5 July 2018

China-Pakistan Economic Corridor: Opportunities and Risks



What’s new? Pakistani leaders say the China-Pakistan Economic Corridor (CPEC), launched in 2015, is a “game changer” for the country’s ailing economy. But opaque plans for the corridor, the upheaval likely to affect locals along its route, and profits flowing mostly to outsiders could stir unrest. The government has repressed CPEC critics. Why does it matter? CPEC could help revive Pakistan’s economy. But if it moves ahead without more thorough debate in parliament and provincial legislatures and consultation with locals, it will deepen friction between the federal centre and periphery, roil provinces already long neglected, widen social divides and potentially create new sources of conflict.

Fugitive Bangladeshi Militants Bring Jamaat ul Mujahideen to India

By: Animesh Roul

A failed bomb plot that appeared to target the Tibetan Buddhist spiritual leader, the Dalai Lama, as he visited a pilgrimage site in Bihar, India, has been blamed on the militant group Jamaat-ul-Mujahideen Bangladesh (JMB), and an emerging Indian offshoot. On January 19, a low intensity blast on the grounds of the Tibetan monastery in Bodh Gaya caused panic among devotees of the Dalai Lama. A subsequent sweep of the vicinity—the blast occurred after the Dalai Lama had left—led to the recovery of two improvised explosive devices near the monastery’s Kalachakra (Wheel of Time) prayer ground (Indian Express, January 20). Investigations into the incident revealed the involvement of the Bangladesh-based JMB.

Reflecting On: Uighur Foreign Fighters – An Underexamined Jihadist Challenge

Dr. Colin P. Clarke, Dr. Paul Rexton Kan

In November 2017, we co-authored “Uighur Foreign Fighters: An Underexamined Jihadist Challenge,” published by the International Centre for Counter-Terrorism- The Hague (ICCT). Uighurs, specifically individuals of Turkic decent from China’s northwest province of Xinjiang, have become a noticeable part of the constellation of globally active jihadist terror groups. Uighur jihadists first came to the world’s attention when the United States and its allies invaded Afghanistan in 2001. While continuing their cooperation with the Taliban under the banner of the East Turkestan Islamic Movement (ETIM), Uighur jihadists have now spread to Southeast Asia and the Middle East. ETIM’s members are part of the Turkestan Islamic Party fighting with the Al-Qaeda umbrella group in Syria, but other Uighurs have joined the Islamic State and still others have joined terrorist groups in Indonesia.

China's New Navy: A short guide for Australian policy-makers

Sam Roggeveen

In this Centre of Gravity paper, Sam Roggeveen, Senior Fellow at the Lowy Institute and Visiting Fellow at the SDSC, argues that China’s focus on developing a large ocean-going surface fleet indicates its growing ambitions. China already has the second most powerful navy in the Pacific and is developing the capability to match America’s maritime strength in the Pacific. China may already be building a ‘post-American navy’, one designed not to confront US naval predominance in the Pacific, but to inherit it as the US baulks at the increasing cost of continued regional leadership. Thanks to China’s rise and America’s relative decline, Australia faces its most challenging maritime security environment since World War II. To meet the challenge, the ADF needs a force structure that is itself inspired by lessons from China.
Download/View publication

China’s strategic investments in Europe: The case of maritime ports

BY: SHIVALI PANDYA AND SIMONE TAGLIAPIETRA

The EU is currently working on a new framework for screening foreign direct investments (FDI). Maritime ports represent the cornerstone of the EU trade infrastructure, as 70% of goods crossing European borders travel by sea. This blog post seeks to inform this debate by looking at recent Chinese involvement in EU ports. In September 2017 Jean-Claude Juncker, president of the European Commission, proposed a new EU framework for screening foreign direct investments (FDI), arguing that ‘if a foreign, state-owned, company wants to purchase a European harbour, part of our energy infrastructure or a defence technology firm, this should only happen in transparency, with scrutiny and debate’.

Who Lost the South China Sea?

BRAHMA CHELLANEY

The South China Sea is central to the contest for strategic influence in the larger Indo-Pacific region. Unless the US adopts a stronger policy to contain Chinese expansionism there, the widely shared vision of a free, open, and democratic-led Indo-Pacific will give way to an illiberal, repressive regional order. US Defense Secretary Jim Mattis has spoken out against China’s strategy of “intimidation and coercion” in the South China Sea, including the deployment of anti-ship missiles, surface-to-air missiles, and electronic jammers, and, more recently, the landing of nuclear-capable bomber aircraft at Woody Island. There are, Mattis warned, “consequences to China ignoring the international community.”

The Next Pacific War: Lessons From Wake Island For The PLA

By Ben Ho Wan Beng and Gary Lehmann

Expeditionary Advance Base Operations (EABO) is the new Navy-Marine Corps concept for using land units forward-deployed ashore to help win a naval war. EABO is intended to turn the tables on our adversaries’ Anti-Access/Area Denial (A2/AD) strategies, using island outposts to help US land, sea, and air forces survive and fight in the face of enemy sensors and long-range precision missilesAccording to the 2017 concept for Littoral Operations in a Contested Environment (LOCE), EABO proposes deploying relatively modest forces — companies, platoons, even single squads — in austere temporary locations, hidden from enemy sensors and able to rapidly relocate when found. This would confound enemy planning by forcing them to split their resources over a wider and more dispersed set of threats.

US defence secretary intervenes in UK military budget row

Ewen MacAskill 

The US defence secretary, James Mattis, has made a surprise intervention in the row over UK defence spending by warning France could replace the UK as Washington’s closest military ally in Europe. In a leaked letter to the British defence secretary, Gavin Williamson, Mattis expressed concern the UK’s military power was at risk of erosion and compared the UK unfavourably with France, which Mattis pointed out had committed to significant increases in defence spending. “As global actors, France and the US have concluded that now is the time to significantly increase our investment in defense. Other allies are following suit,” he said. It is in the best interest of both our nations for the UK to remain the US partner of choice.”

Trump’s North Korea diplomacy aims to contain China

Brahma Chellaney
Source Link

U.S. President Donald Trump, by seeking to clinch a deal directly with Pyongyang, is attempting to effectively cut out the traditional middleman, China. Beijing’s growing anxieties over the engagement between Washington and Pyongyang have prompted it to host North Korean strongman Kim Jong Un for the third time in less than three months. In fact, the White House has already eroded China’s role as an essential conduit in U.S. diplomacy with Pyongyang by establishing direct connections, including a virtual hotline, to Kim, while Chinese President Xi Jinping has no hotline with him.

The state of the world’s nuclear arsenal in 3 charts


At the start of 2018 nine states—the United States, Russia, the United Kingdom, France, China, India, Pakistan, Israel and the Democratic People’s Republic of Korea (North Korea) — possessed approximately 14,465 nuclear weapons.
This marked a decrease from the approximately 14,935 nuclear weapons that SIPRI estimated these states possessed at the beginning of 2017.

THREAT MULTIPLIERS AND THE NEED FOR A COMPREHENSIVE CLIMATE CHANGE STRATEGY

Spencer Phillips

Introduction

The National Security Strategy (NSS) of the United States released by the White House in December 2017 was a sharp departure from the idealism of other recent administrations. In recognition of the realities of a highly competitive world, and to ensure its continued standing in the world, the U.S. would now be more willing to use its political, economic, and military power to confront potential rivals. This strategy strongly focuses on the dangers posed by traditional state actors and violent extremist organizations, and the tools they may use to threaten U.S. security interests.[1] While the dangers posed by hostile nation states, weapons of mass destruction, drones, and cyber weapons are significant enough to justify a robust U.S. response, the current strategy completely omits other equally urgent security threats. Neither the NSS nor the Defense Department’s National Defense Strategy (NDS) make any mention of the risks associated with global climate change, to include the widespread instability and conflict that it is likely to cause in the coming decades.

The start of a new poverty narrative

Homi Kharas, Kristofer Hamel, and Martin Hofer

We now have the first actual data points that ring the alarm bells about a new, unfolding story on global poverty reduction that is far less favorable than pieces such as Nick Kristof’s New York Times column “Why 2017 was the best year in human history.” These new data are available courtesy of the World Poverty Clock, a web tool produced by World Data Lab with which the three of us are associated. (A paper presenting the methodology underpinning the World Poverty Clock has been published by Nature’s Palgrave Communications journal.)

In Eastern Europe, U.S. Military Girds Against Russian Might and Manipulation

By Eric Schmitt

First, four Army Stryker armored vehicles collided, sending 15 soldiers to the hospital with minor injuries. But hours later, an anti-American blog claimed a child was killed and posted a photo of the accident. Lithuanian media quickly denounced the blog post as a doctored fake, designed to turn public opinion against the Americans and their Baltic ally. The bloggers had borrowed a page from the playbook of Russia’s so-called hybrid warfare, which American officials say increasingly combines the ability to manipulate events using a mix of subterfuge, cyberattacks and information warfare with conventional military might.

Over The Barrel: Networked and vulnerable

by Vikram S Mehta 

Former US President Bill Clinton has co-authored a political thriller, The President Is Missing. The plot is thin, the language somewhat strained and the read a disappointment. But the book will do well. People will buy it out of curiosity and perhaps in the expectation that, whilst billed as fiction, the story line will be revealing of the inner and personalised dynamics of the White House. I read the first half of the book in earnest and skimmed through the second half looking for these revelatory nuggets. I found none but I did take away two messages. One, the more networked a society, the greater is its vulnerability to roguish genius. And two, more than perhaps ever before, the world needs inspired, courageous and selfless leadership.

McAfee Labs Threats Report June 2018


The McAfee Labs count of total coin miner malware rose by 629% in Q1, to more than 2.9 million samples. Introduction Welcome to the McAfee® Labs Threats Report June 2018. In this edition, we highlight the notable investigative research and threat trend statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in Q1 of 2018. In the first quarter, new revelations surfaced concerning complex nation-state threat campaigns that targeted users and enterprise systems worldwide. These campaigns were driven by many objectives—from profit-motivated cybercrime to political subversion to surveillance and espionage. Since our exploration of cryptojacking in the previous issue, we have seen continued expansion of this criminal endeavor during the quarter. The goal of the perpetrators is to monetize their criminal activity by expending the least amount of effort, using the fewest middlemen, and executing their crimes in the shortest time possible and with the least risk of discovery. 

INFORMATION OPERATIONS AS FORCE PROTECTION

Jaim Coddington and Casey Lamar

In the 20th century, the industrial revolution allowed states to leverage existing technology for brutally effective new tactics on the battlefield. Rapid innovations in rifled artillery, mechanized fighting vehicles, and chemical warfare caught commanders of the day woefully unprepared and led to horrific casualties and collateral damage. Today, actors like Russia and the Islamic State occupy this disturbing, pioneering role in the realm of information warfare (IW), leveraging the reach of global telecommunications to influence target audiences and support kinetic operations on the battlefield. Some observers contend that the West should co-opt these new methods to avoid falling further behind in the information domain. The combined threat of adversary information capability and the growing academic discussion around information warfare puts US doctrine at a crossroads between adopting the methods of its adversaries or establishing different methods to dominate the information domain. While much of the defense community’s planning, wargaming, and emerging doctrine focuses on counter-propaganda and targeting adversary IW capabilities, this reactive strategy may have neutral or negative results.

How ransomware democratized cyber weapons, warfare

BY MORGAN WRIGHT

At any given moment, there are between 190-200 countries in the world. For now, nine countries have nuclear capabilities (although Israel will neither confirm nor deny). According to the Arms Control Association, there are about 14,500 nuclear warheads. Russia and the United States have 90 percent of the total arsenal. MAD — mutually assured destruction — has kept Russia and the U.S. from obliterating each other. Unfortunately, there’s a new kind of arms race that is threatening to upset the balance of power — in cyberspace.

Banning Software Won’t Keep the Government Safe, Says Nuclear Security Agency Official

BY JOSEPH MARKS

Rather than banning software from China or Russia, the U.S. government should focus on reducing the danger any particular app can pose. The federal government can’t legislate or mandate its way out of the risk of foreign hackers compromising its networks, the top tech official in the government’s nuclear security agency said Tuesday. Instead of banning software with a connection to China or other U.S. cyber adversaries, government tech shops should focus on installing safeguards that mitigate any risk the software poses for foreign spying or sabotage, said Wayne Jones, chief information officer at the National Nuclear Security Administration.

You Should Be ‘Significantly Concerned’ There’s No White House Cyber Coordinator, Policy Experts Say

BY JOSEPH MARKS

How concerned should Americans be about a White House shuffle that removed the cybersecurity coordinator position? Significantly concerned, according to a collection of top cybersecurity policy experts gathered by the Atlantic Council think tank. White House National Security Adviser John Bolton eliminated the cybersecurity coordinator position soon after taking office in May. The elimination was greeted with consternation by many cyber analysts who believed the job, which encompasses government cyber protections, international cyber negotiations and broad U.S.cyber policy, was too complex to be subsumed into broader White House operations.

Can NATO’s new cyber strategy survive risky summits?

By: Justin Lynch

Amid a resurgent campaign of Russian cyber aggression and a high-stakes summit that is just days away, NATO has bolstered its digital protocols, a move that experts say will reshape how the organization defends itself. The new joint air power strategy unveiled June 26 envisions a NATO that has its 29 states synchronized in cyberspace, adding to its existing land, air and sea activity. The plan means that NATO members are formally able to add cyberwarfare to their joint operations toolkit. The plan appears to improve collective cybersecurity through greater training and coordination among NATO members, but its real impact will only be known in the face of conflict. Be it online or offline, the question remains unanswered whether political leaders will respond in cyberspace through the transatlantic alliance, according to experts.

DoD stands up its artificial intelligence hub

By: Aaron Mehta  

WASHINGTON – The Defense Department has formally ordered the creation of a new hub for artificial intelligence research with Dana Deasy, the Pentagon’s new chief information officer, taking the lead. Deputy Secretary of Defense Patrick Shanahan ordered the move in a June 27 memo. The Pentagon’s goal is to launch a series of AI projects known as National Mission Initiatives within 90 days – as well as taking over the controversial Project Maven. The office will be known as the Joint Artificial Intelligence Center (JAIC), with the goal of enabling “teams across DoD to swiftly deliver new AI-enabled capabilities and effectively experiment with new operating concepts in support of DoD’s military missions and business functions,” according to DoD spokeswoman Lt. Col. Michelle Baldanza.

The Army is working on better tactical connectivity

By: Mark Pomerleau 

The Army is looking to create better mission command, data transport and communications ability for smaller, more tactical echelons. In an approach the service is calling the integrated tactical network (though officials stressed the ITN is not a new network), the Army seeks to focus on a simplified, independent, mobile network solution at the battalion level providing network availability down to the small unit dismounted leader, an Army document states. Officials described a suite of capabilities to provide better mission command, situational awareness and air-to-ground integration that can close capability gaps at the company level and be tailored based on the environment troops are operating in or the commander’s objective.

The View From Olympus: The Crying Child


Now and then it happens that a commander at some level in the U.S. military wants to move whatever he is in charge of toward Third Generation maneuver warfare. The results are usually meager, because the military personnel system moves him after a year or two and his replacement invariably neither understands nor has any interest in what he was trying to accomplish. However, those leaders making the attempt will accomplish more if they draw on work that has already been done rather than trying to reinvent the tank tread. A number of publications offer the “Cliff Notes” on maneuver warfare, i.e., they boil the general literature down and offer the basics without requiring too much reading. The most important such works are:

Mining History for the Warning Signs of America’s Next Major War

Steven Metz

Over the past few decades, the U.S. military has had to shift its focus several times as the security environment and American national interests evolved. Until the end of the Cold War, it concentrated on preparing to fight the Soviet Union, potentially with nuclear weapons. In the 1990s, most of the military’s attention was on conventional wars against what were called “rogue states,” particularly Iran, Iraq and North Korea. After the 9/11 attacks, the U.S. military retooled for counterinsurgency and counterterrorism. Now that era, too, is ending. 

Army Professional Reading and Creative Thinking

James Torrence

Background

“Because they must be able to compensate for their own weaknesses, strategic leaders cannot afford to have staffs that blindly agree with everything they say. Strategic leaders encourage staffs to participate in open dialogue with them, discuss alternative points of view, and explore all facts, assumptions, and implications. Such dialogue, that includes inquiry and advocacy, enables strategic leaders to assess all aspects of an issue and helps clarify their vision, intent, and guidance. As strategic leaders build and use effective staffs, they continually seek honest and competent people of diverse backgrounds.”[i]

-- ADRP 6-22