6 October 2015

U.S. Bombs Somehow Keep Falling in the Places Where Obama “Ended Two Wars”

https://theintercept.com/2015/09/30/u-s-bombs-somehow-keep-falling-in-the-places-where-obama-boasts-he-ended-wars/

Glenn Greenwald Sep. 30 2015 

“We’ve ended two wars.” — Barack Obama, July 21, 2015, at a DSCC fundraiser held at a “private residence”

“Now that we have ended two wars responsibly, and brought home hundreds of American troops, we salute this new generation of veterans.” — National Security Adviser Susan Rice, May 20, 2015

“His presidency makes a potentially great story: the first African-American in the White House, who helped the country recover from recession and ended two wars.” — Dominic Tierney, The Atlantic, January 15, 2015, “America Will Miss Obama When He’s Gone”

Report from Airwars, August 2, 2015, detailing civilian deaths from continuous U.S.-led airstrikes in Iraq and Syria:


New York Times, today, headlined: “U.S. Planes Strike Near Kunduz Airport as Fight Rages On”
American warplanes bombarded Taliban-held territory around the Kunduz airport overnight, and Afghan officials said American Special Forces were rushed toward the fighting. … The situation for the Afghan forces improved somewhat toward midnight: American warplanes conducted airstrikes at 11:30 p.m. and again at 1 a.m. on Taliban positions near the airport, an American military spokesman said. … Around the same time, soldiers with the American Special Forces headed out toward the city with Afghan commandos, according to Afghan government officials.

Brzezinski: Obama should retaliate if Russia doesn't stop attacking U.S. assets

http://breakingdefense.com/?utm_source=Breaking+Defense&utm_campaign=878bcb1468-RSS_EMAIL_CAMPAIGN&utm_medium=email&utm_term=0_4368933672-878bcb1468-408295813

By NICK GASS, 10/05/15 

The United States should threaten to retaliate if Russia does not stop attacking U.S. assets in Syria, former national security adviser Zbigniew Brzezinski wrote in a Financial Times op-ed published Sunday, urging "strategic boldness," with American credibility in the Middle East and the region itself at stake.
Moscow's apparent decision to strike non-Islamic State targets and those of Syrian rebels backed by the Central Intelligence Agency "at best" reflects "Russian military incompetence," and worst, "evidence of a dangerous desire to highlight American political impotence," wrote Brzezinski, the national security adviser for former President Jimmy Carter and a strong supporter of current President Barack Obama.
And if Russia continues to pursue non-ISIL targets, the U.S. should retaliate, he added.

"In these rapidly unfolding circumstances the U.S. has only one real option if it is to protect its wider stakes in the region: to convey to Moscow the demand that it cease and desist from military actions that directly affect American assets," he said.
"The Russian naval and air presences in Syria are vulnerable, isolated geographically from their homeland," Brzezinski noted. "They could be 'disarmed' if they persist in provoking the US."

The problem in the Middle East is bigger than Syria, Brzezinski wrote, and it would behoove Russia to cooperate with the U.S., who cannot as it did in the past, rely upon the United Kingdom and France to play a "decisive role" in the region.

Cry Wolf - A Perspective on the Brahmaputra Water War

http://www.claws.in/1439/cry-wolf-a-perspective-on-the-brahmaputra-water-war-ghanshyam-katoch.html

September 23, 2015  By Ghanshyam Katoch 

Mr Brahma Chellaney one of the foremost strategic thinkers of India has written extensively of the potential of water shortages to be a flashpoint for wars in the future.[i] In an article in 2009 he warned of Chinese plans to divert the waters of the Tsangpo through gigantic tunneling projects to the parched areas of NorthernChina.[ii] This led to a flurry of writings about the potential of this action to starve India of water, an action akin to declaration of war. Many strategic thinkers and military writers have used this to ring alarm bells about a potential Water War between India and China. A few such articles are listed below: 
Water Wars: The Next Clash between India and China- Geopolitical Monitor 20 Apr 2014.[iii] 
India- China- Water War Over the Brahmaputra ?- Institute of Peace and Conflict Studies dated 30 Apr 2014.[iv]
Water Wars- China, India and the Great Dam Rush- The Diplomat- 03 Apr 2015.[v]
Great Chinese diversion- India must be prepared to deal with China’s plans to divert Brahmaputra waters -Indian Express 21 Apr 2015.[vi]

This article opines that the extremely difficult venture of diverting the water of the Tsangpo to North China, even if can be done successfully, is not going to starve Assam of water. In fact the impact may be overall beneficial.

The Brahmaputra does not originate in Tibet. What originates in Tibet is the Yarlung Tsangpo, one of its tributaries, albeit the primary one. On entering India in Arunachal Pradesh the Tsangpo is called the Siang or Dihang. The Siang descends through Arunachal where it meets another large river, the Siyom. It then enters the plains of Assam where it meets the Dibang and Lohit. Below this confluence point, the river is the Brahmaputra. The Siang brings 30% of the water of the Brahmaputra. The rest of the water originates within India.[vii]

Sharif has given up hope on better ties during the Modi era

October 02, 2015 

'Indian diplomacy is once again being saddled with the heavy burden of a Pakistan-centric foreign policy. It is something grossly unfair at a crucial juncture in India's trajectory as an emerging power on the global stage,' argues Ambassador M K Bhadrakumar.

There is something in common, but much in contrast, between the speech Pakistan Prime Minister Nawaz Sharif made in 2013 at the annual United Nations General Assembly session and his statement at the same venue in New York on September 30.

Indeed, both speeches contained references to relations with India and the 'core issue' of Kashmir. But then, they need to be juxtaposed for two other reasons.
Firstly, Sharif made the 2013 speech during the United Progressive Alliance rule in India, while this time around Prime Minister Narendra Modi is running the government.

Two years ago, Sharif spoke positively about his expectations of carrying forward the India-Pakistan dialogue with Manmohan Singh, while Wednesday's speech was strikingly gloomy -- even alarmist, signaling gathering storms on the horizon.
However, the speech is a mirror image of the sharp deterioration of the India-Pakistan ties under Modi's watch. Modi has squandered away the UPA's splendid legacy of bringing about some degree of stability and predictability to India's relations with Pakistan.
Sharif seems to have given up hope of an improvement in relations so long as Modi is in power in India. His focus on Wednesday was on how to avoid a conflict.
The 2013 speech contained a clear enunciation of Pakistan's stance on the Kashmir problem -- the imperative need of the UN 'continuing to remain attentive' to the Kashmir issue and of the 'full realisation of the right to self-determination' of Kashmiris in accordance with the Security Council resolutions, et al.

Operation Kalat: Ideas For A Free Balochistan

http://swarajyamag.com/world/operation-kalat-ideas-for-a-free-balochistan/
Sayan Ganguly, 3 Oct, 201513

India needs to craft an aggressive covert policy against Pakistan and Balochistan should be at the centre of this policy
While much has been written about how the Narendra Modi regime has handled foreign policy, a lot of insight is still missing about its Pakistan policy. The fact that the Indian government has stuck to generic statements about zero tolerance for terrorism has not helped the public gain an understanding into whether Modi has a firm long-term plan for the Pakistan problem.
One hopes that unlike previous governments, at least this one doesn’t believe that true peace is just around the corner and the Prime Minister just needs to try a little bit harder. With a pragmatist like Ajit Doval as the National Security Advisor, it is hoped that the Indian establishment has finally concluded that it is impossible to negotiate in good faith with a nation whose raison d’etre is to be antagonistic towards India.
The word hope is being used repeatedly here because even if the Indian Government has come to these realizations, it cannot reveal the same publicly and needs to keep up pretenses in front of the international community.

Assuming that the current ruling dispensation harbors no false hope about Pakistan’s intentions, the next step would be to craft an aggressive covert policy against Pakistan. Such a policy should aim at providing India very strong levers which it can use to work towards a permanent long-term solution. Scarcely anyone will disagree that such a plan must revolve around the future of Balochistan.
But can India display the same initiative, sensitivity, agility and ambition in its covert thinking which the Prime Minister has demonstrated publicly in crafting a bolder course in foreign relations? If India hopes that Balochistan can be used as a lever just by dangling the unspoken threat of arming and training the Baloch rebels in the near future, it would be a mistake. That is a very twentieth century tactic which has run its course and will meet with limited success.

Afghanistan and “Failed State Wars”: The Need for a Realistic Transition

SEP 29, 2015 
The Taliban’s capture of Kunduz does mark its first major capture of a major urban area, but it is only a symptom of a much broader crisis in the Transition process in what has begun to approach a forgotten war. 




How to Defeat Religious Violence


http://www.wsj.com/articles/how-to-defeat-religious-violence-1443798275

Islamic State’s creed embodies evil in the name of a sacred cause. To defeat it, we must recover the values that can bring Jews, Christians and Muslims together 

By  JONATHAN SACKS, Oct. 2, 2015 
The West was caught unprepared by the rise of Islamic State, as it was a decade and a half ago by the attacks of al Qaeda and as the Soviet Union was by the determination of the mujahedeen of Afghanistan in the 1980s. These are among the worst failures of political intelligence in modern times, and the consequences have been disastrous.

The unpreparedness was not accidental. It happened because of a blind spot in the secular mind: the inability to see the elemental, world-shaking power of religion when hijacked by politics. Ever since the rise of modern science, intellectuals have been convinced that faith is in intensive care, about to die or at least rendered harmless by exclusion from the public square.
But not all regions of the world have gone through this process. Not all religions have allowed themselves to be excluded from the public square. And when secular revolutions fail, we should know by now that we can expect religious counterrevolutions.

Religion has lately demanded our attention not as a still, small voice but as a whirlwind. If Isaiah’s prophecy that nations “shall beat their swords into plowshares” is to be fulfilled, then the essential task now is to think through the connection between religion and violence.
Three answers have emerged in recent years. The first: Religion is the major source of violence. Therefore, if we seek a more peaceful world, we should abolish religion. The second: Religion is not a source of violence. It may be used by manipulative leaders to motivate people to wage wars precisely because it inspires people to heroic acts of self-sacrifice, but religion itself teaches us to love and forgive, not to hate and fight. The third: Their religion, yes; our religion, no. We are for peace. They are for war.

During his recent visit to the U.S., Pope Francis sits with Rabbi Elliot Cosgrove, left, and Imam Khalid Latif, right, during an interfaith ceremony at the National September 11 Memorial and Museum, Sept. 25, New York City.PHOTO: RAY STUBBLEBINE-POOL/GETTY IMAGES
None of these is true. As for the first, Charles Phillips and Alan Axelrod surveyed 1,800 conflicts for their “Encyclopedia of Wars” and found that less than 10% involved religion. A “God and War” audit commissioned by the BBC found that religion played some part in 40% of major wars over the past three millennia, but usually a minor one.
The second answer is misguided. When terrorist or military groups invoke holy war, define their battle as a struggle against Satan, condemn unbelievers to death and commit murder while declaring that “God is great,” it is absurd to deny that they are acting on religious motives. Religions seek peace, but on their own terms.

1962 The Se La Operation: The Chinese Incursion into India

http://www.indiandefencereview.com/spotlights/1962-se-la-operation-the-chinese-incursion-into-india/0/
1962 The Se La Operation: The Chinese Incursion into India


Read more at:

The US-China-India Triangle: A New Tripolar World Order?; By Prof. B. R. Deepak

http://www.c3sindia.org/india/5248
dated September 29, 2015, C3S Paper No. 0180/2015

The September congregation of the two Asian giants in the US has given off a few definite indications about the emerging world order in the new ecosystem that is witnessing re-globalization after a brief lull or the de-globalization in the wake of 2008-09 financial crises. It appears that Samuel Huntington’s 1999 prophesy of the Uni-multipolarity where the US would be in the core and various other countries extending diplomatic, economic and military support for its initiatives; and India-China’s aspirations about a multi-polar world is fast eroding and paving way for tripolarity centred on the US-China and India.

The US, according to all indications will continue to be a top powerhouse of the military, economic and technological prowess, and China and India closing in the gaps; for example within a decade the respective GDP of the US, China and India at present growth rate will reach to $25 trillion, $19 trillion and $5 trillion respectively. However, if India does well in its infrastructure, education and health sectors, innovation and technology driven India is likely to push the figures for India further more.
Over $40 billion business deals signed between China and the US that include purchase of 300 Boeings; $3 billion deals between India and the US, the meetings of President Xi Jinping and PM Narendera Modi with the top US technology honchos; both promising to deepen the reforms and creating an investment friendly environment, and in turn the US high-tech companies committing to invest in two of the world’s largest markets, is a pointer to this unfolding tripolar symmetry.

This all is taking shape in a new geopolitical and economic eco system, where three unique forces of the US driven re-globalisation, and Chinese and Indian globalization processes are coming into terms with each other. China has been the largest country in the world that has benefitted and uplifted over 600 million people from poverty in the shortest period of time in the history of mankind, implying that it adjusted extremely well to the forces of globalization prior to 2008-09 financial crisis. India on the other hand appears to have muddled through during the deep globalization uplifting over 100 million people from poverty, could have done better but somehow did not make proper adjustments vis-à-vis domestic socio-politico-economic drivers and the globalisation.

Observations on PLA Studies

http://blogs.nottingham.ac.uk/chinapolicyinstitute/2015/09/30/observations-on-pla-studies/

September 30, 2015,  Written by Peter Mattis.

As China’s military modernization accelerated throughout the 1990s and 2000s, an outpouring of People’s Liberation Army (PLA) publications threatened to drown specialists in data. These sources, many of them available on the internet, have been a boon for analysts, providing information on order of battle, organizational structure, officer biographies, write-ups of training exercises, shifts in military policy, and much more.
Yet the expansion of military publications and growth of online sources should not be misinterpreted as transparency. Instead it is a necessary by-product of the PLA’s drive to field a modern, effective force capable of “winning local informatized wars” (打赢信息化局部战争). Since China’s war with Vietnam in 1979, the PLA has been transformed from a military barely capable of fighting a border war to one that is reshaping regional security dynamics on land, on sea, and in the air as well as in space and cyberspace. Any military undergoing such momentous changes needs officers to talk among themselves and debate ideas.

Chinese military writings are not reliable enough on their own as indicators of future PLA activities, but their existence and the conversations therein demonstrate the seriousness of China’s intentions to field a modern military. While many resources have become available, important books and other writings are difficult to access without the benefit of the closed institutional libraries or proximity to the few libraries with good collections of PLA publications. The challenge of PLA studies is not drawing upon Chinese sources, but expanding the community of credible analysts and doing so outside the limitations of narrow contractor projects.
The boom in Chinese military publications has brought a new set of challenges to studying the PLA that preclude taking these writings at face value without further analysis. First, the information carried in these publications, including newspapers, is not always up-to-date or accurate. For example, in 2013, Chinese newspaper articles used helicopter regiments and brigades interchangeably, despite the fact that some regiments had been expanded to brigade strength. Similar distortions can be found in personnel billeting, where someone is reported as being in their position long after they have been replaced.

Second, using these sources requires close attention to authorship and affiliation to determine the import and authority of the publication. All militaries that want to conduct highly-coordinated, high-tempo operations need to have a professional conversation about equipment and tactics, and this conversation can only occur in the open source. With the exception of factual news reporting, most opinions of military tactics, techniques, and procedures are just opinions, not statements of PLA intentions.
The best set of guidelines available on how to parse PLA sources arose out of the work of the CNA Corporation (previously, the Center for Naval Analyses). According to their methodology, authoritative books are most likely to have principal editors and editorial committees, rather than individually-named authors, and will have been coordinated across relevant PLA departments. Andrew Erickson’s comprehensive study of the DF-21D anti-ship ballistic missile is a good example of how to do this well. Long-time China watchers inside and outside the U.S. Government Alice Miller and Paul Godwin offered a similar sort of framework for parsing Chinese government and officials’ statements and articles in their study of Chinese signalling ahead of conflict. Without appreciating the problem of authoritativeness, Chinese military publications cannot be used in a straight-forward manner to determine PLA capabilities, doctrine, and intentions.

China-US War Over Taiwan and Spratlys: Which Side Would Win?


http://thediplomat.com/2015/09/china-us-war-over-taiwan-and-spratlys-which-side-would-win/
A new RAND report analyzes US and Chinese military capabilities based on two future war scenarios. 
September 28, 2015

While the People’s Liberation Army (PLAN) is still far away from catching up with U.S. military aggregate capabilities, Chinese forces can still pose a formidable challenge to American power in China’s immediate periphery.
That’s the major conclusion of a new 430-page RAND report written by 14 scholars titled “The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017.”
The study notes that China has made progress in most operational areas “with startling speed” while, however, simultaneously emphasizing that “U.S. forces retain some important advantages” in most categories.

In detail, the RAND scholars analyze ten different categories of military capabilities deemed crucial in the event of a Sino-U.S. conflict over Taiwan (closer to Mainland China) or the Spratly Islands (farther from Mainland China), looking at these capabilities during four specific different time periods from 1996 to 2017. The analysis pays particular attention to geography and distance in each scenario.
The military capabilities in each category are summarized on a scorecard that outlines advantages and disadvantages of Chinese and U.S. military forces in both scenarios and across time. Advantage in this context, according to the study, is defined as one side being “able to achieve its primary objectives in an operationally relevant time period while the other side would have trouble in doing so.”

U.S. vs. Russia: What a war would look like between the world's most fearsome militaries VLADIMIR PUTIN'S BRAZEN MOVES IN SYRIA AND UKRAINE RAISE NEW QUESTIONS ABOUT AMERICA'S CONTINGENCY

http://www.militarytimes.com/story/military/2015/10/04/us-russia-vladimir-putin-syria-ukraine-american-military-plans/73147344/

Russia has big ambitions, growing capabilities

Early on the morning of Sept. 30, a Russian three-star general approached the American embassy in Baghdad, walked past a wall of well-armed Marines, to deliver face-to-face a diplomatic demarche to the United States. His statement was blunt: The Russia military would begin air strikes in neighboring Syria within the hour — and the American military should clear the area immediately.
It was a bout of brinksmanship between two nuclear-armed giants that the world has not seen in decades, and it has revived Cold War levels of suspicion, antagonism and gamesmanship.

With the launch of airstrikes in Syria, Russian President Vladimir Putin instigated a proxy war with the U.S., putting those nation's powerful militaries in support of opposing sides of the multipolar conflict. And it’s a huge gamble for Moscow, experts say. “This is really quite difficult for them. It’s logistically complex. The Russians don’t have much in the way of long-range power projection capability,” said Mark Galeotti, a Russian security expert at New York University.
Moscow’s military campaign in Syria is relying on supply lines that require air corridors through both Iranian and Iraqi air space. The only alternatives are naval supply lines running from Crimea, requiring a passage of up to 10 days round-trip. How long that can be sustained is unclear.

That and other questions about Russian military capabilities and objectives are taking center stage as Putin shows a relentless willingness to use military force in a heavy-handed foreign policy aimed at restoring his nation’s stature as a world power. In that quest, he has raised the specter of resurgent Russian military might — from Ukraine to the Baltics, from Syria to the broader Middle East.

The Long War in Syria: The Trees, the Forest, and All the King’s Men

OCT 1, 2015 

Clichés are clichés, but sometimes it really is hard to see the forest for the trees. In the case of Syria, the “trees” include the UN debate between Obama and Putin over Syria and the fight against Islamic extremism, Russia’s sudden military intervention in Syria, the failure of the U.S. training and assist missions in both Syria and Iraq, and the developing scandal in USCENTCOM over exaggerated claims of success for the U.S.-led air campaign in Syria and Iraq.
The most important “tree,” however, is trying to negotiate an end to the fighting from the outside, as if Assad was the key issue and as if it would be possible for some diplomatic elite or mix of power brokers to bring Syria back to some state of stability if only Assad would agree to leave and the United States and Russia could agree on how to approach the negotiations.

Focusing on the Trees When the Forest is Burning
The problem is that the “forest” is dying, burning, and occupied by four broad sets of fighters that have little reason to cooperate with any UN-led negotiating effort, outside agreement over Assad – with or without U.S. and Russian cooperation.

To shift from one cliché to another, Syria presents far more problems than Humpty Dumpty. “All the king's horses and all the king's men” couldn’t put Syria back together by negotiating a solution from the outside even if there was one King instead of a divided mix of the United States, Russia, Iran, Turkey, Iraq, the other states surrounding Syria, the Arabian Gulf states, Egypt, and France and the other interested European powers.
It shouldn’t take a child’s nursery rhyme to point out the obvious –although it is one whose origins may date back to England’s civil wars and first appeared in print shortly after it became fully clear that there was no way English could ever bring the 13 colonies back under its control. To begin with, there is no equivalent of Humpty.
Putting Four Humptys Together with No King and No Unity Among the King’s Men

The Background to Putin’s Actions in Syria and the UN: Russia’s New View of the US and Western Strategy: The Color Revolution

OCT 2, 2015 
Far too much of the commentary on Russian military intervention in Syria, Vladimir Putin’s speech at the United Nations, and Putin’s relations with Barack Obama reverts to the mindreading era of Kremlinology. It takes Putin’s actions out of context and often says more about the author’s prejudices than it does about Putin.
It is important to note that Russia formally introduced many of the views of the U.S. and Western “destabilizing” impact on the Middle East and the developing world well over a year ago at a formal military conference in Moscow.

Russian high-level officers and diplomats reacted strongly to the criticisms and sanctions resulting from Russia’s actions in Ukraine. They shifted radically away from a past focus on improving military relations with Europe—and to a lesser degree the United States.
They instead focused on what they called the “color revolutions” and portrayed the instability in the Middle East and North Africa (MENA) region and the rise of Islamist terrorism as a mix of ill-judged U.S.-led interference that was destabilizing many developing states and part of something approaching a U.S.-led plot to dominate the states involved.

Russia’s New View of the U.S. and Western Strategy: The Color Revolutions
A range of Russian and Belorussian military and civil experts presented a very different view of global security and the forces behind it at the Russian Ministry of Defense’s third Moscow Conference on International Security on May 23, 2014.
The first session of the conference presented an overview of the security situation, focusing on what Russian experts called the color revolutions. Russian analysts have used this term since—the Rose Revolution in Georgia in 2012, the Tulip Revolution in Kyrgyzstan in 2005, and the Orange Revolution in Ukraine in 2004.

Russian military officers tied the term color revolution to the crisis in Ukraine and to what they saw as a new U.S. and European approach to warfare that focuses on creating destabilizing revolutions in other states as a means of serving their security interests at low cost and with minimal casualties. It was seen as posing a potential threat to Russia in the near term, to China and Asian states not aligned with the United States, and as a means of destabilizing states in the Middle East, Africa, Central Asia, and South Asia.
The second session repeated these themes, focusing on the instability in the Middle East, and the final session addressed the war in Afghanistan and South Asia.

Many of the speakers at the meeting from other countries touched on very different themes, but the Russian and Belorussian military speakers provided a consistent and carefully orchestrated picture of the color revolutions—backed by detailed PowerPoint presentations.

India’s ‘Look West’ Maritime Diplomacy

http://thediplomat.com/2015/10/indias-look-west-maritime-diplomacy/

Recent developments show that India’s attention is very much on the Indian Ocean. 

By Abhijit Singh, October 04, 2015 

India’s maritime diplomacy is most often associated with its naval outreach to East Asia. With an increase in naval ship visits to South East Asia in recent years, and attendant media speculation over New Delhi’s supposed Pacific ambitions, the impression has been created that East Asia remains the ultimate destination of the Indian Navy’s diplomatic endeavours. By contrast, New Delhi’s nautical diplomacy in the Indian Ocean has seemed relatively modest. Despite its considerable contribution to sea-lanes security and counter-piracy operations off the coast of Somalia, in the popular imagination, the Indian Navy’s security efforts in the Indian Ocean region have remained confined to the level of constabulary and benign presence. 

Developments in the past few months, however, have shown that India’s attention remains squarely focused on the Indian Ocean. Since February this year, when Prime Minister Narendra Modi visited Sri Lanka, Seychelles and Mauritius, making it clear the Indian Ocean littorals remained India’s top priority, New Delhi has actively nurtured relationships with its maritime neighbours. Having improved the texture of its diplomatic ties, India has also sought to undertake joint developmental projects and strengthen a maritime security trilateral with Sri Lanka and Maldives through the inclusion of Seychelles. 
New Delhi’s maritime diplomatic efforts haven’t remained limited to the cultivation of political relationships. In April this year, the Indian Navy scored one of its biggest diplomatic successes when it evacuated over 4000 Indians and 900 foreign nationals from war‐torn Yemen. Operation Rahat was seen as a credible illustration of the India’s maritime peacekeeping and benign potential, more so because it was conducted amid an active conflict, amidst an unfolding humanitarian catastrophe. 

CIA’s New Cyber Directorate Declared Operational

CIA goes live with new cyber directorate, massive internal reorganization
Guy Taylor, Washington Times,  October 1, 2015

The CIA officially launched its new cyber-focused directorate Thursday, capping a massive internal reorganization that intelligence officials say will also include the agency’s first ever creation of six regional command centers aimed at streamlining U.S. spying activities across the globe.
The establishment of the new Directorate for Digital Innovation (DDI) marks the first time in more than 50 years that the agency has formed a new directorate, and it is expected to be a cornerstone of CIA Director John O. Brennan’s legacy at the agency.

Yet, while CIA officials have touted the DDI’s creation as the mantelpiece of an internal reorganization that has been occurring behind-the-scenes for months, it is the formation of the new “mission” centers — including ones for counterintelligence, weapons and counterproliferation, and counterterrorism — that is most likely to shake up the agency’s personnel around the world.
Agency sources described the creation of the the new centers as something akin to the Pentagon’s establishment during recent decades of regional operations hubs including U.S. Central Command, Southern Command and Africom, designed to bring focus and clarity to American military assets with different missions peppered across specific regions.

A CIA statement provided to The Washington Times described the agency’s “ten new Mission Centers” as being designed to “serve as locations to integrate capabilities and bring the full range of CIA’s operational, analytic, support, technical and digital skillsets to bear against the nation’s most pressing national security problems.”
“The new Mission Centers are not tethered to any single directorate and will work with all CIA elements to further enhance integration and interoperability,” the statement said. “They are organized to take full advantage of CIA officers and elements that have the expertise and capabilities to execute missions.”

The Programs That Become the Programmers “Machine learning” is starting to reshape how we live. It’s time we understood it.

http://www.slate.com/articles/technology/bitwise/2015/09/pedro_domingos_master_algorithm_how_machine_learning_is_reshaping_how_we.single.html

Vertical section of human brain MRI scan, overlaid with a single-layer feed-forward artificial neural network.
Photo illustration by Lisa Larson-Walker. Images by Ultima_Gaina/Thinkstock and Akritasa/Wikimedia Commons. 

Computers and the algorithms they run are precise, perfect, meticulously programmed, and austere. That’s the idea, anyway. But there’s a burgeoning, alternative model of programming and computation that sidesteps the limitations of the classic model, embracing uncertainty, variability, self-correction, and overall messiness. It’s called machine learning, and it’s impacted fields as diverse as facial recognition, movie recommendations, real-time trading, and cancer research—as well as all manner of zany experiments, like Google’s image-warping Deep Dream. Yet even within computer science, machine learning is notably opaque. In his new book The Master Algorithm, Pedro Domingos covers the growing prominence of machine learning in close but accessible detail. Domingos’ book is a nontechnical introduction to the subject, but even if it still seems daunting, it’s important to understand how machine learning works, the many forms it can take, and how it’s taking on problems that give traditional computing a great deal of trouble. Machine learning won’t bring us a utopian singularity or a dystopian Skynet, but it will inform an increasing amount of technology in the decades to come.

While machine learning originated as a subfield of artificial intelligence—the area of computer science dedicated to creating humanlike intelligence in computers—it’s expanded beyond the boundaries of A.I. into data science and expert systems. But machine learning is fundamentally different from much of what we think of as programming. When we think of a computer program (or the algorithm a program implements), we generally think of a human engineer giving a set of instructions to a computer, telling it how to handle certain inputs that will generate certain outputs. The state maintained by the program changes over time—a Web browser keeps track of which pages it’s displaying and responds to user input by (ideally) reacting in a determinate and predictable fashion—but the logic of the program is essentially described by the code written by the human. Machine learning, in many of its forms, is about building programs that themselves build programs. But these machine-generated programs—neural networks, Bayesian belief networks, evolutionary algorithms—are nothing like human-generated algorithms. Instead of being programmed, they are “trained” by their designers through an iterative process of providing positive and negative feedback on the results they give. They are difficult (sometimes impossible) to understand, tricky to debug, and harder to control. Yet it is precisely for these reasons that they offer the potential for far more “intelligent” behavior than traditional approaches to algorithms and A.I.

http://www.dailydot.com/politics/cyberwar-international-law-russia-china/
By Eric Geller, Sep 30, 2015, 

The cyberwar era arguably began two hours before midnight on April 26, 2007, when hordes of Internet traffic started quietly overwhelming servers in the small European nation of Estonia.
The barrage, prompted by the Estonian government’s decision to relocate a controversial monument to the country’s Russian liberators in World War II, went largely unnoticed for the first 24 hours. After a week, major government websites were offline. In the second week, the hackers, operating from an unknown location and controlling infected machines all over the world, brought down the websites of Estonia’s major newspapers. The papers’ IT experts eventually had to block all international traffic to stay online—saving themselves, but cutting off their best way of telling the world that they were under attack.

The hackers were using a technique called a distributed denial-of-service (DDoS) attack. They assembled botnets—networks of computers surreptitiously infected with their malware—to flood Estonian servers with data requests. This jumble of garbage traffic prevented packets of genuine data from getting through. DDoS attacks are a crude but highly effective tool, and they continue to be a major weapon in cyberattackers’ arsenals.
The attacks peaked at midnight, Russian time, on May 9, the anniversary of V-E Day. The symbolism was obvious and deliberate: Most of the attacks were the work of pro-Russian activists, who used software distributed on Russian-language forums and were furious about the relocation of a statue honoring their war heroes. When the nationwide political cyberattack reached a fever pitch, Estonian servers received a combined total of 4 million packets per second from almost 1 million computers worldwide.
“Never before had an entire country been targeted on almost every digital front all at once,” wrote Wired’s Joshua Davis in August 2007, “and never before had a government itself fought back.”
Estonia did indeed fight back, identifying the individual IP addresses flooding its servers with traffic and sending them to the Internet Architecture Board, a small group of trusted experts who can take individual network addresses offline entirely. The North Atlantic Treaty Organization (NATO), of which Estonia is a member, sent a few cyber-defense experts to aid in the response.

Cyber warfare: Regional nuisances may become global threats

http://fortune.com/2015/10/03/cyber-warfare-regional-nuisances-may-become-global-threats/
by  Peter Suciu, OCTOBER 3, 2015, 

Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars. 
While the Cold War never turned hot between the major world powers, throughout Asia there were a number of border disputes and other regional small wars. For instance, India and Pakistan engaged in several border disputes, and China engaged both India and the Soviet Union in similar small wars. Cooler heads prevailed and major conflicts were avoided. But these small conflicts continue, in the 21st century. Only instead of shells flying across a border, the battlefront has moved online.

Last year, a full-blown hacking war erupted between India and Pakistan, with groups on each side defacing websites belonging to organizations in their rival nation. It was a brief cyber war, with the websites of the Press Club of India (PCI) and the Pakistan People’s Party (PPP) getting hacked. “We’re seeing this as a common form of attack,” says Martin Libicki, senior management scientist with the RAND Corp. “This is a relatively easy attack to carry off, and the cost in terms of damage isn’t very large.” But as it continues to develop, cyber warfare has the potential to cause a lot more harm than mischief and nuisance.
Cyber warfare has become an extension of traditional small war politics. In most cases it isn’t meant to cause physical or even economic damage but is one that is more of mass annoyance or mass distraction. Outside the economic harm it caused, the alleged North Korean cyber attack on Sony is an example of how it fits into the mass annoyance category.

But there are cases where these attacks have had more damaging results. In March 2013, a bank and three South Korean TV stations were victims of an attack also believed to have been carried out by North Korea. The attacks actually froze computer terminals and shut down ATMs and mobile payment services. In total more than 50,000 servers across South Korea were taken offline in the attack – costing as much as $800 million. Similar attacks also occurred there in 2009 and 2011.

Intelligence officials: Cyber domain is still the 'Wild West'

http://defensesystems.com/articles/2015/09/30/ic-congress-cyber-wild-west.aspx?admgarea=DS 
By Mark Pomerleau ,  Sep 30, 2015 

There appears to be two glaring trends in cyber policy today—the lack of defined terms and the lack of deterrence. Government and military officials say that operating in and defining the cyber realm is not easy for several reasons and that it will take a few years to build up the cyber mission force and develop norms – something also incumbent on the international community.
With regard to definitions, lawmakers on Capitol Hill seem to be most concerned with what constitutes “cyber war” and how other activities in cyberspace are different. “Any type of malicious activity, which causes either damage or a theft of materials, theft of information or [intellectual property] – all of those are under either cyber, malicious cyber activities, it might be espionage – in each case, there’s no defined red line for what would constitute an act of war,” Deputy Secretary of Defense Robert Work told Sen. Deb Fischer (R-Neb.) when asked in a Tuesday Senate Armed Services Committee hearing if the administration had a definition for what constitutes a “cyber attack.” 

“We’re still working our way through that,” NSA director and commander of the U.S. Cyber Command Adm. Michael Rogers told lawmakers this week regarding cyber definitions of war. While talking about the parameters that could define an cyber act of war, he said the that building on conventional war frameworks is a useful exercise – something he elaborated on in greater detail this spring at the Aspen Security Forum. “What [the hack of the Office of Personnel Management databases] represents is a good question … so what are the parameters we want to use? Is it as [Director of National Intelligence James Clapper] has said, is it the intent is within the acceptable realm, is it scale, is it you can do espionage at some level for example but if you trip some magic threshold – hey is 20 million records, is 10 million records – is there some scale component to this?” said Rogers this week.
Clapper and Rogers have previously warned lawmakers about using the proper terms for operations in cyberspace. “Terminology and lexicon is very important in this space,” Rogers told the House Intelligence Committee earlier this month. “And many times I’ll hear people throw out ‘attack’ and ‘act of war’ and I go, ‘That’s not necessarily in every case how I would characterize the activity that I see’.” Clapper agreed with Rogers, saying that although the OPM hack has been characterized as an attack, it actually wasn’t, given its passive nature and the fact that did not result in destruction. (Although that hack, which exposed detailed information on 21.5 million current and former government employees and contractors, has prompted the United States to pull spies from China over fears that they could be identified.)

The No. 1 battlefield threat? Cyberattacks

http://defensesystems.com/Articles/2015/09/28/Army-NIE-cyber-top-battlefield-threat.aspx

By Kevin McCaney, Sep 28, 2015 

Members of the 2nd Armored Brigade Combat Team defend the network at NIE.
The Army has over 200 years’ experience dealing with the physical threats of the battlefield, and leaders are pretty confident in their ability to overcome them. These days, it’s the other kind of threat that has them concerned.

"The greatest threat I face as a brigade commander on the battlefield is not tanks, snipers or IEDs," Col. Chuck Masaracchia said as the Army got started hosting the largest-ever joint forces network exercise. "It's defending the network."
The importance of cyber defense on the battlefield reflects two relatively recent developments in military operations. First, just about any enemy can launch cyberattacks, because the cost of doing so is relatively low and the technology is readily available. And second, the Army needs that network to function, because so many systems depend on it and interact with each other through it.

"I am more than confident of our force's capabilities to destroy any force on the battlefield—as long as we can provide mission command," Masaracchia, commander of the 2nd Armored Brigade Combat Team, 1st Armored Division, said in a release, shortly after the start of Network Integration Evaluation 16.1, which is taking place Sept. 25 to Oct. 8 at Fort Bliss, Texas, and nearby White Sands Missile Range and Holloman Air Force Base, both in New Mexico.
The Army has been hosting NIEs twice a year since 2011, in order to test the integration and interoperability of new technologies into the battlefield network, the Warfighter Information Network-Tactical. NIE 16.1 is serving as the final proof of concept for a new exercise that will replace one of the NIEs each year, the multinational, innovation-focused Army Warfighting Assessment (AWA). The current exercise includes some 9,000 military and 3,000 civilian participants—nearly three times the total of a typical NIE—from the U.S. military services, the U.K., Italy and 12 other countries.

Empower intelligence agencies


http://www.thehindu.com/opinion/lead/empower-intelligence-agencies/article7723294.ece?homepage=true
Updated: October 5, 2015 
Mr. Parker’s interview should be looked at in the context of proposed legislation by the David Cameron government that would give more teeth to U.K. agencies in fighting terror. A more articulate intelligence agency can help make the public understand the national security threats better. However, this should be done while making sure that its operational secrecy is not compromised

Folklore has it that the profession of ‘intelligence’ is a cloak-and-dagger affair, enveloped in a certain mystique that is hard to unravel. It has always been looked upon as a calling that requires self-effacing men and women who are little-known to the public. Except for an occasional upstart — we did have a few of them in our own country — no intelligence operative is ever heard in public espousing his cause over the media, especially when he is still actively employed under a government. So, when the head of a traditional and low-profile MI5 — United Kingdom’s domestic intelligence outfit — goes live on BBC Radio 4, describing the current terror scene in the country and what his agency ought to do and what its obstacles are, eyebrows are certain to be raised.

It would be interesting to speculate whether the Indian government would ever fancy our Intelligence Bureau (IB) director going to the media to explain the threats facing us, as the MI5 chief did. I do not see anything wrong in such a departure from the past, as long as it serves to educate the common man and instruct him on the perils of complacency and unwillingness to be proactive in hunting down terrorists who are living in our very midst. I would, therefore, certainly commend such a dose of transparency. This may be tried after making sure that openness in the national interest does not compromise on the IB’s operational secrecy. This is not difficult to achieve. I know that many current and past intelligence men will be outraged by my suggestion. Nevertheless, it is worth an experiment, if we have to move with the times.

Time for American GIs to Become UN Peacekeepers

http://nationalinterest.org/feature/time-american-gis-become-un-peacekeepers-14004?page=show
America has certain types of specialized force structures that other countries do not possess that can make a big difference in many peacekeeping missions.

Michael O'Hanlon,  October 5, 2015 

Little noticed among all the Obama-Putin drama and other recent intrigue at the United Nations has been one issue that President Obama himself chose to highlight prominently—the future of United Nations peacekeeping. For all the high-level attention to conflicts from Syria and Iraq to Afghanistan to Ukraine, it is UN peacekeepers who handle most of the world’s hotspots—through more than a dozen missions at present, with a total of more than 100,000 soldiers worldwide. From the Sudans to Congo to Haiti to Lebanon, they patrol, train and protect local populations. Increasingly, related operations like the African Union’s mission in Somalia contribute importantly as well, albeit with mixed results like anything else in life.
As such, President Obama was right to extol the efforts of peacekeepers. He and other world leaders who led the summit deserve praise for persuading a number of countries, including notably China, to pledge more help for future missions. In theory at least, some 30,000 additional personnel from a total of 50 countries were designated to be available for future operations.

However, there are problems. America’s pledge to help in future missions was limited in scope and scale, at a time when most missions remain badly under-resourced in terms of troop numbers and equipment. Take one example—the Democratic Republic of Congo, a country with more than twice the population and several times the geographic size of either Iraq or Afghanistan, has never been accorded more than 20,000 UN troops. By comparison, the Iraq and Afghanistan missions each exceeded 100,000 at their respective peaks. Yet President Obama’s proposals for greater American support would be confined essentially to specialty realms—important to be sure, but not addressing the heart of the current shortfall in UN capacity, which is in the realm of well-trained and well-equipped regular soldiers and police.

Here is what President Obama offered up at the UN conference on September 28:

China's Islamic terror problem


http://www.rediff.com/news/column/chinas-islamic-terror-problem/20151005.htm 
October 05, 2015 
'Islamic State has declared that the liberation of Islamic Xinjiang from China is an objective. Beijing may well find that Pakistan is unable to assist in any meaningful way,' says China expert Jayadeva Ranade.

IMAGE: A man sentenced to be executed in the Xinjiang Uighur Autonomous Region, June 16, 2014. He was among 13 men China executed for 'terrorist attacks' in Xinjiang. The 13 men were allegedly involved in attacks in different parts of China's Muslim-majority province Xinjiang, including one that killed 24 policemen, Xinhua said. Photograph: Reuters

Coinciding with the 60th anniversary celebrations of the so-called 'liberation' of Xinjiang by China and establishment of the Xinjiang-Uyghur Autonomous Region, China has been rocked by unprecedented Islamic extremist violence.
Over twenty bomb explosions and a very violent knife attack resulting in the deaths of dozens of Han Chinese occurred in three incidents within two weeks in two cities in two of China's peripheral provinces where a high percentage of the country's ethnic Muslim minorities reside.
The incidents occurred at a coal mine in Aksu city in the restive north-western Xinjiang Autonomous Region and Luizhou city in the Guangxi-Zhuang Autonomous Region on the southern border opposite Vietnam. China's top leadership has been jolted by these acts of violence.

Short History of U.S. Cold War Listening Post at Peshawar, Pakistan

History of PAF Badaber

Ali Ashraf Khan, Pakistan Observer (Karachi)

October 5, 2015

Monday, October 05, 2015 - Badaber has a long history connected to the US- Pakistani military relations. It was called ‘Camp Badaber’ in 1959 when it served as CIA - United States Air Force Security Service listening post (Communication base) mainly as a spying centre during the cold war against the Soviet Union. Ultimately, America had to vacate the base in July 1970 after its failure to get the agreement renewed amidst increased anti-US public sentiments, especially after the 1965 Indo-Pak war and US arms embargo on Pakistan. The US hold over Badaber was a result of a communication agreement that was negotiated by the US and signed in 1957 by Prime Minister Hussain Shaheed Suhrawardy with Gen. Iskander Mirza as President. 

The Pakistani government at that time was hoping for US diplomatic help with regard to a resolution of the Kashmir conflict. The agreement included the American use of Badaber base as a spying station and of Pakistani air space and a portion of Peshawar airport for spying flights by the famous U2 spy plane designed to carry out aerial reconnaissance. When in 1958 Ayub Khan came to power as a result of a military coup he strengthened Pakistan’s military and economic alliance with the US against the Soviet Union who was eying on India to become their strategic partner against US. Pakistan’s policy for a short while led to major economic aid from the US and Europe.

Camp Badaber started operating in 1958. It grew into a small American town that was called “little US” with a population of 800 personnel at the air base and an additional 500 support personnel for cooking, medical care, teachers etc. It was equipped apart from administration buildings, barracks and dining hall with elaborate leisure facilities like a movie theatre, and a gym. Later construction added a bowling alley, golf course, dependent living, and school. These facilities are still there and used by the Pakistan Airforce and their families. In 1960s Badaber drew international attention when one of the U2 spy planes flown by CIA pilot Gary Powers was shot down by a Soviet surface-to-air missile and crashed near Sverdlovsk. The pilot survived and was captured as were the photos that had been taken by the pilot. 

Taliban Expanding Their Offensive to Four More Afghan Provinces


Bill Roggio and Caleb Weiss

The Long War Journal, October 5, 2015

Map detailing Taliban controlled or contested districts. Click colored district for information. Based on an analysis by The Long War Journal, 27 of Afghanistan’s 398 districts are under Taliban control, and another 36 districts are contested. Map created by Caleb Weiss, Bill Roggio, and Patrick Megahan.

While fighting for control of the provincial capital of Kunduz, the Taliban launched a wider offensive in the Afghan north aimed at seizing control of districts in four provinces: Badakhshan, Baghlan, Kunduz, and Takhar. Since Sept. 28, the Taliban has taken control of nine districts in these four provinces and another in the western province of Farah.
The Long War Journal has been tracking the Taliban’s attempts to gain control of territory since NATO ended its military mission in Afghanistan and switched to an “advise and assist” role in June 2014. The map, above, is an attempt to document the Taliban’s advances since the summer of 2014. The districts displayed (red for Taliban contested, black for Taliban control) include only those where The Long War Journal was able to determine a Taliban presence based on open source information, which includes press reports and the Taliban’s claims of control. While the Taliban does exaggerate in its propaganda, its territorial claims have proven to be mostly accurate in the past.

“Contested” means that the government may be in control of the district center, but little else, and the Taliban controls large areas or all of the areas outside of the district center.
“Control” means the Taliban is openly administering a district, providing services and security, and also running the local courts. Often, the district centers are under Taliban occupation or have been destroyed entirely. The Taliban does not always hold the districts it takes. It occasionally will seize a district or the district center, occupy it and fly the flag, leave after a few days, then return at a later date. These districts are considered contested at best.

How China Is Changing the UN

http://thediplomat.com/2015/10/how-china-is-changing-the-un/



“The Chinese leadership derives legitimacy from its constructive role in matters of peace and development.”
When asking Chinese officials late last year about foreign policy priorities for 2015, the 70th anniversaries of the end of World War II and the founding of the United Nations were usually named among the top five. The importance China attributed to these events was not in Europe, where commemorations of the past were vastly overshadowed by the challenges of the present. However, the opening of the 70th session of the General Assembly did serve as a reminder of why the UN is still one of the few constants in international relations. In these turbulent times, the gathering of world leaders that allows for an open exchange and many behind the scenes encounters has not lost its relevance.

The anniversary celebrations in connection with the 2030 Agenda for Sustainable Development and the Peacekeeping Summit led to an audience packed with world leaders – a degree of high-level representation that New York witnesses only every five to ten years. The setting thus served as an ideal stage for Xi Jinping’s first appearance at the United Nations. It was a wisely chosen opportunity for the president to lay out China’s agenda for the future.

Xi Jinping addressed his colleagues on the banks of the East River at three occasions. He used the undivided attention of the international community to not only indulge in standard Chinese Communist Party rhetoric but also make concrete announcements. It was the first opportunity for the international community to get an idea of the future role Xi wishes for his country to play within the United Nations.

Revealed: Why China Is Selling Submarines to Pakistan

http://thediplomat.com/2015/09/revealed-why-china-is-selling-submarines-to-pakistan/

Does the sale represent a step in China’s possible ambitions to have a toehold in the Indian Ocean?
September 28, 2015

As previously covered by The Diplomat, Pakistan announced earlier this year that it has agreed to purchase eight modified Type 41 Yuan-class diesel-electric submarines from China. These boats will provide Islamabad with much-needed Anti-Access/Area Denial (A2/AD) capabilities against the Indian Navy in case of war. This would be especially useful in case of an Indian blockade of Pakistan’s coast and could give New Delhi grounds to pause before deploying its planned new aircraft carrier, the INS Vikrant.

A Yuan-class submarine is undoubtedly a great piece of kit. It is China’s first class of submarines to incorporate an indigenously designed- and constructed Air-Independent Propulsion system (AIP), giving it a cruise speed of 18 knots and an operational range of 8,000 nautical miles. Although the export version of the Yuan, named the S-20, does not automatically come fitted with the AIP, Pakistan has apparently been able to secure it for its subs. Furthermore, the Yuan is integrated “with advanced noise reduction techniques including anechoic tiles, passive/active noise reduction and an asymmetrical seven-blade skewed propeller.”

Combined with the AIP, this makes the Yuan-class the quietest non-nuclear sub in the PLAN. Furthermore, theYuan has an impressive set of teeth. Aside from six tubes firing standard 553mm torpedoes, it is equipped with the YJ-8/8A Anti-Ship Cruise Missile (ASCM). While this weapon only has a maximum range of between 30-42 km, there are plans to equip the Yuans with the YJ-18 ASCM. These missiles have a reported range of 220 km and, represent a real A2/AD “force multiplier” for the Yuan. Whether Pakistan will attempt to acquire these missiles, or opt to go for another option (such as their indigenously produced Hatf VII Babur) is unknown.

Why We Need South China Sea Freedom of Navigation Patrol

By Sean P. Henseler
October 06, 2015
 
 
The littoral combat ship USS Fort Worth (LCS 3) conducts routine patrols in international waters of the South China Sea near the Spratly Islands in May 2015.
Image Credit: Flickr/U.S. Pacific Fleet

The current administration must approve these operations as soon as possible.

Until 1951, the U.S. Navy was governed by the Articles for the Government of the United States Navy, also known as “Rocks and Shoals” in part because Article 4, Section 10 stated that the punishment of death could be inflicted on any person in the naval service who intentionally or willfully caused a vessel to be “run upon rocks or shoals.”

While reports indicate that movement is being made in this direction, the current administration thus far appears willing to risk the ability of U.S. ships and aircraft to freely navigate vast portions of the Pacific Ocean by failing to conduct lawful ‘freedom of navigation’ operations (FONOPs) in response to blatantly illegal Chinese actions regarding rocks, shoals, and reefs in the South China Sea (SCS). In so doing, policymakers are willfully running U.S. presence in this vital region into metaphorical rocks and shoals. The danger to U.S. national security cannot be overstated, and these operations must be conducted as soon as possible.