Politics and Governance

John Mroz Chairs Panel at Munich Security Conference

On January 31, EWI's President and CEO John Mroz chaired a panel discussion on "Rebooting Trust? Freedom vs. Security in Cyberspace" at the 2014 Munich Security Conference.

 

 

Panelists included: Dr. Thomas de Maizière (Federal Minister of the Interior, Federal Republic of Germany), Michael Rogers (Representative, Chairman of the House Permanent Select Committee on Intelligence, United States of America), Cecilia Malmström (Commissioner for Home Affairs, European Union), John Suffolk (Senior Vice President and Global Cyber Security Officer, Huawei Technologies Co, Ltd.) and Matt Thomlinson (Vice President, Microsoft Security). 

_

Click here to watch the panel discussion "Rebooting Trust? Freedom vs. Security in Cyberspace."

 

 

Greg Austin Advocates Paradigm Shift in Cybersecurity

Professorial Fellow Greg Austin writes "High Time to Act Against Information Catastrophe: Time to Strengthen Cyber Security," for The Globalist. Austin argues that we need a paradigm shift in cybersecurity, pointing to EWI's recently released policy report Resetting the System as an example.  

Read the full piece here on The Globalist

 

High Time to Act Against Information Catastrophe: Time to Strengthen Cyber Security

We need stronger cyber security to protect against massive consumer data breaches

If you are a leader in business or government, or even just a private citizen, there is an emerging phenomenon that you need to know more about. It’s called “information catastrophe.”

This is the event where the marvelous technologies of the cyber age combine with the actions of a person (accidental or malicious) to dump the larger share of your confidential database into the public domain, to criminals or to hostile governments.

It just happened in Korea, as announced this week. The event in question involved the theft and illegal sale of the credit card information of most of the country’s consumer population.

Don’t worry so much about identity theft, though that is happening. You need to be preparing for information catastrophe.

There are important defensive measures, such as reviewing security procedures, vetting your staff or associates better, or establishing strong relations with law enforcement or national intelligence agencies. Those approaches, however, are only band-aid solutions and temporary fixes.

Market pressure + policy failures = low security

The biggest source of the problem is the low-security character of the information systems and networks you are using.

A series of market pressures over half a century as well as regulatory policy failures have somehow convinced most of us to entrust our life savings of information and our inner-most feelings and secrets to data “banks” somewhere in the ether.

Only gradually are people becoming aware that these data banks are highly insecure and more regularly being breached in the bright glare of unwanted publicity.

The data banks comprise software and hardware products in which high vulnerability to attack has been tolerated as a trade-off for lower cost and more convenient accessibility.

When the initial choices for lower cost and lower security were made in many technical sub-fields decades ago, we did not quite foresee the combined effect of those choices.

A paradigm shift in cyber security

Now that we fear NSA can hack anything and anyone, and we know some other, more sinister governments are mining all of our personal information with malicious intent, it is time for us all to trade-up to “highly secure computing.”

In a recent paper released by the East West Institute, called “Resetting the System,” German researcher Sandro Gaycken and I make the case for this paradigm shift in cyber security.

We note that the U.S. Department of Homeland Security (DHS) has identified highly secure computing as one of the highest priorities for research in this field. U.S. scientists are reserving the right to legally develop NSA-resistant encryption.

And the Defense Advanced Research Projects Agency (DARPA), where key elements of Internet technology were developed, is now running new projects in highly secure computing.

We understand that term to mean information technology with security that is unlikely to be breached — except in unusual and rare circumstances (or at high cost and risk to the perpetrator).

Highly security computing is a gigantic investment

This is not some unachievable holy grail. As John Dobson and Brian Randell argued in 1986, while being critical of those who believed it possible to build totally secure systems, “highly secure computing” is a worthwhile goal for scientific research and public policy.

As the DHS’s research plan mentioned above has noted, the more highly secure technologies cannot be bolted on top of the existing ones.

By and large, a move to less vulnerable IT would require a gigantic initial investment by manufacturers and consumers. It could be more expensive to operate and perhaps less convenient and less functional. So consumers—firms and individuals—will not rush to adopt it voluntarily.

The roles of governments and the private sector

Typically, a market failure—where private markets do not provide goods or services needed by customers or do not provide them in adequate quantities at an affordable price—triggers the question of government intervention.

In most market economies, considerable care is taken to craft policies that address the national interest (or public interest) without unduly constraining innovation and competitiveness in the private sector.

But once a government chooses to intervene, the inevitable result—absent a complete course reversal by the private sector—must be some compromise with and by private sector interests. Just how this might play out in particular economies demands detailed study. The policy outcome would inevitably be imperfect.

At the very least, this cyber security dilemma probably demands a price signal of some sort by government and a transition plan with clear benchmarks and standards to provide for phasing out of low security equipment and software.

With or against markets: the EU and China

While this may seem anathema within a U.S. free market environment, the pace of change may be forced on the global market by the European Union or its individual member states with considerable influence.

China is definitely acting against the market, as we have known it. The Snowden leaks about NSA successes against it have led to decisions by the government to accelerate its indigenous cyber security efforts, including new design standards. China is also reviewing its exposure to commercially available products that fall into the low-security and highly vulnerable category.

Today, it seems like we are many years from a consistent effort by any government to adopt highly secure standards for its IT market.

But as the information catastrophes start to affect more and more politicians or significant national economic or security actors, the rush to new products will intensify.

As we move closer to adoption of cloud computing, where confidentiality expectations will be paramount, we can expect that to drive a more rapid move to maximum security in cyber space. The companies that judge this moment well may ride the crest of a new wave of IT wealth.

 

Ischinger Discusses Munich Security Conference Goals

Writing for Project Syndicate, EWI Board Member Wolfgang Ischinger and Tobias Bunde write that this year's Munich Security Conference will must addresss how to prevent the West from falling apart in the digital age. 

Read the article on Project Syndicate

The Western Alliance in the Digital Age
 

MUNICH – This weekend, Helmut Schmidt and Henry Kissinger will participate in a discussion at the Munich Security Conference (MSC)—just as they did a half-century ago, when they took part in the first “Internationale Wehrkunde-Begegnung” (the forerunner of today’s conference). In the meantime, many developments around the world have given us reason to rejoice—but also to reflect.

It is not only the crises extending from Ukraine to Syria that will prevent the MSC, the fiftieth, from becoming an exercise in self-celebration. The transatlantic partnership, traditionally the backbone of the conference, has seen better days than these.

The United States has now at least recognized that a great deal of trust has been lost in recent months, owing to the scale of surveillance undertaken by its National Security Agency. President Barack Obama’s speech about reforms of US intelligence-gathering activities, as well as his subsequent interview on German television, represented a first attempt to regain the confidence of America’s allies. But it signals, at most, the beginning of an intensive transatlantic dialogue on the issue.

The topic is too broad to be discussed solely among governments and secret services. What we need is a more comprehensive international debate that engages, say, the American and German publics, as well as the US Congress and the German Bundestag—in short, an intra-Western debate about our relationship in the digital age.

In 1963, when Ewald von Kleist invited participants to Munich for the first conference, which Americans fondly call the “Wehrkunde” to this day, the motivating idea was to invite our most important allies to a discussion about the major strategic issues directly affecting Germany and NATO. The main topic, at that time, was the Atlantic Alliance’s nuclear strategy. After all, Germany would have been the first victim of a nuclear confrontation between NATO and the Warsaw Pact countries. Kleist wanted to contribute to the creation of a German “strategic community,” which could make its own contributions to the NATO debate, rather than just absorbing whatever their technologically superior US ally proposed.

In a way, we are in a similar situation today. Though the security implications of the digital age are less tangible and not as destructive as a nuclear attack, the technological possibilities fundamentally alter the playing field of international relations.

The revelations concerning the NSA’s surveillance activities are just the start. A future of “thinking drones” and defensive and offensive cyber weapons raises new ethical, legal, and political questions. We Europeans need to be self-critical and admit that we are not only lagging behind in terms of technical capabilities; we are also in danger of not fully grasping in time the possibilities and dangers of the digital world.

And of course, we will hardly be able to engage in meaningful negotiations with the Americans on cyber issues unless we succeed in establishing a united stance within the European Union. Doing so would put us in far better position to negotiate on equal terms with the US, just as we can on trade issues.

In the past, the Western allies’ participation in NATO and its Nuclear Planning Group accommodated their concerns and prevented them from becoming mere objects of US strategy. Today, we need similar initiatives with regard to the digital world. Those hoping to achieve true cooperation must be willing to make their own contributions.

This year’s MSC will include not only security officials from many countries. Three dozen German MPs and a significant US Congressional delegation will also participate. That is why the conference is an excellent opportunity to step up the transatlantic debate. After all, let’s be honest: there will be real changes in US intelligence agencies’ behavior only if Congress regulates their activities more strictly.

The revelations and resulting debates in recent months have shown that many US politicians are also uneasy about the liberties taken by the secret services. However, without domestic pressure, little will change. It is all the more important that societal stakeholders—companies, NGOs, or international commissions of experts—both here and in the US become more heavily involved than before. This issue affects us all.

The debate is not—and should not be—between Europe and the US. Some Americans are grateful for Edward J. Snowden’s revelations about the NSA, which they believe have stimulated urgently needed public deliberation. The institutionally assured possibility of self-criticism is, arguably, the West’s best characteristic—its outstanding trait. Our democracies are better organized than other systems to scrutinize their own policies and respond to criticism.

In the 1960’s, the West had to agree on a common strategy for the nuclear age, and learn to deal with the atomic threat. Subsequently, we were able to take the first steps toward arms control and disarmament. Today, we need a similar debate in the West regarding our strategy for the digital age if we want to overcome new challenges without denying our identity as liberal democracies.

This weekend in Munich, the Schmidts and Kissingers of today and tomorrow will have an opportunity to engage in what is probably the most important strategic debate of our time: how to prevent the West from falling apart in the digital age.

Click here to watch a live stream of the Munich Security Conference in English. 
_

Return to EWI Now

A Measure of Restraint in Cyberspace

In a report introduced by Nobel Peace Laureate Mohamed ElBaradei, the EastWest Institute urges all parties to commit themselves to making civilian nuclear facilities off limits for cyber attacks. 

A Measure of Restraint in Cyberspace: Reducing Risk to Civilian Nuclear Assets, released today at the Munich Security Conference by EWI President John Mroz, proposes four specific steps to limit the use of cyber weapons during peacetime. 

According to EWI Senior Vice President and former Homeland Security cyber official Bruce McConnell, “Given the potential risks to humanity and the planet, nations should refrain from attacking civilian nuclear assets using cyber weapons. It’s a concrete step to advance peace in cyberspace.”

McConnell and EWI co-authors Greg Austin, Nadiya Kostyuk and Eric Cappon argue that the four steps will insulate these peaceful assets from attack while a more comprehensive approach to the cyber arms race evolves. Anatoly Streltsov of Moscow State University’s Information Security Institute writes the report’s afterword, which includes additional recommendations.

“The EastWest Institute takes a refreshingly direct approach, drawing on the successful experiences of global arms control negotiations in non-cyber arenas,” ElBaradei, former director general of the International Atomic Energy Agency, states in the preface. “I recommend this report to the delegates of the 2014 Nuclear Security Summit in The Hague this March.” 

_

Return to EWI Now

Greg Austin Writes on U.S.-China Information Warfare

Greg Austin, professorial fellow at EWI, writes for The Globalist on "Terabyte Leaks and Political Legitimacy in the U.S. and China." While information leaks have historically been a source of political power, a new breed of massive cyber leaks poses global risks. 

Read the full piece here on The Globalist

Terabyte Leaks and Political Legitimacy in the U.S. and China

What the brave new world of global information warfare means for political and business elites everywhere.

The “leaking” of information is a time-honored tactic to undermine the legitimacy of a political opponent or a policy. Sir Winston Churchill relied on it during the run-up to World War II to attack what he saw as weak British responses to German rearmament.

Ever the master of using information and disinformation, he would use question time in the parliament to reveal morsels of secret information. As part of an embarrassment strategy, these were drawn from UK intelligence assessments of Germany’s military build-up and from UK policy planning documents.

At another level, the sustained control of information has always been viewed as central to political power. The totalitarian governments of the 20th century were among the best practitioners. The term propaganda came to symbolize this technique of political control of information.

Leaks and global governance

In such a governance frame, the idea of a strategic leak has always been one of a slow trickle of pieces of information. Meanwhile, the event itself or the process in question was unlikely to undermine the power of a determined state propaganda machine.

But now the old style of a steady flow of bit-by-bit “leaks” may be passing into history. Welcome to the brave new world of avalanche-like leaks, where the unauthorized release of secrets has moved from a trickle to a virtual flood.

And now, that flood has even biblical proportions. Wikileaks has been a manifestation of the changing times. All that is required is having a suitable platform to release those occasional floods of secret information.

In publishing 251,287 diplomatic cables from the U.S. government, the Wikileaks website provided a sustained embarrassment to the United States.

Wikileaks is passing into history

While there were temporary setbacks, the leaks did not shake the government to its core—or bring about the end of any political career. The total file size of the entire package of leaked cables was less than two gigabytes (2 billion bytes).

But Wikileaks is passing into history. By comparison, on some estimates, Edward Snowden took from the NSA 2,000 times as much information (4 terabytes, or 8 trillion bytes).

This did shake the United States government to the core. It did so not because Snowden revealed unusual activities that were not previously contemplated. The surprise lay in the scale of activity for which the U.S. government was fingered. That stunned people around the globe, foreigners first and, remarkably, American citizens later.

Leaks and legitimacy

The terabyte leaks of Snowden raised serious questions about the capacity of the United States government at a high political level: Can it contain the enormous technological potential of its own machines as well as the officials and managers who operate them?

The issue is not just one of basic constitutional rights. It also immediately raises questions of the moral legitimacy of government. The contest over whether Snowden’s acts were heroic or traitorous speaks to the depth of his impact on the legitimacy of the Obama administration.

That was June 2013. Within just seven short months, the wheel has turned again. The numbers have become even more staggering and the political environment around information security has become more chaotic as a result.

As the absolute size of the “leaks” is growing, it seems there will be growing threats to political legitimacy not really imaginable in earlier days.

China’s Snowden moment

Just as Wikileaks shook the US government to its core, China is now facing a similar seismic event.

This has been particularly visible in reports this week analyzing 2.5 million leaked files from offshore tax havens in the British Virgin Islands and the Cook Islands.

The leaks in question occurred more than a year ago and led to rapid adjustments in many tax jurisdictions to close loopholes highlighted by particular cases in the leaked documents.

But the sheer volume of the material meant that it has taken a team of more than 50 journalists worldwide over a year to start to see the totality of the files in a way that speaks very directly to bigger issues of political legitimacy.

As one might expect of journalists, to address the way these leaks threaten political legitimacy, they chose a prime news target: China’s ruling Communist Party and its wealthiest entrepreneurs.

In these tax havens, the International Consortium of Investigative Journalists (ICIJ) has identified 22,000 separate clients residing in China (including Hong Kong) who held offshore accounts. These are included in a database accessible through the ICIJ website.

The “red nobility” goes fishing

Their reports on China this week highlight the wealth and offshore trading of China’s “red nobility”, descendants or relatives of former or current Chinese leaders. There are no smoking guns revealed in the ICIJ reports on China so far, but there is no doubting the political sensitivity of the leaks.

To be sure, China’s internet censors have blocked all access in China to the database webpage and almost all access to the reports.

International media have correctly pointed out the link between this sort of information leak and the cases in 2012 of reports on the personal wealth of the extended family members of Wen Jiabao (then the Prime Minister) and Xi Jinping (then the named successor as Communist Party Secretary General).

Yet, the bigger story is not in the specifics of even these two notable families, but rather in the new phenomenon that the ICIJ database and its information sources represent.

Credibility at stake

Even if the Chinese offshore accounts are not illegal, many will be in some way connected with corrupt activity. Either way, the available data is so extensive and so unfamiliar to most Chinese citizens that it puts the credibility of the entire Chinese ruling elite in play. It does not matter whether this is elaborated in broad daylight or not.

Behind the scenes in China, the leaders have moved aggressively to shore up cyber security arrangements affecting their personal lives. But all indications are that this is an exercise doomed to failure.

There is now no single issue more sensitive in China than internet reporting on the leaders. Nor is there a topic of more public interest which, depending on your viewpoint, may either be curious or predictable for a formerly very closed society.

To counteract that imminent threat, China’s leadership has tried the route of technical surveillance by any means and of anyone.

Internet terror, anyone?

The term “internet terror” is used in newspapers in China to describe the practice of using leaked information to affect political careers and personal lives. The leaders now know that it affects them, and their hold on power, as well.

They fear the near certainty that there is a Chinese Edward Snowden out there who will deliver an even greater information catastrophe to them.

They also fear that one day soon, the U.S. intelligence community, with its massive cyber surveillance capability, will link up with investigative journalists or other activists to publish sensitive information about the leaders on such a scale that the Community Party itself will be discredited almost overnight.

They have images from 1989 in their minds: the Tiananmen protests and the collapse of Communist Parties in Eastern Europe. Now they fear the next wave of resistance will occur online.

Indeed, the U.S. government in 2010 offered funding for Falun Gong internet activity against the Chinese government.

Welcome to the info wars

These considerations give rise to a possible process of action and reaction. This mix of insecurity and conjecture could possibly lead to an information war.

The Chinese Foreign Ministry has already called into question the motives of the ICIJ, meaning a presumption that they are trying to dismantle Party legitimacy in China. As the terabyte leaks affecting China’s political class accumulate, the leaders’ insecurity will also increase.

One thing is for sure: The international information wars are moving to new levels. Issues of ethics and legitimacy long considered settled are now at risk in novel ways either because of the very large scale of leaks themselves or the scale they can take on through new internet-based media.

In the end, we may hope that liberal democracy—as in rule by the people in an atmosphere of personal freedom—can be the ultimate victor. But those who study the new technologies and politics, including in China, do not see that as inevitable.

Photo Credit: JoshuaDavisPhotography

Kanwal Sibal Says "It is Cherry Blossom Time in India-Japan Relations"

Amb. Kanwal Sibal, an EWI board member, writes for the Hindustan Times on the warming of political and economic relations between India and Japan, amidst a changing balance of power in Asia. 

See the full piece here on the Hindustan Times

Politically speaking, it is cherry blossom time in India-Japan relations. For the first time in history, the Emperor and Empress of Japan visited India December last. That visit had great symbolic significance. Now Prime Minister Shinzo Abe visits India as chief guest at our Republic Day celebrations — the first Japanese leader to be so honoured. This event too has notable symbolic importance.

If political relations between India and Japan have been tepid all these years it is largely because Japan’s vision of its priorities in Asia has long excluded India. Other factors that have played their part in preventing India and Japan from drawing closer are — the weight of the United States influence on Japan’s policies, India’s nonaligned foreign policy during the Cold War, the non-proliferation issue on which Japan’s posture has been rigid, the closed Indian economy prior to 1991, Japan’s reluctance to over-extend itself by going beyond South-East Asia, and Japan’s massive focus on China in the wake of the US opening towards China.

India, on the other hand, has always admired Japan’s success as an Asian country, especially its technological prowess, even though Japan has seen itself belonging to a league beyond Asia. Now that Japan is reaching out to India, it faces no negative attitudes. India continues to think of Japan with a generosity of spirit that objectively lacks a solid basis. Japan’s generous development assistance to India even could be a factor, but other countries that have assisted us have not benefitted from this kind of positive feeling.

In recent years India-Japan relations have acquired political and economic substance. India’s integration with the global economy, its high growth rates in recent years, its success in certain sectors of the knowledge economy, the remarkable improvement of its ties with the US, its nuclear deal with the US and the exemption obtained from the Nuclear Suppliers Group, its desire to strengthen its Asian ties through its Look East policy, its participation in the Asean Regional Forum, the East Asia Summit, etc, have all created more convergence in India’s and Japan’s interests.

India and Japan have now established a strategic and global partnership for which various supportive mechanisms have been created, such as annual summits between leaders that India has only with Russia and a combined foreign affairs and defence ‘two plus two’ dialogue that India has with no other country. The relationship is being upgraded even in the sensitive defence field in which Japan still suffers from various inhibitions derived from its constitution and a strong public sentiment against militarism since 1945. Joint naval exercises have been held and air exercises have been agreed to during the visit of the Japanese defence minister to India earlier this month. Japan has offered to sell its amphibious US-2 aircraft to India — the first country to which it has offered a military sale.

Japan has gone through almost two decades of economic stagnation that has cost it considerable loss of national prestige too. Japan has been traditionally considered an economic giant but a political dwarf because of its subservience to the US foreign policy. With its economy caught in a trough, its international profile had got badly dented. As Japan slid into a slump, China has risen inexorably, altering their bilateral equations. They say that never in history have China and Japan risen together. This gives Abe’s determination to put Japan on the road to economic recovery and restore Japan’s international role a geopolitical meaning that will become clearer ahead.

Already China has begun to challenge Japan’s interests. Its trumped up quarrel with Japan over the Senkaku Islands, its nibbling tactics in questioning Japanese sovereignty over these islands as part of a wider strategy to assert its vast territorial claims in the South China Sea, its declaration of an Air Defence Identification Zone that covers the Senkakus, its campaign against the rise of Japanese militarism under Abe, the periodic regurgitation of its historical grievances against atrocities inflicted on China by Japan during the war years, its strident protests when Japanese leaders visit the Yasukuni Shrine, are all part of a strategy to browbeat Japan, obstruct its resurgence as that will pose a challenge to the Asian hegemony that China seeks, and, beyond that, to test the US-Japan relationship by making it appear that Abe is politically adventurous and can disturb the US-China equilibrium in the making. The real target of Chinese muscle-flexing is the American forward presence in the western Pacific as that prevents China from wielding untrammelled power in its neighbourhood and constrains China’s naval ambitions. China needs a strong navy to protect the lines of communication of its far flung energy and trade interests.

Japan’s economic stakes in China are huge; our own political and economic stakes in China are high, given China’s contiguity with us and our direct exposure to its power. Neither Japan nor India seek a confrontation with China, but both have a responsibility to build lines of defence against any disruptive exercise of power by a rising China.

Today, no other leader of a great power has such positive ideas about strengthening strategic ties with India as Abe. We have, therefore, a vested interest in his success in restoring Japan economically and politically, more so as almost no other country has the resources and technology to assist in modernising India’s physical and industrial infrastructure through flagship projects like the Delhi-Mumbai industrial and rail corridors and the Chennai-Bangalore industrial corridor.

The cherry blossoms will be in full bloom when Japan ends its foot-dragging on its nuclear agreement with India, a reticence on its part that is difficult to justify strategically and, therefore, needs overcoming expeditiously.

Photo Credit: Jason Karsh (2010)

Ikram Sehgal Writes on "The Davos Challenge"

EWI board member Ikram Sehgal reflects on Pakistan's role at the annual World Economic Forum (WEF) in Davos and discusses the challenges to be addressed at this year's meeting. 

See the full piece here at The News International 

This is Davos week, the annual summit of the World Economic Forum (WEF). My first visit to Davos was in January 1993 as part of the delegation accompanying the then prime minister, Mian Nawaz Sharif. The WEF was then not that strict about allowing non-members to take part in its events.

This year the Pakistani PM was to grace the Pakistan Lunch, now counted as a significant traditional event in the Davos calendar. Unfortunately the Davos trip was cancelled at the last minute due to the vicious terrorist attack at Bannu. The disappointment notwithstanding, the prime intention being to project Pakistan, the traditional Pakistan Lunch at Davos will take place as scheduled.

Almost 50 Pakistanis will join the record 200 WEF members in the Steigenberger Belvedere. A panel of eminent experts, including Dr Ishrat Husain, will debate ‘Pakistan Vision 2025’.

Little did I know in 1993 that in a few months momentous changes would start taking place in Pakistan, most crises man-made. Terrorists are holding governance hostage, and the PM’s cancellation of the Davos trip has thrown this up. Rip Van Winkle woke up 20 years later to find the world to be a better place, but Pakistan is worse off than it was in 1993.

The tragedy is that the country was then set to break the shackles of nationalisation and emerge as a potent economic force. The most important thing for us today is not to let the future of our children become hostage to the vicious mindset of the terrorists.

Only a handful of Pakistani businessmen visit Davos regularly. In contrast over 125 Indian businessmen come as WEF members. In keeping with its exclusive nature the WEF only caters to the top companies of the world; the fee for being a corporate member is high. Husain Dawood, Atif Bukhari, Sultan Allana, Nauman Dar, and Arif Naqvi – Mian Mansha having dropped outcannot shoulder the burden of projecting Pakistan by themselves. Emulating their Indian counterparts, our elite Pakistani community must use this unique opportunity in greater numbers. What one gets in networking in a week at Davos may not be possible in several years. The government may like to give tax rebates amounting to 50 percent of the WEF membership, annual summit and regional summit fees as an incentive.

The programme pillars for this year’s annual summit are: (1) achieving inclusive growth; (2) embracing disruptive innovation; (3) meeting society’s new expectations; and most importantly (4) sustaining a world of nine billion people. The WEF ‘Global Risks 2014 Report’ highlights these risks and seeks to understand how these are interconnected.

The gap between the incomes of the richest and the poorest needs to be tackled and the disparities in income and wealth have to be addressed. That is the risk most likely to cause global damage in the coming decade.

Compiled by contributions from 700 global experts, the report details ten risks that are “global risks of highest concern” for 2014: (1) fiscal crises in key economies; (2) structurally high unemployment/underemployment; (3) water crises; (4) severe income disparity; (5) failure of climate change mitigation and adaptation; (6) greater incidence of extreme weather events; (7) global governance failure; (8) food crises; (9) failure of a major financial mechanism/institution; and (10) profound political and social instability.

Before the recession, the buzzword was ‘globalisation’, which is now believed to be an unstable system prone to be disrupted by political tensionsleading to financial turmoil. Nations must not adopt a do-it-alone policy; coordinated policy responses were deemed essential. Environmental risks such as water crises, extreme weather events, natural catastrophes, man-made environmental catastrophes and climate change present another cluster in the interconnections map.

Among interlinked risks climate change is of pivotal importance. This displays by far the strongest linkages and is both a key economic risk in itself and a multiplier of other risks, such as extreme weather events, and water and food crises.

There is a dire warning of a ‘lost’ generation of young people coming of age in the 2000s lacking both jobs and, in some cases, adequate skills for work, thereby fuelling pent-up frustration. Unemployed youngsters also remain vulnerable to being sucked into criminal or extremist movements. The social upheaval could have catastrophic results as seen in some parts of the world recently.

Technology is a significant aspect of the employment landscape for young peoplewhere the private sector can guide curriculum and training programme design by communicating about projected skills needs. Establishing partnerships with the education sector businesses can improve apprenticeship opportunities. Educational and civil society organisations can also prioritise entrepreneurship education, soft skills and earlier delivery of sector-relevant and professional skills in schools, all of which promote employability.

The increasing reliance on the internet to carry out essential tasks and the massive expansion of devices connected to it increases the risk of systematic failure even more. Recent revelations on government surveillance have dampened the international community’s willingness to work together to build governance models to address this weakness. The effect could be a ‘balkanisation’ of the internet, or ‘cybergeddon’ where hackers enjoy overwhelming superiority and massive disruption becomes an everyday occurrence.

While each risk holds potential for failure globally, their interconnected nature force-multiplies their catastrophic potential. To address and adapt to the ever-changing global ‘risks’, stakeholders must unite and take collaborative multi-stakeholder action. Businesses, governments and civil society can improve how they approach risk by taking steps such as opening lines of communication with each other to build trust, systematically learning from others’ experiences and finding ways to encourage long-term thinking.

President Hassan Rouhani of Iran is here in Davos and, though they will not meet, so is Israeli PM Benjamin Netanyahu. The presidents of half a dozen Latin American countries are joined by the Brazilian president. US Secretary of State John Kerry will represent the US. Davos highlights a wide range of disparate subjects, debated and discussed by eminent experts during the week. 

The Pakistani PM will miss a unique opportunity to clarify the world’s misconceptions about Pakistan. Actors Matt Damon and Goldie Hawn are chairing sessions on arts and culture. Other sessions concentrate on science, medicine, environment, etc. For me the ‘Partnering Against Corruption Initiative’ (PACI) panel organised by Elaine Dezenski was most important. We cannot fight terrorism without eliminating its nexus with corruption and organised crime. 

A number of geopolitical initiatives were launched during the WEF Summit in the 1990s, including the Israel-Palestine dialogue between Yasser Arafat and Shimon Peres. During the last decade participation from the private sector has increased in contrast to the public sector. The number of participant heads of state and government dropped from an average of over 60 to little more than a dozen, signalling a significant shift of emphasis of the WEF to its original economic mandate. 

Networking to create positive perceptions and taking advantage of it is, both as a country and commercially, is what the ‘Davos challenge’ is all about.

Photo Credit: World Economic Forum (2011)
 

Pages

Subscribe to RSS - Politics and Governance