The Problem Of Siloed Cyber Warriors

Cyber capabilities cannot be detached from other domains of warfare, such as electromagnetic, air, land, sea, and space. The future holds two potential battlefields that overlap: one fought between high-tech adversary militaries, and another, between highly specialised military units and insurgent forces in population-dense urban environments. In both situations, cyber capabilities must be integrated into […]

Rate this:

China’s Evolving Economic Statecraft

Chinese enterprises are going global, venturing overseas to acquire foreign companies, know-how, and technologies. While most of these activities reflect simple business decisions, others carefully and deliberately advance China’s strategic interests, perhaps against the interests of its trading partners. Read Here – The Diplomat

Rate this:

Saudis Thinking Beyond Oil In Asia Courtship

China’s role and influence in global markets is a big lure to Saudi Arabia. It is the world’s largest energy consumer and the second-biggest importer of crude, after the U.S. Just like the Japanese, China is driven by its need to secure sources of energy. That gives Saudi Arabia an opportunity to solidify its market […]

Rate this:

Big Brother Is Winning

The clamour for security, accountability and transparency is leading to unfettered increase in the power of states. We are enacting law after law, introducing technology after technology, to render citizens transparent to the state. But at the same time, we are weakening protections and consenting to technologies in a way that makes the state less […]

Rate this:

The UK’s New Surveillance Law: Security Necessity Or Snoopers’ Charter?

On January 1st, the United Kingdom began the implementation of the Investigatory Powers Act, widely considered the most comprehensive—and intrusive—surveillance law in the Western world. The Act authorizes government access to bulk datasets such as travel logs, financial transactions, biometrics, the interception of digital communications data, the hacking of devices, and requires the retention of […]

Rate this: