November 24, 2017: Pakistan has accepted an American offer to cooperate and quickly deal with any cross border activity in eastern Afghanistan that results in Islamic terror attacks in Pakistan. Earlier in the week the U.S. military commander in the region offered a solution and told Pakistan that American forces would be made available to deal with any Islamic terrorist groups Pakistan feels are hiding in eastern Afghanistan and have, increasingly, been attacked with Pakistani artillery fire (rockets, mortars and howitzers firing across the border). Afghans feel the Pakistanis will invent an excuse to reject or sabotage the American offer because over the years Afghans in borders areas regularly hit by the Pakistani rockets and shells have told Afghan and American Special Forces troops that the Pakistanis often fire when there is no one out there or after anti-Pakistan Islamic terrorists have passed through the area days or weeks earlier. Sparely populated regions like Kunar province have plenty of hills and forests to hide in, and few roads to quickly bring in a lot of Afghan soldiers or police. The American offer is backed by the fact that the U.S. has helicopters, UAVs and other aircraft available to quickly act on Pakistani complaints. This could get interesting.
26 November 2017
Rohingya Crisis: Will China’s Mediation Succeed?
By: Sudha Ramachandran
During his visits to Dhaka, Bangladesh and Naypyitaw, Myanmar on November 18 and 19, China’s Foreign Minister Wang Yi put forward a three-phase plan to resolve the Rohingya crisis. First, Wang called for a ceasefire in Myanmar’s devastated Rakhine state, which is at the center of the crisis. Aimed at restoring order and stability in the Rakhine state, the ceasefire is expected to halt the flow of Rohingya refugees to Bangladesh. China envisages that this will pave the way for the second stage: negotiations between Myanmar and Bangladesh to address the refugee problem. The third and final stage will involve the economic development of the Rakhine state to address the underlying causes of the violence (Global Times, November 20). China’s plan has reportedly found acceptance in Naypyitaw and Dhaka and marks the start of a new phase in Beijing’s involvement in the Rohingya conflict (FMPRC, November 20). China’s role has hitherto been limited to providing humanitarian aid to the Rohingya refugees and protecting Myanmar from international censure. Why is China now adopting a mediatory role in the conflict? And is it likely to succeed in bringing peace to a restive region?
China and the World Dealing With a Reluctant Power
By Evan A. Feigenbaum
In 2013, China launched an initiative to establish a new multilateral development institution, the Asian Infrastructure Investment Bank. The AIIB, Beijing argued, could help fill a multitrillion-dollar gap in financing for railways, roads, power plants, and other infrastructure in the world’s fastest-growing region. But the United States treated China’s proposal as a challenge to the existing regional and global development institutions that it had helped establish in the decades after World War II. Washington not only refused to join the bank itself but also launched a quiet diplomatic campaign to dissuade its allies from doing so either.
Saudi Arabia’s Arab Spring, at Last
By THOMAS L. FRIEDMAN
I never thought I’d live long enough to write this sentence: The most significant reform process underway anywhere in the Middle East today is in Saudi Arabia. Yes, you read that right. Though I came here at the start of Saudi winter, I found the country going through its own Arab Spring, Saudi style. Unlike the other Arab Springs — all of which emerged bottom up and failed miserably, except in Tunisia — this one is led from the top down by the country’s 32-year-old crown prince, Mohammed bin Salman, and, if it succeeds, it will not only change the character of Saudi Arabia but the tone and tenor of Islam across the globe. Only a fool would predict its success — but only a fool would not root for it.
ISIS’ Intelligence Service Refuses to Die
Vera Mironova, Ekaterina Sergatskova, and Karam Alhamad
In the darkness of a Mosul safe house in which ten Iraqi soldiers slept, bluish light still emanated from the mobile devices of two intelligence officers busy locating suicide cars, IEDs, and Islamic State (ISIS) bases, and tracking down the names of ISIS members. Providing that information were civilians deep in ISIS territory. On the other side of the battle, the same process was happening in reverse. And those operations were, in many ways, far more sophisticated. Even now that the terrorist organization is disintegrating, its intelligence bureau still presents a major challenge.
THE INFORMATION WAR
The Caliphate Is Destroyed, But the Islamic State Lives On
BY MICHAEL P. DEMPSEY
With technology, these researchers are figuring out North Korea’s nuclear secrets
By Anna Fifield
Stalingrad To El Alamein: What November 1942 Tells Us About Today's Russians - And The Brexit Mindset
by Ben Shepherd
Russia to the United Nations: Don’t Try to Stop Us From Building Killer Robots
BY PATRICK TUCKER
What the US U-turn on net neutrality means to India

The Cost Of Making The IPhone X
by Felix Richter
Nobody can get any extra information about you once you link your mobile to your UID
By RS Sharma
In November 2008, 10 members of Lashkar-e-Taiba carried out terrorist attacks across Mumbai, killing 164 persons. The attackers used at least three SIM (subscriber identification modules) cards purchased on the Indian side of the border with Bangladesh. Would the terrorists have been deterred if they could not obtain disposable SIM cards on bogus ID papers? Probably not. But the security agencies may have had a sliver of hope in nabbing them and preventing the deaths. In the dystopian view of alarmists, if we verify the subscriber’s identity using his Aadhaar number, it would destroy the privacy of citizens. That is far from the truth. What is retained by the telecom company after acquiring or verifying the subscriber’s ID is the record of authentication, not the biometric data itself. It is like a ‘verified’ tickmark in the record.
Why AI Is Tipping the Scales in the Development of Self-driving Cars
THE U.S. MILITARY IS PREPARING FOR WAR IN SPACE: WE'RE DRAFTING LAWS TO BE READY FOR IT
BY DALE STEPHENS AND DUNCAN BLAKE
A war in outer space sounds like the stuff of science fiction but it is something we need to consider. Its impact on everybody on Earth and its implications for future human space exploration would be devastating. Right now, there are laws that are relevant to the prospect of war in space, but currently it is unclear exactly how these might be applied. We and our colleagues from around the world—including experts from Australia, Canada, the U.K., Russia and China—are undertaking a multi-year project to provide a definitive guide on how law applies to military uses of outer space. The aim is to develop a Manual on International Law Applicable to Military uses of Outer Space (MILAMOS) that covers times of tension and outright hostility. The ultimate goal is to help build transparency and confidence between space-faring states.
Ransomware Attacks: An Increasingly Common Threat

Here’s how NATO is preparing for cyber operations
By: Mark Pomerleau
The alliance’s initial focus has been primarily on cyber defense; strengthening NATO’s infrastructure and member nations pledging to take concrete steps to harden their systems as well.
The NATO Communications and Information Agency, is also undergoing a major IT modernization effort mainly focused on centralization and virtualization of services.
91st Cyber Brigade activated as Army National Guard’s first cyber brigade
By Cotton Puryear
The new brigade provides training and readiness oversight for cyber units across 30 states and deploys personnel to meet the demands of growing cyber mission sets throughout the U.S. Army and Department of Defense. Virginia Gov. Terry McAuliffe and members of his cabinet joined Lt. Gen. Timothy Kadavy, director of the Army National Guard, Maj. Gen. Timothy P. Williams, the adjutant general of Virginia, as well as numerous other senior military and civilian leaders, fellow Soldiers and family members for the ceremony activating the brigade, also known as the Shadow Brigade.
Amazon’s New ‘Secret Region’ Promises Easier Sharing of Classified Data
Amazon Web Services unveiled a cloud computing region for the CIA and other intelligence community agencies developed specifically to host secret classified data.
The AWS Secret Region will allow the 17 intelligence agencies to host, analyze and run applications on government data classified at the secret level through the company’s $600 million C2Scontract, brokered several years ago with the CIA. AWS already provides a region for the intelligence community’s top secret data.
COMMISSIONING DA VINCI: DEVELOPING CREATIVITY, COMMUNICATION, AND CRITICAL THINKING IN TOMORROW’S MILITARY LEADERS
Rick Montcalm

On the Business Models of War
By Everett C. Dolman

25 November 2017
Professional Military Education - An Indian Experience
Maj Gen P K Mallick, VSM (Retd)
Professional Military Education (PME) has always been a critical component of developing military leaders. It is based on two key principles: train for certainty, so that military personnel gain and master the skills needed for known tasks and educate for uncertainty, so that they have the broad base of knowledge and critical thinking skills needed to handle unanticipated and unpredictable situations.
Litigating Tejas LCA’s quality & utility
by Bharat Karnad

Will Coca-Cola’s New India Strategy Have Fizz or Go Flat?
Chinese State Sponsored Hacking
By Sam Bocetta
For the past several years, China has denied any role in the exploitation of U.S. networks.Yet mounting evidence suggests China is involved in widespread hacking activity. In many cases, the sources of these attacks are difficult to trace, and therefore challenging to deter under current U.S.-Chinese cyber agreements. Both states signed a no-first-use agreement back in 2015, and some have argued the Chinese Communist Party’s control over hackers inside its own country is quite minimal. Given this, China’s claim that such attacks occur without the express guidance and sanction of central authority seems at least plausible.
China's Military Is Upgrading Its Hardware (and Its People)
James CharRichard A. Bitzinger
Tehran Is Winning the War for Control of the Middle East

Saudi Arabia appears to be on a warpath across the Middle East. The Saudi-orchestrated resignation of Lebanese Prime Minister Saad Hariri, and Saudi officials’ bellicose rhetoric after the launch of a ballistic missile targeting Riyadh from Yemen, appear to herald a new period of assertiveness against Iranian interests across the Middle East.
Newly Declassified Documents Prove America's North Korea Strategy Has Failed
The State Department, the Defense Department and the White House were increasingly concerned either that the North Korean regime was hiding components of its plutonium program from the International Atomic Energy Agency (IAEA), or that it would exploit any negotiating track to stall the international community while improving its nuclear capacity. The motives of the Chinese, Pyongyang’s biggest trading partner and bankroller by far, were unclear—adding more complication to a problem that was already far too complicated.
Dealing With North Korea
By Paul Cook
So far this year, North Korea has conducted multiple nuclear weapon tests, a series of intercontinental ballistic missile tests, and has continued to prioritize the development of nuclear weapons over the well-being of its own citizens. North Korean dictator Kim Jong Un assumes that provoking the U.S., threatening our allies, and developing nuclear weapons will secure the future of his regime. He is wrong in this assumption. This threat is critical to the national security of the United States and for the safety of the world.
North Korea has disregarded almost every agreement and commitment it has made to the U.S. and our allies. The regime has also demonstrated a proclivity for breaking international law and undermining international oversight of nuclear development. It is imperative that as North Korea’s nuclear capability increases, we continue to put pressure on Kim Jong Un and his regime.
Germany Is Europe’s Newest Problem
JUDY DEMPSEY
“Today there was no progress but rather there were setbacks because specific compromises were questioned,” Free Democrat leader Christian Lindner said. “It is better not to rule than to rule the wrong way. Goodbye!”
Merkel, long known for her skills at forging compromises, was visibly taken aback by Lindner’s decision.
“It’s a day at the very least for a profound examination of Germany’s future,” Merkel told reporters after the talks ended. “As chancellor, as caretaker chancellor, I will do everything to make sure this country continues to be well governed through the tough weeks ahead,” she added.
Germany’s preliminary coalition talks collapse

Terrorism Spreading but Less Deadly
By Murray Ackman

War, Nuclear War and the Law
By George Friedman
The U.S. Senate held hearings last week on the president’s authority to use nuclear weapons. The trigger for the hearings was the North Korea situation, and the fear among some that President Donald Trump might launch a reckless nuclear attack against the North Koreans. The question senators were asking was what the power of the president was to initiate nuclear war unilaterally.
This has long been a burning question, but one that has been intentionally ignored for decades. But this question involves not only the use of nuclear weapons, but the president’s authority to initiate all kinds of war without congressional approval. The Constitution states that the president is commander in chief of the armed forces. It also says that Congress has the power to declare war. On the surface, this seems a fairly clear system. The president is in command of the military; however, the authority to go to war rests with Congress.
The Kremlin’s Trojan Horses 2.0
BY ATLANTIC COUNCIL
“Russia’s interference in the US presidential election in 2016 sent a signal to the West: democratic societies are deeply vulnerable to foreign influence,” writes Dr. Alina Polyakova in The Kremlin’s Trojan Horses 2.0: Russian Influence in Greece, Italy, and Spain, a new report from the Atlantic Council’s Eurasia Center. Following a successful installment on Russian influence in France, Germany, and the United Kingdom, this report examines Russian political presence in Southern Europe.
Israel: The Making of a Cyber Power - Case Study
On September 14, 2017, CCHS convened a Symposium on Trends in Technology and Digital Security. Four panels addressed emerging threats and their implications for security policy, with a focus on digital infrastructure protection and anticipatory analysis. In a series of Issue Briefs, CCHS shares the findings and recommendations that emerged from the Symposium, primarily on a not-for-attribution basis. This fifth Brief in the series is a case study of the evolution of Israel as a cyber power.
The EU’s Revised Cybersecurity Strategy
In September 2017 the EU updated its 2013 Cyber Security Strategy. The new version is intended to improve the protection of Europe’s critical infrastructure and boost the EU’s digital self-assertiveness towards other regions of the world. But the reformed strategy leaves open a number of questions as to how its objective of an “open, safe and secure cyberspace” will be credibly defended, both internally and externally. The EU has neither properly defined resilience or deterrence nor made sufficiently clear how it intends to overcome institutional fragmentation and lack of legal authority in cybersecurity issues. Moreover, controversial topics – such as the harmonisation of criminal law or the use of encryption – have been entirely omitted. Member states should abandon their standalone efforts and speed up the legal regulation of cybersecurity at the EU level.
Subscribe to:
Posts (Atom)