Global View Assessments Fall 2016

Size: px
Start display at page:

Download "Global View Assessments Fall 2016"

Transcription

1 Accepting Syrian Refugees: Wise or Detrimental? Key Judgement: As ISIS strengthens their spread and reach, and with the United States accepting 10,000 refugees a Paris level attack could be imminent for the United States. Analysis: November 13, 2015 there was an attack on Paris, France, that stopped the world similarly as Eight separate yet coordinated attacks took place resulting in 189 deaths and over 300 injured. One location, La Bataclan held hostages for over 3 hours before they were killed in a police raid. The French resources were operating at max capacity and were stretched during these attacks, and raised questions on whether or not the French were fully prepared for an attack like this. The United States, under the Presidency and guidance of Barack Obama, is accepting 10,000 refugees from Syria. This is worry some because of the current conditions with-in France. Syrian passports are being sold, and produced on the black market and are going to the highest bidder. This can be problematic when the United States goes to accept these refugees, and there are non- Syrian members in that group. These non-syrians could include ISIS terrorists. Secondly, with the establishment of no-go zones within France, what is stopping the predominantly Muslim population from coming in and grouping together and kicking authority out? There are already areas where rival African American gangs are the law, and Police refuse to go into the sections in fear of their lives. The refugees are spilt up upon arrival, but the U.S. government does not keep track of them once they arrive in the United States. Cities like Houston, and Chicago already have over 100 Syrian refugees, and New Jersey, Maryland, Connecticut, and Massachusetts seem to be a dumping ground for the rest. Assessment: The United States interview and selection process is top notch in this area, and it is unlikely that a terrorist would be able to claim asylum through Syria. Unfortunately, there is the possibility that there are already radicalized Americans, and when these Syrian refugees arrive in America and see that it isn t exactly the land of milk and honey they too can become radicalized. In addition, the American government does not keep track of the refugees once they arrive, there is nothing stopping them from linking up with these radicalized Americans, becoming radicalized, and then radicalizing other refugees. Since Obama is trying to accept these refugees but is getting push back, he might skip some of these important separation steps. The majority of states are refusing to accept any refugees, but places like Connecticut, according to the governor, are willing and eager to accept all 10,000 refugees. This almost ensures that an attack will occur within the United States. First the grouping of the refugees will occur. Next it will become a no-go zone. Then the non- Muslim families with be exiled from their homes, and lastly an attack will occur. Author: Jacob Woodworth Faculty Facilitator: Dr. David H. Gray 1

2 Australia: A Twenty-Year Military Buildup and Navy Modernization Key Judgment: The Australian government has taken action to implement and modernize its military & naval fleet for growing threats in Asian-Pacific region. Analysis: Since 1947 China has claimed it has sovereign rights to the South China Sea based on historical presence, and a demarcation line that is referred to as the nine-dash line. China has used aggressive militaristic tactics against neighboring countries for many years in the South China Sea to maintain their dominance over this region. China has also recently finished three runways that are positioned on islands within the South China Sea as a bold new military stance. This aggressive posture with updating its military capabilities has caused countries to rethink their strategies in the area. Australia in response to these actions has taken large steps to equalize the power distribution within the region. They currently have planned to add nine anti-submarine frigates, twelve patrol boats, three destroyers, and 12 submarines to their naval fleet. Prime Minister Malcolm Turnbull has refused to take sides in the matter since China is such a huge player in the Australian economy with regard to trade. He does voice the importance of international law and the importance to navigate freely in open waters. This increase in weaponry will cost the Australian government close to 56- billion dollars to complete over the next 20 years. Assessment: The buildup of the Australian Navy will likely add more responsibility for Australia to secure larger areas within the Asian-Pacific in the future. China will continued to claim the South China Sea as their territory, and they will continue to build new infrastructure and add to their military capabilities. The South China Sea is one of the world s most important shipping routes with more than five trillion dollars in cargo transported through it every year. Currently Australia is working with other countries to finalize plans on who will build their new naval fleet. The United States will remain the prominent military power in the Pacific, but other countries like Australia are taking the lead to help secure and keep international waters open. Additionally, international maritime training like RIMPAC (Rim of the Pacific Exercise) will continue to promote stability and enhance inoperability between all participating countries. Author: Gantt Kinlaw 2

3 Apple Versus the FBI: The Battle over the Backdoor to the iphone Key Judgment: Although the Federal Bureau of Investigation (FBI) has legitimate interests in accessing the iphone of one of the San Bernardino terrorists, the judicial system must refuse to compel Apple to unlock the device given that doing so would threaten both the privacy and security of millions of American citizens. Analysis: According to Apple and countless other technology companies, it is not possible to create software limited specifically to a particular phone; rather, complying with the FBI s order would create a backdoor that weakens the encryption of iphones around the world. In the past, Apple has provided law enforcement with data when presented with a search warrant, but the company altered their code after the disclosures of Edward Snowden, making it impossible for the phones to be unlocked. During their investigation of the San Bernardino attacks, however, this decision was unacceptable to the FBI who subsequently went to court to enlist Apple s assistance. Ultimately, Sheri Pym, a federal judge, ordered Apple to formulate software to eliminate the delay for incorrect password entries and prevent the phone from erasing all of its data after more than ten incorrect attempts. The FBI then would have been capable of unlocking the individual iphone. However, Apple refused to obey the court order and the legal fight will continue in the upcoming weeks and months. Assessment: Should Judge Pym once again side with the FBI, it will not only create a dangerous legal precedent in the United States but will also permit unfriendly authoritarian regimes in Russia and China to access data within iphones. In writing her opinion, Pym relied heavily on the All Writs Act of 1789, which provides judges with a great deal of control regarding the enforcement of their decisions. However, given that code was established as speech in Bernstein v. Department of Justice, this ruling essentially allows the federal government to compel speech, a clear violation of the First Amendment of the Constitution. Theodore Olsen, Apple s leading attorney and a former solicitor general for President George W. Bush, even argues that this judicial overreach would be the first step towards a police state in which privacy could be violated at the whim of law enforcement. Yet even concerns related to civil liberties are minimal compared to the serious cybersecurity ramifications a backdoor could inflict. It is almost guaranteed that access to a backdoor into Apple s security system would not be limited to the United States and that hackers from around the world could crack the new vulnerabilities to steal information that could be utilized for economic or political gain. This intense debate between the FBI and Apple has been framed as a fight between national security and privacy, but all the evidence at hand projects that a victory for the FBI would ultimately lead to a weakening of both. Thus, this assessment recommends that Judge Pym utilize the precedent surrounding free speech and maintain the security system of the iphone. Author: Justin Cole 3

4 Non-State Actors: Cyberterrorism Poses Future Security Challenges Key Judgment: Given non-state actors demonstrated intent to launch cyberterrorist attacks, the various means by which they could acquire cyber capabilities, and the plethora of potential targets, the occurrence of successful cyberterrorist attack has greatly increased. Analysis: While the notion of cyberterrorism can be traced back to the early 1990 s, when the rapid growth in internet use sparked concerns about the potential risks faced by highly networked, technology dependent societies, there has been no successful cyberterrorist attack to date. The potential to commit large-scale acts of cyber espionage or warfare have thus far remained the responsibility of state actors. Non-state actors strong intent to gain cyber capabilities has been witnessed through ISIS hackers attempts to hack U.S. Power companies throughout the fall of 2015 and their purchase of personally identifiable information of 1,351 service members from known Kosovan hacker, Ardit Ferizi, in Although many nuclear facilities are largely inaccessible to would be cyber terrorists, many auxiliary energy infrastructure and utilities networks are not. Deregulation and an emphasis on profitability has left the Security Control and Data Acquisition networks of many private utility companies particularly vulnerable to attack. Assessment: While it is unlikely that any non-state actor will be able to acquire cyber capabilities comparable to those of state actors in terms of magnitude, the threat posed by cyberterrorism should not be underestimated. If the general public were to react in a similar manner to an act of cyber-terrorism that they respond to a conventional terrorist attack, there would likely be a great loss of confidence in the government s ability to protect its citizens in both the cyber and physical world. Such a loss of confidence would be particularly concerning due to degree to which many of our financial, personal, and day-to-day life depends on some form of technology. In order to thwart the threat of cyber terrorism, state actors should first seek preventative measures to reduce the likelihood of a successful cyberterrorist attack. This can be accomplished through the establishment of formal security reviews of likely targets and the development of new encryption technologies. State actors should also focus on developing formal public and private policies with the aim of mitigating the potential damage a potential attack could inflict. Formal policies and procedures would serve a twofold purpose: they would facilitate a faster and more efficient response while simultaneously providing a degree of assurance to the affected parties. Author: Charlie Martin 4

5 North Korea: Cyber Threat Posed to the United States and the Republic of Korea Key Judgment: The United States and the Republic of Korea need to be proactive in their efforts to combat North Korea s dedicated cyber attacks. Analysis: The U.S. and the ROK have attributed recent cyber attacks to North Korea. The ROK blamed North Korea for several cyber attacks since 2007, most notably a series of attacks on South Korean banks and media outlets in In 2014, the U.S. accused North Korea of hacking Sony Pictures. Furthermore, the ROK said North Korea was likely responsible for the 2015 data breach of a ROK nuclear plant. While open source research about North Korea s cyber capabilities is subject to disinformation, bias, and erroneous estimation, these attacks raised concerns about the nature of the North Korean cyber threat. The U.S. and the ROK have made efforts to increase cyber collaboration, through bilateral cooperation mechanisms such as the U.S.-ROK Cyber Policy Consultations and the Cyber Cooperation Working Group between their militaries. Both countries believe in the applicability of international law to cyberspace and seek to establish peacetime norms of state behavior. Assessment: North Korea is expected to continue conducting cyber attacks to further its political objectives. It is likely that North Korea views cyber attacks as a cost-effective and low-risk way to exploit the vulnerabilities of highly networked states, especially the U.S. and the ROK. Currently, North Korea is probably incapable of integrating cyber capabilities with conventional military elements. However, the U.S. and the ROK should expand upon their current bilateral cooperation efforts to develop contingency plans that would outline appropriate responses to future North Korean cyber attacks. Defensively, the U.S. and the ROK will need to expand information sharing between intelligence agencies, government agencies, and private sector entities to ensure the provision of early warning of cyber attacks. Offensively, the U.S. and the ROK should use cyber operations to exploit North Korea s repressive media environment. The U.S. and the ROK should leverage the introduction of foreign media or information critical of the government into North Korea to counter previous and deter future cyber attacks. Author: Abbey Rogers 5

THE WRIT TO REFUSE. The Writ to Refuse 429

THE WRIT TO REFUSE. The Writ to Refuse 429 THE WRIT TO REFUSE The Apple, Inc. iphone Controversy (2016) 429 26 Introduction In December of 2015, FBI agents were investigating a domestic terrorist attack in which a married couple attacked a government

More information

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management War Gaming: Part I January 10, 2017 by Bill O Grady of Confluence Investment Management One of the key elements of global hegemony is the ability of a nation to project power. Ideally, this means a potential

More information

Global View Assessments Winter 2016

Global View Assessments Winter 2016 Russia: Complicating Matters in the Fight against the Islamic State Key Judgment: As Russia furthers its involvement in the Syrian civil war, there is a strong possibility that loyalist troops backed by

More information

Weekly Geopolitical Report

Weekly Geopolitical Report Weekly Geopolitical Report By Bill O Grady March 14, 2016 The Apple Problem On December 2, 2015, Syed Rizwan Farook and his wife, Tashfeen Malik, attacked a San Bernardino county facility, killing 14 people

More information

Japan s Position as a Maritime Nation

Japan s Position as a Maritime Nation Prepared for the IIPS Symposium on Japan s Position as a Maritime Nation 16 17 October 2007 Tokyo Session 1 Tuesday, 16 October 2007 Maintaining Maritime Security and Building a Multilateral Cooperation

More information

Next- Generation National Security and Public Safety in Europe

Next- Generation National Security and Public Safety in Europe A N A L Y S T C O N N E C T I O N Alan Webber Research Director Next- Generation National Security and Public Safety in Europe June 2016 As the threats and risks from cyber criminals, terrorists, gangs,

More information

Japan s defence and security policy reform and its impact on regional security

Japan s defence and security policy reform and its impact on regional security Japan s defence and security policy reform and its impact on regional security March 22 nd, 2017 Subcommittee on Security and Defense, European Parliament Mission of Japan to the European Union Japan s

More information

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment 1050 17 th Street, N.W. Suite 1150 Washington, DC 20036 Free Markets. Real Solutions. 202.525.5717 www.rstreet.org Statement for the Record Before: Reps. Ted Poe, Pete Olson and Blake Farenthold April

More information

Thinking About a US-China War, Part 2

Thinking About a US-China War, Part 2 Thinking About a US-China War, Part 2 Jan. 4, 2017 Sanctions and blockades as an alternative to armed conflict would lead to armed conflict. By George Friedman This article is the second in a series. Read

More information

Hearing on the U.S. Rebalance to Asia

Hearing on the U.S. Rebalance to Asia March 30, 2016 Prepared statement by Sheila A. Smith Senior Fellow for Japan Studies, Council on Foreign Relations Before the U.S.-China Economic and Security Review Commission Hearing on the U.S. Rebalance

More information

Overview East Asia in 2010

Overview East Asia in 2010 Overview East Asia in 2010 East Asia in 2010 1. Rising Tensions in the Korean Peninsula Two sets of military actions by the Democratic People s Republic of Korea (DPRK or North Korea) heightened North-South

More information

The Growth of the Chinese Military

The Growth of the Chinese Military The Growth of the Chinese Military An Interview with Dennis Wilder The Journal sat down with Dennis Wilder to hear his views on recent developments within the Chinese military including the modernization

More information

Conventional Deterrence: An Interview with John J. Mearsheimer

Conventional Deterrence: An Interview with John J. Mearsheimer Conventional Deterrence: An Interview with John J. Mearsheimer Conducted 15 July 2018 SSQ: Your book Conventional Deterrence was published in 1984. What is your definition of conventional deterrence? JJM:

More information

The Syrian Conflict: Two Perspectives on 10,000 Lives. began in March of Millions have been displaced and are looking to start life anew in

The Syrian Conflict: Two Perspectives on 10,000 Lives. began in March of Millions have been displaced and are looking to start life anew in 1 The Syrian Conflict: Two Perspectives on 10,000 Lives Approximately 470,000 Syrians have been killed as a result of the Syrian civil war which began in March of 2011. Millions have been displaced and

More information

CHINESE NATIONALISM AND THE MORAL INFLUENCE. Sun Tzu Explains China s Shaping Operations in the South China Sea

CHINESE NATIONALISM AND THE MORAL INFLUENCE. Sun Tzu Explains China s Shaping Operations in the South China Sea In the past two weeks, Filipino President Duterte has agreed to 13.5 billion dollars in trade deals with China, softened his country s claims to Scarborough Shoal, and called for the expulsion of U.S.

More information

United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK

United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK Introduction United Nations Security Council (UNSC) 5 November 2016 Emergency Session Regarding the Military Mobilization of the DPRK UNSC DPRK 1 The face of warfare changed when the United States tested

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Who governs the South China Sea? Author(s) Rosenberg, David Citation Rosenberg, D. (2016). Who governs

More information

2019 National Opinion Ballot

2019 National Opinion Ballot GREAT DECISIONS 1918 FOREIGN POLICY ASSOCIATION 2019 EDITION 2019 National Opinion Ballot First, we d like to ask you for some information about your participation in the Great Decisions program. If you

More information

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire

2015 Biennial American Survey May, Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire 2015 Biennial American Survey May, 2015 - Questionnaire - The Chicago Council on Global Affairs 2015 Public Opinion Survey Questionnaire [DISPLAY] In this survey, we d like your opinions about some important

More information

Australia and Japan Cooperating for peace and stability Common Vision and Objectives

Australia and Japan Cooperating for peace and stability Common Vision and Objectives 4 th Australia-Japan Foreign and Defence Ministerial Consultations Australia and Japan Cooperating for peace and stability Common Vision and Objectives 1. The Australian Minister for Foreign Affairs, Senator

More information

THE FOREIGN POLICY INITIATIVE

THE FOREIGN POLICY INITIATIVE THE FOREIGN POLICY INITIATIVE FPI PODCAST: UNDERSTADING JAPAN S NATIONAL SECURITY STRATEGY: AN INTERVIEW WITH CAPTAIN IZURU IKEUCHI BY HIDETOSHI AZUMA, FPI POLICY INTERN Friday, December, 0 :0 p.m. The

More information

SECURITY CHALLENGES IN THE ASIA- PACIFIC REGION: A US PERSPECTIVE

SECURITY CHALLENGES IN THE ASIA- PACIFIC REGION: A US PERSPECTIVE SECURITY CHALLENGES IN THE ASIA- PACIFIC REGION: A US PERSPECTIVE Patrick M. Cronin alliance.ussc.edu.au October 2012 EXECUTIVE SUMMARY Analysts should not discount the continued threat posed by North

More information

and the role of Japan

and the role of Japan 1 Prospect for change in the maritime security situation in Asia and the role of Japan Maritime Security in Southeast and Southwest Asia IIPS International Conference Dec.11-13, 2001 ANA Hotel, Tokyo Masahiro

More information

Honourable Minister of State for External Affairs, General VK Singh, Director of USI, LT Gen PK Singh, Distinguished guests, ladies and gentlemen,

Honourable Minister of State for External Affairs, General VK Singh, Director of USI, LT Gen PK Singh, Distinguished guests, ladies and gentlemen, Address by Ambassador Kenji Hiramatsu Challenges and Prospects in the Indo-Pacific Region in the context of India-Japan relationship USI, November 2 nd, 2017 Honourable Minister of State for External Affairs,

More information

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council Montessori Model United Nations S/12/BG-Terrorist Acts General Assembly Distr.: Middle School Twelfth Session XX March 2018 Original: English Security Council This is a special part of the United Nations.

More information

2017 National Security Strategy: Question and Answer

2017 National Security Strategy: Question and Answer 2017 National Security Strategy: Question and Answer 1. How does this strategy put America First? Where is the America First in this Strategy? This strategy puts America first by looking at all challenges

More information

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan

BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY NATO STUDENT POLICY PAPER COMPETITION Oscar Vejen Lacoppidan BEYOND BORDERS: TRANSITIONING NATO TOWARDS HUMAN SECURITY PEACE AND SECURITY IN THE 21 ST CENTURY: A YOUTH PERSPECTIVE NATO STUDENT POLICY PAPER COMPETITION 2016 Oscar Vejen Lacoppidan Security Risk Management,

More information

Defence and Peacekeeping: Armed Services Policy

Defence and Peacekeeping: Armed Services Policy Defence and Peacekeeping: Armed Services Policy Spokesperson: Kennedy Graham MP Definitions NZDF: New Zealand Defence Force EEZ: Economic Exclusion Zone (our international boundary, including territorial

More information

WORLD WAR 1. Causes of WWI

WORLD WAR 1. Causes of WWI WORLD WAR 1 1914-1918 Causes of WWI 1. Imperialism: Germany, France, & Great Britain Scramble for power and claim to lands in Africa, Asia, and the Pacific 2. Militarism Aggressive build up of a nation

More information

Conflict on the Korean Peninsula: North Korea and the Nuclear Threat Student Readings. North Korean soldiers look south across the DMZ.

Conflict on the Korean Peninsula: North Korea and the Nuclear Threat Student Readings. North Korean soldiers look south across the DMZ. 8 By Edward N. Johnson, U.S. Army. North Korean soldiers look south across the DMZ. South Korea s President Kim Dae Jung for his policies. In 2000 he was awarded the Nobel Peace Prize. But critics argued

More information

Briefing Memo. Yusuke Ishihara, Fellow, 3rd Research Office, Research Department. Introduction

Briefing Memo. Yusuke Ishihara, Fellow, 3rd Research Office, Research Department. Introduction Briefing Memo The Obama Administration s Asian Policy US Participation in the East Asia Summit and Japan (an English translation of the original manuscript written in Japanese) Yusuke Ishihara, Fellow,

More information

Following the Money to Combat Terrorism, Crime and Corruption

Following the Money to Combat Terrorism, Crime and Corruption Following the Money to Combat Terrorism, Crime and Corruption ACAMS Houston Chapter April 19, 2017 Celina B. Realuyo Professor of Practice William J. Perry Center for Hemispheric Defense Studies, National

More information

Authors: Claire Felter, Assistant Copy Editor/Writer, and James McBride, Senior Online Writer/Editor, Economics February 6, 2017

Authors: Claire Felter, Assistant Copy Editor/Writer, and James McBride, Senior Online Writer/Editor, Economics February 6, 2017 1 of 6 07.02.2017 17:09 CFR Backgrounders How Does the U.S. Refugee System Work? Authors: Claire Felter, Assistant Copy Editor/Writer, and James McBride, Senior Online Writer/Editor, Economics February

More information

Address by His Excellency Shigekazu Sato, Ambassador of Japan to Australia. Japan and Australia. Comprehensive and Strategic Partnership

Address by His Excellency Shigekazu Sato, Ambassador of Japan to Australia. Japan and Australia. Comprehensive and Strategic Partnership Address by His Excellency Shigekazu Sato, Ambassador of Japan to Australia Japan and Australia Comprehensive and Strategic Partnership The Asialink Leaders Program 21 September, 2010 Professor Anthony

More information

Remarks by Mr Sumio Kusaka, Ambassador of Japan Japan-U.S.-Australia relations and the Indo-Pacific Symposium Perth USAsia Centre

Remarks by Mr Sumio Kusaka, Ambassador of Japan Japan-U.S.-Australia relations and the Indo-Pacific Symposium Perth USAsia Centre Remarks by Mr Sumio Kusaka, Ambassador of Japan Japan-U.S.-Australia relations and the Indo-Pacific Symposium Perth USAsia Centre Thursday 1 March 2018 Ladies and gentlemen, I am honoured to be here with

More information

Chapter 8: The Use of Force

Chapter 8: The Use of Force Chapter 8: The Use of Force MULTIPLE CHOICE 1. According to the author, the phrase, war is the continuation of policy by other means, implies that war a. must have purpose c. is not much different from

More information

GUIDELINES FOR REGIONAL MARITIME COOPERATION

GUIDELINES FOR REGIONAL MARITIME COOPERATION MEMORANDUM 4 GUIDELINES FOR REGIONAL MARITIME COOPERATION Introduction This document puts forward the proposed Guidelines for Regional maritime Cooperation which have been developed by the maritime Cooperation

More information

The Strategic Significance of the Internet Commons

The Strategic Significance of the Internet Commons The Strategic Significance of the Internet Commons What is a global common? Historically, it has been defined as a naturally occurring domain or area not governed by any single political jurisdiction or

More information

Name: Adv: Period: Cycle 5 Week 1 Day 1 Notes: Relations between the US and Russia from 1991 Today

Name: Adv: Period: Cycle 5 Week 1 Day 1 Notes: Relations between the US and Russia from 1991 Today Cycle 5 Week 1 Day 1 Notes: Relations between the US and Russia from 1991 Today Tuesday 6/6/17 Part A US Russian Relations at the end of the Cold War: (1986 1991) Soviet Union under leadership of. US under

More information

T H E I N T E R N A T I O N A L L Y O N M O D E L U N I T E D N A T I O N S R E S E A R C H R E P O R T

T H E I N T E R N A T I O N A L L Y O N M O D E L U N I T E D N A T I O N S R E S E A R C H R E P O R T NOTE: THE DATE IS THE 1 ST OF APRIL, 1936 FORUM: Historical Security Council ISSUE: The Invasion of Abyssinia STUDENT OFFICER: Helen MBA-ALLO and Sandrine PUSCH INTRODUCTION Please keep in mind that the

More information

VISIONIAS

VISIONIAS VISIONIAS www.visionias.in India's Revitalized Look at Pacific and East Asia Table of Content 1. Introduction... 2 2. Opportunities for India... 2 3. Strategic significance... 2 4. PM visit to Fiji and

More information

S/2003/633* Security Council. United Nations

S/2003/633* Security Council. United Nations United Nations Security Council Distr.: General 27 June 2003 Original: English S/2003/633* Letter dated 30 May 2003 from the Chairman of the Security Council Committee established pursuant to resolution

More information

Sahel Region Capacity-Building Working Group

Sahel Region Capacity-Building Working Group Sahel Region Capacity-Building Working Group Good Practices on Regional Border Security Issues Related to Terrorism and Other Transnational Crime Suspects in the Sahel Region I. Introduction The Sahel

More information

Anthony Saich The US Administration's Asia Policy

Anthony Saich The US Administration's Asia Policy Anthony Saich The US Administration's Asia Policy (Summary) Date: 15 November, 2016 Venue: CIGS Meeting Room, Tokyo, Japan 1 Anthony Saich, Distinguished Visiting Scholar, CIGS; Professor of International

More information

General NC Vij Vivekananda International Foundation. Quad-Plus Dialogue Denpasar, Indonesia February 1-3, 2015

General NC Vij Vivekananda International Foundation. Quad-Plus Dialogue Denpasar, Indonesia February 1-3, 2015 Asia-Pacific Security Structure Defence Cooperation: Operation and Industry General NC Vij Vivekananda International Foundation Quad-Plus Dialogue Denpasar, Indonesia February 1-3, 2015 India has been

More information

NORTH AMERICAN BORDER PROCESSES AND METRICS

NORTH AMERICAN BORDER PROCESSES AND METRICS NORTH AMERICAN BORDER PROCESSES AND METRICS MARIKO SILVER 1 On May 19, 2010 President Obama and President Calderón issued the Declaration on Twenty-First Century Border Management and created an Executive

More information

Strategic Intelligence Analysis Spring Russia: Reasserting Power in Regions of the Former Soviet Union

Strategic Intelligence Analysis Spring Russia: Reasserting Power in Regions of the Former Soviet Union Russia: Reasserting Power in Regions of the Former Soviet Union Since the collapse of the Soviet Union in 1991 Russia has struggled to regain power in Eurasia. Russia is reasserting its power in regions

More information

HARMUN Chair Report. The Question of the South China Sea. Head Chair -William Harding

HARMUN Chair Report. The Question of the South China Sea. Head Chair -William Harding HARMUN Chair Report The Question of the South China Sea Head Chair -William Harding will_harding@student.aishk.edu.hk Introduction Placed in between the Taiwan Strait and the Straits of Malacca Straits

More information

Indonesia's Foreign Policy

Indonesia's Foreign Policy Asia Rising Indonesia's Foreign Policy Dr Welcome to Asia Rising, the podcast of La Trobe Asia where we discuss the news, views and general happenings of Asian states and societies. It's been more than

More information

South China Sea- An Insight

South China Sea- An Insight South China Sea- An Insight Historical Background China laid claim to the South China Sea (SCS) back in 1947. It demarcated its claims with a U-shaped line made up of eleven dashes on a map, covering most

More information

The United States, China, and the Global Commons

The United States, China, and the Global Commons The United States, China, and the Global Commons By Julianne Smith and Wu Chunsi February 20, 2014 The global commons four distinct areas that no one state controls but on which all rely present a unique

More information

Philippines U.S. pawn in its looming clash with China?

Philippines U.S. pawn in its looming clash with China? POWER FEUDS IN THE SCS (WPS): Prospects of Dispute Settlement between Philippines & China Philippines U.S. pawn in its looming clash with China? Political Science Week, UP Manila Dec. 04, 2012 By Center

More information

Running head: DOMESTIC POLICY VERSUS FOREIGN POLICY 1

Running head: DOMESTIC POLICY VERSUS FOREIGN POLICY 1 Running head: DOMESTIC POLICY VERSUS FOREIGN POLICY 1 Impacts of Chinese Domestic Politics on China s Foreign Policy Name Institution Date DOMESTIC POLICY VERSUS FOREIGN POLICY 2 Impacts of Chinese Domestic

More information

I. Background: An Exclusive Economic Zone (EEZ) is an area of water a certain distance off the coast where countries have sovereign rights to

I. Background: An Exclusive Economic Zone (EEZ) is an area of water a certain distance off the coast where countries have sovereign rights to South China Seas Edison Novice Committee I. Background: An Exclusive Economic Zone (EEZ) is an area of water a certain distance off the coast where countries have sovereign rights to economic ventures

More information

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND? EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND? Given the complexity and diversity of the security environment in NATO s South, the Alliance must adopt a multi-dimensional approach

More information

The Quadrilateral Security Dialogue: An Alignment of Policies for Common Benefit Ambassador Anil Wadhwa Vivekananda International Foundation

The Quadrilateral Security Dialogue: An Alignment of Policies for Common Benefit Ambassador Anil Wadhwa Vivekananda International Foundation The Quadrilateral Security Dialogue: An Alignment of Policies for Common Benefit Ambassador Anil Wadhwa Vivekananda International Foundation Quad-Plus Dialogue Tokyo, Japan March 4-6, 2018 The Quadrilateral

More information

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

PRO/CON: Is Snowden a whistle-blower or just irresponsible? PRO/CON: Is Snowden a whistle-blower or just irresponsible? By McClatchy-Tribune News Service, adapted by Newsela staff on 02.04.14 Word Count 1,340 Demonstrators rally at the U.S. Capitol to protest spying

More information

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks Policy Paper The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks I Context The writing of the new European Union

More information

- 1 - Address by Donald Tusk, President of the European Council to the 72nd United Nations General Assembly New York, 20 September 2017

- 1 - Address by Donald Tusk, President of the European Council to the 72nd United Nations General Assembly New York, 20 September 2017 - 1 - Address by Donald Tusk, President of the European Council to the 72nd United Nations General Assembly New York, 20 September 2017 Mr President, Mr Secretary General, Excellencies, Ladies and gentlemen,

More information

Exploring Strategic Leadership of the ROK-U.S. Alliance in a Challenging Environment

Exploring Strategic Leadership of the ROK-U.S. Alliance in a Challenging Environment Exploring Strategic Leadership of the ROK-U.S. Alliance in a Challenging Environment Luncheon Keynote Address by The Honorable Hwang Jin Ha Member, National Assembly of the Republic of Korea The The Brookings

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

Australia-Japan-U.S. Maritime Cooperation

Australia-Japan-U.S. Maritime Cooperation APRIL 2016 Australia-Japan-U.S. Maritime Cooperation Creating Federated Capabilities for the Asia Pacific author Andrew Shearer A Report of the CSIS ASIA PROGRAM Blank Chinese

More information

The Strategic Context of the Paris Attacks

The Strategic Context of the Paris Attacks The Strategic Context of the Paris Attacks Nov. 16. 2015 The terrorist attacks in Paris indicate a new level of sophistication in Islamic State s planning and coordination. By George Friedman The attacks

More information

UNITED STATES SENATE

UNITED STATES SENATE Stenographic Transcript Before the Subcommittee on Emerging Threats and Capabilities COMMITTEE ON ARMED SERVICES UNITED STATES SENATE HEARING TO MARK UP THE NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL

More information

17 August 2018 Alexander Neill Shangri-La Dialogue Senior Fellow, IISS Asia

17 August 2018 Alexander Neill Shangri-La Dialogue Senior Fellow, IISS Asia Asia and the rules-based international system: leadership and interests 17 August 2018 Alexander Neill Shangri-La Dialogue Senior Fellow, IISS Asia neill@iiss.org Shangri-La Dialogue reflections The rules-based

More information

DISEC: The Question of Collaboration between National Crime Agencies Cambridge Model United Nations 2018

DISEC: The Question of Collaboration between National Crime Agencies Cambridge Model United Nations 2018 Study Guide Committee: Disarmament and International Security Council (DISEC) Topic: The Question of Collaboration between National Crime Agencies Introduction: With rapid technological advancement and

More information

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman Encryption & FBI vs Apple Sophie Park & Shanelle Roman Legal Issues in FBI vs. Apple Main Topics Technical Debates in Encryption and Security Social Interpretation and Responses Framing Question Consumer

More information

FEPS Post Summit Briefing: European Council, 22 October 2018

FEPS Post Summit Briefing: European Council, 22 October 2018 FEPS Post Summit Briefing: European Council, 22 October 2018 At last week s European Council summit in Brussels (22 October), Brexit negotiations took centre-stage although didn t feature as the main discussion

More information

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned Page 1 of 5 URL: http://www.aclu.org/safeandfree/safeandfree.cfm?id=13356&c=206 The Five Problems With CAPPS II August 25, 2003 The new version of CAPPS II is all dressed up in the language of privacy

More information

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

Transnational Radical Party (TRP) FILLING THE DEMOCRATIC DIGITAL DIVIDE Document WSIS/PC-2/CONTR/51-E 6 January 2003 English only Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE" A. Introduction 1. The main objective of the Second Preparatory Committee

More information

2010 International Studies GA 3: Written examination

2010 International Studies GA 3: Written examination International Studies GA 3: Written examination GENERAL COMMENTS The International Studies examination was reasonably well handled by students. This indicated a greater familiarity with the study content

More information

Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression

Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9359 / +41 22 917 9407 FAX: +41 22

More information

The FBI and the President Mutual Manipulation. James Petras. February 2018

The FBI and the President Mutual Manipulation. James Petras. February 2018 The FBI and the President Mutual Manipulation James Petras February 2018 Few government organizations have been engaged in violation of the US citizens constitutional rights for as long a time and against

More information

Modi Visits United States

Modi Visits United States INSTITUTE OF STRATEGIC STUDIES web: www.issi.org.pk phone: +92-920-4423, 24 fax: +92-920-4658 Issue Brief (Views expressed in the brief are those of the author, and do not represent those of ISSI) Modi

More information

13 FEBRUARY Framework for the Use of Force

13 FEBRUARY Framework for the Use of Force OPERATION SOVEREIGN BORDERS: CHARTING THE LEGAL ISSUES CENTRE FOR MILITARY AND SECURITY LAW PUBLIC SEMINAR Comments by Associate Professor David Letts Co-Director, Centre for Military and Security Law

More information

MCLAUGHLIN & ASSOCIATES NATIONAL SecureAmericaNow.org February 6, 2017

MCLAUGHLIN & ASSOCIATES NATIONAL SecureAmericaNow.org February 6, 2017 MCLAUGHLIN & ASSOCIATES NATIONAL SecureAmericaNow.org February 6, 2017 1. FOR THE 2018 NOVEMBER GENERAL ELECTION FOR CONGRESS, HOW LIKELY WOULD YOU SAY YOU ARE TO VOTE? VERY LIKELY 80.2 SOMEWHAT LIKELY

More information

FDI Outlook and Analysis for 2018

FDI Outlook and Analysis for 2018 23 January 2018 FDI Outlook and Analysis for 2018 Across the Indo-Pacific Region, the year ahead has all the hallmarks of continuing geopolitical uncertainly and the likelihood of increasing concern over

More information

Noise in the Gray Zone:

Noise in the Gray Zone: Noise in the Gray Zone: Findings from an Atlantic Council Crisis Game Rex Brynen Department of Political Science, McGill University Nonresident Senior Fellow, Atlantic Council senior editor, PAXsims The

More information

The Lifting of the EU Arms Embargo on China. The Testimony of

The Lifting of the EU Arms Embargo on China. The Testimony of The Lifting of the EU Arms Embargo on China The Testimony of Peter T.R. Brookes Senior Fellow for National Security Affairs and Director, Asian Studies Center The Heritage Foundation Before the Committee

More information

Measures to eliminate international terrorism

Measures to eliminate international terrorism Forum: General Assembly 6 Issue: Measures to eliminate international terrorism Student Officer: Sama Ayoub Position: Head Chair Introduction Terrorism acts are often carried as an attempt to cause disruption

More information

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations

Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations Theme 3: Managing International Relations Sample Essay 1: Causes of conflicts among nations Key focus for questions examining on Causes of conflicts among nations: You will need to explain how the different

More information

Crowded Waters in Southeast Asia

Crowded Waters in Southeast Asia Crowded Waters in Southeast Asia June 23, 2017 Jihadism in Marawi is actually a good thing for U.S. strategy in Asia. By Phillip Orchard Cooperation among Southeast Asian states has never come easy, but

More information

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger*

IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger* IAMCR Conference Closing Session: Celebrating IAMCR's 60th Anniversary Cartagena, Colombia Guy Berger* 20 July 2017 Here is a story about communications and power. Chapter 1 starts 12 years before IAMCR

More information

Future Japan-Australia Pathways to Defence Collaboration: The Australian Perspective

Future Japan-Australia Pathways to Defence Collaboration: The Australian Perspective CHAPTER 5 Future Japan-Australia Pathways to Defence Collaboration: The Australian Perspective Andrew Davies Abstract Australia and Japan share a great many security interests, not least of which the alliances

More information

www. DaigleLawGroup.com

www. DaigleLawGroup.com FERGUSON CROWD CONTROL AFTER ACTION REPORT: SUMMARY OF FINDINGS AND LESSONS LEARNED On August, 9, 2014 in Ferguson, Missouri, Officer Darren Wilson shot and killed 18 year old Michael Brown following a

More information

Case 3:16-cv Document 1 Filed 04/19/16 Page 1 of 8

Case 3:16-cv Document 1 Filed 04/19/16 Page 1 of 8 Case :-cv-00 Document Filed 0// Page of 0 0 MARK RUMOLD (SBN 00 mark@eff.org NATHAN D. CARDOZO (SBN 0 nate@eff.org AARON MACKEY (SBN amackey@eff.org ELECTRONIC FRONTIER FOUNDATION Eddy Street San Francisco,

More information

connecting the dots: japan s strategy to ensure security and economic growth

connecting the dots: japan s strategy to ensure security and economic growth connecting the dots: japan s strategy to ensure security and economic growth July 2015 ASIA PROGRAM During the final decade of the Cold War, China, Japan, and the United States formed a pseudo alliance

More information

Region VI Legislation 2017

Region VI Legislation 2017 Region VI Legislation 0 A Bill to Automatically Register Voters to Increase Voter Turnout A Bill to Open Trade & Travel with Cuba A Bill to Reform Campaign Finances to Reflect the Political Will of a Larger

More information

I. Is Military Survey a kind of Marine Scientific Research?

I. Is Military Survey a kind of Marine Scientific Research? On Dissection of Disputes Between China and the United States over Military Activities in Exclusive Economic Zone by the Law of the Sea Jin Yongming (Institute of Law, Shanghai Academy of Social Sciences,

More information

The 25 years since the end of the Cold War have seen several notable

The 25 years since the end of the Cold War have seen several notable roundtable approaching critical mass The Evolving Nuclear Order: Implications for Proliferation, Arms Racing, and Stability Aaron L. Friedberg The 25 years since the end of the Cold War have seen several

More information

Overview East Asia in 2006

Overview East Asia in 2006 Overview East Asia in 2006 1. The Growing Influence of China North Korea s launch of ballistic missiles on July 5, 2006, and its announcement that it conducted an underground nuclear test on October 9

More information

Adam Liff Assistant Professor of East Asian International Relations, Indiana University

Adam Liff Assistant Professor of East Asian International Relations, Indiana University Video Transcript for Contemporary Security Challenges to Japan Online at http://spice.fsi.stanford.edu/multimedia/contemporary-security-challenges-japan Adam Liff Assistant Professor of East Asian International

More information

CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017

CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017 CHAIRMAN S STATEMENT ON THE FOURTH ASEAN DEFENCE MINISTERS MEETING-PLUS (4 TH ADMM-PLUS) MANILA, 24 OCTOBER 2017 1. The Fourth ASEAN Defence Ministers Meeting-Plus (4 th ADMM-Plus) was held on 24 October

More information

Preface to the Seventh Edition

Preface to the Seventh Edition Preface to the Seventh Edition This casebook is designed for an introductory course in international law. It can be used by students across the globe, although we consciously chose to gear its contents

More information

IACP s Principles for a Locally Designed and Nationally Coordinated Homeland Security Strategy

IACP s Principles for a Locally Designed and Nationally Coordinated Homeland Security Strategy FROM HOMETOWN SECURITY TO HOMELAND SECURITY IACP s Principles for a Locally Designed and Nationally Coordinated Homeland Security Strategy International Association of Chiefs of Police, 515 North Washington

More information

HIGHER SCHOOL CERTIFICATE EXAMINATION MODERN HISTORY 2/3 UNIT (COMMON) Time allowed Three hours (Plus 5 minutes reading time)

HIGHER SCHOOL CERTIFICATE EXAMINATION MODERN HISTORY 2/3 UNIT (COMMON) Time allowed Three hours (Plus 5 minutes reading time) N E W S O U T H W A L E S HIGHER SCHOOL CERTIFICATE EXAMINATION 1995 MODERN HISTORY 2/3 UNIT (COMMON) Time allowed Three hours (Plus 5 minutes reading time) DIRECTIONS TO CANDIDATES Attempt FOUR questions.

More information

MUNA Introduction. General Assembly First Committee Eradicating landmines in post- conflict areas

MUNA Introduction. General Assembly First Committee Eradicating landmines in post- conflict areas Forum: Issue: Student Officer: General Assembly First Committee Eradicating landmines in post- conflict areas Mariam Tsagikian Introduction The concern about the effects of certain conventional weapons,

More information

International Dimensions of National (In)Security Concepts, Challenges and Ways Forward. Session I: National Security Concepts and Threat Perceptions

International Dimensions of National (In)Security Concepts, Challenges and Ways Forward. Session I: National Security Concepts and Threat Perceptions 9 th Berlin Conference on Asian Security (BCAS) International Dimensions of National (In)Security Concepts, Challenges and Ways Forward Berlin, June 14-16, 2015 A conference jointly organized by Stiftung

More information

The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security.

The CIC is supported in its day-to-day work by the International Staff s NATO Office of Security. ABOUT THE CIVILIAN INTELLIGENCE COMMITTEE (CIC) The Civilian Intelligence Committee (CIC) is the sole body that handles civilian intelligence issues at NATO. It reports directly to the North Atlantic Council

More information

Reflections on U.S. Military Policy

Reflections on U.S. Military Policy Reflections on U.S. Military Policy Douglas Feith Former Under Secretary of Defense for Policy U.S. Department of Defense An Interview with Jonah Shrock and Oliver Hermann Providence, RI, 8 May 2017 Douglas

More information