Maj Gen P K Mallick, VSM (Retd)
18 November 2017
Cyber Security in India – Present Status
*** International Organizations Are Tools for Powerful Countries
By Jacob L. Shapiro
In the modern world, relations between states operate at two levels. The first is the bilateral level. The U.S. and China, for instance, don’t see eye to eye on issues like Taiwan, the South China Sea, or how to denuclearize the Korean Peninsula. Their representatives communicate with each other to try to address their disagreements. The second is the multilateral level. For example, the United Nations passes a resolution placing economic sanctions on North Korea. Most of the U.N.’s 193 member states do not themselves have a problem with North Korea, but they go along with the sanctions because the U.N. says so.
Products of Geopolitics
Indian economy has bottomed out, set to show gradual acceleration
By: M Govinda Rao
Arming India’s response to Xi Jinping thought
Narayan Ramachandran
Oil caution for Indian economy
By Ajit Ranade
China's Belt and Road Initiative Is Stoking Tensions with India
Mitchell J. Hays
Qatar Is at the Center of Today's Arab Tangle
David B. Rivkin JrNawaf Obaid
Raytheon: Arab-operated Patriots intercepted over 100 tactical ballistic missiles since 2015
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/MJDBN25AHZGDRKKNXKBHLWXQ6A.jpg)
Climate Change and Water Woes Drove ISIS Recruiting in Iraq
SAMARRA, IRAQIt was a few weeks after the rains failed in the winter of 2009 that residents of Shirqat first noticed the strange bearded men. Circling like vultures among the stalls of the town’s fertilizer market in Iraq’s northern Salahaddin governorate, they’d arrow in on the most shabbily dressed farmers, and tempt them with promises of easy riches. “Join us, and you’ll never have to worry about feeding your family,” Saleh Mohammed Al-Jabouri, a local tribal sheikh, remembers one recruiter saying.
From Proxy Wars to Direct War Between Iran and Saudi Arabia: America’s Options
by Masoud Kazemzadeh and Penny Watson
The Middle East appears on the precipice of a great war. The fundamentalist rulers of Iran are confident that their goal of establishing a coalition of Shia countries and regions under their control is nearing fruition. Saddam’s invasion of Iran in 1980 was a response to Ayatollah Ruhollah Khomeini’s policy of overthrowing the ruling regimes in Iraq and much of the Middle East. By 1988, that war ended not by victory of one side over the other, but by the exhaustion of Khomeini’s regime and the recognition that no end was in sight. The 1988 ceasefire has been but a respite in the warmongering policy of the fundamentalists, whereby despite military adventurism, many members of the Islamic Revolutionary Guards Corps (IRGC) still express bitterness over the acceptance of the ceasefire.
If America Topples North Korea and Iran, What Happens Next?
George Perkovich
U.S. government shares technical details on North Korean hacking campaign
by Dustin Volz
WASHINGTON (Reuters) – The U.S. government on Tuesday issued a technical alert about cyber attacks it said are sponsored by the North Korean government that have targeted the aerospace, telecommunications and financial industries since 2016. The alert, from the FBI and Department of Homeland Security, said North Korean hackers were using a type of malware known as “FALLCHILL” to gain entry to computer systems and compromise network systems.The FBI and DHS had issued a warning in June that squarely blamed the North Korean government for a raft of cyber attacks stretching back to 2009 targeting media, aerospace and financial sectors, as well as critical infrastructure, in the United States and globally.
Making it in America: Revitalizing US manufacturingBy Sree Ramaswamy
James Manyika, Gary Pinkus, Katy George, Jonathan Law, Tony Gambell, and Andrea Serafino
Source Link
Source Link
The erosion of US manufacturing isn’t a foregone conclusion. The decade ahead—with increased demand, new technology, and value chain optimization—will give the sector a chance to turn around.
US manufacturing is not what it was a generation ago. Its contraction has been felt by firms, suppliers, workers, and entire communities. In fact, the erosion of manufacturing has contributed two-thirds of the fall in labor’s share of US GDP.
Trump, Brexit and Echoes of World War I
Tobin Harshaw

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
By SCOTT SHANE, NICOLE PERLROTH and DAVID E. SANGER
WASHINGTON — Jake Williams awoke last April in an Orlando, Fla., hotel where he was leading a training session. Checking Twitter, Mr. Williams, a cybersecurity expert, was dismayed to discover that he had been thrust into the middle of one of the worst security debacles ever to befall American intelligence.
Mr. Williams had written on his company blog about the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries. Now the group had replied in an angry screed on Twitter. It identified him — correctly — as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted.
Building a Defensible Cyberspace
By Merit Janow![]()
Merit Janow is dean and professor of practice at Columbia University’s School of International and Public Affairs (SIPA). Greg Rattray is director of global cyber partnerships and government strategy for JPMorgan Chase. Phil Venables is chief operational risk officer at Goldman Sachs. Attackers in cyberspace have for decades held fundamental advantages, due to factors such as an internet that was never designed for security. As a result, cybersecurity practitioners and policymakers often look at their field with a sense of dramatic fatalism: they look for architectural overhauls to change the landscape, or wait on a deus ex machina technology to rewrite the rules of the game. Worse, some fall into the trap that the best defense is a good offense.
U.S. Takes Fight to ISIS on Cyber Battlefield
Levi Maxey
No terrorist group has capitalized on networked technology more than ISIS, both for recruitment messaging and commanding their fighters on the ground. The internet is their response to asymmetric disadvantage. Where they lack in infrastructure and resources of a state, they use the web to plan attacks, solicit money and reach out to potential members. Meanwhile, however, U.S. Cyber Command has mustered an array of cyber capabilities intended to undermine ISIS's operations and messaging on the web. Cyber Command's campaign against ISIS – and groups that will eventually follow –continues to test their capabilities against terrorists turning to digital technology to advance their own agendas.
Hive
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware. Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.
Ban on killer robots urgently needed, say scientists
Technology now exists to create autonomous weapons that can select and kill human targets without supervision as UN urged to outlaw them
The movie portrays a brutal future. A military firm unveils a tiny drone that hunts and kills with ruthless efficiency. But when the technology falls into the wrong hands, no one is safe. Politicians are cut down in broad daylight. The machines descend on a lecture hall and spot activists, who are swiftly dispatched with an explosive to the head.
Weed out bad UN Peace keepers
Richard Gowan

Subscribe to:
Posts (Atom)