23 February 2018

12 technologies that will disrupt business in 2018

By Paul Heltzel

From artificial intelligence to augmented reality, these dozen disruptive technologies and trends will begin driving how business gets done at forward-thinking organizations this year.
In 2018, disruptive technologies like artificial intelligence, natural language processing, and computer vision are maturing, going from game-changing ideas to foundational tools for business. This year, we’ll see these and other technologies drive how business gets done and what new products will launch in the near future.

How to Inoculate the Public Against Fake News


When people were given a toolbox of deceptive techniques and told to “play Russian troll,” they learned to reject disinformation. 

Friday’s indictment of 13 Russians on charges of attempting to defraud the public and influence the U.S. presidential election shows that that the United States remains vulnerable to what the indictment calls “information warfare” but what others call simply fake news. A new research paper released Monday from two Cambridge University researchers shows how to counteract it.

Lessons From A Kidnapping Gone Wrong

Fred Burton's recent interview with the author Philip Jettinspired me. Their discussion of Jett's recent book, The Death of an Heir: Adolph Coors III and the Murder That Rocked an American Brewing Dynasty, compelled me to read it for myself. Meticulously chronicling the crime, and the preparation the perpetrator conducted in advance, the book makes for a fascinating read. And although the incident it details - Adolph Coors III's tragic death during a botched kidnapping - happened more than 50 years ago, the story offers valuable lessons for personal security that ring true still today.

Smartphones Drive New Global Tech Cycle, But Is Demand Peaking?

Over a decade of spectacular growth, demand for smartphones has created a new global tech cycle that last year produced a new smartphone for every fifth person on earth.

This has created a complex and evolving supply chain across Asia, changing the export and growth performance of several countries. While our recent analysis of Chinese smartphone exports suggests that the global market may be saturated, demand for other electronics continues to support rising semiconductor production in Asia.

Noose Tightens On Bitcoin

by James Rickards

With everything that’s been happening with the stock market lately, people have forgotten about last year’s biggest investment story:

After briefly topping off near $20,000 in December, today it’s trading around $10,000.

A lot of bad news has come to the bitcoin ecosphere. China, for example, recently ordered its banks to stop providing financial services for any cryptocurrency-related transactions.

The Air Force requested $30M to develop a ‘cyber carrier’

By: Mark Pomerleau 

Much like traditional military capabilities have platforms from which to launch attacks, Cyber Command and the services’ cyber components need a comparable platform.

This effort underway is called the unified platform, which some have equated to a “cyber carrier,” and the Department of Defense’s budget request for fiscal 2019 describes a plan to develop such a program.

22 February 2018

As China concerns grow, India looks to build military presence in Seychelles

By Steve George and Manveena Suri

New Delhi (CNN)The Seychelles is not typically associated with geopolitics. But beyond the white sandy beaches and tropical jungles, the tiny archipelago nation is emerging as a key player in India's battle to counter growing Chinese influence in the Indian Ocean.

Late last month, India and the Seychelles signed a revised agreement granting India permission to construct a military base on the Seychelles' Assumption Island, roughly 1,650 kilometers (1,025 miles) east of mainland East Africa.

Jammu terror attack: Does India have a game plan to counter Pakistan's misadventures?

Raj Chengappa 

Pakistan is like the bounceback toys sold in subcontinental markets. Hit them hard enough and they appear to topple, only to rebound and, if you are not watchful, whack you. As he nears the end of his fourth year as prime minister, Narendra Modi must be both exasperated and frustrated with the way his efforts to deal with Pakistan have turned out. Whatever he has thrown at Pakistan to bring it around, it never seems to learn, and keeps coming back for more punishment.

Indian investors offered dinner with Donald Trump Jr

Michael Safi

Prospective investors in a Trump Tower project near Delhi are being offered a conversation and dinner with Donald Trump Jras part of a marketing campaign that has drawn criticism from corruption watchdogs.

Full-page advertisements reading “Trump is here. Are you invited?”featured on the front page of three Indian national newspapers at the weekend ahead of a visit by the US president’s son to India this week.

From Make In India To Making In India: Q And A With Baba Kalyani

by Anupama Airy

Babasaheb Neelkanth Kalyani, chairman and managing director of the Kalyani group, speaks with Swarajya on indigenous defence production, Make in India, the guns and and engines developed by his group, and much more, in this interview.

When most top Indian defence companies were seen vying for orders under the government’s new “Make In India” initiative, this company seemed in no rush, and continued to invest and innovate. Today, the Kalyani Group — flagship company, the Rs 4,000-crore Bharat Forge Ltd — boasts of having developed a highly sophisticated indigenous gun to enable our artillery force to fight Indian wars with Indian solutions. The gun has successfully completed trials in deserts and is now under trial in hilly terrain.

The Risks of the China-Saudi Arabia Partnership

Source Link
By Samuel Ramani

Geopolitical factors, as well as Saudi Arabia’s own domestic landscape, could limit the relationship’s potential.

On January 18, Chinese Ambassador to Saudi Arabia Li Huaxin praised Saudi Arabia’s Vision 2030 project and called for tighter integration between Saudi Arabia’s economic diversification efforts and the Belt and Road Initiative (BRI). Li also expressed enthusiastic support for Saudi Crown Prince Mohammed bin Salman’s anti-corruption campaign, claiming that his efforts to strengthen the rule of law in Saudi Arabia would increase the country’s attractiveness as an investment destination for Chinese businesses.

China’s Alleged ‘Stealth Fighter’ Beset by Host of Technical Problems

Although China declared that its J-20 stealth fighter had officially entered service in September 2017 production of the J-20 appears stalled. The manufacturer had planned to build three a month initially but since mid-2017 production appears to have been zero. There are several potential problems with the J-20 but the main ones have to do with stealth (the delicate materials on the airframe that make radar detection less effective) and engines. The most obvious problem is the engines. The WS-10s currently installed are a stopgap and not efficient enough to support supercruise (go supersonic without using the afterburner and becoming easier to spit). China has had persistent problems developing high-performance jet engines. China has been developing the more powerful (and supercruise ready) WS-15 engine since the 1990s for a larger aircraft like the J-20 but has not been able to get the engine to work. Officials also confirmed rumors that a WS-15 exploded during a 2015 static (on the ground) test. That failure had been a secret but when an engine this big fails by blowing up the incident is difficult to hide.

Information Wants to Be Chinese


In November, while Donald Trump was on his first state visit to Beijing, Republican Senator John Cornyn and Democrat Dianne Feinstein introduced a bill that would dramatically expand the government’s ability to block foreign investment in U.S. technology companies. The bill was directed at the Committee on Foreign Investment in the United States, or CFIUS, an interagency panel that scrutinizes purchases by “potential adversaries” that go against “national interests.” It was clear which adversary most concerned them: China had received more CFIUS reviews than any other country, according to the most recent data.

Exposed: Why China Would Lose a War against America

Harry J. Kazianis

When it comes to a war with the U.S. how well would Beijing be able to use all that stuff? The real question seems pretty simple: yes, China is certainly developing all the military and technology goodies to field a potent force. However, how well can it operate all that equipment in the pressure filled situation of a war? Sure, Beijing is certainly developing a world-class military, but can its soldiers operate all that equipment competently? Just how well trained are they? You can have the best military in the world but if you don’t know how to use it, well, you get the idea.

Xi Jinping May Turn to Top Ally to Handle US Pressure

By Don Tse and Larry Ong

Wang Qishan (right) receives a fire helmet in recognition of his "fire brigade chief" nickname during a 2011 meeting with then-U.S. Treasury Secretary Timothy Geithner .

Wang Qishan, Xi’s right-hand man, may reemerge as vice president after stepping down from his CCP position. 

Under President Donald Trump, the United States has adopted a hawkish stance on China. The Trump administration’s new national security and defense strategies identify China as a strategic competitor, and a threat to domestic security and the global order. More importantly, the Trump administration plans to contest China’s “unfair trading practices,” cyber intrusions, and expansionism in the Indo-Pacific.

Threat Assessment #Fail: Al-Qaida Quietly Growing, By Design

The annual accounting to Congress of global threats to the United States made it sound like al-Qaida’s separate branches were managing to thrive independently of one another, said Bruce Hoffman, Cipher Brief expert and Council on Foreign Relations visiting senior fellow, in comments to The Cipher Brief. But Hoffman believes the Worldwide Threat Assessment presented to Congress Tuesday failed to acknowledge that al-Qaida is following a very careful and deliberate strategy to establish its separate branches as pillars on which to build future growth.


So this is what the Syrian war suggests about future conflicts: They will be intricately complex; they will involve conflict-specific configurations of participants; there will be no humanitarian intervention to stop them; and the United Nations will be a nonfactor. But that isn’t all. It gets even worse. Next week’s column will explain how.


Last month, David Sanger and William Broad’s article in the New York Times, “How U.S. Intelligence Agencies Underestimated North Korea,” ranked the failure to predict the recent breakout pace of North Korea’s nuclear program as “among America’s most significant intelligence failures.”

As two career military intelligence officers we appreciate Sanger and Broad’s tough critique on US intelligence agencies—especially considering one of us is a former student of Sanger’s. However, the tone and tenor that Sanger and Broad use is exaggerated and counterproductive to informing the public on the roles and capabilities of intelligence. More fundamentally, calling US intelligence on North Korea an “intelligence failure” is simply wrong.

North Korean Cyber-Attacks and Collateral Damage

WannaCry was incredibly destructive. The attackers made about $150,000 – but the total damage caused by WannaCry has been estimated in the billions of dollars.

There is strong evidence linking WannaCry to a group of hackers known as ‘Lazarus’, reportedly operating out of the DPRK (North Korea). Whilst WannaCry is perhaps the most famous attack by Lazarus, it isn’t the only ‘collateral damage’ caused by the DPRK’s cyber actions.

U.S. Revives Concerns About European Defense Plans, Rattling NATO Allies

By Steven Erlanger

MUNICH — After years of encouraging European nations to work together to provide more of their own defense, the United States is having second thoughts, driven by concerns about NATO and possible protectionism in defense industries.

The new American skepticism has been the big surprise of the high-level security conference held this past week in Munich. And it has puzzled and disconcerted NATO officials, who have welcomed the European Union’s new commitment, after the Russian annexation of Crimea, to do more for its own defense.

Russia's shadowy world of military contractors: independent mercenaries, or working for the Kremlin?


Russian President Vladimir Putin, right, and Syrian President Bashar Assad in December watch the troops marching at the Hemeimeem air base in Syria. Putin's government denies Russian mercenaries killed in Syria worked on behalf of Russia. 

Stanislav Matveev left his home in the Ural Mountains in September to join a Russian private military company. Five months later, Matveev was dead, killed in a U.S. airstrike on Feb. 7 in eastern Syria.

Europe Held Leading Positions in Terms of Real Defense Spending in 2017 - Report

LONDON (Sputnik) - Europe became a global leader in terms of growth in real defense spending — spending adjusted for inflation — in 2017, the International Institute for Strategic Studies (IISS) said Wednesday in its annual report that assesses the military capabilities of countries.

"Europe was fastest-growing region for real-terms defense spending in 2017. While this could be the result of US pressure, it also reflects changing threat perceptions," the report was quoted as saying on the IISS Twitter page.

US wasting billions on nuclear bombs that serve no purpose and are security liability – experts

Julian Borger

A B61-12 model at the Arnold Engineering Development Center in Tennessee. Photograph: National Nuclear Security Administration/Nevada Site Office

The US is to spend billions of dollars upgrading 150 nuclear bombs positioned in Europe, although the weapons may be useless as a deterrent and a potentially catastrophic security liability, according to a new report by arms experts.

These Chinese military innovations threaten U.S. superiority, experts say


BEIJING — The Chinese New Year began with the traditional lighting of firecrackers on Friday, but the country's military has been working on incendiaries on an entirely different scale.

Over the past year, the nation that invented gunpowder has been rolling out an array of high-tech weapons that some experts say could threaten the global superiority of the United States.

Waiting for Depression to Lift

By Effy Redman

It’s late morning on a balmy September day. I try to summon the will to run from the bench where I’m sitting on Broadway and dive under the massive wheels of one of the trucks roaring past. Which section of my body, I wonder, should I hurl beneath the tires. Where would hurt the least, and soonest erase my suffering. I clutch my cellphone, hating its potential for rescue signals.

After nine or 10 trucks pass me by, an unkempt man in his mid-50s sits on the bench beside me, plastic cup of lager in one hand, half-smoked self-rolled cigarette in the other. He looks me up and down and grins. Go away, jerk, I think to myself, shooting him an icy glance. Leave me be.

Russia by Cyber, North Korea by Nuke: A New Batch of Grim Warnings from US Intel

Questioning on Russian election interference and how the Trump White House handles staff clearances dominated the worldwide threat hearing Tuesday, as the Senate intelligence committee grilled leaders of the FBI, CIA, NSA, DNI, DIA and NGA over the contents of the 2018 Worldwide Threat Assessment of the U.S. Intelligence Community.



With this weekend’s events shifting the country’s attention to envisioning the next potential war risks, the cyber-war playing field may once again come front and center.

Unfortunately, in estimating the cyber dangers potentially posed by Israeli adversaries, the danger list may be so long, that it might be easier to assume they can do almost anything and only mention the few things they cannot do.

The U.S. Invented the Internet. The Russians Weaponized It and Used It Against America to Help Donald J. Trump Get Elected

Nancy Scola 

The indictment released Friday by special counsel Robert Mueller makes plain how prosecutors believe Russia pursued its multiyear scheme to undermine the 2016 presidential election — by wielding the social media-driven internet that the United States itself did so much to create. 

They had help, digital experts say, from decades of accepted U.S. policy about how to help the internet thrive: The U.S. government has taken a largely hands-off approach, while the anonymity that protects people’s privacy and liberty online also allowed Russian trolls to deceive overly trusting Americans. And the same freedom to innovate that has made Silicon Valley wealthy and powerful meant that there were few eyes on the ball as Russian actors began figuring out how to manipulate the internet’s few dominant platforms, such as Facebook, Twitter and the Google-owned YouTube. 

Russia and China Racing to Get Satellite Jammers, Report Finds

A painting of a Defense Support Program satellite from the Air Force Art collection. DSP provides a variety of national security capabilities. Its flagship mission of launch detection was made famous during the Cold War. 

Weapons capable of jamming or destroying U.S. military and commercial satellites will reach initial operational capability in the next few years, according to a new intelligence report.

Winning the Digital Transformation Cyberwar

The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end users, break through inadequate security systems, and infect people wandering around the web in places they probably shouldn’t go.

For decades, fighting these cyber threats has been the primary job of cybersecurity professionals. Establishing controls, setting up a perimeter, hardening edge devices, inspecting traffic, regular patching and replacing protocols, and controlling access points are all security fundamentals that every security team practices, and that most traditional security devices are designed to support. Unfortunately, that didn’t always happen and we often resorted to buying the latest and greatest tools when a new threat emerged, reverted back to hard-wiring the integration of these new technologies, and then hoping it all worked together seamlessly to detect and mitigate threats. Cyber threats were real but manageable – and usually more disruptive than destructive.

No Easy Answers, Just More Questions in Major Encryption Report

By Joseph Marks

Anyone looking for a quick fix to the years-long debate over encryption systems that protect people’s personal information but frustrate law enforcement tracking criminals and terrorists won’t find it in a long-awaited study from the National Academies of Sciences, Engineering and Medicine released Thursday.

The consensus report, produced by a panel of tech industry, law enforcement and academic experts, spends roughly 100 pages laying out the problems posed by warrant-proof encryption systems and by law enforcement’s efforts to access them.

21 February 2018

The story of ‘Sher Bachha’: braveheart soldier who saved Poonch

By Lt Gen H S Panag

Nestled between the Betar Nala to the west and Poonch river to the south, Poonch is a historical town along the Line of Control in Jammu and Kashmir. It’s a place that occupies an important place in our military history and also one that has produced some legendary characters, including two unforgettable members of the Indian Army, who were in their own way the Rajas of Poonch.

Our logistics base for 4 Sikh in Poonch was near the old palace of its former King that was designed like a European castle. Our Officers' Mess was called Joginder Mahal and was located in the house of a former jagirdar. Outside Joginder Mahal, under a Chinar tree, were the quarters of Havaldar Raja Singh, the unit mascot of 4 Sikh - a six-foot tall (when standing), 250 kg Himalayan black bear!

State of Play: Insurgencies in India’s Northeast

Bibhu Prasad Routray

Amid relative tranquility, little rebellions are continuing in India’s northeastern region. Headed by recalcitrant rebel leaders, some of whom have no inhibitions in aligning their ambitions with that of the anti-India policies of neighbouring countries, these movements have been responsible for the occasional acts of violence and a more persisting problem of disruption and instability. Directionless and protracted negotiations between the government and the pro-talk insurgencies have not helped. Although insurgency-related fatalities have dipped, for durable peace to return, New Delhi needs to do more. 

Nirav Modi blames PNB

Nirav Modi, at the centre of the ₹11,500 crore banking fraud, has said the Punjab National Bank’s overzealousness has shut the doors on his ability to clear the dues, which he claimed were much lower than the amount stated by the bank.

In a letter to the PNB management, a copy of which PTI has seen, Mr. Modi has pegged the amount that his companies owe the bank at under ₹5,000 crore.

Media frenzy

“The erroneously cited liability resulted in a media frenzy which led to immediate search and seizure of operations, and which in turn resulted in Firestar International and Firestar Diamond International effectively ceasing to be going-concerns. This jeopardised our ability to discharge the dues of the group to the banks,” said Mr. Modi, who left the country along with his family in the first week of January.

Eye on China — 16/02/2018

Ni hao! Welcome to Eye on China, a weekly bulletin offering news and analysis related to the Middle Kingdom.

I. The Lead:

Inspections and resolutions:It’s the holiday season in China with Friday being the first day of the new Year of the Dog. Ahead of the the Spring Festival celebration, President Xi Jinping carried out a series of inspection visits. These essentially offer an opportunity to interact with people and indicate areas of priority. Xi visited a military base in Sichuan Provinceinteracting with servicemen and women. While at the base, he also stepped out to look at the launch site from where the BeiDou-3 satellites were to be sent into orbit. He talked about military modernisation and also chatted via video conference with soldiers stationed at an island in the Paracels.

Noise warfare

By Leah Burrows

In his 5th century treatise on war, Sun Tzu famously proclaimed “If you know your enemy and you know yourself, you will be victorious in numerous battles.” Of course, Sun Tzu was fighting with swords and arrows, not keystrokes and algorithms, but the principle is just as applicable to cyber warfare as it was to ancient Chinese battlefields.

Among the most vulnerable targets in cyberwarfare are deep neural networks. These deep-learning machines are vital for computer vision — including in autonomous vehicles — speech recognition, robotics and more.

China's Military Modernization Challenges US Air Power - Report

China is poised to challenge American air dominance and has already shown itself to be a formidable naval power, according to a newly published report.

In a press launch for its annual “Military Balance” report published on Wednesday, the International Institute for Strategic Studies (IISS) highlighted the rapid modernization of Chinese land and naval forces and described China's progress in aerospace defense as “remarkable.”

Brexit, the US, China and the future of global trade

Anabel Gonzalez

Some years ago, the distinguished economist Richard Baldwin said: “Regional trade liberalisation sweeps the globe like wildfire”. He was right. Preferential trade agreements (PTAs) increased from 20 in 1990 to close to 300 today, and have become a key feature of the international trade policy landscape.

Every country in the world is party to at least one PTA, with Mongolia the last to join the pack when it signed a deal with Japan in 2016. But Brexit, the US withdrawal from the Trans-Pacific Partnership (TPP), and the renegotiation of the North American Free Trade Agreement (NAFTA) have been a major shock for the world trade system.

Threat Assessment #Fail: Al-Qaida Quietly Growing, By Design


The annual accounting to Congress of global threats to the United States made it sound like al-Qaida’s separate branches were managing to thrive independently of one another, said Bruce Hoffman, Cipher Brief expert and Council on Foreign Relations visiting senior fellow, in comments to The Cipher Brief. But Hoffman believes the Worldwide Threat Assessment presented to Congress Tuesday failed to acknowledge that al-Qaida is following a very careful and deliberate strategy to establish its separate branches as pillars on which to build future growth.

Has Turkey Gone Rogue?


When Secretary of State Rex Tillerson arrives in Ankara on Thursday, he will find Turkey unrecognizable as the ostensibly Muslim democracy and close ally that U.S. officials once held up as a model for the Islamic world. President Recep Tayyip Erdogan is poised to complete his long transformation of Turkey from a raucous -- if imperfect democracy -- to an autocracy, one ruled by caprice and fear.

The once solid U.S.-Turkish relationship has foundered on miscalculations, grievances, and increasingly divergent worldviews.

Europe Ponders How to Curb China's High-Tech Buying Spree

Source Link
By Friso Stevens

Struggling to reconcile stark differences, the Commission’s push to level the playing field is unlikely to make a dent.

Reflecting growing concern among European political elites, the European Think-tank Network on China (ETNC) published a grim report in December detailing the scale, nature, and implications of Chinese foreign direct investment in Europe. The network, consisting of Europe’s 19 leading think tanks, revealed not only a sharp increase in Chinese FDI in numerical terms — from 1.6 billion euros ($2 billion) in 2010 to 35 billion euros ($44 billion) in 2016 — it notably managed to shed light on the qualitative side as well.

Putin’s Shadow Army Suffers a Setback in Syria

By Joshua Yaffa

For the first time in fifty years, U.S. and Russian military forces have engaged in direct combat. Soldiers from the two countries last clashed during the Vietnam War, when Soviet soldiers shot down U.S. warplanes with anti-aircraft weapons. Last week, on February 7th, the two powers met again, when U.S. drones, attack helicopters, and fighter planes struck a contingent of pro-regime fighters near Deir Ezzor, a Kurdish-held city in eastern Syria. As would emerge later, among those killed were up to a hundred Russian citizens who were fighting in Syria as private military contractors, a shadowy mercenary force whose presence in Syria is not officially recognized by the Kremlin.

European Defense vs. NATO: Not the Right Fight


One year into Donald Trump’s presidency, it’s clear this White House isn’t one for carefully picking its battles. And given the president’s appetite for confrontation, it is only matter of time before the U.S. and its allies end up in a pointless fight over EU defense.

A Pentagon official this week criticized the EU’s “common security and defense policy” (CSDP) for pulling forces away from NATO, and the U.S. ambassador to the alliance warned against its provisions to protect European defense companies. This will make for awkward conversations at the Munich Security Conference this week, where the allies intend to push back against talk of a NATO divided under Donald Trump.

The ultimate rent-a-war being fought in Syria

Thomas L. Friedman

Two weeks ago, standing on the Syria-Israel border in the Golan Heights, I wrote a column positing that this frontier was the "second most dangerous" war zone in the world - after the Korean Peninsula.

I'd like to revise and amend that column. Having watched the opening ceremony of the Winter Olympics, where North and South Korean athletes marched last week into the stadium together in a love fest; and having also watched Israel shoot down an Iranian drone from Syria, bomb an Iranian base in Syria and lose one of its own F-16s to a Syrian missile; and after US jets killed a bunch of Russian "contractors" who got too close to our forces in Syria, I now think the Syria-Israel-Lebanon front is the most dangerous corner in the world.

Economic Warfare a Poor Strategy for PLO’s Abbas

By David May

It was a speech that few Middle East observers will forget. During his January 14 tirade before the PLO Central Council, Palestinian President Mahmoud Abbas delivered a slew of conspiratorial and anti-Semitic comments. Abbas accused Israel of deliberately creating a drug problem among Palestinians and attempted to undermine the Jewish connection to the land of Israel. The Palestinian president also threatened to “publish a blacklist of 150 companies who work with the settlements.” After Abbas’ hours-long oratory, the PLO Central Council declaredthat it would “adopt the BDS movement and call on world countries to impose sanctions on Israel,” referring to Israel as an “apartheid regime.”

Why North Korea and Iran get accused of nuclear collusion

Jim Walsh

Iran and North Korea are often rhetorically linked, most famously in President George W. Bush's 2002 speech in which he labeled them part of an "axis of evil." In practice, however, they have been largely treated as separate challenges for American foreign policy. There are good reasons for this. The Islamic Republic of Iran and the Democratic People's Republic of Korea are in different regions, have different economies and political systems, and affect different sets of US allies.

Looking back at Eisenkot’s three years as IDF chief

Ron Ben Yishai

Analysis: It is still too early to assess Eisenkot’s performance as IDF Chief of Staff; the real test is how well the army he leads performs on the battlefield; However, it can still be said that Eisenkot is an exceptional military leader owing to the impressive amount of objectives, which he set for himself at the start of his term, which were fulfilled.

In the shadow of the latest events in the north, Lieutenant General Gadi Eisenkot is completing his three year term as army Chief of Staff. However, as is often the case, Defense Minister Avigdor Lieberman extended his term an additional year. Eisenkot announced though that he will complete his service at the close of 2018, and not wait until February, 2019. 

China Warns It May Retaliate If U.S. Imposes Metal Tariffs

China said proposed U.S. tariffs on imported steel and aluminum products are groundless and that it reserves the right to retaliate if they are imposed.

The U.S. recommendations, unveiled by the Commerce Department on Friday, aren’t consistent with the facts, Wang Hejun, chief of the trade remedy and investigation bureau at China’s Ministry of Commerce, said in a statement posted on its website.

The future of education, according to experts at Davos

The future of work is going to look very different, as automation and Artificial Intelligence make many manual, repetitive jobs obsolete.

According to the McKinsey Global Institute, robots could replace 800 million jobs by 2030, while the World Economic Forum suggests a “skills revolution” could open up a raft of new opportunities.

“If we do not change the way we teach, 30 years from now, we’re going to be in trouble,” said Jack Ma, founder of Alibaba Group, China’s e-commerce giant.

International Hackers Find 106 Bugs in U.S. Air Force Websites

By Jack Corrigan

Breaking into a federal network usually gets you a one-way ticket behind bars, but sometimes hacking the government ends with a paycheck instead of a prison sentence.

The Air Force paid out nearly $104,000 to a cohort of white-hat hackers as part of Hack the Air Force 2.0, the Pentagon’s most recent bug bounty competition. During the 20-day competition, participants uncovered 106 security vulnerabilities across roughly 300 of the branch’s public-facing websites.

The debate over what Cyber Command still needs

By: Mark Pomerleau 

This is the final part of a series exploring the future of Cyber Command. For previous installments, see part one and part two.

As Cyber Command continues to mature, key government watchdogs want to ensure the organization does so in a responsible way.

As part of this effort, the House Armed Services Emerging Threats and Capabilities subcommittee, which oversees cyber, held a classified briefing with the Government Accountability Office in mid January to “discuss ongoing reviews and studies of cyberspace and cybersecurity capabilities of the Department of Defense,” a press release from the committee said.

Here's a great explanation of what the blockchain is from the person tasked with explaining it to the world


Business Insider's Sara Silverstein spoke with Jamie Smith, CEO of the Global Blockchain Business Council, at the World Economic Forum in Davos, Switzerland. Smith is also the co-chair of the WEF's blockchain council . Following is a transcript of the video.

Sara Silverstein: So tell me what is the purpose of the Global Blockchain Business Council?

Jamie Smith: So the Global Blockchain Business Council is designed to specifically educate regulators on behalf of business so that they can understand what blockchain technology is and why they should care.

Here are 5 predictions for the future of our cities

In 2018, it is all but impossible to know whether you are reading this on a computer screen, mobile phone, or a tablet. However, chances are you are doing so in one of the 150 metropolitan areas that are home to every seventh person alive today.

More than half of us have chosen to live in cities, a figure that is expected to rise to 70% by 2050. In economic terms, the results of urbanization have been nothing but impressive. Cities are accountable for 80% of global GDP. For instance, the Boston-NYC-Washington corridor together with the LA region generates more than 30% of the United States’ annual output.

How can policy keep pace with the Fourth Industrial Revolution?

Agile governance is needed in an era when blockchain and AI are changing life as we know it. 

In today’s era of transformative scientific and technological advances, businesses are not only creating new products and services. They are reshaping industries, blurring geographical boundaries and challenging existing regulatory frameworks.

The Army's next network strategy: halt, fix, pivot

By: Mark Pomerleau 

The Army submitted a report to Congress last month, as mandated by the 2018 defense authorization bill, that requested the Army’s strategy for “modernizing air-land ad-hoc, mobile tactical communications and data networks.”

Following a highly contentious review, the Army announced last year it would make major changes to its tactical network, the $6 billion program known as Warfighter Information Network, citing operational concerns.

Having Your Cake and Eating It Too: The Paradox of Readiness and Modernization in the US Army

By: Eric Altamura

The recently published National Defense Strategy states that, “without sustained and predictable investment to restore readiness and modernize our military to make it fit for our time, we will rapidly lose our military advantage.”[i] Secretary of Defense James Mattis reinforced this point to the Senate Armed Services Committee this past week, testifying that budget uncertainty since the passing of the 2011 Budget Control Act (BCA) has “negatively impacted military readiness” and resulted in a “failure to modernize our military.”[ii]