From Hudson in 5 <[email protected]>
Subject Now Is the Time to Expose Chinese Corruption, Chinese Political Warfare
Date June 29, 2022 11:00 AM
  Links have been removed from this email. Learn more in the FAQ.
  Links have been removed from this email. Learn more in the FAQ.
No images? Click here [link removed]

Now Is the Time to Expose Chinese Corruption

Xi Jinping delivers a keynote speech in virtual format at the opening ceremony of the BRICS Business Forum, June 22, 2022. (Getty Images)

The West can create difficult distractions for Xi Jinping by uncovering corruption in China. Dirty money undermines the integrity of America’s financial system and weakens its national security, argues [[link removed]] Nate Sibley [[link removed]] in The Wall Street Journal. So the Biden administration must accelerate the implementation of its U.S. Strategy on Countering Corruption to help counter Chinese kleptocratic influence in the U.S.

READ HERE [[link removed]]

Chinese Political Warfare: The PLA's Information and Influence Operations

Xi Jinping addresses the opening of a study session at the Party School of the CPC Central Committee attended by provincial and ministerial-level officials, Jan. 11, 2022. (Getty Images)

Read John Lee’s [[link removed]] report [[link removed]] on the rise of nonmaterial power in China, particularly political warfare, and how the People’s Liberation Army (PLA) uses it. This is an important warfare tactic for China and has become an essential piece of its strategy. Despite this rise, the United States and its allies can both counter this warfare and responsibly use it to achieve their objectives.

READ HERE [[link removed]]

Building a Team for Next Generation Air Dominance

A F-22 Raptor from the 325th Fighter Wing flies alongside a F-35 Lightning II from the 33rd Fighter Wing over the Emerald Coast. (U.S. Air Force photo by 1st Lt Savanah Bray)

Read Bryan Clark [[link removed]] and Dan Patt’s [[link removed]] report [[link removed]] on framing Next Generation Air Dominance (NGAD) programs around software for operational advantage. These programs seek to counter the impact of adversary sensor and weapon networks by allowing US air forces to operate against more challenging threats and at longer distances from airfields or aircraft carriers. Prioritizing NGAD’s software ecosystem could dissuade adversary aggression.

READ HERE [[link removed]]

🎙Interpreting Israel's Domestic Politics

Jonathan Schacter [[link removed]] joins Counterbalance [[link removed]] host Michael Doran [[link removed]] to discuss what to expect from upcoming elections in Israel, how Israeli foreign policy with Iran might shift, and the significance of President Joe Biden’s upcoming trip to Saudi Arabia.

LISTEN HERE [[link removed]]

End of the German Idyll

G7 leaders during a working session at the G7 summit in Schloss Elmau on June 28, 2022 near Garmisch-Partenkirchen, Germany. (Getty Images)

Despite the appearance of normalcy at the G-7 summit, Germany faces its most daunting challenges since the foundation of the Federal Republic following World War II, argues [[link removed]] Walter Russell Mead [[link removed]] in The Wall Street Journal. A floundering economy, failed energy initiatives, the loss of Russian natural gas, and decline of Chinese demand have left Germany in turmoil. Yet Biden must make clear to Berlin that American security guarantees come at a price, and Germany must do more to support the U.S.

READ HERE [[link removed]]

BEFORE YOU GO...

Hudson added two new experts to its ranks this week. Former Attorney General William P. Barr [[link removed]] has joined as a distinguished fellow, and Luke Coffey [[link removed]], former director of the Allison Center for Foreign Policy Studies at the Heritage Foundation, has joined as a senior fellow. To read more about their impressive backgrounds and the various policy areas they will focus on, visit Hudson.org.

DONATE TO HUDSON [[link removed]] Share [link removed] Tweet [link removed] Forward [link removed] Preferences [link removed] | Unsubscribe [link removed]
Screenshot of the email generated on import

Message Analysis