Conflict Prevention

Gady Says It's Time to Drop Anglo-German Analogy with China

Writing in China-U.S. Focus, EWI's Senior Fellow Franz-Stefan Gady says comparing the current relationship between Japan and Chinese to Anglo-German relations prior to World War I distorts the realities of the relationship. Relying on misinformed historical analogies in an effort to make sense of difficult relationships, he writes, often leads to ineffective policy.  

Read the original article here in China-U.S. Focus

Let’s Drop the Anglo-German Historical Analogy Once and For All When Discussing China

Prime Minister Shinzo Abe did it: He compared the relationship between Japan and China to the one of Great Britain and Germany prior to World War One. In particular he referred to the Anglo-German arms race and used the historical analogy to warn of a new arms race in Asia. It appears that it is virtually impossible to discuss the rise of China without sooner or later making a historical analogy to 1914. It is, however, typically used to describe the relationship between the United States and China.

The Anglo-German historical analogy often leads policy makers astray from the actual reality of the rise of China and its military build-up. If we use historical analogies at all we should get them right!

Yuen Foong Khong , author of ‘Analogies at War-Korea, Dien Bien Phu, and the Vietnam Decision of 1965‘, defines historical analogy as:

“an inference that if two or more events separated in time agree in one respect, then they may also agree in another . . . appeasement in Munich occurred as a result of Western indolence; appeasement in Vietnam is also occurring as a result of Western indolence. Appeasement in Munich resulted in a world war; therefore, appeasement in Vietnam will also result in a world war.” 

Analogy is thus used to predict possible outcomes of certain policy decisions and provide prescriptions. 

Analogies also are used widely for justification or advocacy or to assist in processing difficult information. The problem arises when policy makers select ‘bad’ analogies. As Khong asserts, had the Johnson administration used the French example in Indochina (especially their defeat at Dien Bien Phu) rather than Munich and the Korean War, the fateful decision in 1965 to commit ground troops to Vietnam might have been viewed very differently. 

He also makes a compelling argument that ultimately it was analogy rather than domestic political considerations, bureaucratic politics, or the political military ideology that caused President Johnson and the National Security Council to decide to intervene in Vietnam. Henry Cabot Lodge, U.S. Ambassador to South Vietnam, offered the plausible rationale at a National Security Council meeting. “I feel there is a greater threat to start World War III if we don’t go in. Can’t we see the similarity to our own indolence at Munich?” Historical analogies are thus powerful tools in the hands of an eloquent advisor. 

Taking a closer look at U.S. policies towards China and applying the historical analogy of the German-British naval race, we might conclude that unchecked, Chinese aggression could destabilize the region and even lead to World War III. The same is true for the China-Japan relations. At least by applying Khong’s framework, this would have to be the logical conclusion; however, even the most hawkish defense analysts would find this statement difficult to accept. 

The general consensus of expert opinion is that despite its increasingly martial tone, neither the Chinese People’s Liberation Army Navy nor the People’s Liberation Army can in any way challenge the United States globally. Thus, using the German-British naval race of the early 20th century as an analogy to illustrate U.S. policy options toward China is simply inappropriate. 

Perhaps then if we look for proper historical analogies to use in discussing the rise of Chinese naval power, we might choose the rise of the Italian naval power in the inter-war years. As it turned out, the Italian Navy did not really impact the outcome of World War II substantially. However, like the Chinese today, the Italians were engaged in many military innovations throughout the 1930s, faced a similar strategic outlook and were confronted by a technologically superior force. 

The post-World War I Italian Navy, similar to the current Chinese Navy, possessed specific regional aspirations. With the conclusion of the war in 1918, the Italian Navy agreed that it must first dominate the Adriatic Sea and then expand into the Mediterranean and the Red Sea. China has a similar sequential strategy with attempting to control first the Straits of Taiwan and the South China Sea followed by the First Island Chain. Finally, China plans to project power all the way to the Second Island Chain. 

Often echoed in Chinese newspaper editorials, China, like Italy in the 1930s, feels boxed in and claims the right of an emerging power to a strong and powerful navy because the “Chinese nation’s existence, development, and great resurgence all increasingly rely on the sea.” Mussolini in 1926 forcefully asserted that “a nation which does not have free access to the oceans cannot be a great power; Italy must become a great power!” He reiterated this point in 1939 when he argued, “The bars of this prison are Corsica, Tunesia, Malta, and Cyprus . . .The fundamental aim of the Italian foreign policy must be ‘to break free of this prison . . .” The strategic straightjacket for China, as Robert Kaplan put it in his book Moonson, is Taiwan; for Italy in the 1930s it was Malta — both islands often referred to as unsinkable aircraft carriers. The Italian Navy’s prime obsession during the 1930s, especially during the Mediterranean Crisis in 1935, was the conquest of Malta, which greatly troubled Admiral Domenico Cavagnari, the head of the Italian Navy ministry, since he, much more than Mussolini, was aware of the inherent weakness of the Italian Regia Marina. 

Another similarity between Italian strategic thinking in the 1930s and current Chinese strategy is striking. Afraid to face the might of Great Britain — the most powerful naval force of its time — starting in 1936, Italy began to develop an access denial strategy based on light cruisers, destroyers, and submarines to defend the coast and to cooperate with the air force in creating torpedo bombers squadrons, light surface-assault craft, underwater assault techniques and the rapid construction of motor torpedo boats. 

Today, China likewise aims to implement an access denial strategy to offset the powerful U.S. Navy by developing an anti-ship ballistic missile, the DF-21-D, with the ability to target U.S. carrier groups within 1000 miles of the Chinese coast. They possess over 50 high-speed anti-ship cruise missiles carrying patrol boats, and since the 1990s, China has more than quadrupled its submarine fleet, capable of firing anti-ship cruise missiles. Additionally, the new Lyang II Class Guided Missile destroyer is equipped with a sophisticated phased-array radar system similar to the Western Aegis system. Like the Italian example demonstrates, this is largely a sign of perceived weakness and should not be misinterpreted. 

Closely analyzing French and British Naval policy towards Italy in the 1930s, one also notices how little both navies factored in cultural and psychological aspects (e.g. some naval historians, argue, that due to their experience in the 19th century, the Italians had developed a keen aversion to large sea battles, after a devastating defeat by the Austrian Navy in the Adriatic in 1866, which made any aggressive Italian action in the 1930s less likely) which also today are neglected in alarmist statements on the Chinese Navy. The French for example greatly overestimated Italian naval strengths throughout the 1930s, which substantially influenced their policies. The British more accurately assessed the Italian Navy’s fighting strengths, yet their forces to protect global commerce and the far-reaching British Empire could not withstand the loss of even a single battleship. This is similar to the United States’ fear of losing a single aircraft carrier to Chinese missiles; the psychological impact would be just too shocking to contemplate. 

Using the analogy of Germany prior to World War I is not only alarmist but simply a non-sequitur. Applying the logic of historical analogies to the British-German naval race, the corollary is the following: if the United States does not increase its naval spending, a resurgent Chinese Navy will lead China to pursue a more aggressive, unpredictable global foreign policy with the aim of guaranteeing “China’s place in the sun,” which sooner or later will lead to war. The intra-wars Italian navy was, at least in magnitude, a formidable force, and, although equipped with modern battleships and cruisers, was untested by war, badly trained, and lacking an aggressive offensive doctrine, European political rhetoric to the contrary. 

If, however, we can instill in foreign policy makers an apposite analogy, we can draw a more rational conclusion regarding the Chinese Navy and the Communist elite, which would help both the United States and Japan develop a more prudential naval policy vis-à-vis China. 

John Mroz Chairs Panel at Munich Security Conference

On January 31, EWI's President and CEO John Mroz chaired a panel discussion on "Rebooting Trust? Freedom vs. Security in Cyberspace" at the 2014 Munich Security Conference.

 

 

Panelists included: Dr. Thomas de Maizière (Federal Minister of the Interior, Federal Republic of Germany), Michael Rogers (Representative, Chairman of the House Permanent Select Committee on Intelligence, United States of America), Cecilia Malmström (Commissioner for Home Affairs, European Union), John Suffolk (Senior Vice President and Global Cyber Security Officer, Huawei Technologies Co, Ltd.) and Matt Thomlinson (Vice President, Microsoft Security). 

_

Click here to watch the panel discussion "Rebooting Trust? Freedom vs. Security in Cyberspace."

 

 

Nagorski Receives Lech Walesa Media Award

On February 1, 2014, the American Institute of Polish Culture in Miami held its 42nd International Polonaise Ball. The guest of honor was Poland’s former President and Solidarity leader Lech Walesa, who presented the “Lech Walesa Media Award” to EWI’s Andrew Nagorski. 

A former Newsweek Warsaw bureau chief who reported extensively from Poland during the rise and triumph of Solidarity, Nagorski was commended “for dedication to the cause of freedom and writing about Poland’s history and culture.”

Walesa told the 380 guests that Solidarity’s victory was greatly helped by the way correspondents like Nagorski were able to report the news from Poland during that tension-filled era. “We needed more journalists who could analyze the events and who understood Poland’s position in the world, who understood the historical context,” he said. This is a role that journalists should play more often, he added. 

Accepting the award, Nagorski declared: “What an honor it is to get this award from a man whose name is synonymous with Poland’s successful struggle for freedom, a man who is central to any narrative not just about Poland but about the collapse of communism throughout what we used to call the Soviet bloc.”

Nagorski pointed out that all young journalists dream about covering historic figures and historic events sometime during their careers. “Thanks to Lech Walesa and Solidarity, I can count myself among the lucky few who were able to do so,” he said.

Event Photos: 

Andrew Nagorski and President Lech Walesa

President Lech Walesa, Andrew Nagorski and Lady Blanka Rosenstiel  

 

__

Read the Lech Walesa Institute’s report in Polish about this event here.

Greg Austin Advocates Paradigm Shift in Cybersecurity

Professorial Fellow Greg Austin writes "High Time to Act Against Information Catastrophe: Time to Strengthen Cyber Security," for The Globalist. Austin argues that we need a paradigm shift in cybersecurity, pointing to EWI's recently released policy report Resetting the System as an example.  

Read the full piece here on The Globalist

 

High Time to Act Against Information Catastrophe: Time to Strengthen Cyber Security

We need stronger cyber security to protect against massive consumer data breaches

If you are a leader in business or government, or even just a private citizen, there is an emerging phenomenon that you need to know more about. It’s called “information catastrophe.”

This is the event where the marvelous technologies of the cyber age combine with the actions of a person (accidental or malicious) to dump the larger share of your confidential database into the public domain, to criminals or to hostile governments.

It just happened in Korea, as announced this week. The event in question involved the theft and illegal sale of the credit card information of most of the country’s consumer population.

Don’t worry so much about identity theft, though that is happening. You need to be preparing for information catastrophe.

There are important defensive measures, such as reviewing security procedures, vetting your staff or associates better, or establishing strong relations with law enforcement or national intelligence agencies. Those approaches, however, are only band-aid solutions and temporary fixes.

Market pressure + policy failures = low security

The biggest source of the problem is the low-security character of the information systems and networks you are using.

A series of market pressures over half a century as well as regulatory policy failures have somehow convinced most of us to entrust our life savings of information and our inner-most feelings and secrets to data “banks” somewhere in the ether.

Only gradually are people becoming aware that these data banks are highly insecure and more regularly being breached in the bright glare of unwanted publicity.

The data banks comprise software and hardware products in which high vulnerability to attack has been tolerated as a trade-off for lower cost and more convenient accessibility.

When the initial choices for lower cost and lower security were made in many technical sub-fields decades ago, we did not quite foresee the combined effect of those choices.

A paradigm shift in cyber security

Now that we fear NSA can hack anything and anyone, and we know some other, more sinister governments are mining all of our personal information with malicious intent, it is time for us all to trade-up to “highly secure computing.”

In a recent paper released by the East West Institute, called “Resetting the System,” German researcher Sandro Gaycken and I make the case for this paradigm shift in cyber security.

We note that the U.S. Department of Homeland Security (DHS) has identified highly secure computing as one of the highest priorities for research in this field. U.S. scientists are reserving the right to legally develop NSA-resistant encryption.

And the Defense Advanced Research Projects Agency (DARPA), where key elements of Internet technology were developed, is now running new projects in highly secure computing.

We understand that term to mean information technology with security that is unlikely to be breached — except in unusual and rare circumstances (or at high cost and risk to the perpetrator).

Highly security computing is a gigantic investment

This is not some unachievable holy grail. As John Dobson and Brian Randell argued in 1986, while being critical of those who believed it possible to build totally secure systems, “highly secure computing” is a worthwhile goal for scientific research and public policy.

As the DHS’s research plan mentioned above has noted, the more highly secure technologies cannot be bolted on top of the existing ones.

By and large, a move to less vulnerable IT would require a gigantic initial investment by manufacturers and consumers. It could be more expensive to operate and perhaps less convenient and less functional. So consumers—firms and individuals—will not rush to adopt it voluntarily.

The roles of governments and the private sector

Typically, a market failure—where private markets do not provide goods or services needed by customers or do not provide them in adequate quantities at an affordable price—triggers the question of government intervention.

In most market economies, considerable care is taken to craft policies that address the national interest (or public interest) without unduly constraining innovation and competitiveness in the private sector.

But once a government chooses to intervene, the inevitable result—absent a complete course reversal by the private sector—must be some compromise with and by private sector interests. Just how this might play out in particular economies demands detailed study. The policy outcome would inevitably be imperfect.

At the very least, this cyber security dilemma probably demands a price signal of some sort by government and a transition plan with clear benchmarks and standards to provide for phasing out of low security equipment and software.

With or against markets: the EU and China

While this may seem anathema within a U.S. free market environment, the pace of change may be forced on the global market by the European Union or its individual member states with considerable influence.

China is definitely acting against the market, as we have known it. The Snowden leaks about NSA successes against it have led to decisions by the government to accelerate its indigenous cyber security efforts, including new design standards. China is also reviewing its exposure to commercially available products that fall into the low-security and highly vulnerable category.

Today, it seems like we are many years from a consistent effort by any government to adopt highly secure standards for its IT market.

But as the information catastrophes start to affect more and more politicians or significant national economic or security actors, the rush to new products will intensify.

As we move closer to adoption of cloud computing, where confidentiality expectations will be paramount, we can expect that to drive a more rapid move to maximum security in cyber space. The companies that judge this moment well may ride the crest of a new wave of IT wealth.

 

Ischinger Discusses Munich Security Conference Goals

Writing for Project Syndicate, EWI Board Member Wolfgang Ischinger and Tobias Bunde write that this year's Munich Security Conference will must addresss how to prevent the West from falling apart in the digital age. 

Read the article on Project Syndicate

The Western Alliance in the Digital Age
 

MUNICH – This weekend, Helmut Schmidt and Henry Kissinger will participate in a discussion at the Munich Security Conference (MSC)—just as they did a half-century ago, when they took part in the first “Internationale Wehrkunde-Begegnung” (the forerunner of today’s conference). In the meantime, many developments around the world have given us reason to rejoice—but also to reflect.

It is not only the crises extending from Ukraine to Syria that will prevent the MSC, the fiftieth, from becoming an exercise in self-celebration. The transatlantic partnership, traditionally the backbone of the conference, has seen better days than these.

The United States has now at least recognized that a great deal of trust has been lost in recent months, owing to the scale of surveillance undertaken by its National Security Agency. President Barack Obama’s speech about reforms of US intelligence-gathering activities, as well as his subsequent interview on German television, represented a first attempt to regain the confidence of America’s allies. But it signals, at most, the beginning of an intensive transatlantic dialogue on the issue.

The topic is too broad to be discussed solely among governments and secret services. What we need is a more comprehensive international debate that engages, say, the American and German publics, as well as the US Congress and the German Bundestag—in short, an intra-Western debate about our relationship in the digital age.

In 1963, when Ewald von Kleist invited participants to Munich for the first conference, which Americans fondly call the “Wehrkunde” to this day, the motivating idea was to invite our most important allies to a discussion about the major strategic issues directly affecting Germany and NATO. The main topic, at that time, was the Atlantic Alliance’s nuclear strategy. After all, Germany would have been the first victim of a nuclear confrontation between NATO and the Warsaw Pact countries. Kleist wanted to contribute to the creation of a German “strategic community,” which could make its own contributions to the NATO debate, rather than just absorbing whatever their technologically superior US ally proposed.

In a way, we are in a similar situation today. Though the security implications of the digital age are less tangible and not as destructive as a nuclear attack, the technological possibilities fundamentally alter the playing field of international relations.

The revelations concerning the NSA’s surveillance activities are just the start. A future of “thinking drones” and defensive and offensive cyber weapons raises new ethical, legal, and political questions. We Europeans need to be self-critical and admit that we are not only lagging behind in terms of technical capabilities; we are also in danger of not fully grasping in time the possibilities and dangers of the digital world.

And of course, we will hardly be able to engage in meaningful negotiations with the Americans on cyber issues unless we succeed in establishing a united stance within the European Union. Doing so would put us in far better position to negotiate on equal terms with the US, just as we can on trade issues.

In the past, the Western allies’ participation in NATO and its Nuclear Planning Group accommodated their concerns and prevented them from becoming mere objects of US strategy. Today, we need similar initiatives with regard to the digital world. Those hoping to achieve true cooperation must be willing to make their own contributions.

This year’s MSC will include not only security officials from many countries. Three dozen German MPs and a significant US Congressional delegation will also participate. That is why the conference is an excellent opportunity to step up the transatlantic debate. After all, let’s be honest: there will be real changes in US intelligence agencies’ behavior only if Congress regulates their activities more strictly.

The revelations and resulting debates in recent months have shown that many US politicians are also uneasy about the liberties taken by the secret services. However, without domestic pressure, little will change. It is all the more important that societal stakeholders—companies, NGOs, or international commissions of experts—both here and in the US become more heavily involved than before. This issue affects us all.

The debate is not—and should not be—between Europe and the US. Some Americans are grateful for Edward J. Snowden’s revelations about the NSA, which they believe have stimulated urgently needed public deliberation. The institutionally assured possibility of self-criticism is, arguably, the West’s best characteristic—its outstanding trait. Our democracies are better organized than other systems to scrutinize their own policies and respond to criticism.

In the 1960’s, the West had to agree on a common strategy for the nuclear age, and learn to deal with the atomic threat. Subsequently, we were able to take the first steps toward arms control and disarmament. Today, we need a similar debate in the West regarding our strategy for the digital age if we want to overcome new challenges without denying our identity as liberal democracies.

This weekend in Munich, the Schmidts and Kissingers of today and tomorrow will have an opportunity to engage in what is probably the most important strategic debate of our time: how to prevent the West from falling apart in the digital age.

Click here to watch a live stream of the Munich Security Conference in English. 
_

Return to EWI Now

A Measure of Restraint in Cyberspace

In a report introduced by Nobel Peace Laureate Mohamed ElBaradei, the EastWest Institute urges all parties to commit themselves to making civilian nuclear facilities off limits for cyber attacks. 

A Measure of Restraint in Cyberspace: Reducing Risk to Civilian Nuclear Assets, released today at the Munich Security Conference by EWI President John Mroz, proposes four specific steps to limit the use of cyber weapons during peacetime. 

According to EWI Senior Vice President and former Homeland Security cyber official Bruce McConnell, “Given the potential risks to humanity and the planet, nations should refrain from attacking civilian nuclear assets using cyber weapons. It’s a concrete step to advance peace in cyberspace.”

McConnell and EWI co-authors Greg Austin, Nadiya Kostyuk and Eric Cappon argue that the four steps will insulate these peaceful assets from attack while a more comprehensive approach to the cyber arms race evolves. Anatoly Streltsov of Moscow State University’s Information Security Institute writes the report’s afterword, which includes additional recommendations.

“The EastWest Institute takes a refreshingly direct approach, drawing on the successful experiences of global arms control negotiations in non-cyber arenas,” ElBaradei, former director general of the International Atomic Energy Agency, states in the preface. “I recommend this report to the delegates of the 2014 Nuclear Security Summit in The Hague this March.” 

_

Return to EWI Now

Pages

Subscribe to RSS - Conflict Prevention