21 March 2018

‘Pakistan is isolated and has fewer friends in the international community’


Last month the Supreme Court of Pakistan issued an arrest warrant for the former ambassador to the United States, Husain Haqqani, after he failed to appear in court for a hearing on “Memogate.” The “memo” in question had allegedly been sent by Haqqani to a high-ranking US official in May 2011 – days after the operation that killed Osama bin Laden in Abbottabad, Pakistan – exposing clashes between the civilian government then led by the Pakistan Peoples Party and the army.

We Asked Gen. Petraeus If The Iraq War Was Worth It. Here’s What He Said

by Jeff Schogol 

Fifteen years of war have turned Iraqi cities such as Ramadi, Fallujah, and Mosul into ruins. Iraq remains as divided as ever along sectarian lines, despite the deaths of more than 4,500 U.S. troops and untold numbers of Iraqis. U.S. troops remain in Iraq to help advise and assist Iraqi forces as they try to prevent ISIS from launching yet another insurgency. Meanwhile, Iran has flooded the country with thousands of proxy fighters, giving it a large say in what the government of Iraq does post-ISIS. This wasn’t the Iraq that was supposed to emerge when U.S. troops crossed the berm from Kuwait to Iraq in March 2003. Nor is this the Iraq that troops who trounced al Qaeda during the surge bled for. There are few tangible signs of success, and Iraq’s future is still unclear.

A New Order for the Indo-Pacific


China has transformed the Indo-Pacific region’s strategic landscape in just five years. If other powers do not step in to counter further challenges to the territorial and maritime status quo, the next five years could entrench China’s strategic advantages. Security dynamics are changing rapidly in the Indo-Pacific. The region is home not only to the world’s fastest-growing economies, but also to the fastest-increasing military expenditures and naval capabilities, the fiercest competition over natural resources, and the most dangerous strategic hot spots. One might even say that it holds the key to global security.  The increasing use of the term “Indo-Pacific” – which refers to all countries bordering the Indian and Pacific oceans – rather than “Asia-Pacific,” underscores the maritime dimension of today’s tensions. Asia’s oceans have increasingly become an arena of competition for resources and influence. It now seems likely that future regional crises will be triggered and/or settled at sea.

Chinese APT15 Group Steals UK Military Docs

Phil Muncaste
Source Link

A suspected Chinse APT group has been spotted raiding a UK government contractor for military and other sensitive documents. APT15 is also known as Ke3chang, Mirage, Vixen Panda GREF and Playful Dragon – a group operating for several years from servers registered in China and with Chinese language infrastructure. NCC Group claimed at the weekend that it spotted the group stealing sensitive documents from one of its clients, a government contractor, back in May. It appeared to be using a blend of old and new tools: previous backdoor BS2005 now appearing alongside new versions RoyalCli and RoyalDNS.

The Fatal Flaw in China's Plan for Dominating the World Economy

Milton Ezrati

Chinese premier Li Keqiang recently delivered a remarkably revealing speech. Addressing the National People’s Congress for two full hours early in March, he stressed the county’s determination to rely on broad industrial policies as a means to development. The objective, to use Li’s words, is to “speed up work to build China into a leader in manufacturing.” Li doubtless wanted his audience and the world to hear his remarks as a challenge to Western economic power. Many no doubt did. What Li failed to note, and assuredly does not realize, is how his blueprint for progress, rather than ensure Chinese dominance, will instead keep that country indefinitely dependent on the West, doom it to repeat its already well-established pattern of wasteful overbuilding, and ensure that its economy will always remain just a bit behind the West technologically.

Chairman Xi, Chinese Idol

Ian Johnson 

For nearly sixty years since it opened in 1959, the Great Hall of the People has been the public focus of Chinese politics, a monumental granite block that extends 1,200 feet along the west side of Tiananmen Square. It is where the country’s leaders appear in public to display their power: a platform for state banquets, receptions of foreign dignitaries, and symbolic political meetings. It is their throne room, their sacred space. It is the outward manifestation of decisions made in other, darker realms. 

‘Enforcer’ Wang could be let loose on US to quell trade dispute


Wang Qishan has been described as cold, calculating and combative by his enemies. Just the sort of skill set his small, select circle of political allies are counting on, including his old comrade, the Chinese President Xi Jinping. At 69, Wang was forced to step down from the all-powerful seven-man Politburo Standing Committee in October because of his age during a reshuffle at the 19th National Congress of the Communist Party of China in Beijing. For the past five years, he had been feared and loathed as the anti-corruption tzar in President Xi’s centerpiece “clean up” campaign before he “retired”. But now, he is back after being elected to the National People’s Congress last month.

A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.


In August, a petrochemical company with a plant in Saudi Arabia was hit by a new kind of cyberassault. The attack was not designed to simply destroy data or shut down the plant, investigators believe. It was meant to sabotage the firm’s operations and trigger an explosion. The attack was a dangerous escalation in international hacking, as faceless enemies demonstrated both the drive and the ability to inflict serious physical damage. And United States government officials, their allies and cybersecurity researchers worry that the culprits could replicate it in other countries, since thousands of industrial plants all over the world rely on the same American-engineered computer systems that were compromised.

Pentagon Wants Silicon Valley’s Help on A.I.


An Air Force cargo jet in 2016 at a base in the Persian Gulf where drones were launched against the Islamic State. With drone technology just one area open to advances in artificial intelligence, a task force will explore how the government can work better with tech leaders to develop its A.I. There is little doubt that the Defense Department needs help from Silicon Valley’s biggest companies as it pursues work on artificial intelligence. The question is whether the people who work at those companies are willing to cooperate.

The Cambridge Analytica Files

by Carole Cadwalladr

The first time I met Christopher Wylie, he didn’t yet have pink hair. That comes later. As does his mission to rewind time. To put the genie back in the bottle. By the time I met him in person, I’d already been talking to him on a daily basis for hours at a time. On the phone, he was clever, funny, bitchy, profound, intellectually ravenous, compelling. A master storyteller. A politicker. A data science nerd.

Israel says it foiled Hamas bid to rebuild Gaza attack tunnel

Israel says foiled Hamas bid to rebuild Gaza tunnel 

Israeli forces on Sunday knocked out a tunnel in the Gaza Strip dug by Hamas militants to mount cross-border attacks, the military said.  The tunnel had been cut off during the 2014 Gaza war and Hamas had tried to put it back into operation, a military spokesman said. It had been dug inside the Hamas-ruled enclave several hundred meters away from Israel’s border fence. The Israeli forces did not cross the border to render the tunnel inoperable but used a new technique, Lieutenant-Colonel Jonathan Conricus told reporters. “We did not use explosives. It (the tunnel) was filled with a certain material, with a certain compound,” Conricus said.

How Trump could give the Pentagon a McMaster problem


The growing expectation that President Donald Trump is going to force out Lt. Gen. H.R. McMaster as national security adviser raises a quandary: would the Army take him back? Like his precarious position in the White House over the past year, McMaster’s stormy relationship with the Army leadership is nearly legendary due to his questioning of orthodoxy and brusque manner. Now, the Pentagon is grappling with what to do with the military’s leading warrior-intellectual should he become the latest Trump aide to be replaced, according to multiple current and former officers and administration officials — a predicament that even McMaster himself hinted at on Friday, when he told a reporter that "everybody has got to leave the White House at some point."

U.S. Imposes New Sanctions On Russia Over Election Interference, Cyberattacks


The Trump administration imposed new sanctions against Russia on Thursday, slapping punitive measures on 19 people and five entities over their alleged role in Moscow's interference in the 2016 election and other "destructive" cyberattacks. The sanctions mark the most significant move against Russia since President Trump took office more than a year ago. They arrived as Washington's closest ally, Britain, is locked in a diplomatic struggle with Moscow after accusing the Kremlin of using a nerve agent to poison a former Russian intelligence officer living in the United Kingdom.Trump also joined the leaders of the U.K., France and Germany on Thursday in issuing a statement that condemned the poisoning attack.

Why we must break the Syria-North Korea WMD trade, and how we can

By Joshua Stanton

Last night, the U.N. Panel of Experts published its latest report. There is sufficient material in it for several posts, but some of the most alarming facts in it have to do with North Korea’s assistance to Syria with its ballistic missiles and chemical weapons, so that’s where I’ll begin.

Putin’s new Cold War


Vladimir Putin is not one to accept criticism from the West, even when his country stands accused of attempted murder using military-grade nerve agents. Russian responses to the accusations have been dismissive, even suggesting that British intelligence was really responsible for the attempted murder on 4 March of Sergei Skripal and his daughter Yulia in Salisbury, combined with knowing observations that their fate should be a warning to other traitors.

Okay, Say Someone Hacks into the US Power Grid. Then What?


A joint research project between the Department of Energy and a geographic analytics company is mapping just how far the repercussions could spread. “On a scale of 1 to 10,” the threat of a cyber attack on U.S.critical infrastructure is “a 7 or an 8,” the Department of Homeland Security warned lawmakers last week. And indeed, someone has been probing the defenses of utilities, key manufacturers, and others. So what happens if hackers launch a network attack that, say, causes a rolling blackout in the Midwest?

Russians Targeting the “Achilles Heel” of Critical Infrastructure

The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting to delete evidence of their intrusions. Homeland Security officials say they have helped the affected companies remove the Russian hackers from their compromised networks, but the Russians keep trying to hack into these critical systems.

It’s official: Russia is targeting critical American infrastructure with ‘malicious cyberattacks’

By Bryan Clark

Russian cyber operatives are attacking critical American infrastructure such as energy grids, nuclear facilities, aviation systems, and water processing plants, according to the Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS). The report details numerous attempts, since at least March of 2016, where Russian cyber operatives targeted government entities and multiple US critical infrastructure sectors.

Pentagon Cloud Migration Fights Cybersecurity Challenges

By Kris Osborn - Managing Editor - Warrior Maven

The Pentagon is working with industry to accelerate migration to cloud technology to enable faster decision making The Pentagon is working with industry to accelerate widespread migration to cloud technology to enable faster decision-making, AI implementation, rapid data organization and improved IT security, Pentagon leaders said. The multi-faceted initiative includes data consolidation, reducing the hardware footprint and efforts to connect satellite ground terminals more seamlessly with one another; the key concept, of course, is to increase access to otherwise disparate pools of information, share information quickly and give combat commanders more options on a faster time frame.

Army standardizes ‘thinking outside the box’ procedures


In an attempt to encourage critical thinking among its ranks, the U.S. Army announced it has standardized all procedures for thinking outside the box, sources confirmed today.The new Army Doctrinal Publication 9-0: Thinking Outside the Box codifies time-tested methods for thinking unconventionally in “the proper Army fashion,” officials said.“The goal was to have a single, fixed way of thinking outside the box so we can make sure everyone is doing it right,” said Chief of Staff of the Army Gen. Mark Milley. “Now I’m confident that all of our soldiers will think outside the box in accordance with Army regulations.” The publication lays out specific steps for achieving proficiency in outside-the-box thinking. Steps range from, the first, “perform thorough military decision-making process (MDMP) to identify who, what, when, where, and why the box is, and establish rules of engagement for thinking outside of said box” to step 14, “submit thinking outside the box proposal to first general officer in chain of command.”

The Looming National Security Crisis: Young Americans Unable to Serve in the Military

Authors:Thomas Spoehr and Bridget Handy

The military depends on a constant flow of volunteers every year. According to 2017 Pentagon data, 71 percent of young Americans between 17 and 24 are ineligible to serve in the United States military. Put another way: Over 24 million of the 34 million people of that age group cannot join the armed forces—even if they wanted to. This is an alarming situation that threatens the country’s fundamental national security. If only 29 percent of the nation’s young adults are qualified to serve, and if this trend continues, it is inevitable that the U.S. military will suffer from a lack of manpower. A manpower shortage in the United States Armed Forces directly compromises national security. 


Sidharth Kaushal


Combating insurgencies with conventional forces has long been regarded as being, to paraphrase T.E Lawrence’s colorful formulation, comparable to eating soup with a knife (Lawrence, 1922, 53). Indeed, the inutility of force with regards to combating a phenomenon that primarily exists in the minds of a target population has been noted by figures from General Rupert Smith to General David Petraeus, the latter articulating this principle as a central premise upon which he built his population centric theory of counterinsurgency in FM-3-24 (Petraeus, 2006, 60-100) (Smith, 2005, 40). Within the context of this argument, any effort to destroy an insurgent militarily by a policy of attrition or annihilation ignores the insurgents innate capacity to trade space for time, avoiding the strengths of a conventional force and eroding both its domestic will and its control over the target populace (over which the insurgent and counterinsurgent force are fighting) by policies of assassination, intimidation of the counterinsurgency’s local supporters and dispersed attacks on occupying troops. The ability of an insurgency, even one which has held territory for a significant period to revert to what T.X. Hammes dubs phase I of an insurgent strategy (whereby it resorts to asymmetrical warfare) is central to the argument regarding the inutility of an enemy-centric Clausewitzian approach to combating insurgencies (Hammes, 2006, 50).

What the Coming Space Conflict Will Really Look Like

By Lee Ferran

President Donald Trump raised a few eyebrows and prompted no small amount of scorn online when, in apparently off-the-cuff remarks, he proposed creating a “Space Force” as a separate military branch to do battle among the stars. “My new national strategy for space recognizes that space is a war-fighting domain, just like the land, air and sea,” Trump told U.S. Marines at Marine Corps Air Station Miramar Tuesday before appearing to veer off script. “We may even have a Space Force, develop another one, Space Force. We have the Air Force, we’ll have the Space Force … You know, I was saying it the other day, because we’re doing a tremendous amount of work in space, I said maybe we need a new force. We’ll call it Space Force.”

War Games: Army Replacing 1980s Simulators With Gaming Tech


The first phase of the Synthetic Training Environment initiative replaces existing simulators for vehicles. The second phase aims to create — in just two years — something the Army’s never had before: an “immersive” virtual training environment for troops on foot. UPDATED Lockheed Wins Contract To Maintain 100+ Legacy Training Systems After years of toying with the technology, the Army is now racing to replace its clunky 1980s and ’90s-vintage training simulators with virtual reality, massive multiplayer networks and other innovations straight from the commercial gaming industry.


Bradley L. Rees

“This is a totally new kind of threat, as we all know. Our adversaries, both state and non-state actors, view the entire information domain as a battlespace, and across it, they are waging a new kind of war against us, a war involving but also extending beyond our military, to include our infrastructure, our businesses, and our people.”


20 March 2018

Hold my beer while I crack UIDAI security

It was a squally Saturday evening in Manhattan, winds touching 40mph and seeping through the cracks of my rent subsidized midtown apartment(it’s the details, not just the location). I had just invited a friend over for a drink and we planned on binge watching Altered Carbon and finish a party pack of Doritos(not healthy, I know). We started discussing our doomsday scenarios of a post apocalyptic world where the state monitors your every movement and spoke at length about the Chinese “Credit Score” for appropriate behavior and its parallels with the credit score in the US which unfairly docks points for minorities and people in less than glamorous neighborhoods. 

Indian Foreign Policy Establishment’s China Policy Conundrum – Analysis

By Dr Subhash Kapila

India and its foreign policy establishment’s most confusing conundrum once again is to clearly define whether in the larger and long-range perspective China is India’s ‘Friend or Foe’? India’s lack of discerning this distinction makes it ecstatically jump at every crumb of feigned friendship that China spasmodically keeps throwing at India India’s confused China Policy Conundrum has once again surfaced recently when media reports indicate that Indian Foreign Secretary Gokhale sent an advisory note to the Cabinet Secretary that Indian leaders and officials should not attend HH The Dalai Lama’s ‘Thank Yu India’ event in Delhi out of sensitivity for China’s stances on Tibet.

Why the Taliban Isn't Winning in Afghanistan

By Seth G. Jones

We must face facts,” remarked Senator John McCain in August 2017, “we are losing in Afghanistan and time is of the essence if we intend to turn the tide.” He is not the only one who has argued that the Taliban are on the march. “The Taliban are getting stronger, the government is on the retreat, they are losing ground to the Taliban day by day,” Abdul Jabbar Qahraman, a retired Afghan general who was the Afghan government’s military envoy to Helmand Province until 2016, told the New York Times over the summer. Media outlets have likewise proclaimed that “The Taliban do look a lot like they are winning” and that this is “The war America can’t win.”

The 'Resource War' in Kachin State

By Eugene Mark

Myanmar’s Tatmadaw has been launching air strikes in the gold and mining region inside Kachin state’s Tanai township in recent months. The area is controlled by the Kachin Independence Organization (KIO) and its armed group, the Kachin Independence Army (KIA). The aim is to clear out the illegal mines in the area that provide a lucrative source of income for the KIO. But underneath this military operation is actually a “resource war” between the Tatmadaw and the KIO in Kachin state. Indeed, control of not only gold and amber but also jade, copper, and ruby mines in the area is important for both the Tatmadaw and the KIO. This competition for natural resources can be viewed as an obstacle to implementing lasting peace in the Kachin state, as it precipitates or worsens the socioeconomic crisis faced by the rest of the Kachin community.

House Proposal Targets Confucius Institutes as Foreign Agents

Chinese consular staff wave national flags in front of a demonstration by supporters of the Falungong spiritual movement outside the venue where China's Vice President Xi Jinping was opening Australia's first Chinese Medicine Confucius Institute, at the RMIT University in Melbourne on June 20, 2010. A new draft proposal in the House of Representatives seeks to require China’s cultural outposts in the United States, the Confucius Institutes, to register as foreign agents.

The battle for digital supremacy

“DESIGNED by Apple in California. Assembled in China”. For the past decade the words embossed on the back of iPhones have served as shorthand for the technological bargain between the world’s two biggest economies: America supplies the brains and China the brawn. Not any more. China’s world-class tech giants, Alibaba and Tencent, have market values of around $500bn, rivalling Facebook’s. China has the largest online-payments market. Its equipment is being exported across the world. It has the fastest supercomputer. It is building the world’s most lavish quantum-computing research centre. Its forthcoming satellite-navigation system will compete with America’s GPS by 2020.

The Fatal Flaw in China's Plan for Dominating the World Economy

Chinese premier Li Keqiang recently delivered a remarkably revealing speech. Addressing the National People’s Congress for two full hours early in March, he stressed the county’s determination to rely on broad industrial policies as a means to development. The objective, to use Li’s words, is to “speed up work to build China into a leader in manufacturing.” Li doubtless wanted his audience and the world to hear his remarks as a challenge to Western economic power. Many no doubt did. What Li failed to note, and assuredly does not realize, is how his blueprint for progress, rather than ensure Chinese dominance, will instead keep that country indefinitely dependent on the West, doom it to repeat its already well-established pattern of wasteful overbuilding, and ensure that its economy will always remain just a bit behind the West technologically.

China’s Quest for Political Control and Military Supremacy in the Cyber Domain

The People’s Republic of China seeks to contest information dominance (制信息权) and discursive dominance (话语权) in cyberspace. For the Chinese Communist Party (CCP), cybersecurity is integral to comprehensive state security (国家安全). That’s distinct from ‘national’ security in that it focuses on preserving stability and legitimacy to ensure the regime’s survival. Xi Jinping has said that ‘without cybersecurity, there is no state security’. In this concept of cybersecurity, information security and control take priority. Indeed, for the CCP, threats to cyber sovereignty (网络主权) are seen as existential in nature. For that reason, the People’s Liberation Army (PLA) is actively building its capabilities to engage in ‘military struggle’ (军事斗争) in the cyber domain.

The Chinese Leadership's Reform Strategy Comes With a Risk

The next few years will determine whether China's leaders have the commitment and ability to adapt to economic changes and follow through with necessary reforms. Chinese President Xi Jinping will need to retain a firm grip on power while at the same time meeting the rising expectations that come with that level of authority. Beijing aims to reshape local governments' behavior and lower its growth target, paving the way for more sustainable economic growth. Trade pressure from the United States and a slowing economy will test Beijing's resolve as it strives to restructure its economy, challenging its deleveraging campaign and its attempts at enforcing environmental reforms. 

China’s great leap forward in science and engineering

Narayan Ramachandran

Sixty years ago, Chairman Mao Zedong of China launched his great leap forward, a plan for social and economic transformation that is widely believed to have resulted in the great Chinese famine of the 1950s. Luckily for China, in the intervening years since then, systematic development programmes and diligent execution begun by Deng Xiaoping and continued by subsequent governments have lifted 700 million people out of poverty, brought prosperity to millions of households and put China on an undeniable path to super-power status.

Threat of Russian cyber reprisal puts UK finance, power and water on high alert

Mark Townsend and Toby Helm

Britain’s finance sector is on high alert amid warnings of a possible Russian cyber-attack on the nation’s infrastructure. Banks, energy and water companies are on maximum alert over the threat of a serious cyber-attack from Moscow as concern continues over the safety of Russian exiles in the UK. Fears that Russia will target Britain’s critical national infrastructure have prompted round-the-clock threat assessments by the UK’s financial sector, energy firms and GCHQ, the UK’s largest intelligence agency, along with the security services MI5 and MI6.

Obstacles to Mexico’s Territorial Control

Mexico City, the seat of Mexico’s government, has a very basic problem: It has a lot of territory to govern and many physical obstacles between itself and much of that territory.

A U.S. Containment Strategy for Syria

The United States’ interests in Syria lie in formalizing its battlefield gains with a negotiated settlement and then leaving the country. To achieve this goal, it will need to find common cause in the short term with its greatest geopolitical foe, Russia. Doing so will require Washington to acknowledge a painful but obvious truth: Syrian President Bashar al-Assad has largely routed the anti-regime insurgency, consolidated power in much of the country’s west, and received open-ended support and security guarantees from Moscow and Tehran. Assad will govern most of Syria for the foreseeable future.

Africa, Latest Theater in America’s Endless War

Joe Penney 

Last October, four American soldiers, four Nigerien soldiers, and a Nigerien translator were killed in combat on Niger’s border with Mali while looking for the jihadi militant Doundoun Cheffou. For the most part, the fallout concentrated on President Trump’s mangled call with the widow of Sergeant La David Johnson. But the incident also called attention to a dangerous development at multiple levels of US politics. From a small village in rural Niger all the way to the White House, the US military has increasing influence over American foreign policy in Africa. 

The global impacts of a terrorist nuclear attack: What would happen? What should we do?

Irma ArguelloEmiliano J. Buis

As seen by recent events such as the bombing in Manchester, UK, terrorism can occur anywhere, at any time. So far, the terrorist incidents have been relatively low-tech – such as improvised explosive devices detonating inside pressure cookers, trucks driving down crowded sidewalks, or bombs exploding in backpacks containing metal bolts and screws. But what if terrorists were to build a dirty bomb that contained radioactive materials instead of bits of metal shrapnel, and set it off in a major city? Or, worse, what if they managed to build a fully functioning nuclear weapon, cart it to the downtown of a city, and then detonate it – even a small, rudimentary one that was much smaller than the atomic bomb dropped on Hiroshima? What would the social, economic, and political impacts of the successful terrorist use of a nuclear weapon look like? What planning has the international community done for such an event? 

NATO’s Next Nuclear Challenges


A more competitive international environment, and in particular Russia’s assertive policies, has sparked renewed interest in the concept of nuclear deterrence in Western defense strategies. For NATO, this rediscovery has manifested itself (among other things) in a thorough analysis of Russia’s nuclear policy and posture, renewed attention to NATO’s own nuclear arrangements, and a stronger emphasis on nuclear deterrence and nuclear arms control in public statements. But there’s more. Major changes in the global nuclear landscape, including in nuclear governance, may soon put renewed pressure on this important part of NATO’s deterrence strategy. Allies need to look not only at the challenges posed by Russia’s nuclear modernization, but also ponder the implications of other—potentially much more far-reaching—changes. Three areas stand out.

Syria: Russia's Military Proving Ground

In the past decade, Russia has made a strategic breakthrough in terms of developing its military, but before its operations in Syria, it had not tested its armed forces in combat. In this regard, Syria became the perfect laboratory for mastering skills and testing equipment of the Russian military machine.The Russian-Georgian War For the Russian Federation, the Russian-Georgian War in 2008 was a harsh lesson regarding its military weaknesses and strategic backwardness compared to the West, and it triggered a reassessment of the real situation with the Russian Army. Although victory was achieved quickly, the military noted its deficiencies and the advantages Georgia enjoyed compared to Russia.

A Storm Is Brewing in Transatlantic Relations

By Louis Golino

Recent events in Washington, especially the nomination by US President Donald J. Trump of Mike Pompeo to be the next secretary of state and US imposition of tariffs on aluminum and steel imports, combined with a Europe that is politically weakened and internally focused, are helping create what may become the worst divergence in the transatlantic relationship since the 2003 crisis over the war in Iraq. Unlike the Iraq split, which was over one issue—Franco-German opposition to the US intervention there —the new crisis involves a wide range of complex issues that will be much more difficult to resolve. The replacement of Rex Tillerson with Pompeo, whose paternal great-grandparents came to the United States from Italy, is being greeted in Europe with caution and concern.

Food Insecurity: A Devastating Consequence—And Weapon—of Conflict


Bottom Line: Behind the curtain of violent conflict often resides a potentially devastating, long-term issue that demands global attention: food insecurity as both a weapon and consequence of war. Militant groups recruit the hungry with promises of the next meal, and states such as North Korea and Syria control food as a mechanism of internal power and psychological warfare. The problem of feeding the world’s hungry – many of whom find themselves in the crossfire of conflict – is only expected to get worse as climates change, populations grow and the rural migrate to booming megacities.

Redefining Skilled Labour

Ganesh Chakravarthi

Skilled labour seems to be in short supply. At least that is what many companies gripe. However, artificial intelligence can substitute the vast expertise, placing the ‘skill’ in the hands of machines. That McDonalds you frequent, the construction workers you employ, or the shop stewards in a supermarket that restock empty shelves may eventually be replaced by robots. The subsequent wave of automation, currently underway — machine learning, sensors feeding data to an AI system, and artificial cognition — will eventually spread from manual labour to white-collar work.

Russians Targeting the “Achilles Heel” of Critical Infrastructure

The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting to delete evidence of their intrusions. Homeland Security officials say they have helped the affected companies remove the Russian hackers from their compromised networks, but the Russians keep trying to hack into these critical systems.

How Social Media Affects Politics

Anirudh Kanisetti

A recent book, Political Turbulence, uses data to uncover the effect social media has on politics. Let’s say you have a pendulum. You give it a bit of a nudge, and it oscillates peacefully. You know exactly how this simple system works. What’s better than a nice, calming pendulum? Two nice, calming pendulums. So you tie another pendulum to the first one. And you give it a nudge. But from the confluence of two simple, predictable systems, chaos ensues. Over the last few years, chaos and turbulence have become ever-more apparent parts of our daily lives. Apparently small effects can be magnified to produce dizzyingly large and unpredictable effects. Social media has moved from being peripheral to integral to politics, and those who have understood and exploited it have reaped massive electoral rewards.

Intelligence official: US still leads in quantum computing ... for now

By: Mark Pomerleau 

Recent comments from the intelligence community indicate quantum computing could be one of the most important technology investments being made today, but the field has many worried about what might happen if others achieve it first. Quantum encryption, enabled by quantum computing, could have profound national security implications such as making adversary messages unreadable and enabling others to easily decrypt critical protected intel. The United States, for now, remains the leader, according to one U.S. intelligence official.

Guns, Drones, & Augmented Reality: Army Seeks Infantry Revolution


There’s a revolution afoot in America’s infantry. New guns to replace the M4 carbine, M16 rifle, and M249 Squad Automatic Weapon. A new mini-drone to scout ahead. A new tactical network to link scattered units. A new night vision sight that displays targeting data like a fighter pilot’s Heads-Up Display. New tactics to use all of the above and new VR simulators to train on. All these innovations could be in the hands of US Army infantry within “a few years,” Brig. Gen. Christopher Donahue told reporters Friday.

Army Accelerates Upgraded Intel Data-Base to War

By Kris Osborn 

The Army is taking its intelligence data base and accelerating it to the edge of combat with a series of strategic and technological initiatives including ruggedized laptops and an increased ability to enable tactical operations in challenged or “disconnected environments,” service officials announced. Through a new deal with Raytheon and Palantir technologies, the Army plans to quickly integrate hardware and software improvements to its Distributed Common Ground System-Army such that it can better access and organize combat relevant information at the “tactical echelon,” Army officials announced.