Tuesday, August 27, 2019

THE EU AND NATO

The EUISS news

analytical article on cooperation between two organizations

THE EU AND NATO

The Political Economy of Oil Taxation in Latin America

Latin America is characterized by different approaches to oil taxation in each country.

Rice University's Baker Institute for Public Policy

Francisco J. Monaldi  

The Political Economy of Oil Taxation in Latin America: Policy Volatility and Untapped Potential

August 23, 2019

New Nuclear Power

This Commons Library briefing paper summarises current progress on nuclear power, including conventional reactors, advanced designs, waste disposal and nuclear research.

Published Monday, August 19, 2019 | Commons Briefing papers CBP-8176

https://researchbriefings.parliament.uk/ResearchBriefing/Summary/CBP-8176

中国新国防白書の要点

JIIA news

国問研戦略コメント

http://www2.jiia.or.jp/RESR/column_page.php?id=368

Britain’s new Prime Minister Boris Johnson clearly prefers soundbites over policy details

Friends of Europe news

With a new mandate focused primarily on emotions, and in search of the vulnerabilities of people and communities, Johnson fundamentally rethinks the brexit debate.

https://www.friendsofeurope.org/insights/back-pedaling-on-the-backstop-boris-and-the-blame-game/

Morocco's leadership in immigration management

RUSI news

modern trends of Morocco development in the context of the issue of immigration are shown

Get Africa Involved: Morocco’s Lead in the Management of Immigration
20 August 2019

Sunday, August 18, 2019

Mexico Maya Train poses major challenges

Oxford Analytica news

President Andres Manuel Lopez Obrador (AMLO)’s Maya Train poses serious social, financial and environmental risks

https://dailybrief.oxan.com/Analysis/GA245654/Mexico-Maya-Train-poses-major-challenges

Mexico Maya Train poses major challenges

Defining the Concept of ‘Violent Extremism’

GCSP news

Over the past few decades, the concept of violent extremism (VE) has played an increasingly prominent role in global development policy and programming. Having gone through several incarnations, most actors are now focused on preventing and countering violent extremism. This terminology was developed in an attempt to repackage the global war on terrorism (GWOT) in such a way as to shift the focus from the overly militarized responses of the 1990s and early 2000s to methods related to social support and prevention.


Defining the Concept of ‘Violent Extremism’
https://www.gcsp.ch/publications/defining-concept-violent-extremism

National Security

banking while an important part of U.S. innovation and culture, bankruptcy proceedings have nonetheless become a unique way through which foreign adversaries can acquire sensitive U.S. national security technologies and intellectual property. Through a detailed analysis of the existing gaps in the Federal rules governing foreign investment and bankruptcy procedures in the United States, Camilla Stewart provides the reader with an in-depth look at how foreign companies were able to circumvent these rules of foreign investment in the United States.

Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings

Journal of National Security Law & Policy


Nord Stream 2 Sanctions A Miss?

Rice University's Baker Institute for Public Policy news

Although sanctions against the Russian Nord stream 2 gas pipeline project will be very well accepted in Central and Eastern Europe, they can make the already tense relations between the US and its Western European allies even more complex

Online Jihadist propaganda – 2018 in review

Europol news

report based on open sources about the terrorist propaganda of Jihad in 2018

Online Jihadist propaganda – 2018 in review

how social media platforms have been instrumentalized for various purposes by terrorist organizations in Pakistan, Bangladesh, and Sri Lanka, and how these governments have addressed this issue

       Given the scale of inter-communal violence in the region, it is essential to conduct further research on this connection.
      The use of end-to-end encrypted communications by terrorists is a common feature of all three case studies in the present document: Pakistan, Bangladesh and Sri Lanka. However, the government's response to this in South Asia has so far been futile, as their proposals were not feasible and social media blocks were of limited effectiveness.

RUSI news

Transnational Lessons from Terrorist Use of Social Media in South Asia
13 August 2019

ロシア軍機・中国軍機の竹島周辺飛行

レビューで提示された事実は、日本の安全保障を脅かすものではないと私は信じています

NIDS Commentaryロシア軍機・中国軍機の竹島周辺飛行

DIIS - New article about the contested state-building in periods of cease-fire

DIIS news

New article about the contested state-building in periods of cease-fire


INTELLIGENCE SERVICES AND THE SECRET SERVICE

RIEAS news

sharp and very necessary in the present discussion article about democratic control over the security services

INTELLIGENCE SERVICES AND THE SECRET SERVICE, MYTHS IN EUROPE

Counterintelligence Threat Brief for Turkey

a summary of the threat of counterintelligence about traditional and non-traditional counterintelligence threats to individuals who fail a security check who travel to Turkey as business travelers or for personal reasons.

Counterintelligence Threat Brief for Turkey

https://moderndiplomacy.eu/2019/08/15/counterintelligence-threat-brief-for-turkey/
Modern Diplomacy is an invaluable platform for assessing and evaluating complex international issues that are often outside the boundaries of mainstream Western media and academia.