By KUNWAR KHULDUNE SHAHID
21 March 2018
‘Pakistan is isolated and has fewer friends in the international community’
We Asked Gen. Petraeus If The Iraq War Was Worth It. Here’s What He Said
by Jeff Schogol
Fifteen years of war have turned Iraqi cities such as Ramadi, Fallujah, and Mosul into ruins. Iraq remains as divided as ever along sectarian lines, despite the deaths of more than 4,500 U.S. troops and untold numbers of Iraqis. U.S. troops remain in Iraq to help advise and assist Iraqi forces as they try to prevent ISIS from launching yet another insurgency. Meanwhile, Iran has flooded the country with thousands of proxy fighters, giving it a large say in what the government of Iraq does post-ISIS. This wasn’t the Iraq that was supposed to emerge when U.S. troops crossed the berm from Kuwait to Iraq in March 2003. Nor is this the Iraq that troops who trounced al Qaeda during the surge bled for. There are few tangible signs of success, and Iraq’s future is still unclear.
A New Order for the Indo-Pacific
BRAHMA CHELLANEY
China has transformed the Indo-Pacific region’s strategic landscape in just five years. If other powers do not step in to counter further challenges to the territorial and maritime status quo, the next five years could entrench China’s strategic advantages. Security dynamics are changing rapidly in the Indo-Pacific. The region is home not only to the world’s fastest-growing economies, but also to the fastest-increasing military expenditures and naval capabilities, the fiercest competition over natural resources, and the most dangerous strategic hot spots. One might even say that it holds the key to global security. The increasing use of the term “Indo-Pacific” – which refers to all countries bordering the Indian and Pacific oceans – rather than “Asia-Pacific,” underscores the maritime dimension of today’s tensions. Asia’s oceans have increasingly become an arena of competition for resources and influence. It now seems likely that future regional crises will be triggered and/or settled at sea.
Chinese APT15 Group Steals UK Military Docs
A suspected Chinse APT group has been spotted raiding a UK government contractor for military and other sensitive documents. APT15 is also known as Ke3chang, Mirage, Vixen Panda GREF and Playful Dragon – a group operating for several years from servers registered in China and with Chinese language infrastructure. NCC Group claimed at the weekend that it spotted the group stealing sensitive documents from one of its clients, a government contractor, back in May. It appeared to be using a blend of old and new tools: previous backdoor BS2005 now appearing alongside new versions RoyalCli and RoyalDNS.
The Fatal Flaw in China's Plan for Dominating the World Economy
Milton Ezrati
Chairman Xi, Chinese Idol
Ian Johnson
For nearly sixty years since it opened in 1959, the Great Hall of the People has been the public focus of Chinese politics, a monumental granite block that extends 1,200 feet along the west side of Tiananmen Square. It is where the country’s leaders appear in public to display their power: a platform for state banquets, receptions of foreign dignitaries, and symbolic political meetings. It is their throne room, their sacred space. It is the outward manifestation of decisions made in other, darker realms.
‘Enforcer’ Wang could be let loose on US to quell trade dispute
By GORDON WATTS
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.
By NICOLE PERLROTH and CLIFFORD KRAUSS

Pentagon Wants Silicon Valley’s Help on A.I.
By CADE METZ

The Cambridge Analytica Files
by Carole Cadwalladr
The first time I met Christopher Wylie, he didn’t yet have pink hair. That comes later. As does his mission to rewind time. To put the genie back in the bottle. By the time I met him in person, I’d already been talking to him on a daily basis for hours at a time. On the phone, he was clever, funny, bitchy, profound, intellectually ravenous, compelling. A master storyteller. A politicker. A data science nerd.
Israel says it foiled Hamas bid to rebuild Gaza attack tunnel
Israel says foiled Hamas bid to rebuild Gaza tunnel
Israeli forces on Sunday knocked out a tunnel in the Gaza Strip dug by Hamas militants to mount cross-border attacks, the military said. The tunnel had been cut off during the 2014 Gaza war and Hamas had tried to put it back into operation, a military spokesman said. It had been dug inside the Hamas-ruled enclave several hundred meters away from Israel’s border fence. The Israeli forces did not cross the border to render the tunnel inoperable but used a new technique, Lieutenant-Colonel Jonathan Conricus told reporters. “We did not use explosives. It (the tunnel) was filled with a certain material, with a certain compound,” Conricus said.
How Trump could give the Pentagon a McMaster problem
By WESLEY MORGAN and BRYAN BENDER

U.S. Imposes New Sanctions On Russia Over Election Interference, Cyberattacks
RYAN LUCAS

Why we must break the Syria-North Korea WMD trade, and how we can
By Joshua Stanton
Last night, the U.N. Panel of Experts published its latest report. There is sufficient material in it for several posts, but some of the most alarming facts in it have to do with North Korea’s assistance to Syria with its ballistic missiles and chemical weapons, so that’s where I’ll begin.

Putin’s new Cold War
BY LAWRENCE FREEDMAN
Vladimir Putin is not one to accept criticism from the West, even when his country stands accused of attempted murder using military-grade nerve agents. Russian responses to the accusations have been dismissive, even suggesting that British intelligence was really responsible for the attempted murder on 4 March of Sergei Skripal and his daughter Yulia in Salisbury, combined with knowing observations that their fate should be a warning to other traitors.
Okay, Say Someone Hacks into the US Power Grid. Then What?
BY CAROLINE HOUCK

Russians Targeting the “Achilles Heel” of Critical Infrastructure

It’s official: Russia is targeting critical American infrastructure with ‘malicious cyberattacks’
By Bryan Clark

Pentagon Cloud Migration Fights Cybersecurity Challenges
By Kris Osborn - Managing Editor - Warrior Maven
The Pentagon is working with industry to accelerate migration to cloud technology to enable faster decision making The Pentagon is working with industry to accelerate widespread migration to cloud technology to enable faster decision-making, AI implementation, rapid data organization and improved IT security, Pentagon leaders said. The multi-faceted initiative includes data consolidation, reducing the hardware footprint and efforts to connect satellite ground terminals more seamlessly with one another; the key concept, of course, is to increase access to otherwise disparate pools of information, share information quickly and give combat commanders more options on a faster time frame.
Army standardizes ‘thinking outside the box’ procedures
BY CAT ASTRONAUT

The Looming National Security Crisis: Young Americans Unable to Serve in the Military
Authors:Thomas Spoehr and Bridget Handy
The military depends on a constant flow of volunteers every year. According to 2017 Pentagon data, 71 percent of young Americans between 17 and 24 are ineligible to serve in the United States military. Put another way: Over 24 million of the 34 million people of that age group cannot join the armed forces—even if they wanted to. This is an alarming situation that threatens the country’s fundamental national security. If only 29 percent of the nation’s young adults are qualified to serve, and if this trend continues, it is inevitable that the U.S. military will suffer from a lack of manpower. A manpower shortage in the United States Armed Forces directly compromises national security.
PERHAPS WE CAN EAT SOUP WITH A KNIFE: PROSPECT THEORY AND THE USE OF CONVENTIONAL MILITARY STRATEGIES IN COUNTERINSURGENCY OPERATIONS
Sidharth Kaushal
Introduction
Combating insurgencies with conventional forces has long been regarded as being, to paraphrase T.E Lawrence’s colorful formulation, comparable to eating soup with a knife (Lawrence, 1922, 53). Indeed, the inutility of force with regards to combating a phenomenon that primarily exists in the minds of a target population has been noted by figures from General Rupert Smith to General David Petraeus, the latter articulating this principle as a central premise upon which he built his population centric theory of counterinsurgency in FM-3-24 (Petraeus, 2006, 60-100) (Smith, 2005, 40). Within the context of this argument, any effort to destroy an insurgent militarily by a policy of attrition or annihilation ignores the insurgents innate capacity to trade space for time, avoiding the strengths of a conventional force and eroding both its domestic will and its control over the target populace (over which the insurgent and counterinsurgent force are fighting) by policies of assassination, intimidation of the counterinsurgency’s local supporters and dispersed attacks on occupying troops. The ability of an insurgency, even one which has held territory for a significant period to revert to what T.X. Hammes dubs phase I of an insurgent strategy (whereby it resorts to asymmetrical warfare) is central to the argument regarding the inutility of an enemy-centric Clausewitzian approach to combating insurgencies (Hammes, 2006, 50).
What the Coming Space Conflict Will Really Look Like
By Lee Ferran
President Donald Trump raised a few eyebrows and prompted no small amount of scorn online when, in apparently off-the-cuff remarks, he proposed creating a “Space Force” as a separate military branch to do battle among the stars. “My new national strategy for space recognizes that space is a war-fighting domain, just like the land, air and sea,” Trump told U.S. Marines at Marine Corps Air Station Miramar Tuesday before appearing to veer off script. “We may even have a Space Force, develop another one, Space Force. We have the Air Force, we’ll have the Space Force … You know, I was saying it the other day, because we’re doing a tremendous amount of work in space, I said maybe we need a new force. We’ll call it Space Force.”
War Games: Army Replacing 1980s Simulators With Gaming Tech
By SYDNEY J. FREEDBERG JR.

DISMANTLING CONTEMPORARY MILITARY THINKING AND RECONSTRUCTING PATTERNS OF INFORMATION: THINKING DEEPER ABOUT FUTURE WAR AND WARFIGHTING
Bradley L. Rees
“This is a totally new kind of threat, as we all know. Our adversaries, both state and non-state actors, view the entire information domain as a battlespace, and across it, they are waging a new kind of war against us, a war involving but also extending beyond our military, to include our infrastructure, our businesses, and our people.”
Introduction
Subscribe to:
Posts (Atom)