/69.30117068749993,29.76683827244043,4/421x337.png?access_token=pk.eyJ1IjoiZGFsdG9ud2IiLCJhIjoiOWdSSXFQSSJ9.HZyjh4g3TAAOAncwelv9Vw)
5 July 2018
China-Pakistan Economic Corridor: Opportunities and Risks
/69.30117068749993,29.76683827244043,4/421x337.png?access_token=pk.eyJ1IjoiZGFsdG9ud2IiLCJhIjoiOWdSSXFQSSJ9.HZyjh4g3TAAOAncwelv9Vw)
Fugitive Bangladeshi Militants Bring Jamaat ul Mujahideen to India
By: Animesh Roul
A failed bomb plot that appeared to target the Tibetan Buddhist spiritual leader, the Dalai Lama, as he visited a pilgrimage site in Bihar, India, has been blamed on the militant group Jamaat-ul-Mujahideen Bangladesh (JMB), and an emerging Indian offshoot. On January 19, a low intensity blast on the grounds of the Tibetan monastery in Bodh Gaya caused panic among devotees of the Dalai Lama. A subsequent sweep of the vicinity—the blast occurred after the Dalai Lama had left—led to the recovery of two improvised explosive devices near the monastery’s Kalachakra (Wheel of Time) prayer ground (Indian Express, January 20). Investigations into the incident revealed the involvement of the Bangladesh-based JMB.
Reflecting On: Uighur Foreign Fighters – An Underexamined Jihadist Challenge
Dr. Colin P. Clarke, Dr. Paul Rexton Kan
In November 2017, we co-authored “Uighur Foreign Fighters: An Underexamined Jihadist Challenge,” published by the International Centre for Counter-Terrorism- The Hague (ICCT). Uighurs, specifically individuals of Turkic decent from China’s northwest province of Xinjiang, have become a noticeable part of the constellation of globally active jihadist terror groups. Uighur jihadists first came to the world’s attention when the United States and its allies invaded Afghanistan in 2001. While continuing their cooperation with the Taliban under the banner of the East Turkestan Islamic Movement (ETIM), Uighur jihadists have now spread to Southeast Asia and the Middle East. ETIM’s members are part of the Turkestan Islamic Party fighting with the Al-Qaeda umbrella group in Syria, but other Uighurs have joined the Islamic State and still others have joined terrorist groups in Indonesia.
China's New Navy: A short guide for Australian policy-makers
Sam Roggeveen
Download/View publication
China’s strategic investments in Europe: The case of maritime ports
BY: SHIVALI PANDYA AND SIMONE TAGLIAPIETRA
The EU is currently working on a new framework for screening foreign direct investments (FDI). Maritime ports represent the cornerstone of the EU trade infrastructure, as 70% of goods crossing European borders travel by sea. This blog post seeks to inform this debate by looking at recent Chinese involvement in EU ports. In September 2017 Jean-Claude Juncker, president of the European Commission, proposed a new EU framework for screening foreign direct investments (FDI), arguing that ‘if a foreign, state-owned, company wants to purchase a European harbour, part of our energy infrastructure or a defence technology firm, this should only happen in transparency, with scrutiny and debate’.
Who Lost the South China Sea?
BRAHMA CHELLANEY
The South China Sea is central to the contest for strategic influence in the larger Indo-Pacific region. Unless the US adopts a stronger policy to contain Chinese expansionism there, the widely shared vision of a free, open, and democratic-led Indo-Pacific will give way to an illiberal, repressive regional order. US Defense Secretary Jim Mattis has spoken out against China’s strategy of “intimidation and coercion” in the South China Sea, including the deployment of anti-ship missiles, surface-to-air missiles, and electronic jammers, and, more recently, the landing of nuclear-capable bomber aircraft at Woody Island. There are, Mattis warned, “consequences to China ignoring the international community.”
The Next Pacific War: Lessons From Wake Island For The PLA
By Ben Ho Wan Beng and Gary Lehmann

US defence secretary intervenes in UK military budget row
Ewen MacAskill
The US defence secretary, James Mattis, has made a surprise intervention in the row over UK defence spending by warning France could replace the UK as Washington’s closest military ally in Europe. In a leaked letter to the British defence secretary, Gavin Williamson, Mattis expressed concern the UK’s military power was at risk of erosion and compared the UK unfavourably with France, which Mattis pointed out had committed to significant increases in defence spending. “As global actors, France and the US have concluded that now is the time to significantly increase our investment in defense. Other allies are following suit,” he said. It is in the best interest of both our nations for the UK to remain the US partner of choice.”
Trump’s North Korea diplomacy aims to contain China

The state of the world’s nuclear arsenal in 3 charts

This marked a decrease from the approximately 14,935 nuclear weapons that SIPRI estimated these states possessed at the beginning of 2017.
THREAT MULTIPLIERS AND THE NEED FOR A COMPREHENSIVE CLIMATE CHANGE STRATEGY
Spencer Phillips
Introduction
The National Security Strategy (NSS) of the United States released by the White House in December 2017 was a sharp departure from the idealism of other recent administrations. In recognition of the realities of a highly competitive world, and to ensure its continued standing in the world, the U.S. would now be more willing to use its political, economic, and military power to confront potential rivals. This strategy strongly focuses on the dangers posed by traditional state actors and violent extremist organizations, and the tools they may use to threaten U.S. security interests.[1] While the dangers posed by hostile nation states, weapons of mass destruction, drones, and cyber weapons are significant enough to justify a robust U.S. response, the current strategy completely omits other equally urgent security threats. Neither the NSS nor the Defense Department’s National Defense Strategy (NDS) make any mention of the risks associated with global climate change, to include the widespread instability and conflict that it is likely to cause in the coming decades.
The start of a new poverty narrative
Homi Kharas, Kristofer Hamel, and Martin Hofer

In Eastern Europe, U.S. Military Girds Against Russian Might and Manipulation
By Eric Schmitt

Over The Barrel: Networked and vulnerable
by Vikram S Mehta

McAfee Labs Threats Report June 2018
The McAfee Labs count of total coin miner malware rose by 629% in Q1, to more than 2.9 million samples. Introduction Welcome to the McAfee® Labs Threats Report June 2018. In this edition, we highlight the notable investigative research and threat trend statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of 2018. In the first quarter, new revelations surfaced concerning complex nation-state threat campaigns that targeted users and enterprise systems worldwide. These campaigns were driven by many objectives—from profit-motivated cybercrime to political subversion to surveillance and espionage. Since our exploration of cryptojacking in the previous issue, we have seen continued expansion of this criminal endeavor during the quarter. The goal of the perpetrators is to monetize their criminal activity by expending the least amount of effort, using the fewest middlemen, and executing their crimes in the shortest time possible and with the least risk of discovery.
INFORMATION OPERATIONS AS FORCE PROTECTION
Jaim Coddington and Casey Lamar
In the 20th century, the industrial revolution allowed states to leverage existing technology for brutally effective new tactics on the battlefield. Rapid innovations in rifled artillery, mechanized fighting vehicles, and chemical warfare caught commanders of the day woefully unprepared and led to horrific casualties and collateral damage. Today, actors like Russia and the Islamic State occupy this disturbing, pioneering role in the realm of information warfare (IW), leveraging the reach of global telecommunications to influence target audiences and support kinetic operations on the battlefield. Some observers contend that the West should co-opt these new methods to avoid falling further behind in the information domain. The combined threat of adversary information capability and the growing academic discussion around information warfare puts US doctrine at a crossroads between adopting the methods of its adversaries or establishing different methods to dominate the information domain. While much of the defense community’s planning, wargaming, and emerging doctrine focuses on counter-propaganda and targeting adversary IW capabilities, this reactive strategy may have neutral or negative results.
How ransomware democratized cyber weapons, warfare
BY MORGAN WRIGHT
Banning Software Won’t Keep the Government Safe, Says Nuclear Security Agency Official
BY JOSEPH MARKS

You Should Be ‘Significantly Concerned’ There’s No White House Cyber Coordinator, Policy Experts Say
BY JOSEPH MARKS

Can NATO’s new cyber strategy survive risky summits?
By: Justin Lynch
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/3WDCEEOZJFHODMWH3X6B7D6WYQ.jpg)
DoD stands up its artificial intelligence hub
By: Aaron Mehta
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/57CR652KNZDABMTTRFZJKYQ5H4.jpg)
The Army is working on better tactical connectivity
By: Mark Pomerleau
/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com/public/C4XBGAAY4RD3JKHW5FMGUKXWYQ.jpg)
The View From Olympus: The Crying Child
Now and then it happens that a commander at some level in the U.S. military wants to move whatever he is in charge of toward Third Generation maneuver warfare. The results are usually meager, because the military personnel system moves him after a year or two and his replacement invariably neither understands nor has any interest in what he was trying to accomplish. However, those leaders making the attempt will accomplish more if they draw on work that has already been done rather than trying to reinvent the tank tread. A number of publications offer the “Cliff Notes” on maneuver warfare, i.e., they boil the general literature down and offer the basics without requiring too much reading. The most important such works are:
Mining History for the Warning Signs of America’s Next Major War
Steven Metz

Army Professional Reading and Creative Thinking
James Torrence
Background
“Because they must be able to compensate for their own weaknesses, strategic leaders cannot afford to have staffs that blindly agree with everything they say. Strategic leaders encourage staffs to participate in open dialogue with them, discuss alternative points of view, and explore all facts, assumptions, and implications. Such dialogue, that includes inquiry and advocacy, enables strategic leaders to assess all aspects of an issue and helps clarify their vision, intent, and guidance. As strategic leaders build and use effective staffs, they continually seek honest and competent people of diverse backgrounds.”[i]
-- ADRP 6-22
Subscribe to:
Posts (Atom)