23 January 2018
The future belongs to biopharma. Can India catch up with China?
Five months on, understanding Doklam ‘disengagement’, a few other issues
‘China pursuing missile defenses; Indian nukes are main worry’
By DOUG TSURUOKA EDITOR AT LARGE
A Visit to One of China’s First Nuclear Weapons Plants
Chris Buckley and Adam Wu
China — Among the yak herds and Tibetan Buddhism prayer flags dotting the windswept highlands of northwestern China stand the ruins of a remote, hidden city that vanished from the maps in 1958. The decaying clusters of workshops, bunkers and dormitories are remnants of Plant 221, also known as China’s Los Alamos. Here, on a mountain-high grassland called Jinyintan in Qinghai Province, thousands of Tibetan and Mongolian herders were expelled to create a secret town where a nuclear arsenal was built to defend Mao Zedong’s revolution. “It was totally secret, you needed an entry pass,” said Pengcuo Zhuoma, 56, a ruddy-faced ethnic Mongolian herder living next to an abandoned nuclear workshop, whose family once supplied meat and milk to the scientists. “Your mouth was clamped shut so you couldn’t talk about it.”
How China Infiltrated U.S. Classrooms
![](https://static.politico.com/dims4/default/5b1b97a/2147483647/resize/1160x%3E/quality/90/?url=https%3A%2F%2Fstatic.politico.com%2F37%2Fdc%2Fafefcb5b4226a6b6b02493c57301%2F180116-confucius-gw-gty-1160.jpg)
MAKE CHINA GREAT AGAIN: COMMUNIST PARTY SEEKS TO SEIZE ‘HISTORIC’ MOMENT TO RESHAPE WORLD ORDER
Nectar Gan
The world is in chaos, giving the Communist Party a “historic opportunity” to make China great again and reshape the world order – at least that was the message the party sought to drive home in a high-profile opinion piece in its flagship newspaper this week. needed China so much as it does now,” a commentary on Monday’s front page of People’s Daily asserted.
The world has never focused on China so much and needed China so much as it does now
The 5,500-word article is the latest rallying call for the country to unite around President Xi Jinping – its most powerful leader in decades – to rejuvenate China and achieve its global aspirations. Under Xi, Beijing has become more confident than ever in how it sees itself in the world. It has repeatedly vowed to take on more global responsibility and provide a “China solution” to the world’s woes, at a time when the United States under President Donald Trump is retreating from its global leadership role and Europe is distracted by Brexit.
Resource-hungry China is in overdrive as it wages water wars by stealth
Brahma Chellaney
5 ways the Fourth Industrial Revolution transformed 2017 (and 5 ways it did not)
Nicholas Davis, Anne Marie Engtoft Larsen,
![](https://cdn-images-1.medium.com/max/800/0*hD-ougdP1UqPP_2S.jpg)
1. Ethics: addressing biases and assumptions in technologies
President Trump's New Defense Strategy Is a Return to the Cold War
By W.J. HENNIGAN
President Donald Trump is bracing the Pentagon for a long-term, strategic competition with the world’s major powers that puts the U.S. military on a Cold War footing with Russia and China for the foreseeable future, the administration said on Friday. The National Defense Strategy, set to be rolled out by Defense Secretary James Mattis at John Hopkins’ School of Advanced International Studies in Washington, directs the U.S. government to engage in a multi-year build-up of the military involving more troops, more weapons and stronger foreign alliances. he document, which serves as the Administration’s roadmap for global security, says China and Russia aim to upend the global hierarchy that the United States has sat atop of since World War II. The strategy serves as the latest sign the Administration wants to pivot from the morass of violence and counter-terrorism operations in the Middle East to intensify great power competitions in the western and eastern hemispheres.
Tracking Global Terrorism In 2018
Al Qaeda: Surviving Under Pressure
Really? We’re Gonna Nuke Russia for a Cyberattack?
By GEORGE PERKOVICH
The front page of Tuesday’s New York Times contained an alarming headline: “Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms.” The article, by David Sanger and William Broad, reported on a leaked draft of the Trump administration’s Nuclear Posture Review, which determines what the role of nuclear weapons should be. This draft departs from previous posture reviews by broadening the range of attacks that could trigger a massive U.S. retaliation, including with nuclear weapons.
Containing Russia, Again
With each passing week, the evidence of Russia’s interference in the 2016 U.S. presidential election—and in U.S. politics and society more generally—grows. Since at least 2014, in an effort to influence the election and undermine confidence in U.S. democracy, Russia has hacked private American citizens’ and organizations’ computers to steal information; released that information in ways designed to affect electoral outcomes and divide Americans; planted and disseminated disinformation in U.S. social media, through its own state-funded and -controlled media networks and by deploying tens of thousands of bloggers and bots; cooperated with Americans, possibly including members of Donald Trump’s campaign, to discredit Trump’s opponent in the election; and probed election-related computer systems in multiple states. We will never know for certain whether Russia’s intervention changed the outcome of the 2016 election. The point is that it tried.
Inside a European Center to Combat Russia’s Hybrid Warfare
![](https://foreignpolicymag.files.wordpress.com/2018/01/gettyimages-478165955.jpg?w=1500&h=1000&crop=0,0,0,0)
Age of Ignorance
Charles Simic
Warming, Water Crisis, Then Unrest: How Iran Fits an Alarming Patter
By SOMINI SENGUPTA
![](https://static01.nyt.com/images/2018/01/19/climate/19CLI-IRAN01/merlin_132414302_9b716b42-d793-4150-ae64-e1a31463b973-superJumbo.jpg)
A Tough National Defense Strategy
By MARK CANCIAN
![](https://breakingdefense.com/wp-content/uploads/sites/3/2016/11/New-Pentagon-from-river-entrance.jpg)
Infographic Of The Day: The 10 Companies That Dominate The Global Arms Trade
Artificial Intelligence: the impact on employment and the workforce
![](https://cdn-images-1.medium.com/max/2000/1*vU6CQaOXRfZKgmuzJpnGJg.jpeg)
Future shocks: 10 emerging risks that threaten our world
![](https://cdn-images-1.medium.com/max/800/0*VvRYv9odqFLa75bg.jpg)
Four new ‘superpowers’ changing our world
Pat Gelsinger, Chief Executive Officer, VMware Inc.
![](https://cdn-images-1.medium.com/max/800/0*94OJ_4RZ3vaCw858.jpg)
Beyond the Bitcoin Bubble
The sequence of words is meaningless: a random array strung together by an algorithm let loose in an English dictionary. What makes them valuable is that they’ve been generated exclusively for me, by a software tool called MetaMask. In the lingo of cryptography, they’re known as my seed phrase. They might read like an incoherent stream of consciousness, but these words can be transformed into a key that unlocks a digital bank account, or even an online identity. It just takes a few more steps. On the screen, I’m instructed to keep my seed phrase secure: Write it down, or keep it in a secure place on your computer. I scribble the 12 words onto a notepad, click a button and my seed phrase is transformed into a string of 64 seemingly patternless characters:
From CES: The sea is alive with cheap, powerful robots — and that will be dangerous
![](https://www.armytimes.com/resizer/OyUWD_QjuYF6cM-E27tQhKZ29QM=/1200x0/filters:quality(100)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/X2VG2G65FJB7VECA6VFGMNBBRQ.jpg)
Congressional budget skirmishes won’t halt cyber issues
![](https://www.armytimes.com/resizer/kO4SOllSgDobXo25FXuI2psFAgU=/1200x0/filters:quality(100)/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/YTVLAEMYSVDNBKOLWX4OVWHERM.jpg)
Discovered: New Malware Espionage Campaign Infecting Thousands Around the World
Electronic Frontier Foundation
San Francisco – The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign infecting thousands of people in more than 20 countries. Hundreds of gigabytes of data has been stolen, primarily through mobile devices compromised by fake secure messaging clients.The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.
Why mobiles could be key to solving humanitarian crises
Elaine Weidman-Grunewald
![](https://assets.weforum.org/article/image/large_03SHAKk2AaFGsN7LqG0ZZwacYswx_mMqz-kS2oi1XDI.jpg)
Data that enables rapid response
Subscribe to:
Posts (Atom)