11 January 2018
'US may help India in war against terror'
India’s jobless growth is not a myth
Mahesh Vyas
Will Pakistan Close NATO’s Supply Routes into Afghanistan?

Pakistan Will Try to Make Trump Pay

Why Pakistan and America Can't Stand Each Other—But Can't Step Away
Mohammed Ayoob
China may build second foreign naval base in Pakistan amid Trump’s row with Islamabad

Roads to Nowhere: Asia’s Risky Obsession With Infrastructure
By Ravi Prasad

Myanmar's Unhappy Rebels
By Neil Thompson

Could China spring a nice surprise in 2018?

Has Xi Fully Consolidated His Power Over the Military?
By Charlotte Gao

Cyber Vigilantes & Hacktivists: Double-Edged Sword Against ISIS
LEVI MAXEY

A Spending Spree as a Means of Fulfilling the Saudi Vision

Ukraine on the brink of kleptocracy
On January 3rd former Georgian President Michael Saakashvili’s plea for asylum in Ukraine was turned down, removing a key obstacle to deport him to Georgia. If deported, he will likely be show-trialled without a fair chance of defence. Since Saakashvili broke his alliance with President Poroshenko, the Ukrainian authorities have been working overtime to get rid of their new political opponent. The Soviet-style harassment campaign started with stripping him of his Ukrainian citizenship (a decision judged illegal by most independent experts), denying him entry into Ukraine, and arbitrary arrests of his aides. Ukrainian Prosecutor General Yuriy Lutsenko tried to bring about his own political show trial of Saakashvili, which he had to abandon on November 13th, formally due to weak evidence, but in effect due to pressure from the EU and the US.
Russian Analytical Digest No 212: Information Warfare
By Jolanta Darczewska, Piotr Zochowski, Robert W. Orttung, Marlene Laruelle and Gemma Pörzgen for Center for Security Studies (CSS)

The Wolfowitz Doctrine
Written by Dan Steinbock
Despite continued nuclear threats, all US postwar presidents have failed to reset relations with Russia. Why? The “New Cold War" between the US and Russia began a decade ago. The elevated tensions in the Korean Peninsula are only a part of the collateral damage around the world. But what led to the new friction? The simple response is the Wolfowitz Doctrine.
How to Break Up Europe’s Axis of Illiberalism
BY SLAWOMIR SIERAKOWSKI

Russia 'simulated full-scale war' against Nato, says military commander
Samuel Osborne

An Australian Perspective on Identity, Social Media, and Ideology as Drivers for Violent Extremism
By Kate McNair
Countering Violent Extremism (CVE) is a leading initiative by many western sovereigns to reduce home-grown terrorism and extremism. Social media, ideology, and identity are just some of the issues that fuel violent extremism for various individuals and groups and are thus areas that CVE must be prepared to address. Text: On March 7, 2015, two brothers aged 16 and 17 were arrested after they were suspected of leaving Australia through Sydney Airport to fight for the Islamic State[1]. The young boys fouled their parents and forged school letters. Then they presented themselves to Australian Immigration and Border Protection shortly after purchasing tickets to an unknown middle eastern country with a small amount of funds and claimed to be on their way to visit family for three months. Later, they were arrested for admitting to intending to become foreign fighters for the Islamic State. October 2, 2015, Farhad Khalil Mohammad Jabar, 15 years old, approached Parramatta police station in Sydney’s West, and shot civilian police accountant Curtis Cheng in the back[2]. Later it was discovered that Jabar was inspired and influenced by two older men aged 18 and 22, who manipulated him into becoming a lone wolf attacker, and supplied him the gun he used to kill the civilian worker.
Infographic Of The Day: The Year In News 2017 According To 2.8 Billion Tweets
Expanding the Menu: The Case for CYBERSOC
by Benjamin Brown
Introduction
The United States military should develop cyber special operations capabilities to expand the menu of policy options for addressing threats to U.S. interests and national security. As the roles of the cyber domain in modern conflict expands, new possibilities emerge for special operations to accomplish strategic objectives by employing cyber functions. The creation of Cyber Special Operations Forces (Cyber SOF) within the United States Special Operations Command (SOCOM) would empower the U.S. military to exploit cyber-enabled special operations. Cyber SOF will best enhance U.S. special operations capabilities by taking shape as a sub-unified command within SOCOM. This Cyber Special Operations Command (CYBERSOC) would position Cyber SOF to play supporting or leading roles as a key component of integrated special operations campaigns.
Cross-Domain Network Engagement: Geopolitical Competitors, Cross-domain Considerations and Multi-Domain Battle
by Victor R. Morris
The character of war, strategy development and operational dilemmas change over time, therefore operational approaches must do the same. Joint Countering Threat Networks (JP 3-25) includes versatile lines of effort to identify, neutralize, disrupt or destroy threat networks. These efforts enable engagement of friendly, neutral or unknown actors and mission objectives. To successfully engage networks, more advanced human-machine networks need to be understood and analyzed. For example, battle networks are technologically enhanced Anti-Access Area Denial (A2/AD) and human-machine systems that will influence current and future conflict. This assessment outlines a revised US Army Network Engagement construct to achieve cross-domain effects involving a variety of actors and competitors in a convergent operational environment.
Drone swarm tactics get tryout for infantry to use in urban battlespace
By: Todd South
The Department of Defense successfully tested a drone swarm in 2016. Officials want to put drone swarms in the hands of light infantry. The science fiction-sounding goal: Put an autonomous robot swarm of 250 or more drones under the control of light infantry soldiers or Marines to do complex tasks on the urban battlefield. Competitors are now tackling that goal in a multi-stage event announced late last year by the Defense Advanced Research Projects Agency. Events called Sprinters are intended to develop “offensive swarm-enabled tactics” for these emerging technologies. Swarm drone technology already exists. In 2016, the Defense Department successfully tested micro-drone swarms at China Lake, California. They dropped 103 Perdix drones from three F/A-18 Super Hornet jet fighters.
Next-gen sensors could fit on, and bend like, a Band-Aid
By: Adam Stone
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/U23OXGXIAVBIFAHKGBUW3HZ45M.jpg)
What’s Next for Vietnam’s New Military Peacekeeping Role?
By Prashanth Parameswaran

Mattis on War, Tyranny, Revolution and Body Counts

Subscribe to:
Posts (Atom)