Srl | Item |
1 |
ID:
104713
|
|
|
2 |
ID:
123307
|
|
|
Publication |
2013.
|
Summary/Abstract |
Burma's two decades-old alignment with China, which was always an uneasy one, is being reordered to better reflect Burmese national interests. In an attempt to reach out to the West, partial democratisation has been permitted. The military remains highly influential in Burmese politics, but its desire to avoid the pitfalls of over-dependence on Beijing, together with confidence that separatist movements pose a lesser threat than in the past, have led to a loosening of political control. It is now crucial to ensure that democratisation proceeds at a pace that Burma's fragile polity can absorb, and does not lead to new internal conflicts.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
111038
|
|
|
4 |
ID:
111888
|
|
|
Publication |
2012.
|
Summary/Abstract |
Since 2004, the Indian government has described the country's Maoist insurgency as a grave threat to domestic security. A study of the sustaining dynamics behind Maoist violence suggests that the rebels are growing operationally stronger due to profits derived from organized crime. Having built up a parasitic economy that operates within the boundaries of nominal state control, they are proceeding to undermine that same control. In effect, the Maoists have assumed characteristics of a Mafia group. With India's economic growth having surged in recent years, their ability to finance aggressive operations and consolidate their subversive infrastructure has increased correspondingly.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
117560
|
|
|
6 |
ID:
094733
|
|
|
7 |
ID:
088817
|
|
|
8 |
ID:
105884
|
|
|
9 |
ID:
102312
|
|
|
10 |
ID:
100556
|
|
|
11 |
ID:
100413
|
|
|
Publication |
2010.
|
Summary/Abstract |
Western counter-intelligence suffered a massive reputational loss on 9/11. Although many of the risks remain the same, the next decade is likely to see the increasing incidence of 'grey area phenomena': the convergence of subversive threats in ungoverned spaces. Better counter-espionage will be required to tackle cyber-attacks and information asymmetry, whilst some threats - such as the crime-terror nexus and proxy warfare - will require enhanced investment across the whole range of counter-intelligence capabilities.
|
|
|
|
|
|
|
|
|
|