen

When China launched the Tiangong-1 into orbit in 2011, the country heralded its first space station as a milestone in its bid to be a superpower in space and on Earth.

Six years later, the station will meet an unglamorous, fiery death, apparently with China not at the wheel.

Officials appear to have confirmed the fears of astrophysicists and amateur astronomers that the country has lost control of the 34-foot-long, 8.5 metric ton spacecraft. The unmanned station will likely crash into Earth in late 2017, but scientists don't know where that would be, Chinese officials said in a news conference in the Gobi desert Wednesday.

The odds of debris from the craft injuring a particular person on Earth are less than those of that person being struck by lighting. But China’s apparent admission highlights a question faced by every spacefaring nation: How do you develop end-of-mission plans to avoid posing any threat to humans or other spacecraft? It’s a question even the United States has failed to resolve in the past, ever since parts of Skylab, its first space station, famously crashed in a sparsely populated part of Australia.

Suspicion Shadows ‘Albanian Terror’ Trial In Macedonia – Analysis

By Semra Musai 
SEPTEMBER 22, 2016

The trial of 37 alleged members and accomplices of an ethnic Albanian terror group that battled Macedonian police in Kumanovo last year has been marred by allegations about false witnesses and police brutality.

The trial of the 29 alleged gunmen and their eight alleged accomplices, accused of being part of or aiding a terrorist group that fought the security forces during a deadly two-day shootout in the northern Macedonian town of Kumanovo in May last year, has been hit by defence claims that prosecution witnesses have been coached to lie in court.

The trial has been going on behind closed doors, but Artene Ademi Iseini, the lawyer for 11 of the defendants, claimed that protected witnesses who have been giving testimony have been coached by the prosecutors to echo the authorities’ version of what happened in Kumanovo.

“Prosecution witnesses are describing in a very cynical way things that probably the prosecution itself taught them what to say. Their testimony is contradictory, confusing and does not support the indictment. In some cases it is compromising for the police and the prosecution,” Iseini told BIRN.

More than a year after the Kumanovo shootout in May 2015, which left 18 people dead, Iseini said that the truth about what happened during the two-day gun battle remains unclear.

The prosecution says the group devised a plan to form a terrorist group and acquired cash, weapons, ammunition and medical supplies.

How the US Intelligence Community Confirms a Terrorist ‘Kill’


Islamic State took an unusual step in late August when it announced that its spokesman and external operations leader Abu Muhammad al-Adnani had been killed near Aleppo, Syria.

Washington had offered a $5 million reward for Adnani, who had a hand in the gruesome November 2015 Paris attacks and other assaults. Adnani likely met the business end of a Hellfire missile fired from a Reaper drone in what the Defense Department labels a “precision strike.” He is one of the highest-level targets of the 120 or so senior Islamic State leaders the coalition has killed in the last few years.

Yet the death of a targeted terrorist is often shrouded in mystery. Determining whether U.S. weapons hit their mark is a complex endeavor. Pentagon statements couch words like “killed” in euphemisms like “taken off the battlefield.” Complicating matters, militant groups might announce a leader’s death even if the target escaped harm.

So how can the American public know if Adnani – or any senior Islamic State leader, for that matter — is really dead? How does the Pentagon determine that a strike has successfully taken out its target?

The most reliable sign for those not privy to classified data: The State Department removes a target’s name and photograph from its “most wanted” list. The U.S. government runs the website, Rewards for Justice, where it offers $1 million to $25 million for information that leads to those it classifies as terrorists. Once the administration is certain a target is dead (or locked up), it deletes that name from the list.

Troubling Times for Regional Stability in Russia

By Antonia Colibasanu

The Kremlin is searching for ways to hold the country together in the face of a struggling economy.

The Russian government announced yesterday that, considering the difficult fiscal environment, it plans to increase the use of interregional budget transfers to help poorer regions. Russian regions have seen their debt increasing during the last few years and have reached out to commercial banks for loans and bond issues to get cash and service some of their debt, even though Moscow has offered them cheap loans.

Russia’s vast geography has always been a challenge for its leaders. The country’s immense landmass is disproportionally populated because of its climate. Much of the Russian population lives north of the 50th parallel, which is even further north than Canada’s main population centers. This makes agricultural production scarce. Population density and urbanization rates are higher in the western regions, which have seen greater commercial development, considering their access to river routes. These factors have resulted in dramatic differences between rural and urban Russia and between western and eastern regions. These differences are highly problematic during times of economic crisis.

STRATCOM Nominee Favors Boosting Cyber Command, Nuke Modernization

By: Joe Gould

WASHINGTON — US Cyber Command should be elevated to an independent, unified combatant command, the nominee to head US Strategic Command told lawmakers Tuesday. 

Air Force Gen. John Hyten, at his confirmation hearing before the Senate Armed Services Committee, said the evolution of the cyberthreat means its “simply a matter if when, not if,” US Cyber Command is elevated. During the more than 90-minute hearing, Hyten also threw strong support behind modernizing the nuclear triad.

Hyten commands Air Force Space Command in Colorado Springs, Colorado.

The White House is reportedly moving toward separating US Cyber Command from the National Security Agency, a step touted by proponents as easing responses to threats, budget prioritization, strategy and policy. 

A convenient terrorism threat

Daniel L. Byman

Many governments, including several important U.S. allies, simultaneously fight and encourage the terrorist groups on their soil. This two-faced approach holds considerable appeal for some governments, but it hugely complicates U.S. counterterrorism efforts—and the United States shouldn’t just live with it. This post originally appeared on Lawfare.

Not all countries that suffer from terrorism are innocent victims doing their best to fight back. Many governments, including several important U.S. allies, simultaneously fight and encourage the terrorist groups on their soil. President George W. Bush famously asked governments world-wide after 9/11 whether they were with us or with the terrorists; these rulers answer, “Yes.”

Some governments—including at times Russia, Egypt, Turkey, and Pakistan among others—hope to have it both ways. They use the presence of terrorists to win sympathy abroad and discredit peaceful foes at home, even while fighting back vigorously enough to look plausible but not forcefully enough to solve the problem. This two-faced approach holds considerable appeal for some governments, but it hugely complicates U.S. counterterrorism efforts—and the U.S. shouldn’t just live with it.

We’re not talking about straightforward state sponsors of terrorism like Iran, which brazenly supports Hezbollah and others, or basket-case quasi-states like Somalia, whose government is too feeble to provide basic services, let alone defeat a rampaging terrorist group like al-Shabaab. Here we’re talking about governments that are at least semi-competent and notionally oppose the terrorists, yet still think it’s in their interests to give militants some rope or even tacitly aid them.

These governments come in various shades of democracy and autocracy, but they all put their international ambitions or domestic politics above sustained counterterrorism. As these leaders see it, the presence of terrorists among their foes discredits the entire opposition—including peaceful groups.

Red Atlantic: Russia Could Choke Air, Sea Lanes To Europe

By SYDNEY J. FREEDBERG JR.


NATIONAL HARBOR: Russia could hinder US reinforcements headed to Europe in the event of a major war, warned the recently retired Supreme Allied Commander, Gen. Philip Breedlove. It’s well known Russian radars, missiles, and strike planes — “Anti-Access/Area Denial” systems — threaten ships and aircraft across wide swathes of the Black Sea, Eastern Europe, and the Baltic. But Gen. Breedlove’s worries are on a wider scale: He’s anxious about the Atlantic.

CJCS Dunford Calls For Strategic Shifts; ‘At Peace Or At War Is Insufficient’

By COLIN CLARK

NATIONAL HARBOR: The increasingly “adversarial” relationships with Russia and China are forcing the Pentagon to classify its previously public National Military Strategy, the Chairman of the Joint Chiefs of Staff says. Classification will allow bolder and more specific discussions of how to manage those relationships and our responses to them, Gen. Joe Dunford told the annual Air Force Association conference here.

“This year’s National Military Strategy will be classified so we can focus on these four-plus-one challenges and the five domains we are dealing with,” Dunford told the audience at the annual Air Force Association conference.

(“Four plus one” refers to four nation-states — Russia, China, Iran, and North Korea — plus the enduring but ever-mutating problem of Islamic extremism, once exemplified by al-Qaeda but now embodied by the so-called Islamic State, aka Daesh. The five domains are the land, sea, air, space, and cyberspace).

Russia (our top threat), China, and Iran use “economic coercion, political influence, unconventional warfare information ops, cyber ops to advance their interests and they do it in a way that they know we don’t have an effective response,” Dunford said. “They, unlike us, are able to integrate the full range of capabilities their states possess to advance their interests.”