Strategic Trust-Building
U.S.-China Sanya Initiative 5th Meeting Report
The EastWest Institute in partnership with the China Association for International Friendly Contact (CAIFC) convened the 5th meeting of the U.S.-China Sanya Initiative, which took place on December 9-13, 2013.
Senior retired flag officers of the U.S. Army, Navy and Marine Corps traveled to Beijing and Chengdu, China to meet with retired senior generals of the Chinese People’s Liberation Army (PLA) to discuss critical issues in the U.S.-China military-to-military relationship. The delegations spent two days in off-the-record dialogue in Chengdu and also met with General Zhang Yang, director of the General Political Department of the PLA and member of the Central Military Commission, and General Li Zuocheng, commander of the Chengdu Military Area.
The Chengdu dialogue sessions covered a range of topics of military and political importance to the United States and China. Discussion focused on Taiwan; cybersecurity and regional security in Northeast Asia; and also addressed other issues such as the U.S. rebalancing strategy to Asia, North Korea, the East China Sea, Islamic extremism and managing the U.S.-China military-to-military relationship. Both sides agreed that cultivating communication and mutual understanding between the militaries of the United States and China is essential for fostering the cooperation necessary to address the world’s most difficult issues.
Since 2008, the Sanya Initiative has regularly brought together retired American and Chinese senior generals in order to build stronger military-to-military ties between the U.S. and China. EWI expects to host the next round in the United States in 2014.
_
Return to EWI Now.
Chinese Media Coverage
Vice President David Firestein was interviewed on China's Global Times regarding our recent report on U.S. arms sales to Taiwan, Threading the Needle: Proposals for U.S. and Chinese Actions on Arms Sales to Taiwan, and the concept "Concurrent Unilateralism," an idea introduced by EWI.
The ideas presented in Threading the Needle have received positive coverage in Chinese-language media, from the Global Times, Xinhua, Sohu and Sina, as well as on many other significant media and social media platforms.
Global Times - http://world.huanqiu.com/interview/2014-02/4829899.html
China Jiangsu - http://news.jschina.com.cn/system/2014/02/14/020250830.shtml
Sina - http://news.sina.com.cn/c/2014-02-14/023529470416.shtml
Sohu - http://mil.sohu.com/20140214/n394988608.shtml
EastDay - http://news.eastday.com/eastday/13news/auto/news/world/u7ai747904_K4.html
Renren - http://share.renren.com/keywords/2403508
Rise of China - http://risechina.blogspot.com/2014/02/threading-needle-concurrent.html
USA Life Online - http://www.usalifeonline.com/news/bencandy.php?&fid=54&id=73242
China Review News - http://hk.crntt.com/crn-webapp/touch/detail.jsp?coluid=148&kindid=0&docid=103025387
Net Ease - http://news.163.com/14/0214/08/9L1G7RIO000146BE.html
21CN - http://news.21cn.com/hotnews/a/2014/0214/08/26407789.shtml
Kaixian.tv - http://www.kaixian.tv/gd/2014/0214/2023116.html
April Media - http://news.m4.cn/2014-02/1224214.shtml
VHTeam - http://www.vhteam.cn/feed/1259095
Photo Credit: ArtsieAspie
_
Return to EWI Now.
China’s "Global Times" Interviews EWI’s David Firestein
David Firestein, Perot Fellow and vice president for the Strategic Trust-Building Initiative and Track 2 Diplomacy at the EastWest Institute, spoke to China’s Global Times about EWI’s recent report, Threading the Needle: Proposals for U.S. and Chinese Actions on Arms Sales to Taiwan, as well as other issues in U.S.-China relations.
In a February 14 Global Times interview, Firestein details the findings of Threading the Needle, which he co-authored with Piin-Fen Kok, Director of EWI’s China, East Asia and United States program.
Firestein emphasized the major innovations set forth in the report. One that drew particular attention was the idea of “concurrent unilateralism.” This concept recommends that the U.S. and China take actions unilaterally and not as part of a deal, as U.S. policy prevents Washington from making deals or directly consulting with China on the issue of arms sales to Taiwan. But they both could take their own actions on this issue at the same time.
Other innovations include proposing a monetary cap on arms sales that would bring the U.S. into compliance with its commitments as stipulated in the 1982 Communique. The report also calls on China to move one of its short-range ballistic missile brigades out of range of Taiwan as a proportional confidence-building gesture.
Firestein noted that the report grew out of extensive consultations in Washington, Beijing and Taipei, and that policymakers and scholars in all three cities provided valuable input that strengthened the report. He added that the findings of the report are being communicated to policymakers and officials in both the U.S. and Chinese governments, and that the initial response to these ideas has been encouraging.
The interview also touched on other issues pertaining to the U.S.-China relationship, including President Obama’s upcoming visit to Asia, China’s new leadership and the idea of a “new type of great power relations.” Below are some highlights from Firestein’s interview.
_
On developing a cap on arms sales:
“This process essentially ‘modernizes’ the Communique and translates it into current dollar terms so that policymakers now have a very precise sense for what the 1982 Communique means today for U.S. arms sales to Taiwan… No other scholars had ever crunched these numbers, but now, as a result of our work, the numbers are on the table and, as George Shultz, who was U.S. Secreary of State when the 1982 Communique was signed, has stated, they are now ‘demystified.’”
On the role of U.S. business interests in arms sales to Taiwan:
“We see the driving consideration in the U.S.-mainland China-Taiwan dynamic as ideology, not money. What drives arms sales—including Taiwan’s own requests for U.S. arms—is the stark disparity between the mainland’s and Taiwan’s political and social systems and, relatedly, Taiwan’s sense of insecurity relative to the mainland, not profit-seeking by U.S. defense contractors. As we noted in our report, as long as there is such a stark disparity between the mainland and Taiwan’s political and social systems, arms sales will continue.”
On a “new type of great power relations”:
“China places a lot of stock in the notion of a ‘new model of great power relations’… I don’t think the concept resonates that well in Washington. I think most people in Washington believe that foreign policy is driven principally by a nation’s interests and values. In this way of looking at things, how U.S.-China relations develop over the coming years or decades will primarily be a function of the degree to which U.S. and Chinese interests converge or diverge, and this tends to unfold ‘case by case,’ ‘issue by issue.’ I don’t think any overarching intellectual construct, such as ‘new type of great power relations,’ fundamentally changes this dynamic.”
On President Obama’s “real intentions toward China” with regards to arms sales:
“There is a broad and enduring bipartisan consensus in the United States that continuing to sell arms to Taiwan advances U.S. interests and helps maintain the region’s peace and stability. That said, I don’t think the issue of U.S. arms sales to Taiwan is the right litmus test (from a Chinese perspective) for a U.S. president’s ‘real intentions toward China.’ All U.S. presidents sell significant quantities of U.S. arms to Taiwan—on average, about a billion dollars a year worth. Perhaps a better litmus test of presidential intentions is his willingness to invest personal time and energy in meeting his counterpart and personally set the tone for the relationship. By this measure, I think President Obama can rightly be regarded as one of the most active advocates of and contributors to improved U.S.-China ties in recent years.”
Click here for the full interview (in Chinese).
_
Return to EWI Now.
U.S. and Russia: A Productive Partnership?
PBS Senior Correspondent Margaret Warner interviews Angela Stent to discuss the frequently contentious, geopolitical competition between Russia and the U.S.
_
Return to EWI Now.
Russia and Allies Towards Post-2014 Afghanistan
The East and West face the same threats: terrorism by the Taliban and Al Qaida, as well as drugs production and trafficking. Both sides will remain involved in and around Afghanistan after 2014, hence, cooperation is essential.
In June 2011, President Obama announced the withdrawal of most American troops in Afghanistan by the end of 2014. NATO made the same decision in 2011, reducing its current force of some 100,000 military to 8,000–12,000 troops in 2014, in a new non-combat mission, to train, advise and assist the Afghan security forces.
When the West has mostly departed from Afghanistan after 2014, the East, i.e. Russia and its allies, will have to continue to cope with the Afghan security situation and its overflow to the Central Asian region. Russia, although not directly adjacent to Afghanistan, is affected by Afghan narcotics and terrorism. Afghanistan borders China and the Central Asian states of Uzbekistan and Tajikistan. These states, as well as Kazakhstan and Kyrgyzstan, are partners of Russia, bilateral but also multilateral, as members of the military alliance Collective Security Treaty Organization CSTO and/or the regional organization Shanghai Cooperation Organization (SCO). Much has already been said about post-2014 Afghanistan, but not enough about the consequences for Russia and its allies. This work deals with that largely untouched area, by explaining the security challenges; the mind-set of the Kremlin towards Afghanistan; the statements of CSTO and SCO on Afghanistan; the views of NATO and the EU on cooperating with these Eastern institutions; as well as the policy action towards post-2014 by Eastern and Western actors.
In preparation for post-2014 Afghanistan, different parties have different approaches. Russia, China and CSTO have no wish to deploy armed forces in Afghanistan. Russia is expanding its military presence in Central Asia (bases in Tajikistan and Kyrgyzstan); strengthening the borders with Afghanistan of the states with a fragile security, i.e. Kyrgyzstan and Tajikistan; as well as supplying CSTO with modern weapons and equipment, hence reinforcing its rapid reaction force. These actions are taken to counter terrorism and drugs trafficking. The Central Asian states give priority to strengthening border security.
Furthermore, in addition to their military cooperation with Russia (bilateral and through CSTO), these states have also demonstrated—to the dissatisfaction of Moscow—an interest in military cooperation with the West, by obtaining arms and equipment, which the U.S. and NATO intend to leave behind after their retreat. Regarding direct aid to Afghanistan, Moscow’s assistance lies mainly in the military realm, by supplying arms and training. China mostly cooperates economically with Kabul, with financial aid and investments, especially in mineral exploitation.
Kazakhstan and Uzbekistan, the strongest Central Asian states, are also involved in bilateral military and socio-economic cooperation with Afghanistan. CSTO supports Afghanistan by training its military and law enforcement agencies and by realizing socio-economic projects. The SCO lacks joint actions, such as CSTO’s collective counter-narcotics operations, but primarily supports the actions of its individual members. The U.S. financially supports reinforcement of the border security capacity of Kyrgyzstan and Tajikistan. In addition to the NATO-Russia Council (NRC) -projects like counter-narcotics training of Afghan and Central Asian personnel, the (Afghan air force) Helicopter Maintenance Trust Fund, and the Action Plan on Terrorism, NATO has mainly concentrated on the reverse transit route through Central Asia and Russia, to get its arms and equipment out of Afghanistan.
With regard to post-2014, the lack of cohesion of the mentioned parties is particularly stunning. A deficiency of unity, consistency and cooperation is visible, within the East (Russia, China, Central Asia, CSTO, SCO) and West (U.S., NATO, EU). Each of these actors has its own national or organizational objectives and corresponding agenda. However, time is running out. The East and West face the same threats: terrorism by the Taliban and Al Qaida, as well as drugs production and trafficking. Both sides will remain involved in and around Afghanistan after 2014, hence, cooperation is essential.
After its formal declaration rejecting Moscow’s alleged privileged interests in Central Asia, NATO has the possibility of opening a path to engage in joint action with CSTO/SCO. A division of labor could be established whereby CSTO and NATO carry out military and security teamwork and SCO and the EU handle socio-economic cooperation. CSTO-NATO military cooperation could entail exchanging liaison officers between their headquarters; information sharing by military intelligence services of both sides; joint CSTO-NATO-NRC training of Afghan (and Central Asian) law enforcement officers; border guards and military; coordinated delivery of weapons and maintenance to the Afghan army; as well as Russian-US-CSTO strengthening of border security capacities of the Central Asian states. Socio-economic cooperation by the EU and the SCO could be conducted in areas such as direct relief and assistance (water and food supplies), good governance, state-building, police training and reconstruction projects (building schools, hospitals, roads, railways, bridges, etc.). Such a mutual East-West approach would benefit all parties.
Austin on Arise Review Discussing China's Territorial Disputes
Greg Austin addresses China's recent projection of power in the East China Sea, spurring territorial disputes and heightening regional tensions, particularly in China–Japan relations.
See the full interview here on Arise News (segment begins at 20:00).
Greg Austin Advocates Paradigm Shift in Cybersecurity
Professorial Fellow Greg Austin writes "High Time to Act Against Information Catastrophe: Time to Strengthen Cyber Security," for The Globalist. Austin argues that we need a paradigm shift in cybersecurity, pointing to EWI's recently released policy report Resetting the System as an example.
Read the full piece here on The Globalist.
High Time to Act Against Information Catastrophe: Time to Strengthen Cyber Security
We need stronger cyber security to protect against massive consumer data breaches
If you are a leader in business or government, or even just a private citizen, there is an emerging phenomenon that you need to know more about. It’s called “information catastrophe.”
This is the event where the marvelous technologies of the cyber age combine with the actions of a person (accidental or malicious) to dump the larger share of your confidential database into the public domain, to criminals or to hostile governments.
It just happened in Korea, as announced this week. The event in question involved the theft and illegal sale of the credit card information of most of the country’s consumer population.
Don’t worry so much about identity theft, though that is happening. You need to be preparing for information catastrophe.
There are important defensive measures, such as reviewing security procedures, vetting your staff or associates better, or establishing strong relations with law enforcement or national intelligence agencies. Those approaches, however, are only band-aid solutions and temporary fixes.
Market pressure + policy failures = low security
The biggest source of the problem is the low-security character of the information systems and networks you are using.
A series of market pressures over half a century as well as regulatory policy failures have somehow convinced most of us to entrust our life savings of information and our inner-most feelings and secrets to data “banks” somewhere in the ether.
Only gradually are people becoming aware that these data banks are highly insecure and more regularly being breached in the bright glare of unwanted publicity.
The data banks comprise software and hardware products in which high vulnerability to attack has been tolerated as a trade-off for lower cost and more convenient accessibility.
When the initial choices for lower cost and lower security were made in many technical sub-fields decades ago, we did not quite foresee the combined effect of those choices.
A paradigm shift in cyber security
Now that we fear NSA can hack anything and anyone, and we know some other, more sinister governments are mining all of our personal information with malicious intent, it is time for us all to trade-up to “highly secure computing.”
In a recent paper released by the East West Institute, called “Resetting the System,” German researcher Sandro Gaycken and I make the case for this paradigm shift in cyber security.
We note that the U.S. Department of Homeland Security (DHS) has identified highly secure computing as one of the highest priorities for research in this field. U.S. scientists are reserving the right to legally develop NSA-resistant encryption.
And the Defense Advanced Research Projects Agency (DARPA), where key elements of Internet technology were developed, is now running new projects in highly secure computing.
We understand that term to mean information technology with security that is unlikely to be breached — except in unusual and rare circumstances (or at high cost and risk to the perpetrator).
Highly security computing is a gigantic investment
This is not some unachievable holy grail. As John Dobson and Brian Randell argued in 1986, while being critical of those who believed it possible to build totally secure systems, “highly secure computing” is a worthwhile goal for scientific research and public policy.
As the DHS’s research plan mentioned above has noted, the more highly secure technologies cannot be bolted on top of the existing ones.
By and large, a move to less vulnerable IT would require a gigantic initial investment by manufacturers and consumers. It could be more expensive to operate and perhaps less convenient and less functional. So consumers—firms and individuals—will not rush to adopt it voluntarily.
The roles of governments and the private sector
Typically, a market failure—where private markets do not provide goods or services needed by customers or do not provide them in adequate quantities at an affordable price—triggers the question of government intervention.
In most market economies, considerable care is taken to craft policies that address the national interest (or public interest) without unduly constraining innovation and competitiveness in the private sector.
But once a government chooses to intervene, the inevitable result—absent a complete course reversal by the private sector—must be some compromise with and by private sector interests. Just how this might play out in particular economies demands detailed study. The policy outcome would inevitably be imperfect.
At the very least, this cyber security dilemma probably demands a price signal of some sort by government and a transition plan with clear benchmarks and standards to provide for phasing out of low security equipment and software.
With or against markets: the EU and China
While this may seem anathema within a U.S. free market environment, the pace of change may be forced on the global market by the European Union or its individual member states with considerable influence.
China is definitely acting against the market, as we have known it. The Snowden leaks about NSA successes against it have led to decisions by the government to accelerate its indigenous cyber security efforts, including new design standards. China is also reviewing its exposure to commercially available products that fall into the low-security and highly vulnerable category.
Today, it seems like we are many years from a consistent effort by any government to adopt highly secure standards for its IT market.
But as the information catastrophes start to affect more and more politicians or significant national economic or security actors, the rush to new products will intensify.
As we move closer to adoption of cloud computing, where confidentiality expectations will be paramount, we can expect that to drive a more rapid move to maximum security in cyber space. The companies that judge this moment well may ride the crest of a new wave of IT wealth.