Apocalypse Pakistan: An Anatomy of ‘the World’s Most Dangerous Nation’ by Francesca Marino and Beniamino Natale

The current state of Pakistan is messy and full of existential contradictions. The nation was built on a separate Muslim identity and on the pretext that in independent and integrated India the status of minorities would not be equal with Hindus. This notion was proved wrong as early as the 1950s, when political discourse in Pakistan turned more strongly towards religion than democratic principles. Consequently, Pakistan has become a safe haven for religious fundamentalists who trade in deadly violence and pose a threat to peace in the South Asian region.

Read More

Northern Provincial Council: What Does it Mean for Tamil Political Aspiration in the Post-War Context?

Elections for the Northern Provincial Council (NPC) of Sri Lanka were held on September 21, 25 years after they were first held in 1988 under the Thirteenth Amendment (13A) to the Sri Lankan Constitution, which formed part of the Indo-Lanka Accord. It was, however, the first election since the demerger of the Northern and Eastern Provinces in 2006.1 With the end of 30 years of war that had culminated in the elimination of the Liberation Tigers of Tamil Eelam (LTTE), election to the NPC was politically crucial for the Tamils, especially in the post-war context.

Read More

China Unplugged! Poised to Reshape the Geopolitics of the Asia-Pacific

Within the first year of Xi Jinping’s elevation to the presidency, China has moved further ahead on its path to achieving primacy in the world. In the last week of November 2013, Beijing imposed an Air Defence Identification Zone (ADIZ) over the conflicted Diaoyu/Senkaku Islands in the East China Sea, much to the consternation of its feuding neighbours such as Japan and South Korea. Their howls of protest found expression in the US attempt to challenge China to promulgate what it has done in deed.

Read More

China 2013: One Year Rule of President Xi Jinping—An Assessment

It is a matter of widespread belief that on assumption of supreme power, Chinese leader Xi Jinping’s overall ambition was to emerge as an iconic figure in the same league as Mao Zedong and Deng Xiaoping. At the very outset, Xi realised this would necessitate the elimination of any political challenge and his first step was therefore to consolidate an unassailable position within the Standing Committee of the Party Politburo (PBSC). To achieve this objective, Xi chose to emulate some of the policies and methods of the late Mao Zedong, albeit with modern underpinnings.

Read More

A Reviving Continent?

As a trial ground for humankind’s quest for betterment, India can be reckoned the next frontier. The scale and complexity of India’s problems are every policy maker’s nightmare. For a social scientist, India is a laboratory to test new ideas. As India’s colonial encounter fades from public memory, social science research in India has moved on to address the concerns of ordinary citizens. The euphoria of 1947 has ebbed, and the reticence and anxiety of the 1970s is gone. With the promised economic surge slowing down, millions of Indians continue to be trapped in neediness.

Read More

The Role of Nuclear Forensics in Nuclear Security

The purpose of the nuclear security regime is to prevent, detect and respond to nuclear security events (e.g. illicit trafficking of nuclear material or a nuclear terrorism attack). Nuclear forensic analysis is a key technical capability that utilises signatures inherent to nuclear or other radioactive material to provide information on its source, production and history. It can be used as part of the response to the nuclear security event, as well as to help prevent it. Section I of this article will introduce the basic information about nuclear forensic analysis.

Read More

Sensitive Nuclear Information: Challenges and Options for Control

This article starts by discussing sensitive nuclear information and how malicious non-state actors could exploit this to facilitate acts of nuclear terror. Our analysis shows that there is a significant information security challenge in this area due to the diversity of sensitive information, the different communities within which it resides and the range of mechanisms by which it could be transferred. We then turn our attention to assessing different steps that could be taken to protect sensitive nuclear information.

Read More