
18 June 2018
Creation of a defence space agency: A new chapter in exploring India’s space security

How Using Algorithms Can Worsen Inequality
India’s Strategic Expansion in the Pacific Islands
By Balaji Chandramohan

What’s Next for the India-Russia Strategic Partnership?
By Rajeswari Pillai Rajagopalan

Islamic State Emboldened in Afghanistan
By: Farhan Zahid
From its establishment in September 2014, Islamic State’s arm in Afghanistan, its Khorasan province entity (IS-K), found itself the target of attacks by Afghan Taliban forces and strikes by the U.S. military in conjunction with the Afghan security forces. The group weathered significant losses and entrenched itself in the districts of eastern Afghanistan. In recent months, however, an improvement in relations with the Taliban has allowed it to focus on carrying out a series of bloody attacks.
Beginnings
How the US Is Indirectly Arming the Taliban
By Austin Bodetti

China-US Confrontation: Russian Perspective
4 things to watch as Trump's tariffs hit China
The Trump administration is moving ahead with a plan to assess steep new tariffson $50 billion worth of products made in China and exported to the U.S. The United States Trade Representative on Friday released a list of $34 billion in Chinese goods that would face tariffs of 25 percent. President Donald Trump approved the tariffs after a meeting with trade and Cabinet officials on Thursday. The USTR said it would initially impose tariffs on 818 products made in China, effective July 6. An additional 284 Chinese imports, worth $16 billion, also could face tariffs pending a final decision by the trade office and time to solicit public comment. "We must take strong defensive actions to protect America's leadership in technology and innovation against the unprecedented threat posed by China's theft of our intellectual property, the forced transfer of American technology and its cyber attacks on our computer networks," said U.S. Trade Representative Robert Lighthizer said in a statement.
Who lost the South China Sea?

In China’s Far West, Companies Cash in on Surveillance Program That Targets Muslims
BY CHARLES ROLLET
In the far western region of Xinjiang, China has created one of the world’s most sophisticated and intrusive state surveillance systems to target the predominantly Muslim Uighur ethnic minority. Part of what Beijing calls its anti-terrorism campaign, the system includes mandatory facial-recognition scans at gas stations and Wi-Fi sniffers that secretly collect data from network devices. Over the past two years, the technology has helped authorities round up an estimated hundreds of thousands of Uighurs and other Muslims and lock them up in clandestine camps that China calls “re-education centers.”
Trump’s next target: NATO
By PAUL TAYLOR

Trump's big deal
Raj Chengappa

Trump must still hold North Korea accountable for cyberattacks
Canadian Foreign Minister Sharply Rebukes Trump’s Trade Policy and Worldview

How Russia-Israel engagement is benefiting Iran
Hamidreza Azizi

The battlefield tablet that knows you have just one free hand
By: Kelsey Atherton
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/C4XBGAAY4RD3JKHW5FMGUKXWYQ.jpg)
Bad Cybersecurity? No Access To DoD Networks
"We’re going to turn that off unless you secured that properly. Whoa! That's a very different mindset," Col. Straub told me. "The availability of the network versus the defense of the network, that's something we’re trying to get commanders to think about.".
A DISA schematic of the Department of Defense Information Networks (DoDIN).
ARMY-NAVY COUNTRY CLUB, ARLINGTON: If your unit’s network is not secure, you and your fellow warriors may lose access to the wider Defense Department network until you fix it. That’s the new philosophy — not yet a formal policy — that two Defense Information Systems Agency officials laid out to the industry group AFCEAhere, just two miles from the Pentagon.
Top Marine says cyber warriors must get more flexibility
By: Justin Lynch
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/EUNXF2M6CVAOXEHZPVQJZY56X4.jpg)
Canada announces controversial new cyber strategy
By: Justin Lynch
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/UPBC4YGUR5FU3FGM3YCDVXGM4Q.jpg)
“The Cyber Centre will be outward-facing, open to collaboration with industry partners and academia, as well as a trusted resource for faster, stronger responses to cyber security incidents,” said Scott Jones, who was appointed head of the body. The Canadian government also announced a new National Cybercrime Coordination Unit and a voluntary cyber certification program to help businesses understand digital threats.
The Fourth Industrial Revolution needs a social revolution, too. Here's how we can make this happen
The industrial revolution produced an explosion in new forms of social organization. From the United Nations to trades unions, from the voluntary sector to welfare states, new systems and partnerships were designed to ease the transition from one socio-economic order to the next. But today, across the globe, these organizations find themselves out of step with modern challenges and expectations. The Fourth Industrial Revolution requires a sibling social revolution. How can we make this happen? First, we must stop our expensive attempts to manage the problems better. Then we must start, with communities and professionals, to design something new. This is what I have been doing across Britain, with people like Anne.
'The Perfect Weapon' Tells The Story Of Growing Cyber War That The U.S. Is Fighting
This week, we've heard a lot about what was discussed at the summit between President Trump and North Korean leader Kim Jong Un - nuclear weapons, military exercises, returning the remains of U.S. troops killed in the Korean War. As David Sanger filed his stories from Singapore, he noticed something very big missing. Sanger is a national security correspondent for The New York Times whose new book is all about cyberweapons. DAVID SANGER: Cyber is not included in any of these discussions with North Korea. They want to do nuclear, bio, chem. And yet cyber is the only weapon that they've actually used against us and used effectively. SHAPIRO: North Korea used cyberweapons against the U.S. in the 2014 hack of Sony Pictures to catastrophic effect. And Sanger's book describes a raging cyber war happening just below the surface of public perception. The U.S. and Israel attack Iran. Russia and China attack the U.S. Sanger's new book is called "The Perfect Weapon." One story he tells in detail is about the Sony hack, which began with North Korea getting upset over a movie called "The Interview" about two journalists who plot to kill Kim Jong Un.
Assessing what state institutions can do to combat cyberattacks

Plenary highlights: migration, drones, Parliament's composition
From stricter drone rules to migration and the new composition of the Parliament: check out our overview of June's plenary session in Strasbourg. On Wednesday MEPs approved a proposal to reduce the number of Parliament seats from 751 to 705 after the UK leaves the EU, leaving room for new countries that may join in the future. Discover more facts about the distribution of seats in our infographic. MEPs criticized the new Italian government’s refusal to allow a boat carrying migrants, the MS Aquarius, to dock in the country, during a special debate on Wednesday and during talks about the EU summit on 28-29 June on Tuesday. MEPs called on EU leaders to come up with real solutions to finally end the migration crisis.
What the End of Net Neutrality Actually Means
What the Interwar Years Say About the US Army’s Newest Force Concept
BY LAUREN FISH
Subscribe to:
Posts (Atom)