The Question of Autonomous Weapons Systems

Total Page:16

File Type:pdf, Size:1020Kb

The Question of Autonomous Weapons Systems MEDIMUN XIII Annual Session 2018 RESEARCH REPORT - [General Assembly 1] Mediterranean Model United Nations XIII 2018 Contents Topic 1: The question of contemporary international espionage 3 Topic 2: The Weaponization of National Resources ............. 7 Topic 3: The question of autonomous weapons systems ......... 10 Mediterranean Model United Nations XIII 2018 Topic 1: The question of contemporary international espionage Introduction • Contrary to common belief, espionage did not stop after the Cold War and is nothing like we see in Hollywood movies. In fact, this Lernaean Hydra of modern espionage has expanded, and its multiplying heads have taken many new forms. • The two tenacious “T”s have turned the world of espionage upside down in modern times: Technology and Terrorism. • Espionage is no longer limited to gathering information, but also involves transmission of false/biased information for political gain, sabotage of weapons and military plans and damaging of a country’s main pipelines (e.g. power, transport and communication) • In the 21st Century, espionage and cyber warfare have merged into one single, powerful weapon Definition of Key Terms • Espionage: Gathering of information using spies • Cyber-espionage: the use of computer networks to gain illicit access to confidential information, typically that held by a government or other organization. • SIGINT: Signals Intelligence • HUMINT: Covert intelligence-gathering by agents. • STUXNET: A malicious computer worm that was used for espionage • Operation Olympic games: One of the first uses of offensive cyber weapons. A covert and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities by the United States and likely Israel. • Leak: Secret information becoming exposed to the public Research Report | Page 3 of 15 Mediterranean Model United Nations XIII 2018 • Al Jazeera: State-funded broadcaster in Qatar • Malware: software which is specifically designed to disrupt, damage, or gain access to a computer system. • Spy Cables: A series of leaked documents from global intelligence agencies that were published by Al Jazeera and The Guardian in 2015. General Overview International Espionage is the process of obtaining military, political, commercial, or other secret information by means of spies, secret agents, or illegal monitoring devices. Collecting electronic information is becoming easier as people are led into digital lives. Any activity using computers and networks creates “openings” for watchers. Tracking people’s moves has become increasingly easier, using mobile phone tracking devices, credit card and banking activities, and surveillance cameras. This peculiar, virtual reality weapon system is complex and sophisticatedly crafted; however no inspection regimes are being used through the web. The paradox about this Cyber-espionage, is that just as it has become easier to obtain information about others, it has become harder to maintain secrecy, too. This affects State Security and results in leaks of information. In addition, technology makes the jobs of spymasters more difficult, as they can be more easily identified through modern Biometric Identification. More recent revelations revealed that International Agencies were not only infiltrating each other’s intelligence, but were also spying on ordinary citizens. This violation of personal privacy caused great alarm among civilians. Furthermore, intelligence sources can be abused in order to advantage political factions (many argue this was the case with Donald Trump’s election). When espionage takes the form of transmitting information, Mediterranean Model United Nations XIII 2018 modern-day propaganda is used through media adverts and misinforming articles. With the modern excuse of monitoring terrorist activity, countries have set up surveillance satellites. One such example is ‘Condor’, a South African and Russian secret satellite surveillance project which monitors all of Africa for Al-Qaeda activity. Major Parties Involved • USA: CIA, NSA, US Cyber Command • Russia: FSB • China: MSS • Britain: MI5, MI6 • Israel: Mossad • USA, Australia, Britain, Canada, New Zealand (‘Five Eyes’): Stoneghost Agency • Britain and USA: DISHFIRE, OPTICNERVE (programmes for monitoring phones and computers) • South Africa • Iran • North Korea: RGB Possible Solutions • A most uncomfortable fact about espionage is that it is inherently Lawless: Laws must be passed • Drawing up of treaties • Diplomatic negotiations • Imposing sanctions • Inspection regimes to be set up against cyber activity • Taking a step backwards in technology for protection of classified National Security Data Research Report | Page 5 of 15 Mediterranean Model United Nations XIII 2018 Sources http://www.economist.com/sites/default/files/20161112 _espionage.pdf https://www.economist.com/news/special- report/21709778-intelligence-services-both-sides- atlantic-have-struggled-come-terms http://www.newsweek.com/spies-among-us-modern-day- espionage-74521 http://www.bbc.com/news/magazine-17560253 https://en.wikipedia.org/wiki/Stuxnet https://www.youtube.com/watch?v=ay6GPlkvckY Mediterranean Model United Nations XIII 2018 Topic 2: The Weaponization of National Resources Introduction • In this topic, you shall be looking into the different ways countries exploit their nation’s resources, against other countries or against their own people. The common thinking on this topic would be the direct use of natural resources for production of Weapons, for example use of uranium and plutonium for developing nuclear weapons, or the use of minerals and other natural resources critical to military functioning. • However there are also indirect means of using natural resources as weapons. An evil twist to the topic is the halting of the supply/production of vital resources, such as water and oil. • National Resources can also lead to conflicts because of illegal mining. Definition of Key Terms Weaponisation: The adaptation of something for usage as a weapon Natural resources: naturally occuring materials or subtances eg. A source of wealth, lsnd or water General Overview • Russia is the world’s 2nd largest supplier of oil and has tremendous power over the market. The dangerous dependence on oil makes the rest of the world vulnerable, affecting not only governments, but also common people. • ISIS used cutting off water supplies as a weapon in Iraq. Similarly, cutting off water was also used as a weapon in Syria, where pumps were destroyed and water sources were contaminated. • Another indirect means of using national resources as a weapon is by utilizing them as tools of violence and unrest in developing countries, hence allowing the more developed countries to take control Research Report | Page 7 of 15 Mediterranean Model United Nations XIII 2018 of these vulnerable regions. For example in the Democratic Republic of Congo, minerals are illegally extracted, resulting in resource wars in the country and instability. This allows other countries to take advantage of this situation. Major Parties Involved The terror group "Islamic State" has taken control of six of the eight major dams in Syria and Iraq. It is systemically exercising control by using water. In the 1990s, Iraqi dictator Saddam Hussein had the marshes in southern Iraq drained to punish the population for an uprising against him. Sierra Leone, Congo, Liberia, and Angola have all experienced horrific civil wars in recent decades, and a major factor in those wars has been over diamonds. In October 2003, when Civil War broke out in the Democratic Republic of Congo again, a UN panel of experts released a report accusing Rwanda, Uganda and Zimbabwe of systematically exploiting Congolese resources and recommended the Security Council impose sanctions Previous Attempts to Resolve the Issue The European Union (EU) and the United Nations (UN) entered into a partnership in 2008 for building capacities for land, natural resources and conflict prevention. The United Nations Interagency Framework Team for Preventive Action (FT) manages the joint global UN-EU project to support countries to improve natural resource management for conflict prevention and peace building. In a September 2005 resolution on conflict prevention, the Security Council acknowledged for the first time the link between natural resources and armed conflict, vowing to take action against illegal exploitation and trafficking of natural resources, particularly in Africa. Mediterranean Model United Nations XIII 2018 Resolution 1963 made a call on the governments of DRC, as well as of Uganda, Rwanda, and Burundi to promote lawful and transparent use of natural resources among themselves and in the region. Possible Solutions • Countries to take advantage of their own resources and finding alternative means of power, to become less dependent on limited resources. For example, South Africa produced petrol from Sunflowers. • Transition of heavy-duty machines and from diesel to other gases. • Recycling and energy planning • Reduce our dependence on dangerous oils, thus lowering demand and decreasing the value of oil. • UN to finance projects supporting countries to improve national resource management for conflict prevention and peace maintenance. Sources https://newint.org/blog/2013/08/15/students- congolese-diaspora-fight-against-conflict-minerals/ https://www.forbes.com/sites/tboonepickens/2014/03/10 /oil-and-natural-gas-as-weapon-of-war/#192a7eb1845b http://www.dw.com/en/islamic-state-using-water-as-a- weapon/a-19093081
Recommended publications
  • “State of Civil Society Report: 2015
    the year in review State of Civil Society report 2015: THE YEAR IN REVIEW ...these stories tell us that only civil introduction society, in its broadest sense, is taking a It has been another year of hard work and high achievement for civil society. The story of the year since the stance against the 2014 State of Civil Society Report was published has partly been one of a continuing series of attacks on civil concentration of society in the many countries where, when civil society asks difficult questions about power, the powerful seek to silence it. But is has also been a story of impressive and sustained civil society response, in a world that has power in the hands of become more turbulent and contested. a tiny, global, super- rich elite, and against As we show below, civil society faces challenges - of lack of space, under-resourcing and limited access to the attempts of many decision-makers. Civil society also needs continually to prove its connection with and relevance to citizens, political leaders and and it needs to demonstrate its ability to stay ahead of trends and innovate. When civil society groups do not corporate interests do these, they fail. But so often, we see civil society leading the response to crisis, taking on difficult issues, contributing to change, and winning arguments for social justice. to undermine human rights and This year in review section of the 2015 CIVICUS State of Civil Society Report is complemented by our report’s the value of people’s special thematic section on the resourcing for civil society, and the 27 guest contributions, from civil society participation.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • THE CASE of SOUTH AFRICA and ISRAEL. a Thesis Submitted In
    THE ROLE REGIME TYPE PLAYS WITH RESPECT TO INTELLIGENCE COOPERATION: THE CASE OF SOUTH AFRICA AND ISRAEL. A thesis submitted in fulfilment of the requirements for the degree of Magister Administration in the Department of Political Studies, University of the Western Cape. By Dean John Walbrugh Supervisor: Professor Joelien Pretorius July 2019 KEYWORDS South Africa Israel Intelligence Cooperation Regime Type South African State Security Agency (SSA) Mossad Culture Identity Realism Liberalism Constructivism i ABSTRACT This thesis explores the intelligence cooperation exhibited between South Africa and Israel during the time periods of apartheid (1948-1994) and post-apartheid (1994-2015). Regime type is explored as a factor impacting on the intelligence relationship in both periods. Pertinent to the case study is the fact that South Africa and Israel’s regime type shared commonalities during the first period, but not the second. The thesis examines how these commonalities facilitated intelligence cooperation during apartheid, then turns to the question how the change in South Africa’s regime type after 1994 (whilst Israel’s remained the same) impacted on intelligence cooperation. In order to understand the significance of South Africa’s regime change on the intelligence relationship between the two states, a comprehensive theoretical framework is proposed in order to analyse how and why the internal policies of the two states redirected their intelligence relationship. Within this thesis, the concept of regime type is not used in a conventional way, it is framed through a constructivist notion that includes a focus on identity and how this shapes the two states’ intelligence bureaucratic behaviour. This constructivist framing is in turn juxtaposed to two other International Relations (IR) theories, namely: realism and liberalism.
    [Show full text]
  • Full 8Chan Leak Dump As of April-15-2015 This Is a Quick Overview of Quick Leak
    Full 8chan Leak Dump As Of April-15-2015 This is a quick overview of Quick Leak http://8ch.net/leaked/index.html Anonymous Post Makes News Headline! KILLCEN 04/15/15 (Wed) 15:09:40 No.235[Repl y][Watch Thread] LoL! Hey Anonymous! You made news coverage! http://www.cbsnews.com/news/top-law-officials-personal-information-posted-online -right-wing-group-blamed/ DHS-CIA-FBI TRAITORS HOME ADDRESSES: http://quickleak.ir/xiUw8SIv Infowars also covers dox KILLCEN 04/15/15 (Wed) 15:19:3 2 No.236 Holly Molly! Infowars posts report about this too! (I'd l ay low if I were you, for a while) http://www.infowars.com/leaking-of-government-officials-ad dresses-accompanied-by-note-warning-of-fema-crackdown-by-nwo-satanists/ PREPARATION FOR MARTIAL LAW DOWNLOAD LINKS Anonymous 04/15/15 (Wed) 14:51:11 No .234[Reply][Watch Thread] CONCENTRATION CAMPS FOR AMERICANS FREE PDF DOWNLOAD Concentration Camps for Americans How would you like to enter one the over 600 American concentration camps acros s the USA? The barbed wired, shackle embedded camps have been built and are awaiti ng to enslave huge numbers of the population. Should a fitting event take place, current laws allow FEMA to legally incarcerate civilians into these camps. The Federal Government admits plans to detain millions of people Rex 84, short for Readiness Exercise 1984, was a plan by the United States fede ral government to test their ability to detain large numbers of American citizens in case of massive civil unrest or national emergency.
    [Show full text]
  • Determinants of South Africa's Foreign Policy Strategy In
    DETERMINANTS OF SOUTH AFRICA’S FOREIGN POLICY STRATEGY IN CYBER SPACE LAURENCE CAROMBA, MONASH SOUTH AFRICA 9 MAY, 2009: SOUTH AFRICA Jacob Zuma is inaugurated as the new president of South Africa 1 APRIL, 2009: IRAN The computer worm Stuxnet is deployed and begins to silently penetrate the Iranian nuclear programme 2007 2013 2015 2017 “Operation Edward “Spy Cables” “MasterDeeds” Orchard”; Snowden published data breech Israeli strike revelations on Syria 2007 2008 2012 2016 Cyber Conficker US role in DNC emails attacks on worm creating leaked on Estonia begins Stuxnet is WikiLeaks infections leaked 2009 2012 2014 2015 2017 Jacob Zuma NCSPF SA supports Cybercrime Cybercrime becomes SA approved Brazil at Net- Bill (v.1) Bill (v.2) 2017 president by cabinet MUNDIAL Cyril conference 2016 Ramaphosa SA votes against becomes ANC internet freedom president 2007 2013 2015 2017 “Operation Edward “Spy Cables” “MasterDeeds” Orchard”; Snowden published data breech Israeli strike revelations on Syria 2007 2008 2012 2016 Cyber Conficker US role in DNC emails attacks on worm creating leaked on Estonia begins Stuxnet is WikiLeaks infections leaked 2009 2012 2014 2015 2017 Jacob Zuma NCSPF SA supports Cybercrime Cybercrime becomes SA approved Brazil at Net- Bill (v.1) Bill (v.2) 2017 president by cabinet MUNDIAL Cyril conference 2016 Ramaphosa SA votes against becomes ANC internet freedom president WHAT I’D LIKE TO DO TODAY 1. Provide a framework for understanding the issue 2. Describe South Africa’s foreign policy in cyber space 3. Explain why South Africa has made the choices it has 1. PROVIDING A FRAMEWORK IN SOME RESPECTS, ALL STATES WANT TO ACHIEVE THE SAME THINGS… 1.
    [Show full text]
  • International Politics in an Era of Democratic Peace: the Enduring Quality of Waltzian Structural Realism
    INTERNATIONAL POLITICS IN AN ERA OF DEMOCRATIC PEACE: THE ENDURING QUALITY OF WALTZIAN STRUCTURAL REALISM by EBEN COETZEE Thesis submitted in fulfilment of the requirements for the degree PHILOSOPHIAE DOCTOR in POLITICAL SCIENCE in the FACULTY OF HUMANITIES DEPARTMENT OF POLITICAL STUDIES AND GOVERNANCE SUPERVISOR: PROF. H. SOLOMON 27 JANUARY 2017 ii PLAGIARISM DECLARATION I declare that the enclosed work, entitled International politics in an era of democratic peace: the enduring quality of Waltzian structural realism, is my own work and that I have acknowledged all my sources. Signature: Date: iii TABLE OF CONTENTS Acknowledgements………………………………………………………………........ vi 1. THEORETICAL ASPECTS OF WAR AND PEACE IN AN ERA OF DEMOCRATIC PEACE: INTRODUCTORY REMARKS AND OUTLINE……... 1 1.1 Introduction and significance……………………………………………………….. 1 1.2 The continuity of thought-patterns in international politics: framing the research problem………………………………………………………………….... 8 1.3 Aims and objectives…………………………………………………………………. 18 1.4 Methodological considerations……………………………………………………... 19 1.5 The structure of the study…………………………………………………………... 21 2. THE IDEA OF THEORY IN INTERNATIONAL POLITICS................................ 23 2.1 Introduction........................................................................................................ 23 2.2 The structure of scientific theories and Waltz’s theory of theory……………….. 27 2.2.1 Laws versus theories……………………………………………………………… 28 2.2.2 Thoughts on the structure of scientific theories.............................................
    [Show full text]
  • Internal and External Implications of Iran's Nuclear Program
    VYTAUTAS MAGNUS UNIVERSITY FACULTY OF POLITICAL SCIENCE AND DIPLOMACY DEPARTMENT OF POLITICAL SCIENCE Egidius Johan Adriaan van der Stadt INTERNAL AND EXTERNAL IMPLICATIONS OF IRAN’S NUCLEAR PROGRAM AND THE JCPOA AGREEMENT Final Master Thesis Master Diplomacy and International Relations Study Program, State Code 6211JX049 Political Science Study Field Supervisor: PhD. Ieva Karpavičiūtė Defended: Prof. dr. Šarūnas Liekis Kaunas, Lithuania 2021 Van der Stadt, E. Internal and External Implications of Iran’s Nuclear Program and the JCPOA Agreement. Master Thesis in Political Science / Supervisor Ph.D. I. Karpavičiūtė; Vytautas Magnus University, Faculty of Political Science and Diplomacy, Department of Political Science, Kaunas, Lithuania, 2021. 91 pages. ABSTRACT It is unclear what the regional security impact of Iranian proliferation could be and how this connects with the aftermath of the JCPOA agreement. The existing research lacks an in- depth analysis of the internal and external implications of the development of Iranian nuclear weapons. Due to the absence of such comprehensive combined studies, it is challenging to assess its implications. With possible Iranian proliferation comes a vast array of consequences to the Middle East, challenging the existing status quo and military power balance. This thesis aims to elaborate and analyze the internal and external implications of Iran’s policy to continue its nuclear weapons program. The methods used in this thesis are based on qualitative research, using documents, official statements, declassified government documents, the IAEA reports, the analysis of the JCPOA agreement text, and reputable news sources as secondary sources. The following methodology is used: case studies. The thesis will elaborate and research contemporary, and past phenomena related to Iran's nuclear program and explain its implications.
    [Show full text]
  • Beyond Compliance: Iran and the JCPOA
    Beyond Compliance: Iran and the JCPOA Centre for the New Middle East Research Paper No. 13 (2017) Timothy Stafford The Henry Jackson Society July 2017 BEYOND COMPLIANCE: IRAN AND THE JCPOA Summary Agreed on 14 July 2015, the Joint Comprehensive Plan of Action (JCPOA) is intended to prevent Iran from becoming a threshold nuclear-armed state, by affording the country extensive sanctions relief in exchange for its submission to a range of restrictions upon its nuclear programme. These include limiting the number of its enrichment facilities and holdings of enriched uranium, requiring it to purchase nuclear-related material through a designated procurement channel, and requiring it to submit to international inspections. There is widespread acceptance among the governments of the P5+1 (the five UN Security Council members plus Germany) that Iran is in compliance with the terms of the agreement. Many of the restrictions imposed upon Iran are temporary in nature, and will expire at the end of an agreed period. Accordingly, the JCPOA should not be regarded as an agreement which “resolves” the Iranian nuclear issue, but as an accord which buys time for a process of economic and political rapprochement. Success of the JCPOA therefore depends not only upon Iranian compliance, but also on the capacity of the international community to discourage Iran from returning to nuclear enrichment when its submission to restrictions ceases to be mandatory. Over the last two years, sanctions relief has not led to Iran’s full reintegration into the global economy. Tehran has taken steps to profit from a relaxation of restrictions, resuming oil sales to international customers.
    [Show full text]
  • Rise of the Partisans
    RISE OF THE PARTISANS AMERICA’S ESCALATING MEDIATION BIAS TOWARD THE ARAB-ISRAELI CONFLICT by Clayton Edward Swisher (Student ID No: 660060140) A thesis submitted by Clayton Edward Swisher to the University of Exeter for the degree of Doctor of Philosophy by Publication in Middle East Politics February 2018 Supervisor: Professor Ilan Pappé Arab and Islamic Studies University of Exeter This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own work has been identified and that no material has previously been submitted and approved for the award of a degree by this or any other University. __________________________ Clayton E. Swisher 1 ABSTRACT This submission for PhD by Publication includes two studies I conducted during 8 years of dedicated field research examining the US role in mediating the Arab-Israeli conflict. These studies developed from my collection of in-depth oral testimonies and were buttressed by my recovery and examination of troves of original documents that had been previously denied any public, much less academic, scrutiny. The scope of this qualitative research and my political and historical analysis of it resulted in two published books that chronicle the unsuccessful American efforts to negotiate Arab-Israeli peace agreements during the presidencies of William Clinton, George W. Bush, and the first term of Barack Obama. In order of publication, they are The Truth About Camp David (New York: Nation Books, 2004) and The Palestine Papers: The End of the Road? (London: Hesperus Press, 2011).
    [Show full text]
  • Cyber Security As an Emerging Challenge to South African National Security
    CYBER SECURITY AS AN EMERGING CHALLENGE TO SOUTH AFRICAN NATIONAL SECURITY By Jordan Luke Griffiths Student Number 10345028 A mini-dissertation submitted in partial fulfilment of the requirements for the degree Master of Security Studies (MSS) in the Department of Political Sciences, Faculty of Humanities, University of Pretoria Supervisor: Mr. Roland Henwood November 2016 © University of Pretoria UNIVERSITY OF PRETORIA FACULTY OF HUMANITIES RESEARCH PROPOSAL & ETHICS COMMITTEE DECLARATION Full name : Jordan Luke Griffiths_________________________________________________ Student Number : 1034508_____________________________________________ Degree/Qualification: Master of Security Studies____________________________ Title of thesis/dissertation/mini-dissertation: Cyber Security as an emerging challenge to South African national security I declare that this thesis / dissertation / mini-dissertation is my own original work. Where secondary material is used, this has been carefully acknowledged and referenced in accordance with university requirements. I understand what plagiarism is and am aware of university policy and implications in this regard. 15 December 2016_ SIGNATURE DATE © University of Pretoria ABSTRACT As South Africa is a rapidly developing country and has become more increasingly technologically advanced through the growth in information communications technology (ICT) and the expansion of modern state infrastructure. With this growth more of the country’s citizens have also become connected as access to the internet has spread.
    [Show full text]
  • The State of Whistleblower & Journalist Protections
    THE STATE OF WHISTLEBLOWER & JOURNALIST PROTECTIONS GLOBALLY: A Customary Legal Analysis of Representative Cases May 2015 TABLE OF CONTENTS Table of Contents ......................................................................................................................... 1 Abbreviations and Acronyms...................................................................................................... 3 I. Introduction............................................................................................................................... 6 II. Methodology............................................................................................................................. 7 III. Country Reports: Asia-Pacific.............................................................................................. 9 A. Australia.................................................................................................................. 9 B. China...................................................................................................................... 14 C. India....................................................................................................................... 17 D. Indonesia............................................................................................................... 20 E. Regional Analysis................................................................................................. 24 IV. Country Reports: Sub-Saharan Africa.............................................................................
    [Show full text]
  • India WATCH No
    India WATCH No. 62 March 2015 POLITICAL ISSUES BAHRAIN 1. Bahrain keen to deepen ties with India in counter-terrorism New Delhi, Monday, 23 February 2015 Bahraini Foreign Minister Shaikh Khalid Bin Mohamed Al Khalifa, in his meeting with Prime Minister Narendra Modi expressed his country’s commitment to deepen ties with India in counter-terrorism, security, and defence. Source: DNA, Mumbai http://www.dnaindia.com/india/report-bahrain-keen-to-deepen-ties-with-india-in-counter- terrorism-2063460 2. India to sign deal on security with Bahrain New Delhi, Tuesday, 24 February 2015 India and Bahrain pledged to sign an agreement on internal security and launch talks on defence deals as an attempt to enhance ties in various areas, including counter-terrorism. Source: The Indian Express, Mumbai http://indianexpress.com/article/india/india-others/india-to-sign-deal-on-security-with-bahrain/ ISRAEL 3. Israel says security ties with India out of the closet New Delhi, Thursday, 19 February 2015 According to Israel’s Defence Minister Moshe Ya’alon security relationship with India is out in the open after years of being under wraps and his country vows to play a bigger role in Prime Minister Modi's drive to build an industrial base. Source: Reuters, UK http://in.reuters.com/article/2015/02/19/india-israel-idINKBN0LN14S20150219 See also: NDTV, New Delhi http://www.ndtv.com/india-news/israel-says-security-ties-with-india-are-out-of-the-closet- 740991 See also: Dawn.com, Karachi http://www.dawn.com/news/1164704/ties-with-india-out-of-closet-says-israel See also: The Hindu, Chennai http://www.thehindu.com/todays-paper/tp-national/indiaisrael-ties-out-in-the-open-says- yaalon/article6910516.ece Middle East Institute @ New Delhi, www.mei.org.in 1 INDIA WATCH-62/SINGH 4.
    [Show full text]