Priyadarshi Dutta
29 June 2018
DIAGNOSING ISLAM'S DISQUIET
In Search of the Real Indo-Pacific
By Donald K Emmerson

Time for America to Leave Afghanistan
Richard A. Carrick
As the United States enters its eighteenth year in its war against the Taliban in Afghanistan, the U.S. military remains no closer to ending this conflict. In April the Taliban rejected the latest peace proposals by the Afghan government, and now it appears the war is moving steadily against the U.S. supported Afghan government. President Trump has given the U.S. military one last chance to implement a new strategy to end the conflict. For him, the American people, the Afghans, and the U.S. military the decisive point in this long conflict is rapidly approaching.
How China Got Sri Lanka to Cough Up a Port

China's Belt and Road Initiative, Five Years In

Inside a Heist of American Chip Designs, as China Bids for Tech Power
By Paul Mozur
With a dragnet closing in, engineers at a Taiwanese chip maker holding American secrets did their best to conceal a daring case of corporate espionage. As the police raided their offices, human resources workers gave the engineers a warning to scramble and get rid of the evidence. USB drives, laptops and documents were handed to a lower-level employee, who hid them in her locker. Then she walked one engineer’s phone out the front door. What those devices contained was more valuable than gold or jewels: designs from an American company, Micron Technology, for microchips that have helped power the global digital revolution. According to the Taiwanese authorities, the designs were bound for China, where they would help a new, $5.7 billion microchip factory the size of several airplane hangars rumble into production.
Beijing’s Drive Towards Global Technological Supremacy

CAN TRUMP BUILD A TECH WALL AROUND CHINA?
MAYA KOSOFF
To hear one Silicon Valley investor tell it, China’s authoritarian tech culture—wherein employees work for 14 hours a day, six or seven days a week, and sometimes see their children for only minutes each day—represents the pinnacle of achievement. “If a Chinese company schedules tasks for the weekend, nobody complains about missing a Little League game or skipping a basketball outing with friends,” Michael Moritz wrote in a column in the Financial Times in January. “Little wonder it is a common sight at a Chinese company to see many people with their heads resting on their desks taking a nap.”

Trump, Kissinger and the Search for a New World Order
By Reva Goujon
The United States' return to aloofness, China's rise, Europe's fragmentation and the growing strategic alignment between Moscow and Beijing are all destabilizing the international system. Basing the world order on Westphalian principles is necessary to reinject enough flexibility and pragmatism into the global system amid a new, competitive era of great power politics, according to veteran diplomat Henry Kissinger. The potential for a U.S.-China understanding on the fate of the Korean Peninsula will serve as a critical testing ground for this emerging world order.

An Extraordinarily Expensive Way to Fight ISIS

I. Target
The B-2 stealth bomber is the world’s most exotic strategic aircraft, a subsonic flying wing meant to be difficult for air defenses to detect—whether by radar or other means—yet capable of carrying nearly the same payload as the massive B-52. It came into service in the late 1990s primarily for use in a potential nuclear war with the Soviet Union, and clearly as a first-strike weapon rather than a retaliatory one. First-strike weapons have destabilizing, not deterrent, effects. It is probably just as well that the stealth bomber was not quite as stealthy as it was meant to be, and was so expensive—at $2.1 billion each—that only 21 were built before Congress refused to pay for more. Nineteen of them are now stationed close to the geographic center of the contiguous United States, in the desolate farmland of central Missouri, at Whiteman Air Force Base. They are part of the 509th Bomb Wing, and until recently were commanded by Brigadier General Paul W. Tibbets IV, whose grandfather dropped the atomic bomb on Hiroshima. B-2 bombers are still primarily regarded as a nuclear-delivery system, meaning that their crews are by selection the sort of men and women capable of defining success as a precisely flown sortie at the outset of mass annihilation. No one should doubt that, if given the order to launch a nuclear attack, these crews would carry it out. In the meantime, they have occasionally flown missions of a different sort—make-work projects such as saber rattling over the Korean peninsula, and the opening salvos in Serbia, Afghanistan, and Iraq—to tactical advantage without American discomfort.
Merkel's Toughest Adversary in Europe
By Walter Mayr
In southern Syria, the US faces a Russia-Israel challenge
by Joe Macaron

US' ambivalent role on the southern front
Wargaming Moscow’s Virtual Battlefield
Source Link
The U.S. – Russia relationship is a complicated one, to say the least. While investigations into potential collusion carry the headlines in Washington, there is a fragile balancing act going on behind the scenes. Take the gas and energy market as one small example. U.S. Energy Secretary Rick Perry is due to meet today with Russia’s Energy Minister Alexander Novak at the World Gas Conference in Washington. Despite the fact that tensions between the two nations are incredibly strained, the U.S. may need Russia’s support in it’s efforts to isolate Iran from the world oil market.

State of the Trade Wars
The Trump administration’s protectionist measures on trade are piling up — and so are the retaliatory moves from a spate of other countries. What began with small-scale U.S. tariffs on washing machines and solar panels has now broadened to include steel and aluminum from all over the world, plus hundreds of products from China. Those tariffs have prompted a tit for tat response from affected countries, which target key U.S. exports such as bourbon, motorcycles, and orange juice. And there could be more to come, with the Trump administration studying further tariffs on imported cars and threatening much more action against China.
Russia’s Allies Do Not Want to Take Part in Syrian Operation
By: Aleksandr Golts
Moscow suffered a major military-diplomatic defeat recently in Kyzyl, the capital of the Siberian Russian Republic of Tuva. During the opening session of the Commonwealth of Independent States’ (CIS) Defense Ministers Council, the chief of the Russian Ministry of Defense, Sergei Shoigu, urged the CIS countries to participate in “the restoration of peaceful life” in Syria: “Today, it is possible to provide assistance in many spheres in Syria. There is mine clearance of the territory, joint patrolling of de-escalation zones, humanitarian assistance, restoration of infrastructure. We count on your support, which would demonstrate our unity in the fight against international terrorism and ensuring common security” (RIA Novosti, June 6).
Bending the Internet: Russia Catches Up on Internet Control

The end of the rules-based global order
Narayan Ramachandran

Turkey’s Warning
By YASCHA MOUNK
Turkey’s President Recep Tayyip Erdogan and wife, Emine Erdogan, wave to supporters outside a voting station after casting their votes in the country’s parliamentary and presidential election on Sunday in Istanbul. A couple of years into Recep Tayyip Erdogan’s rule, much of the outside world hailed him as a great statesman. America’s major publications argued that he would deepen the country’s democratic institutions and reconcile its observant Muslim residents to the secular republic founded by Mustafa Kemal Ataturk. The picture in Europe was not so different. From Germany to Sweden, everybody who was anybody celebrated the changes Erdogan was ushering in. In October 2004, the European Commission even helped him deliver on one of Turkey’s most long-standing aspirations: In recognition of the country’s democratic progress, it formally invited Turkey to apply for membership of the European Union.
Rosneft in Kurdistan: A Neglected but Critical Aspect of Russian Regional Strategy
By: Stephen Blank
Rosneft and Gazprom function primarily as arms of the Russian state (Jamestown.org, March 8). Although they are in business to make money for themselves, these state-owned firms are also expected to serve the Russian government and Vladimir Putin’s interest, as well as that of all the executives whose corrupt earnings depend on continuing access to the energy pump (see EDM, March 6, 2017). Over the past year or so, through a series of strategic business deals, Rosneft, in particular, has become an aggressive exponent of Russian state interests. The oil giant’s prominent position has been marked by large-scale investments in key foreign policy arenas for Russia, including the Arctic, China, Vietnam, Venezuela, Africa and the Middle East.
What War Games Tell Us About the Use of Cyber Weapons in a Crisis

Job Training in the Digital Age: Learning to Do, Not Think
An edited transcript of the conversation follows.
How to protect your organization against 5 common browser security threats
Regardless of your choice of web browser, there are both engineered and unintentional threats which can put you at risk when using it. I wrote this past April about five common browser security threats, and how to handle them. Unfortunately, there are well more than five threats which can target the web browser and it remains critical for organizations to implement effective protection from these hard-to-detect attacks. I spoke to Dr. Christopher Kruegel, the co-founder and CEO of malware protection provider Lastline to collaborate on the topic, and we discussed the concept of browser security.
How the Army is virtually prepping for real cyberattacks
By: Justin Lynch
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/CSP4KOC5ANGBNNYZETLLKXHQQM.jpg)
DoD makes significant updates to cyber operations doctrine
By: Mark Pomerleau
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/JKW2ZZUC4NBCND5QHXFUHP6Z2A.jpg)
Can industry help government make sense of artificial intelligence?
By: Mark Pomerleau
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/6UVNMDWNEZFNFFH5TXJBFUEW5Q.jpg)
Preventing the Global Cyberwar: Why We Need a Digital Geneva Convention
by Doug Olenick
In today's cybersecurity climate, no person, company or agency has immunity. As cybercriminals obtain funding to no end and as their tools become more advanced and prevalent, we are seeing hacking move from a niche crime conducted by a small group of highly technical individuals becoming a mainstream misconduct. With cybercrime having the potential for significant global impact, we've seen governments themselves jumping in to steal intellectual property, tamper with elections or interrupt operations of public utilities, energy companies and nuclear plants. In fact, 12 percent of breaches were attributed to nation states, according to Verizon's 2018 Data Breach Investigations Report.

Infographic Of The Day: A Network Map Of The World's Air Traffic Connections
What War Games Tell Us About the Use of Cyber Weapons in a Crisis
Source Link
Recent U.S. war games have shown that decision makers are surprisingly reluctant to use cyber weapons during a crisis scenario that escalates into armed conflict. Why? The second battle of Libya during World War II. A British brigadier commanding tank units in Tobruk instructs officers on an operation, using a sand table for demonstration purposes. British Army/Wikimedia
What War Games Tell Us About the Use of Cyber Weapons in a Crisis

Balancing Authority and Responsiblity
By: Aaron Haubert
We begin with two scenarios:

2) Tasked with her first assignment, a new lance corporal struggles. She has plenty of initiative but has difficulty rallying people around her to help. By necessity, she often says, “Gunny needs you to do this.” Calls back to Gunny are frequent and create a perception that she is ineffectual.
The experiences of these two Marines appear worlds apart. But they both share the one trait that determines success or failure for all leaders: Their authorities and their responsibilities are unbalanced.
How the Army is virtually prepping for real cyberattacks
By: Justin Lynch
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/CSP4KOC5ANGBNNYZETLLKXHQQM.jpg)
Subscribe to:
Posts (Atom)