30 June 2015

China, Pakistan’s strategic Kashmir game

Arun Joshi
Jun 30 2015 

The mastermind of the 26/11, Zaki-ur-Rehman Lakhvi is the top-most man in the Lashkar-e-Toiba hierarchy, after Hafeez Saeed

BEIJING’S move at the UN blocking action against Zaki-ur-Rehman Lakhvi, one of the masterminds of 26/11, should be read as a small piece in the larger game that China and Pakistan are playing in South Asia, particularly Jammu and Kashmir. By vetoing action against Pakistan on the release of Lakhvi, China has shown with an assertive demonstration that for it Pakistan matters more in its geo-strategic scheme of things in South Asia than even the growth of radical Islam and terrorism in its own backyard Xinjiang. It’s not that China is oblivious of dangers of terrorism, but it is playing a bigger game where it probably thinks that radicalism and terrorism would not hurt it. History is replete with the facts that terrorism doesn’t know any boundaries. If the terrorists could strike at the geographically and militarily invincible America in September 2001, they would not spare anyone. China knows it but for now sees larger gains through the China-Pakistan Economic Corridor (CEPC); hence its anxiety to please Pakistan.

Ways to remember

June 30, 2015 
The government is reportedly making massive plans to mark the 50th anniversary of the India-Pakistan 1965 war. Details of a “carnival” that the ministry of defence has asked the three services to put up on Rajpath are still being worked out, but going by this government’s fascination for setting records, it seems safe to assume that it will put into shade any war commemoration that India has so far witnessed. Nations across the world do, in one way or another, commemorate their military victories, and honour soldiers who sacrificed their lives for their country. In May this year, the World War II Allies — the US, France, the UK, and separately Russia — marked the 70th anniversary of Germany’s surrender. The leaders constantly stressed that it was not the defeat of one country at the hands of others that was being commemorated, but the defeat of Nazism and fascism. The war ended decades of hostility between Germany and its neighbours, and could even be said to have paved the way for a European Union. In South Asia, where India and Pakistan have remained hostile, barring a few unsuccessful and shortlived attempts to make peace, a month of gung-ho events to celebrate a war fought with a neighbour 50 years ago does not seem like a good idea.

The Great Game Folio: Chinese Submarines

C. Raja Mohan
June 30, 2015

The Chinese navy first showed its flag in the Indian Ocean nearly three decades ago, when it began to make ship visits to Sri Lanka and Pakistan.

Reports that the docking of a Chinese submarine at Karachi last month has surprised New Delhi are distressing. One would have thought Delhi would have anticipated the development after it sighted Chinese submarines in Sri Lanka’s waters last year. Despite the growing strategic importance of the Indian Ocean in China’s maritime strategy, Delhi’s defence bureaucracy seems to continue to wring its hands rather than act.
VISHAKHA N. DESAI 
June 30, 2015 

“While Bobby Jindal defined America in the narrowest possible white, Christian frame, Barack Obama acknowledged his role and responsibility in addressing the reality of race that continues to persist in the U.S. despite progress.” Picture shows Mr. Jindal announcing his candidacy for the 2016 Presidential election.

There is a stark contrast between Governor of Louisiana Bobby Jindal’s banal remarks and U.S. President Barack Obama’s powerful eulogy on the idea of America

On June 24, the Governor of Louisiana, Bobby Jindal, announced his candidacy for the President of the United States. The media reported this historic moment of the first Indian-American jumping into the fray, just as Mr. Jindal pronounced that he was “done with” describing Americans by their ethnic identity. “We are not Indian Americans, African Americans, Irish Americans, rich Americans or poor Americans; we are Americans,” he said. Within minutes, twitterdom and blogosphere lit up in India and the U.S. with #BobbyJindalIsSoWhite trending. One of my favourite tweets was from Priti: “#BobbyJindalIsSoWhite that he couldn’t win Spelling Bee even if he tried.”

Defence Expenditure: Conflicting Tales

By Brig. Gurmeet Kanwal
29 Jun , 2015

Presently, India’s defence budget – 1.74 per cent of its GDP – is too low to undertake the capacity building necessary to deter China from contemplating another border war. The defence budget needs to be increased gradually to first 2.0 and then to 3.0 per cent of the GDP. India’s growing economy should be able to sustain this hike in the defence budget over a period of three to five years, especially if the government simultaneously shows the courage to reduce wasteful subsidies.

“India’s defence budget is declining in real terms, while China’s is growing at double-digit rates every year.”

In terms of real purchasing power, India’s defence budget has been declining consistently…

In an otherwise pragmatic budget for 2015-2016 that has been hailed as growth oriented, Finance Minister Arun Jaitley has not done enough to give the much needed boost to military modernisation. The proforma hike in the defence budget will not be adequate to make up the ‘critical hollowness’ in India’s defence preparedness pointed out by former Chief of the Army Staff, General VK Singh; nor will it help to meet the growing threats and challenges facing the country and India’s increasing responsibilities as a regional power.

Islamic State Eying Afghanistan’s Natural Resources

By Brian M. Perkins
June 28, 2015

According to a recent Pentagon report, the Islamic State’s (IS) activities in Afghanistan remain exploratory, with limited recruiting efforts. Although the capabilities of the Islamic State’s recently minted Khorasan Province may be limited, the group is clearly attempting to gain a toehold in Afghanistan. IS has dominated headlines in Afghan media for the past several weeks, with multiple reports of the group clashing with Taliban fighters in Nangarhar and a Taliban letterwarning IS to stay out of Afghanistan. There is speculation that the Afghan government is exaggerating the IS threat to draw increased foreign aid, but the group’s presence is undeniable, and the worsening security situation could pave the way for IS to enhance its operations

Tomgram: Andrew Bacevich, The Theology of American National Security

Andrew Bacevich
June 18, 2015.

In April 2003, with Baghdad occupied by American troops, the top officials of the Bush administration were already dreaming of building bases in Iraq that would be garrisoned more or less in perpetuity. Everyone was too polite to call them “permanent bases,” so they were sometimes referred to by the Pentagon as “enduring camps.” Still, planning for “permanent access” to at least four giant Iraqi bases was underway, as Thom Shanker and Eric Schmitt of the New York Times reported then. These were intended to anchor a Pax Americana in the Middle East.

In the months that followed President Bush’s “mission accomplished” speech, the U.S. military began constructing bases in remarkable profusion. By late 2003, Lieutenant Colonel David Holt, "tasked with facilities development" in Iraq, was quoted in an engineering magazine speaking proudly of several billion dollars already having been sunk into base construction. ("The numbers,” he said, “are staggering.") By 2005, as the country disintegrated into Sunni and Shiite insurgencies and chaos ensued, there were 105 U.S. bases in the country, ranging from tiny combat outposts to monster facilities like Balad Air Base with its own Pizza Hut, Subway, and Popeye's franchises, "an ersatz Starbucks," a 24-hour Burger King, two post exchanges, and four mess halls. By the height of the occupation, Washington had reportedly constructed a mind-boggling 505 bases without any kind of public accounting of what was being spent on them. By 2011, when the last U.S. troops slipped out of the country, every one of them (except the 506th base, the giant three-quarters-of-a-billion-dollar American Embassy that the Bush administration built in Baghdad) had been abandoned to the Iraqi military, to looters, or to the ravages of time.

No Easy Task: The Right Way to Study China's Military

Peter Mattis
June 29, 2015 

On February 2, 1977, the late Mike Oksenberg, a China expert then serving on the National Security Council staff, wrote a memo to his boss, National Security Advisor Zbigniew Brzezinski, expressing his dismay with the state of U.S. Government analysis on China. Although Oksenberg had “not been very impressed thus far by what [he had] seen,” he was admirably concerned about the future: “How do we cultivate talent so that 15–20 years from now, we will have a core group of 25–35 top-flight Chinese intelligence analysts in the then age bracket of 40–55. Everyone agrees with me that unless something is done, such a group will not exist.” Thirty-five years later, a senior U.S. academic on China would stand up at a Washington, DC conference and tell an audience of his peers in government and defense contractors that universities had failed to build expertise in the ivory tower and to produce sufficient numbers of properly trained analysts to support ongoing analysis of the Chinese military. And more recently, General Karl Eikenberry, a retired U.S. Army foreign area officer, called American expertise on China into question when he suggested expanded support for China and East Asian area studies to “to better understand and more effectively respond to China's attempts to expand its influence.”

Why Is Washington So Reticent About Bringing Up Chinese Cyber Espionage Activities With the Chinese Government?

Stuart Leavenworth
June 24, 2015

BEIJING — For nearly a year, starting in June 2014, hackers thought to be Chinese accessed security clearance information on millions of current and past federal employees.

Given the scale of that breach, you might think that combating cyberwarfare would be a top priority for U.S. officials during talks with their Chinese counterparts, including a two-day meeting that concludes Wednesday in Washington.

Not necessarily so. While the U.S. side is sure to raise concerns over hacking of the Office of Personnel Management, few analysts think anything of substance will be announced this week. China denies it is behind the OPM hacking, and Obama administration officials are clearly embarrassed it happened so easily, and over such a long period.

Moreover, U.S. officials have been trying to focus their cyber discussions with China on economic espionage — the stealing of trade secrets and intellectual property — as opposed to the kind of spying that both countries have been known to practice.

CHINA’S DEFENCE WHITE PAPER, 2015 AND IMPLICATIONS FOR INDIA’

JAYADEVA RANADE
June 24, 2015

On May 26, 2015, China’s Ministry of National Defense (MND) issued its ninth White Paper entitled ‘China’s Military Strategy’. This 9000-character (in Chinese or 6,393 words in English), 6-chapter long White Paper is the first ever to have been issued which solely discusses China’s military strategy. Reflecting Beijing’s self-confidence, the White Paper spells out China’s expanded ‘national interests’ and role envisaged for its armed forces which, it asserted, must “effectively secure China’s overseas interests”. Outlining the PLA’s role, the White Paper says “national security is more vulnerable to international and regional turmoil, terrorism, piracy, serious natural disasters and epidemics, and the security of overseas interests concerning energy and resources, strategic sea lines of communication (SLOCs), as well as institutions, personnel and assets abroad, has become an imminent issue”. 

Important is the White Paper’s assessment of China’s domestic security situation. Unlike in 2013, this White Paper makes specific mention of Tibet indicating the upgraded importance of the Tibet issue to the Chinese Communist Party (CCP) leadership. The toughly-worded paragraph in the White Paper emphasises that “China faces a formidable task to maintain political security and social stability. Separatist forces for “East Turkistan independence” and “Tibet independence” have inflicted serious damage, particularly with escalating violent terrorist activities by “East Turkistan independence” forces. Besides, anti-China forces have never given up their attempt to instigate a “color revolution” in this country. Consequently, China faces more challenges in terms of national security and social stability”. 

As Deadline Looms, Critics of Iran Nuclear Deal Press On

By Seema Sirohi
June 29, 2015

The Iran nuclear deal is U.S. President Barack Obama’s biggest foreign policy gamble, one that his administration has spent considerable political capital crafting and defending.

But critics say the agreement is not tough enough and doesn’t hold Teheran’s feet to the fire. They argue that no deal is better than a bad deal. The Obama administration’s eagerness to declare success has given Iran the upper hand, they argue.

Stirring the American pot are Saudi Arabia and Israel, who have used their influence on the U.S. Congress to raise questions.

The deadline for reaching a final agreement is June 30, but reports suggest it may be extended. A framework agreement, which broadly says that Iran will restrict its nuclear programme in exchange for the lifting of sanctions, was crafted in April, leaving the details to be worked out over the next three months.

Libyan General Hifter's Machiavellian Plan to Get American Support

Alexander Decina
June 29, 2015

Earlier this month, two prominent Islamist militia leaders, Salim Derby and Nasir Atiyah al-Akar, were killed in clashes against the ISIS in Derna, Libya. One could chalk up their deaths to infighting among Islamist groups in the midst of a civil war, but the reality is far more unsettling. General Khalifa Hifter and the allies of Libya’s eastern House of Representatives (HoR) government—the one that claims to be pro-Western and internationally recognized—are deliberately allowing ISIS the necessary space and time to strengthen itself in Libya and become a real threat to Western interests. In doing so, Hifter creates a situation so dire that the United States and European countries have no choice but to recognize him and the HoR over their political opponents and thus solidify their power in Libya.

The Iranian-Saudi Conflict and Its Cyber Outlet

June 26, 2015

Cyber warfare is an increasingly prominent aspect of the Iranian-Saudi hegemonic rivalry in the Middle East. Cyber attacks offer new revenge (e.g., 2012 attack on Saudi Aramco) and propaganda opportunities in this long running “cold war” type conflict. 

Following Saudi airstrikes in Yemen during late March, the Iran-Saudi cyber conflict escalated. OSINT reveals a rapid exchange of website defacements and social media account hijackings between Saudi and Iranian hackers during mid-April. This period began when pro-Saudi hackers, unusually the aggressors, attacked Fars News Agency’s website on March 31. This incident appears to have spurred pro-Iranian hackers into action as detailed below. 

The Yemen Cyber Army (YCA) emerged in mid-April. Unknown prior to its attack on Saudi newspaper Al-Hayat, the group has since been linked to a data breach at the Saudi Foreign Ministry of Foreign Affairs. The timing of YCA attacks, its communications footprint (Fars News “exclusives” and NewsQuickLeak.ir), and the tagline “Cutting Sword of Justice” used in the Saudi Aramco attack suggest, at a minimum, coordination with Iranian actors. 

The Week in Review

Christopher Kozak
June 27, 2015

This report is derived from open sources collected and processed at ISW during the reporting period. The report includes analysis on Iraq, Syria, ISIS, Afghanistan, Egypt and Ukraine.

Key Take-away: The United States reaffirmed in the importance of NATO security structures amidst escalating threat streams in Eastern Europe, Central Asia, and Southwest Asia. U.S. Secretary of Defense Ashton Carter announced the rotational deployment of U.S. troops and pre-placement of armor to several allied NATO states in Eastern Europe amidst swiftly-escalating geopolitical tensions with Russia and indications of a renewed separatist assault in the Donbas. Meanwhile, NATO defense ministers restated their commitment to Afghanistan amidst a surge in Taliban military operations, foreign fighters, and ISIS activity.

Can Japan and South Korea Do the 'Politically Impossible'?

Brad Glosserman, Scott A. Snyder
June 29, 2015 

In recent years, the two countries have permitted mutual grievances to overshadow shared interests, values and geography. It's time to change that. 

The 50th anniversary of the normalization of Japan-ROK relations was commemorated last week with a whimper, not a bang–and that is a good thing. After years of steady deterioration, the governments in Seoul and Tokyo seem to have recognized that continuing on that path served neither country well and they are now seeking to restore the positive, forward-looking partnership that both sides claim to want. Progress is to be applauded but it will take more than modest, incremental efforts to end the cycle of rapprochement and rupture that dominates their relationship.

'Fallout' is the Best Nuclear War Story Ever Told

By Matthew Gault
June 27, 2015

I wandered the wastelands, desperately searching for a water chip to fix a broken machine and save my people. I spent countless hours searching the California wastes for a Garden of Eden Creation Kit so I could feed a starving community.

I searched for a way to shower the D.C. wasteland in life-giving water, fought super mutants in the metro tunnels and wasted what felt like years playing the slots in New Vegas casinos while Caesar’s Legion fought the New California Republic to a bloody standstill.

I know that war … war never changes.

If that last line sent a shiver down your spine — either out of nostalgia or excitement — then you already know what I aim to prove — the best work of nuclear fiction ever made is a video game series called Fallout.

Washington’s Revealing Central Asia Report

June 29, 2015

If the State Department’s recent “Country Report on Terrorism” confirms anything, it is the lack of import Central Asia maintains in D.C.’s policy circles. The region comes across as something of an afterthought in the write-up, especially in comparison to the South Asian analyses contained in the same report. Considering Washington’s current policies in the region – or lack thereof – perhaps this shouldn’t come as much of a surprise.

Nonetheless, a few trends and tidbits within the report are worth noting. For instance, as EurasiaNet’s Joshua Kucera noted, prior skepticism about terror threats in Central Asia are “less apparent in this report’s newly written sections on ISIS.” Indeed, ISIS is mentioned in the context of all nations, except Turkmenistan, both in terms of recruiting practices and governmental responses. Central Asian governments have been more than eager to play up threats from ISIS – which Washington has been happy to oblige in certain instances – but the report doesn’t contain much new information on either presence or governmental restriction.

IMF counters Raghuram Rajan's comment about world facing Great Depression-like problems

28 Jun, 2015

WASHINGTON: With RBI's Raghuram Rajan ringing alarm bells about the world economy facing the Great Depression-like problems, an IMF research paper has countered his views and says monetary policy easing alone can't be blamed for triggering a financial crisis.

Rajan, who himself has been IMF's Chief Economist and is among the few to have rightly predicted the financial crisis of 2007, has triggered a debate among policymakers and economists with his warning against central banks globally being pushed into "competitive monetary policy easing".

In an address at the London Business School, Rajan went even further and warned that the global economy was "slowly slipping" into the Great Depression-like problems of the 1930s and the central banks need to sit together and define new "rules of the game" to find a better solution to deal with it.

Rajan also said it's a problem of collective action and not a problem of industrial nations or emerging markets.

HOW TO BRIDGE THE GAP BETWEEN POLICY AND SCHOLARSHIP

James Goldgeier and Bruce Jentleson
June 29, 2015

In recent years, many public-minded international relations scholars have bemoaned the divide between academic scholarship and policy debates. Too often, academics are asking narrow questions that enable them to utilize disciplinary methods but fail to support efforts to respond to the pressing challenges of our time.

Kudos to Ryan Evans and colleagues for creating “The Schoolhouse” and for using it to focus on the academic-policy world gap especially as it relates to foreign policy and international relations. A number of colleagues — including Frank Gavin, Steve Van Evera, Michael Horowitz, Lena Andrews and others (here and here) — have made important contributions on the what and why of the problem as well as some efforts to narrow the gap.

The Green Climate Fund: Finding a Role for Peacebuilding Priorities

NEIL BHATIYA
JUNE 19, 2015

In the wake of the September 2014 United Nations climate summit, which brought together representatives from more than one hundred countries to build global ambition to fight climate change, there has been a flurry of diplomatic activity dedicated to that end. One important step taken was that developed nations finally began to make good on theirpromise to endow the Green Climate Fund (GCF), a multilateral mechanism through which they would aid developing nations in climate change mitigation and adaptation.1

As the main vehicle for developing nations to access financing to meet the multiple challenges of climate change, including transitioning to greener energy systems and building resilience against extreme weather, the GCF is an essential component of the global climate effort. Without it, Least Developed Countries (LDCs) will not be able to bear the upfront costs of combating and responding to environmental change and will continue to rely on enviromentally harmful fossil fuels. Critical at this point is not only guaranteeing that the GCF receives adequate funding, but also that it is programmatically aligned to best leverage the use of its resources.

Constructing a Cyber Superpower


By Joe Gould
June 27, 2015 

FORT MEADE, Md. — The site of an Army golf course named for US President Dwight Eisenhower, one long drive from the National Security Agency, is an active construction site, the future of US military cyber.

Where there were once bunkers, greens and tees is a large gray building due to become an NSA-run 600,000-square-foot, state-of-the-art server farm, a skeletal structure that will one day house US Cyber Command's joint operations center, with plots reserved for individual Marine Corps and Navy cyber facilities.

The plans reflect the growth in ambition, manpower and resources for the five-year-old US Cyber Command. One measure of this rapid expansion is the command's budget — $120 million at its inception in 2010 rising to $509 million for 2015.

Those Chinese hackers got into FBI files too

NATASHA BERTRAND,
JUN 25, 2015

Agents from the FBI and other law enforcement agencies work at a 24-hour operations center at FBI headquarters, Monday, May 3, 2010, in the Chelsea section of New York. The center was set up to coordinate the investigation of the Times Square incident involving a vehicle loaded with explosive material.

Hackers who infiltrated the Office of Personnel Management (OPM) and stole the security clearance information of more than 18 million federal employees reportedly breached FBI agents' personnel files in the process,Jeff Stein of Newsweek reports.

Some FBI employees were notified in May that their files had been accessed by hackers during the massive, year-long breach of OPM's database, an FBI source told Newsweek.

Chinese Hackers Joining Nascent Chinese Cyber Security Industry

June 29, 2015

BEIJING (Reuters) - China, long accused by the United States of rampant cyber aggression, may be synonymous with hacking exploits these days, but that doesn’t mean every Chinese hacker is out to pilfer and destroy.

As Chinese companies grapple with a sharp increase in the number of cyber attacks, many hackers are finding it increasingly lucrative to go above board and join the country’s nascent cyber security industry.

Zhang Tianqi, a 23-year old Beijinger, cut his chops in high school trying to infiltrate foreign websites, skirting domestic law by probing for vulnerabilities on overseas gaming networks.

Now, after a stint working at internet bluechip Alibaba Group Holding Ltd, he is the chief technology officer of a Shanghai-based cyber security firm which owns Vulbox.com, a site offering rewards for vulnerability discoveries, and internet security media site FreeBuf.com.

Why Can't We Play This Game?

General Michael Hayden
June 24, 2015

Jimmie Breslin borrowed a line from manager Casey Stengel to title his chronicle of the worst team in baseball history, the 1962 Mets. Stengel plaintively asked, "Can't Anybody Here Play This Game?" Given recent events, Americans could be asking the same question about their government's cyber performance.

Earlier this month the Office of Personnel Management announced that someone had grabbed super user status on OPM computers, taking the records of more than four million current, former and retired government employees and, then, within a week OPM added that an attacker had been in the database of the government's far more sensitive security clearance system for almost a year. Recent estimates put the number of people affected at 18 million.

We've seen breaches before, but these were particularly numbing. The massive files of American government names, social security numbers, dates and places of birth, jobs, training and benefits gives an adversary data that can be used to coerce, blackmail or recruit U.S. sources. Access to the security clearance database would disgorge even more detailed personal information, including the foreign contacts of American officials.

International Law in Cyberspace

Ft. Meade, MD
September 18, 2012

As prepared for delivery

Thank you, Colonel Brown, for your kind invitation to speak here today at this very important conference on “the roles of cyber in national defense.” I have been an international lawyer for more than thirty years, a government lawyer practicing international law for more than a decade, and the State Department’s Legal Adviser for nearly 3 ½ years. While my daily workload covers many of the bread and butter issues of international law—diplomatic immunity, the law of the sea, international humanitarian law, treaty interpretation—like many of you, I find more and more of my time is spent grappling with the question of how international law applies in cyberspace.

Everyone here knows that cyberspace presents new opportunities and new challenges for the United States in every foreign policy realm, including national defense. But for international lawyers, it also presents cutting-edge issues of international law, which go to a very fundamental question: how do we apply old laws of war to new cyber-circumstances, staying faithful to enduring principles, while accounting for changing times and technologies?

Cyber Operations and the New Defense Department Law of War Manual: Initial Impressions

By Charlie Dunlap
June 15, 2015

With headlines in the aftermath of the OPM hack asking if it was a “cyber 9/11” or an “act of war,” and Lawfare’s own Jack Goldsmith’s questioning the apparent “weak and hesitant” U.S. response to the hack, it may be helpful to take a look at a key legal resource: The U.S. Department of Defense (DoD) Law of War Manual, which, coincidently, was issued just last Friday.

What follows are some initial impressions about the Manual’s cyber chapter (chapter XVI).

First, a little context. The 1,220 page Manual is the end result of a nearly quarter-century effort, and one marked by almost interminable interagency squabbles. Indeed, the Manual – which is billed as the institutional view of only DoD – carefully caveats itself by saying that while other departments of the US government were consulted, it does not necessarily represent the position of the U.S. government as a whole. Still, there can be little doubt that it will constitute a very significant state-centered document that will serve as a much-needed counterpoint to nongovernmental organizations, academics, and others who have in recent years come to dominate the dialogue about the law of war.

Analysis of the New WikiLeaks Revelations Concerning NSA Spying on France

Peter Koop
June 27, 2015 

Last Tuesday, June 23, the website Wikileaks (in cooperation with Libération andMediapart) published a number of NSA-documents showing that between 2006 and 2012, NSA had been able to eavesdrop on the phone calls of three French presidents. 

This the first time we see actual finished intelligence reports that prove such eavesdropping, and being classified as TOP SECRET//COMINT-GAMMA they are much more sensitive than most of the documents from the Snowden-archive. 

Also it seems that these new Wikileaks-documents are not from Snowden, but from another source, which could be the same as the one that leaked a database record about NSA’s eavesdropping on German chancellor Merkel. 

Wikileaks announced that more revelations will follow this Monday. 

NSA intelligence report about an intercepted conversation between French president François Hollande and prime minister Jean-Marc Ayrault, May 22, 2012. 

Would Your Feelings Be Hurt If the Chinese Did NOT Steal Your Personal Data?

Robert Knake
June 26, 2015

I finally got my letter from the Office of Personnel Management (OPM). What a relief. I was worried my credibility as a commentator would be damaged if my data wasn’t stolen. Imagine how Dan Rather would have felt had he not received Anthrax.

In any case, in the weeks since the story broke, OPM has yet to change their story. The official number is still 4.2 million and the data that was lost is still, according to my letter, “your name, social security number, date and place of birth, and current or former address.” News outlets, however, are putting the number as high as 18 million and are reporting that the Electronic Questionnaires for Investigations Processing (EQIP) system that contains information collected on form SF-86 was compromised. That would be worse than just the loss of employee personally identifiable information. It would include information on employees and contractors as well as their friends and families.

Ian Bremmer is worried about the impact on U.S. human intelligence. He even posted a comment on CFR’s Facebook page about it in response to my last piece. I’m not as concerned. Here’s why:

Does alleged NSA hack of Kaspersky signal new front in cyberwar?

By Fred Weir
June 23, 2015 

Moscow — The latest Edward Snowden revelations – an alleged hack of a prominent Russian software firm – are creating a big stir here.

According to documents published by the Intercept Monday, the US National Security Agency and its British counterpart, GCHQ, targeted major Internet security firms, including Kaspersky Labs. They allegedly did so to reverse-engineer their antivirus products, enabling them to spy on protected networks.

A 2008 warrant request from GCHQ published by the whistleblower site says the aims of penetrating Kaspersky's most sensitive systems might include "modifying commercially available software to enable interception, decryption … or 'reverse engineering' software” to understand how it works.

Security planners work on cyber defense strategies at U.S. Army War College

By Andrew Conte 
June 23, 2015

CARLISLE — When it comes to cybersecurity, we're all in this together. 

The nation's best defense in cyberspace involves not only the military but private citizens and corporations, top security planners said here Tuesday in a closed-door meeting at the U.S. Army War College. 

“You do not want this to be a military approach,” said speaker Mark Troutman, the director of the Center for Infrastructure Protection & Homeland Security at George Mason University. “We are Americans. We secure ourselves at the end of the day with an active and engaged citizenry.” 

Participants at the Carlisle event are working to break ground on a national cybersecurity strategy that would provide direction for the federal government in the event of a major computer attack, said William Waddell, director of mission command and the cyber division at the War College. 

Peter Singer: How a future World War III could be a cyberconflict

By Sara Sorcher
June 24, 2015 

What could World War III look like? If the growing spate nation-state hacks is any indication, it'll be waged by computers and over networks. In his forthcoming technothriller "Ghost Fleet," Peter Singer explores how global conflicts might play out in the 2020s.

Mr. Singer, a strategist at the New America think tank in Washington, is also a consultant for the Pentagon and FBI, spoke with Passcode about his novel, due out later this month. He also cohosts "The Cybersecurity Podcast" with Passcode. Listen below to hear the latest episode featuring science fiction author and Boing Boing coeditor Cory Doctorow about how science fiction can help predict the future.

Passcode: Your new novel, "Ghost Fleet," looks at what a global war in the 2020s might look like. How do digital attacks, and defenses, fit into this? 

Why the next World War will be a cyberwar first, and a shooting war second


By David Gewirtz 
June 22, 2015 

Opinion: The US already has lost the first battles, and may not have the national will to defend itself in the inevitable global conflict to come. David Gewirtz looks at the geopolitical implications of cyberwarfare. 
 
The Edward Snowden revelations have rocked governments, global businesses, and the technology world. Here is our perspective on the still-unfolding implications along with IT security and risk management best practices that technology leaders can put to good use. 

Whether we're talking about social networking, financial systems, communications systems, journalism, data storage, industrial control, or even government security -- it is all part of the Internet.

That makes the world a very, very dangerous place.

Constructing a Cyber Superpower


By Joe Gould
June 27, 2015

FORT MEADE, Md. — The site of an Army golf course named for US President Dwight Eisenhower, one long drive from the National Security Agency, is an active construction site, the future of US military cyber.

Where there were once bunkers, greens and tees is a large gray building due to become an NSA-run 600,000-square-foot, state-of-the-art server farm, a skeletal structure that will one day house US Cyber Command's joint operations center, with plots reserved for individual Marine Corps and Navy cyber facilities.

The plans reflect the growth in ambition, manpower and resources for the five-year-old US Cyber Command. One measure of this rapid expansion is the command's budget — $120 million at its inception in 2010 rising to $509 million for 2015.

Dazed and Confused: What Is Horribly Wrong With U.S. Counterterrorism Strategy

Rosa Brooks
June 25, 2015

Show me someone who publicly insists that the United States has an effective counterterrorism strategy, and I’ll show you someone who draws a paycheck from the U.S. government.

“This week we have seen success across a broad spectrum,” Pentagon spokesman Col. Steve Warren told reporters on June 16, commenting on the death of Yemeni al Qaeda leader Nasir al-Wuhayshi, reportedly killed as a result of a U.S. drone strike. “Any time a terrorist is removed from the battlefield, is killed or captured, I think the net gain outweighs any potential loss.”

Loyalty to your employer is a fine thing, especially in a press spokesman, but outside the ranks of officials in President Barack Obama’s administration, experts are far more dubious about the heavy U.S. reliance on air power and targeted strikes. “The tactical, whack-a-mole approach is not having the desired effect,” my Foreign Policy colleague Micah Zenko told the New York Times. “Not having the desired effect” was a polite circumlocution: As Zenko recently noted for FP, State Department figures show a substantial recent uptick in global terrorism. In 2014, terrorist attacks increased 39 percent over the previous year, while the number of fatalities caused by terrorist attacks went up 83 percent.

GAO Report on US Government’s Program of Designating Terrorist Organizations: What Does It Accomplish?

June 26, 2015

The U.S. Government Accountability Office (GAO) has just released a report on the designation of foreign terrorist organizations entitled Combating Terrorism: Foreign Terrorist Organization Designation Process and U.S. Agency Enforcement Actions. As of December 31, 2014, 59 organizations had been designated by the US Government as Foreign Terrorist Organizations, with 13 FTO designations occurring between 2012 and 2014.

According to the report, U.S. agencies reported enforcing FTO designations through three key legal consequences—blocking assets, prosecuting individuals, and imposing immigration restrictions—that target FTOs, their members, and individuals that provide support to those organizations. The restrictions and penalties that agencies reported imposing vary widely. For example, as of 2013, Treasury has blocked about $22 million in assets relating to 7 of 59 designated FTOs.

The full report can be downloaded here.

Imagining World War III: Lethal Drone Swarms, F-35s and Total Chaos

June 29, 2015 

If a major war broke out on Earth below, what would happen aboard the International Space Station?
This and a dozen other wild “what ifs” are answered in the opening pages of P.W. Singer and August Cole’s Ghost Fleet. The novel follows a spiraling cast of characters as they are engulfed by a near-future conflict in the Asia-Pacific—the one that real-life U.S. defense planners spend so much time thinking about.

A hyper-aggressive, technocratic China (“The Directorate”) and a revanchist Russia join forces to attack U.S. assets in the Pacific, decimating the U.S. economy and marking an abrupt end to America’s “Pacific Century.” As the United States struggles to regroup, it must use every tool at its disposal. This includes the U.S. Navy’s “Ghost Fleet,” an armada of outmoded warships that will quickly become the core of the U.S. counteroffensive. At its head is the stealthy USS Zumwalt—and a powerful, untested new weapons system.

7 Unbelievable Military Weapons Most People Have Never Heard Of

JEREMY BENDER

History is full of examples of human ingenuity run amok. Weapons design is no exception.

A group of Quora users sought to answer the question "What are some historical weapons that most people have never heard of?" The answers provide an amazing insight into the history of war, and offer examples of some of the most ingenious - yet impractical - weaponry ever created.

We've highlighted some of the most interesting below.

1. The Bat Bomb

Developed by the U.S. for use against Japan during World War II, the bat bomb was literally that. Each bomb would contain 40 hibernating bats, each of which would be strapped with a small napalm bomb and a timer.

The bombs could deploy their own parachutes, giving the bats time to fly out and look for places to roost. They would then explode, potentially burning down whatever structure they had chosen as their new home.

The Military Has a Man Problem

By HELEN BENEDICT 
JULY/AUGUST 2015

Army Specialist Laura Naylor, a Wisconsin native, spent a year in Baghdad with the 32nd Military Police Company in 2003 and 2004. During that time, she—like all of the more than quarter-million women deployed to Iraq and Afghanistan—was officially banned from ground combat. That technicality didn’t slow down Naylor when an IED hit her convoy and it began to take fire from a nearby building. “We had to search this house nearby, thinking they were the ones doing the shooting, and I was the lead person the whole way. I had a flashlight in one hand, a pistol in the other, and I’d kick the door open with my foot, look both ways, give the all clear, go to the next room, do the same thing,” she recounted to me a few years later. “We were interchangeable with the infantry.”

A friend in her unit, Specialist Caryle Garcia, was wounded when a roadside bomb went off beside her Humvee. Garcia was her team’s gunner, her body exposed from the chest up above the Humvee’s roof. Their close friend, 20-year-old Specialist Michelle Witmer, became the first National Guardswoman ever killed in action after being shot during another ambush. Witmer’s death was a grim marker in a steady march that has seen one woman after another achieve milestones in military service since the September 11, 2001, attacks that would have been unimaginable just a generation ago. During the Vietnam War, female soldiers were not even allowed to carry guns.

'Junk Weapons' are Killing Kurdish Troops

By Matt Cetti-Roberts
June 27, 2015

“When I shoot, the top of the rifle flies off,” Mahd Abdul Basit, a 28-year-old Peshmerga fighter told me while we stood a few hundred meters from Islamic State’s front line.

Unlike many Kurdish troops, who must purchase their own weapons, Mahd’s rifle — a taped-up Kalashnikov appearing to be made from several different rifles— was issued to him, and could still one day cost him his life.

Mahd stood in one of the Peshmerga’s newly-built fortifications, known as “citadels.” The sandbagged position, just 15 days old, is one of many that now punctuates the arid flat land on the front line southwest of the oil-rich city of Kirkuk.

Before January, this was Islamic State territory. A Kurdish offensive drove the militants back several kilometers — and both sides dug in for a long fight. Islamic State fighters are now entrenched about 800 meters away from the position, and still definitely a threat.