Crimea: Thaw in Tensions? While President Putin has conveyed the message of tough military action, it is highly unlikely that he will order his troops to invade the majority ethnic Russian region of Crimea. Military brinkmanship can be seen as an attempt to force the West to include Russia as a partner in settlement of the crisis. Rajorshi Roy | March 07, 2014 | IDSA Comments
China and Xinjiang: Kunming incident The Kunming massacre is bound to have widespread repercussions within Chinese society, particularly for the Muslim minorities. In turn this will lead for calls for enhanced security measures and even more repressive policies towards the minority provinces of Xinjiang and perhaps Tibet. R. S. Kalha | March 07, 2014 | IDSA Comments
Upcoming elections in Iraq: Prospects and Challenges Nouri al-Maliki, the Shiite PM, seeking a third term in office, is facing growing opposition at home, including from his powerful Shia allies. There is also a growing rift within Maliki’s party members that his third consecutive political victory could marginalize them and strengthen his monopoly in the party as well as national politics. Rajeev Agarwal , Divya Malhotra | March 06, 2014 | IDSA Comments
Talks with Taliban: war by other means The situation in Pakistan today is very fragile. Despite the progress on the democratic front, there is a sense of helplessness on how to tackle the menace of terrorism. Unlike in the past, Islamabad appears quite weak vis-à-vis Taliban while it keeps chanting its commitment to talks with TTP, despite the provocation and retaliation from the army. Yaqoob-ul-Hassan | March 03, 2014 | IDSA Comments
India-China talks: why soft border is not an option Soft border is neither an option nor a means to resolve the India-China border dispute. In Chinese conceptualization where borders are innately strategic frontiers, the idea of soft border is a misnomer. India should keep a distinction between the notions of soft border and boundary resolution. Abanti Bhattacharya | March 03, 2014 | IDSA Comments
Ukraine’s road to stabilization goes through Moscow Russia has signalled its intentions in Crimea. With neither the US nor Europe willing to be engaged in another crisis in Eastern Europe, the Russian strategy would be to re-enter the scenario not as a junior partner of the West but as a recognized primary power in the region, without whom Ukraine cannot be stabilised. Gulshan Sachdeva | March 02, 2014 | IDSA Comments
Special Editors’ Introduction The 21st century is witnessing a renaissance of civil nuclear energy, particularly in Asia. At the same time, this century is also witnessing a rise in acts of terror, using newer and more lethal tools. The attacks on the United States on September 11, 2001 and other terror incidents have forced the international community to pay more serious attention to the possibility of terror groups using weapons of mass destruction (WMDs). Rajiv Nayan , Ian Anthony | March 2014 | Strategic Analysis
Nuclear Terrorism Criminals attempt to steal a missile submarine and fire its nuclear warheads at a big city. P. K. S. Namboodiri | March 2014 | Strategic Analysis
The Role of Nuclear Forensics in Nuclear Security The purpose of the nuclear security regime is to prevent, detect and respond to nuclear security events (e.g. illicit trafficking of nuclear material or a nuclear terrorism attack). Nuclear forensic analysis is a key technical capability that utilises signatures inherent to nuclear or other radioactive material to provide information on its source, production and history. It can be used as part of the response to the nuclear security event, as well as to help prevent it. Section I of this article will introduce the basic information about nuclear forensic analysis. Vitaly Fedchenko | March 2014 | Strategic Analysis
Sensitive Nuclear Information: Challenges and Options for Control This article starts by discussing sensitive nuclear information and how malicious non-state actors could exploit this to facilitate acts of nuclear terror. Our analysis shows that there is a significant information security challenge in this area due to the diversity of sensitive information, the different communities within which it resides and the range of mechanisms by which it could be transferred. We then turn our attention to assessing different steps that could be taken to protect sensitive nuclear information. Wyn Q. Bowen , Christopher Hobbs | March 2014 | Strategic Analysis