17 June 2018

What Chinese Companies Can Learn From ZTE’s Mistakes

By Xiaomeng Lu

Starting in 2010, Chinese telecommunications equipment company ZTE violated the U.S. embargo against Iran in order to sell export-controlled technology to Iranian entities. During the course of the U.S. government investigation, ZTE engaged in evasive conduct designed to prevent investigators from detecting their violations. This unprecedented scheme led to a record-high penalty of $1.19 billion. At the time ZTE fully admitted its wrongdoing and promised to bring the company’s practice in compliance with U.S. law. However, only a year later, ZTE was found issuing misleading statements and again violating U.S. sanctions during the probationary period under the 2017 Settlement Agreement.

Kuwait and Oman Are Stuck in Arab No Man’s Land


Saudi King Salman bin Abdulaziz (C), Bahrain's King Hamad bin Issa al-Khalifa (R) and Emir of Kuwait Sheikh Sabah al-Ahmad al-Jaber al-Sabah attend a Gulf Cooperation Council (GCC) informal summit in the Saudi Red Sea city of Jeddah on May 31, 2016. Just over a year ago, four of America’s Arab allies — Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt — severed relations with Qatar, another key U.S. ally. They enacted a land, sea, and air blockade to punish the tiny emirate for what they claimed was Doha’s “embrace of various terrorist” entities. Observers widely thought the diplomatic spat would be patched up within a few months. After all, this was hardly the first time Qatar and its Gulf neighbors had squabbled.

In the face of Hodeidah assault, Yemen is on the brink

Bruce Riedel

The war in Yemen is approaching a catastrophic battle for control of the crucial port of Hodeidah. Washington is tepidly counseling the Saudi- and Emirati-led coalition to refrain from trying to capture the strategic port, but it is far from clear that they will listen. The administration has sent mixed signals to Riyadh and Abu Dhabi. Hodeidah is the major port of northern Yemen. Approximately 70 to 80 percent of the nation’s vital imports of food and medicine arrive via Hodeidah. The Zaydi Shia Houthis have controlled the strategic port city of a half million people since 2014. It is a major source of revenue for the rebels and a historic smuggling entrepôt. The city is primarily comprised of Sunnis. It is a very humid and hot place, average daily high temperatures in the summer are over 100 degrees Fahrenheit.

The Broader Implications of What’s Happening in Yemen


Pro-government forces backed by Saudi Arabia and the UAE, have launched an assault on rebels holding Yemen’s port city of Hodeidah. Potential humanitarian casualties are high, since the port serves as one of the only avenues for foreign aid to move into the country, where Yemenis are already facing dire conditions with as many as eight million people at risk of starvation. U.S. Secretary of State Mike Pompeo said the U.S. is ‘monitoring the situation’, but stopped short of saying that the U.S. is leveraging its influence in the region to stop the assault. Besides the humanitarian crisis, there is a national security component to the overall lack of stability in Yemen. In analysis that The Cipher Brief’s Bennett Seftel produced in late February, the risk of terrorist groups exploiting uncertainty in Yemen is high.

Op-Ed: An Assessment of the Islamic State in 2018

Joseph V. Micallef is a best-selling military history and world affairs author, and keynote speaker. Follow him on Twitter @JosephVMicallef. By all accounts, the war against the Islamic State in Iraq and Syria (ISIS) is virtually over -- save for a few mopping-up operations. In December 2017, the Iraqi government declared that, after almost four years of fighting, ISIS had been defeated and no longer controlled any Iraqi towns. Russian President Vladimir Putin has made the same declaration and announced that some Russian troops will soon be withdrawn from Syria, although it does not appear that any withdrawal has yet occurred.



The 21st FIFA World Cup will kick off on June 14, with the best soccer players on the planet heading to Russia to showcase their skills. Russia is a controversial choice to host the tournament, and the bidding team has been accused of bribery to secure the votes needed. But despite the controversy—and no World Cup is complete without some scandal—Russian soccer fans will have June 14 circled in their calendars. Stanislav Cherchesov’s side begin their bid for glory in Moscow’s Luzhniki Stadium on Thursday, though most observers think the team, considered one of the weakest host nations in World Cup history, won’t even get through the first round.

How North Korean hackers became the world’s greatest bank robbers

The Reconnaissance General Bureau, North Korea’s equivalent to the CIA, has trained up the world’s greatest bank-robbing crews. In just the past few years, RGB hackers have struck more than 100 banks and cryptocurrency exchanges around the world, pilfering more than $650 million. That we know of. Students at Mangyongdae Revolutionary School, a prestigious academy in Pyongyang. North Korea’s elite hackers are often deployed to countries with faster internet speeds to target banks around the world. In the US, they’ve gone after Wells Fargo, Citibank and the New York Federal Reserve. 

Global Metro Monitor 2018

More than half the world’s population now lives in urban areas, and the 300 largest metropolitan economies in the world account for nearly half of all global output. The concentration of economic growth and prosperity in large metro areas defines the modern global economy, creating both opportunities and challenges in an era in which national political, economic, and societal trends are increasingly influenced by subnational dynamics. Understanding these large metro areas’ economic trajectory, which we measure through employment and GDP per capita measures, offers additional insights into the sources of growth that national or regional assessments tend to obscure.

Microsoft’s most vulnerable monopoly

The unprecedented opportunity to leverage the decline of one of the most profitable monopolies in history: Microsoft Office. Under Satya’s leadership, Microsoft’s strategy has shifted away from “Windows everywhere” to an infrastructure and software play of “Microsoft everywhere”. More than anything, this shift is acknowledgement that the days of milking old monopolies are gone and the company must expand beyond Windows and Office to re-frame their offering and innovate again. The reasons Microsoft’s dominant position was so heavily disrupted can be summed up by two simple words: Mobile and Internet. The dynamics of that disruption are well documented, and I could write about that at length, but the focus of this post is to bring attention to the very specific opportunity surrounding the Office products and services.

Making Sense of Web 3

Network effects unlocked by common standards and new engineering.

Smartphones Are Doing to Websites What Amazon Did to the Mall

By Kyle Stock

It took 20 years for e-commerce to bring on the shopping mall apocalypse. The next transformation will happen much faster.
Anita Berisha turned her jewelry-making “side hustle” into a $10,000-a-month business. Photographer: Amy Lombard for Bloomberg Young, distracted and styled just-so, Anissa Kheloufi is part of a growing genus of Instagram junkies. As the 21-year-old flits around the Paris suburb of Saint Ouen, she’s incessantly snapping photos and videos. Usually they’re of her friend Cynthia Karsenty, who preens for the camera in swanky clothes ranging from high-waisted shorts and pin-striped jumpers to big, fuzzy slippers.

There's A New Cold War Brewing In Cyberspace

By Safehaven

Amid mounting criticism that the Trump administration is doing too little to punish Russia, the U.S. Treasury has imposed new sanctions on individuals and companies alleged to have worked aided and abetted Moscow’s intelligence services in conducting cyberattacks on the U.S. Specifically, three Russian individuals and five companies have been sanctioned for using submarines to undermine U.S. cybersecurity, according to Treasury Secretary Steven Mnuchin. “The United States is engaged in an ongoing effort to counter malicious actors working at the behest of the Russian Federation and its military and intelligence units to increase Russia’s offensive cyber capabilities. The entities designated today have directly contributed to improving Russia’s cyber and underwater capabilities through their work with the FSB and therefore jeopardize the safety and security of the United States and our allies,” Mnuchin said. 

SASC NDAA Tasks Top Scientists To Suss Out Electronic Warfare Fixes

WASHINGTON: A little known group of top America scientists known as JASON will, if the Senate Armed Services Committee has its way, perform a major analysis of US and allied Electronic Warfare capabilities and recommend how the US can improve this crucial element of warfare. Why is the SASC doing this: “The committee recognizes that the United States has a significant comparative military disadvantage (emphasis added) against our peer competitors in aspects of the electronic warfare mission and in the conduct of joint electromagnetic spectrum operations.” Breaking D readers, of course, have long known about America’s weaknesses in EW and across the spectrum.


By Tom Galvin and Andrew 

In an organization in which … ‘manageR’ is an insult, it is not easy to convince people that defense management is valuable. We are pleased to announce the publication of Defense Management: Primer for Senior Leaders, by the U.S. Army War College’s Department of Command, Leadership, and Management. (Download the primer here. Listen to a reading of the Preface here.) Why do we need a primer on defense management? U.S. military graduates of the Army War College spend much of the rest of their careers dealing with force development and management. A review of 1000 colonels who attended the War College over a five-year span showed that 84% arrived from tactical assignments but only 39% went back to traditional Army units after graduation. What were the other 61% doing?
As division chief in a service component command staff, combatant or sub-unified command staff, service staff or secretariat, or joint staff responsible for translating policy into strategy, strategy into programs, or programs into budgets


By Patrick Bell and Jan Kallberg 

DoD will continue to struggle to develop and employ effective cyber capabilities if it continues putting old wine in new bottles – applying a bad personnel model to the cyber force. The Department of Defense (DoD) must abandon its “up-or-out” promotion model for cyber forces. It should let competent officers hold their positions longer. Applying the outdated Defense Officer Personnel Management Act’s (DOPMA) staffing model to the cyber force is foolish, and makes it difficult to keep experienced, technically-proficient cyber officers in the military. DOPMA’s prescribed career paths entail officers’ attendance at a variety of schools, with several rotations through geographical areas and work domains. In the process, domain-specific knowledge that would allow officers to lead and understand the impact of their various choices in a technically complex and ever-changing environment evaporates. In a world of increasing complexity, shortened windows of opportunity to act, and constantly-changing technical environments, the generalist leaders that the DOPMA system yields may doom the military’s cyber force to failure.

Don't Just Rename the Pacific Command—Give It More Weapons

James Holmes

The Pentagon amended its “mental map” of the world last week at Pearl Harbor, when Adm. Harry Harris handed over the keys to the U.S. Pacific Command to Adm. Phil Davidson. Admiral Harris relinquished the Pacific Command; Admiral Davidson took charge of the Indo-Pacific Command. What’s in a name? For one thing, this was more than mere bureaucratic tinkering. Human beings reason from assumptions. Geopolitics is power politics that unfolds amid distinct geographic features. Assumptions about geography shape how we interpret the setting and our place in it. Changing the name of a geographically-oriented institution, like a regional combatant command, can modify assumptions about that institution, and shape expectations about its future behavior for strategic and political gain. Foes can be cowed, allies and friends comforted, U.S. armed services and nonmilitary agencies rallied behind common endeavors.

Forum: U.S. Drone Policy Not Transparent, Accessible

By Tahreem Alam

Current U.S. drone policy is less transparent and less accessible under the Trump administration, said panelists at a Stimson Center forum June 7. The event was focused on the release of the Stimson Center report An Action Plan on U.S. Drone Policy: Recommendations for the Trump AdministrationRachel Stohl, managing director of the Stimson Center, called the report a cornerstone of Stimson’s work. The research team’s main purpose was to find out if Trump administration drone policies were transparent and legitimate. “In short, the Trump administration’s drone policy appears to be less restrained, less transparent, and less accountable,” Stohl said, noting several changes from past administrations’ programs.

The 12 Critical Areas That Require Addressing: An Army General Officer’s (Retired) Perspective

There are 12 critical areas that must be addressed to ensure the Army is successful in the future. None of what appears here has to do with technology, but rather people, our most important asset. The 12 critical areas are as follows:

1. Leadership
2. Mission Command
3. Investigations
4. Awards
5. Counseling and Mentoring
6. Talent Management
7. Senior Leader Selection
8. Get Public Affairs Right
9. Get Multi-Generation Communication Right
10. Military Service and Veterans Heath, Morale, and Welfare:
11. Revise the Education System
12. Mandatory Service

My concern is derived from personal experience and from what I continue to hear from our service members. Most of what I say here, I have said before as a Major, Lieutenant Colonel, Colonel, and Brigadier General. It was not popular then and will not be popular now. I put people first and loyalty to unit second, and mission third.

16 June 2018

Around the halls: Brookings experts react to the Trump-Kim Jong-un summit in Singapore

Jung H. Pak, Jonathan D. Pollack, Evans J.R. Revere, Robert Einhorn, Ryan Hass, Richard Nephew, Katharine H.S. Moon, Jonathan Stromseth, Michael E. O’Hanlon, Tarun Chhabra, and Jeffrey A. Bader

Jung Pak, SK-Korea Foundation Chair in Korea Studies and Senior Fellow in the Center for East Asia Policy Studies: The Trump administration will probably tout this as a Nobel-worthy effort by President Trump, but the Singapore summit produced little more than frothy statements without substance, with little accountability for Kim Jong-un to cease and dismantle his nuclear weapons program. In the press conference after the summit, Trump could have reinforced the U.S. commitment to our alliances with South Korea and Japan, but instead made gratuitous comments complimenting Kim and touting his trustworthiness, as well as raising the possibility for more give-aways to Kim, such as a visit to the White House. He also criticized U.S.-South Korean military exercises and cast doubt about the future of U.S. troop presence in South Korea. The Trump-Kim meeting started a diplomatic process, but it will be difficult for working-level U.S. officials to build upon North Korean denuclearization on this very shaky and loose foundation. In effect, maximum pressure has morphed into maximum maneuvering space for Kim.

India, China in talks to form bloc against Opec

Sanjay Dutta

India and China, which together accounted for almost 17% of world oil consumption last year, are working on combining their shopping carts with a view to challenging Opec’s capability to play havoc with crude prices and seek better bargains from the cartel of oil exporting countries, especially its West Asian members. The two sides kicked off formal talks in Beijing on Monday for forming an oil buyers’ club + . The development is likely to weigh on Opec energy ministers, who are expected to discuss a plan to end the production cut deal later this month. The talks come within less than two months of oil minister Dharmendra Pradhan proposing an alliance between Indian and Chinese state-run oil companies for a greater say in the market.

Why a War Between China and India Is Not Unthinkable (And Would Be a Total Horror Show)

Kyle Mizokami

Meanwhile, shipping to and from China would be forced to divert through the western Pacific Ocean, where such diversions would be vulnerable to Australian, Japanese, or American naval action. 87 percent of the country’s petroleum needs are imported from abroad, particularly the Middle East and Africa. China’s strategic petroleum reserves, once completed sometime in the 2020s, could stave off a nationwide fuel shortage for up to seventy-seven days—but after that Beijing would have to seek an end to the war however possible.

Myanmar: Army- Civil Relations and Insurgency: Myanmar: Army- Civil Relations and Insurgency

By Dr. S. Chandrasekharan’

On 29th May, in response to a question from the Irrawaddy’s Representative, the Permanent Secretary of the Defence Ministry, Brigadier General Aung Kyaw dropped a bomb shell that the Tatmadaw (the Army) is ready to obey if President U Win Myint orders a stop to the ongoing military operations in Kachin State in line with the law. The catch phrase is perhaps “in line with the law.” The Brig. General declared that the Kachins do not want to relinquish power they gained from bearing arms and that peace can be achieved only through the path of the National Cease fire Agreement. Thus he made it clear to all those including the civilian leadership that the Army’s operations against Kachins will continue until they sign the Government-sponsored cease fire agreement! 

The US needs China as an innovation partner. Here's why

Among the many issues at play in the ongoing economic and trade tensions between the US and China are questions of technological capability and innovation. Two of the main complaints in the US Section 301 report were that American companies have been forced to transfer technology to China and been the subject of cyber espionage. The presentation of the issues in this report has been disputed, but behind it lies concern in the US that Chinese innovative and technological capability is catching up with that in the US, thanks partly to the support of state policies set out in the Made in China 2025 initiative. One important feature of the package of measures announced by the US last month is that it was designed to contain China’s technological development as much as to reduce the trade deficit, even though the latter has been the focus of President Donald Trump’s rhetoric.

In 1969, Russia and China Fought a Brief Border War. It Could Have Started World War III

Robert Farley

The most critical avenue of potential advance lay in Manchuria, where the Red Army had launched a devastating, lightning quick offensive in the waning days of World War II. Despite its size, the PLA of 1969 had no better hope of stopping such an offensive than the Kwantung Army had in 1945, and the loss of Manchuria would have proven devastating to China’s economic power and political legitimacy. In any case, Soviet airpower would have made short work of the Chinese air force, subjecting Chinese cities, communication centers and military bases to severe air attack. Americans tend to remember the Cuban Missile Crisis as the most dangerous moment in Cold War brinksmanship. Despite some tense moments, Washington and Moscow resolved that crisis with only the death of U.S. Air Force pilot Maj. Rudolph Anderson Jr.

China's J-10 Fighter Jet: Could it Take on the Air Force's Best in a Dogfight?

TNI Staff

The Chengdu J-10 Firebird was the People’s Republic of China’s first attempt to develop a fourth generation fighter comparable to the American Boeing F-15C Eagle and Lockheed Martin F-16 Falcon as well as the Soviet Sukhoi Su-27 Flanker and the Mikoyan MiG-29 Fulcrum. While initially envisioned as a pure air superiority fighter when development started in 1988 as a direct counter to the Su-27 and MiG-29, the 1991 collapse of the Soviet Union meant that Beijing could retool the J-10 into a multirole fighter that would complement the People’s Liberation Army Air Force’s (PLAAF) growing fleet of Flanker derivatives—which a formerly adversarial—and impoverished—Russian Federation was more than willing to supply in exchange for hard currency. Indeed, while the J-10 has evolved over the years into a formidable warplane as new technologies are added to the jet, various unlicensed Chinese copies of the Su-27 and Su-30 including the J-11B, J-15 and the J-16 among others have largely overshadowed the Firebird.


By David Scott


On 30 May 2018, Admiral Harry Harris, the retiring chief of the newly renamed U.S. Indo-Pacific Pacific Command (IndoPacom), noted that “China remains our biggest long-term challenge” and “a resurgent and revanchist Russia, remains an existential threat to the U.S” – and that consequently “Great Power competition is back.” Such competition brings Russia and China together as political partners, and is echoed in their increasing naval cooperation. Such naval cooperation provides one another with tacit support in their respective areas of geopolitical interest.

Counter-terrorism strategy (CONTEST) 2018

This updated and strengthened CONTEST strategy reflects the findings of a fundamental review of all aspects of counter-terrorism, to ensure we have the best response to the heightened threat in coming years from all forms of terrorism. Our counter-terrorism strategy will continue to be organised within the tried and tested strategic framework of four ‘P’ work strands, each comprising a number of key objectives:

Jordan’s $2.5b Security Lifeline to the Future


While the media is dominated by events in North Korea, it would be wise to devote some space to the decision this week by Saudi Arabia, the United Arab Emirates, and Kuwait to provide Jordan with more than 2 billion dollars in aid over five years to sustain Amman during a time of unprecedented economic pressure. With an estimated 200,000 Jordanian protestors on the streets venting anger over falling living standards, Jordan is the third Middle East country to endure widespread unrest this year. Dissatisfaction has been rising for months, and protests have echoed the unrest that shook Tunisia and Iran earlier this year. In all three countries, protestors represented a spectrum of lower and middle class groups in demonstrations larger than anything seen in the early days of the Arab Spring. Likewise, protests were essentially leaderless, rudderless, and fueled by social media. The leaders of the affected countries responded by backing away from necessary reforms to restore order.

Never Call Kim Jong Un Crazy Again


The Singapore summit was long on theater and largely devoid of substance, save for a typical Trumpian giveaway. This time Donald Trump impulsively offered to suspend military exercises with South Korea (without notifying Seoul in advance) in exchange for a North Korean pledge to do … well, nothing. If the self-proclaimed master negotiator keeps making deals like this, there will be a Kim Jong Un Hilton in Honolulu before there’s a Trump Tower in Pyongyang.

Think tank and intelligence agency partner for public reports on North Korea

By: Kelsey Atherton   

Not since the Maginot Line has there been a static, fortified border as prominent as the DMZ. And unlike its gallic predecessor, the DMZ endures as intended, a mutually impenetrable void between two permanently mobilized armies, bounded on each side by the oceans that shape the Korean peninsula. There are ways around the border for diplomats and tourists, guided visits and formal state functions, but for the observer looking to peer into North Korea from beyond the reach of its security services, the best way to study the country is by watching it from above. Far, far above. Space, to be exact, which is one reason the Center for Strategic and International Studies (CSIS) is partnering with the National Geospatial-Intelligence Agency (NGA) to create unclassified reports on North Korea.

HASC Chair Thornberry: Okay To ‘Suspend’ US-South Korea Wargames

Source Link

"This is an opportunity to hold their feet to the fire and see if North Korea is serious about this," Rep. Thornberry said. “If they’re not serious, then it’s pretty easy to say those joint exercises that were scheduled for August are now going to happen in September or October." CAPITOL HILL: It’s okay for President Trump to “suspend” upcoming military exercises in Korea as a concession to Pyongyang, the House Armed Services chairman said, since other forms of training will continue. Rep. Mac Thornberry was commenting on Trump’s pledge to stop unspecified “wargames” that were both “tremendously expensive” and “very provocative.” Other members of Congress have expressed concern, including prominent Republicans.


Source Link

The authors seek to spark a deeper conversation on the merits of geoeconomics — i.e., using economic instruments to produce beneficial geopolitical results — as a potential source of new and scalable policy options for the U.S., as well as the EU and its individual member states, to bolster gas supply and national security across Europe. 

Meet the new data challenges. Same as the old data challenges.

By: Valerie Insinna   

During a May 10 panel at the annual C4ISRNET conference, officials from the military and government delved into the barriers that keep the Department of Defense from being able to consolidate data to provide a single battlefield picture to troops and enable them to make decisions on the fly.  Spoiler alert: They might sound familiar to those following the problem over the past several years. Here’s a look at what still needs to be solved: Moving from a platform-centric mindset The military loves its tanks, planes and ships, but equally important is the ability to push the data collected by those platforms to each other in real time, Capt. Clayton Michaels, the special assistant to the associate director for operations at the National Geospatial-Intelligence Agency, said.

53% of execs pay a hacker's ransom. Are businesses losing the cybersecurity battle?

By Alison DeNisco Rayome
Source Link

It's no secret that ransomware attacks have spread like wildfire through enterprises since 2016. However, this marks the first year that the majority of company executives—53%—reported paying a hacker's ransom following an attack, in attempts to unlock critical business files, according to a Tuesday report from Radware. This figure comes as 69% of executives said that their company faced a ransom attack in the past year—up from 14% in 2016, the report found. Some 66% of the 200 executives surveyed worldwide said they are not confident in their network security, and admit that their networks are penetrable by hackers.

The Industrialization Of Cybercrime. Lone-wolf Hackers Yield To Mature Businesses.

by Tamas Gaidosch
Source Link

Cybercrime is now a mature industry operating on principles much like those of legitimate businesses in pursuit of profit. Combating the proliferation of cybercrime means disrupting a business model that employs easy-to-use tools to generate high profits with low risk. Long gone are the legendary lone-wolf hackers of the late 1980s, when showing off level 99 computer wizard skills was the main reason to get into other people’s computers. The shift to profit making, starting in the 1990s, has gradually taken over the hacking scene to create today’s cybercrime industry, with all the attributes of normal businesses, including markets, exchanges, specialist operators, outsourcing service providers, integrated supply chains, and so on. Several nation-states have used the same technology to develop highly effective cyber weaponry for intelligence gathering, industrial espionage, and disrupting adversaries’ vulnerable infrastructures.

Predicting When Weapons Will Break is a Hot New Market. Microsoft Wants In.

Source Link

As the Pentagon shops for technology that can predict when its weapons might break, Microsoft (MSFT) is shopping its artificial intelligence to defense decision makers in Washington. The firm’s touting its technology comes as companies large and small look to score deals in this emerging military market. “Using a lot of [this machine learning technology] really is about lowering your total cost of ownership for a particular asset,” said Jim Ford, director of cloud strategy and solutions for Microsoft Federal, while showing off the technology on Tuesday at a pop-up exhibit in Washington just blocks from the White House.

Comprehensive Deterrence Forum

Edited by Becca Wasser, Ben Connable, Anthony Atler, James Sladden

PDF file 0.4 MB 

On October 30, 2015, the U.S. Army Special Operations Command (USASOC) facilitated a senior leader forum, hosted by the U.S. Special Operations Command (USSOCOM) and the U.S. Department of State (DoS), to explore the subject of comprehensive deterrence. Participants included representatives from across DoS and the U.S. Department of Defense. According to a 2015 draft joint USASOC and USSOCOM definition, comprehensive deterrence is the "prevention of adversary action through the existence of credible and proactive physical, cognitive and moral capabilities (loosely defined as willpower) that raise an adversary's perceived cost to an unacceptable level of risk relative to the perceived benefit." Part I of this report delivers the proceedings from the senior leader forum, reflecting a robust discussion of comprehensive deterrence and its application. To ensure a wide variety of perspectives and encourage free-flowing discussion, all remarks from the forum were not for attribution. As such, the conference summary seeks to draw out the main themes and observations from the discussion without attributing particular points to a specific participant.

Maghreb: Dream of Unity, Reality of Divisions

Anouar Boukhars

It has long been an axiom among the rulers of each Maghrebi country to brandish their rhetorical commitment to regional integration while often-shamelessly suffocating the principles and prospects of unity. King Mohammed VI of Morocco put an end to this masquerade in January 2017 when he proclaimed in front of African heads of state during the 28th African Union summit in Addis Ababa that the “The Arab Maghreb Union (AMU) is dead”. Ten months later in Abidjan, as if to bring his point home, the monarch took the occasion of the 5th African Union - European Union (AU-EU) summit to once again direct his rhetorical artillery at the AMU, that putrid carcass of an institution that “doesn’t exist”. For those that still cling or claim to care about the “Maghrebi dream” of integration, the instinct is to cry fatalism, for the throwing in the towel effect will extinguish any remaining glimmers of hope for unity that people of the Maghreb might still share. “We still believe in Maghreb integration for historical, cultural, political and economic reasons,” Algerian Foreign Minister Abdelkader Messahel stated in response to the comments made by Mohammed VI. (1)

U.S. Senator: Do not underestimate China’s determination to win in space

by Sandra Erwin 

WASHINGTON — China has made no secret of its ambitions to surpass the United States as an economic and military power. Although it still has a lot of catching up to do, China is tenaciously developing space technologies that will threaten U.S. satellites, and the United States should take this challenge seriously, said Sen. David Perdue, a Republican from Georgia and member of the Senate Armed Services Committee. “I have been a China watcher for much of my career,” said Perdue, a longtime business executive who lived and worked in Asia for many years. “China for 30 years has viewed space as a military effort. We need to recognize that,” he told reporters Tuesday at a breakfast meeting.

SASC NDAA Tasks Top Scientists To Suss Out Electronic Warfare Fixes


WASHINGTON: A little known group of top America scientists known as JASON will, if the Senate Armed Services Committee has its way, perform a major analysis of US and allied Electronic Warfare capabilities and recommend how the US can improve this crucial element of warfare. Why is the SASC doing this: “The committee recognizes that the United States has a significant comparative military disadvantage (emphasis added) against our peer competitors in aspects of the electronic warfare mission and in the conduct of joint electromagnetic spectrum operations.” Breaking D readers, of course, have long known about America’s weaknesses in EW and across the spectrum. JASON is one of those entities you’d have to make up if they didn’t already exist. It’s a self-selecting group of top scientists, heavily weighted toward Nobel Prize-winning physicists in the past, who provide independent advice to the US military. They mostly get together in the summer — presumably after classes end — and produce reports on a wide array of topics, most of them classified.

Why cryptomining is the new ransomware, and businesses must prepare for it

By Teena Maddox

For years, ransomware has been the bane of the enterprise, with cyber criminals literally holding data hostage unless a ransom is paid. Some verticals in the enterprise can breathe a sigh of relief, however, because now there is less ransomware in play, but individuals and small businesses are the newest target as cryptomining becomes the hottest trend in cyber attacks. Craig Williams, director of outreach for Cisco Talos, addressed the trend at Cisco Live 2018, noting that "people are backing off from ransomware. It's a super high risk. A lot of people aren't paying." Cryptomining is rising up to take the place of ransomware, and if cyber crime could be considered trendy, crypto mining is Cardi B, Drake and Taylor Swift rolled into one.

Here’s why your printer is a tattletale

By Lexie

When you print, scan, or copy a document at home or in the office, it might look like any other document to your eyes. But, unbelievably, data on the page make it possible to track almost every document you’ve ever scanned, printed, or photocopied back to you.
Your printer logs everything All modern printers keep some form of log. Depending on the make and model, the logs can be highly intrusive and even go as far as indefinitely retaining full copies of all material. Printer logs can be a substantial and unexpected privacy risk, especially if they contain sensitive and personal information. This is a significant risk when disposing of or selling old printers, as people are rarely aware of how to wipe or destroy the hard drive safely. In shared printers, information logs will also include which computer connected to the printer and submitted the printing job. If the printer uses no authentication system, or if enough people share the same credentials (e.g., one password for the entire user base), it is possible to hide the identity of whoever is printing a document by using an operating system like TAILS, but not the contents of the document.

Lessons from Others for Future U.S. Army Operations in and Through the Information Environment

by Christopher Paul, Colin P. Clarke, Michael Schwille, Jakub P. Hlavka, Michael A. Brown, Steven S. Davenport, Isaac R. Porche III, Joel Harding

What information-related practices or capabilities have U.S. allies employed effectively, and which could the U.S. Army adopt? What information-related practices or capabilities have adversaries or potential adversaries used effectively, and which of these could the Army adopt? What are adversaries or potential adversaries doing in the information environment that the Army cannot consider doing because of ethical or legal constraints, and which of these should it be most prepared to counter? Harnessing the power of old and new technology, it is easier than ever for U.S. allies and adversaries to reach — and influence — vast and varied audiences to achieve their strategic goals. Modern conflicts are fought as much in the information environment as on the physical battlefield, and the line between these domains is dissolving. 

AUSA’s Carter Ham To Macgregor: Futures Command Will Work


Carter Ham, head of Association of the US Army

The battle for the soul of the Army is, once again, engaged. Doug Macgregor, best known to Army aficionados for his book Breaking The Phalanx and more recent studies on Joint maneuver warfare, called out the service in an op-ed we published Monday. The Army, he argued, would once again botch procurement of new weapons, as it did with the Future Combat System (FCS) and a whole raft of earlier modernization efforts. The effort to institutionalize Army modernization in Army Futures Command is bound to fail, Macgregor argued. Today, we publish a vigorous rebuttal of Macgregor’s views by the CEO of the Army’s doppleganger, the Association of the US Army. Retired Gen. Carter Ham offers this well written and pointed response, arguing that the top Army leaders know what the service has done wrong in the past and possess the will and intelligence to do it right this time.

15 June 2018

Modi-Xi informal meeting: Equidistant from two super powers

By Ajit Ranade

Just over a month ago Prime Minister Modi went to Wuhan for an informal bilateral two-day meeting with President Xi Jinping. This was supposedly at the invitation of the Chinese President. In fact Xi said to Modi that in his five years, he had moved out of the capital to meet a foreign leader only twice, and on both occasions it was to meet with the Indian Prime Minister. Many sceptical analysts wondered what the tangible achievements of the Wuhan summit were, although they overlooked the announcement of joint projects in Afghanistan and the initiative to have direct dialogue between military leaders of the two countries. Coming after the Doklam standoff, the Wuhan visit is a distinct signal of not just thawing of relations, but of the intention for closer engagement. Later this month, PM Modi is expected to participate in the multilateral meeting of the Shanghai Cooperation Organisation in Qingdao. That would be his fifth visit to China since he became PM.