China’s Military Revolution: Smarter, Better, Faster,
Smaller
|
|
Photo:
Keith Tsuji/Getty Images
With the stated
national goal of achieving ‘great power status,’ China’s
military modernization efforts have contributed to rising tension in the
Asia-Pacific region, as well as between China and the United States.
- China’s
growing ability to project military force, buttressed by the opening
of its first overseas naval base in Djibouti and rapid naval
advancements, are worrying developments from the perspective of the
U.S. and its allies as China seeks to reshape the existing
international order.
- Massive
investments in technological advancements are paying dividends in terms of Chinese
military capabilities, particularly in the air and on the water.
There is no denying that much of the military preparation by both
the U.S. and China is meant to respond to the other.
- Both
nations remain committed to finding areas of common ground—on issues such as
anti-piracy, counterterrorism and nuclear nonproliferation—but they
have found limited success, and the military ramp-up continues, with
China’s capabilities presenting an increasing threat to U.S. and
allied forces.
Read the full brief,
with expert commentary from:
- Adm. (ret.) Sandy Winnefeld, former
Vice Chairman of the Joint Chiefs of Staff
- Bonnie Glaser,
Director of the China Power Project, CSIS
- Jeffrey Engstrom and
Michael S. Chase of RAND Corporation
- Dennis Wilder,
former Senior Director for East Asian Affairs, National Security Council
|
|
New Conference Speaker Announced:
In-Q-Tel's Tara O'Toole
|
|
The Cipher Brief
is proud to announce Dr. Tara O'Toole as a keynote speaker for the 2018
Threat Conference.
O'Toole is a an
Executive Vice President and Senior Fellow at In-Q-Tel. Previously,
she served as Under Secretary for Science and Technology at the
Department of Homeland Security, and was CEO and Director of the
Center for Biosecurity at the University of Pittsburgh Medical Center
(UPMC).
O’Toole is
internationally known for her work on biosecurity and
health and safety issues related to the U.S. nuclear weapons complex. Her
publications in the biodefense field include contagious disease
epidemics; biodefense research and development strategies; and hospital
preparedness.
Join us on
April 8 – 10th in Sea Island, GA for this one-of-a-kind,
invite-only global threat conference featuring dozens of high-level
experts from The Cipher Brief’s Expert Network
as well as Executives from some of the world’s leading private sector
companies.
The 2018 Cipher
Brief Annual Threat Conference is the premier annual event for non-partisan
conversations of global threats and solutions. More information
about the experts, attendees and agenda for 2018, including how to
request an invite, can be found here.
|
|
Who’s In Control? Balance and Power of Cyber Partnership
|
|
Everyone loves
public-private sector partnerships (PPPs), writes Jason
Healey, senior research scholar at Columbia University and a member of
TCB’s Cyber Advisory Board.
But the various
frameworks for successful PPPs, Healey argues, have ignored key questions
about the balance of control, legitimacy and decision-making authority.
Which sector has the presumptive legitimacy to deal with the issue? Which
sector holds the key decision makers? Which sector has the most relative
strength to fix the problem?
- “In
many partnerships, the government is presumed to have superior
knowledge or ability or authority to act… in these PPP models, the
government sets the tune and deputizes, directs or enrolls the
private sector ‘partners’ who are along for the ride.”
- “In
other models, there is more balance between public and private
sectors, such as exchanges of personnel like IT Exchange
Program or botnet takedowns like GameOver Zeus.”
- “In
the third category of PPPs, the private sector has the clear lead.
One approach might be called ‘supported command.’ The government
helps as best it can…However, there will still be times where the
private sector is fully on its own, because the government may not
be willing or able to provide any support.”
|
|
|