With increasing advances in artificial intelligence technologies and machine learning, a new era of deep fakes has emerged, which has the potential to weaken the fabric of democratic society.
Seeing is not always believing, especially so in the Information Age. Information today is being twisted and tweaked to such an extent that segregating facts from fiction would actually need thorough research. Social media has always been ransacked with fake news, via Whatsapp messages or Facebook or Instagram posts. Indeed, fake news has been on the forefront of creating communal divides, enhancing disturbances in sensitive regions, radicalising individuals and tainting reputations.
With increasing advances in artificial Intelligence (AI) technologies and machine learning, a new era of ‘deep fakes’ has emerged. Deep fake technology employs AI based image blending methods to seemingly create real fakes and deceptive videos. This makes differentiating fake from real even more cumbersome and complex. Fake celebrity footages, propaganda videos or revenge porn are all outcomes of the deep fake technology.
The figure shows a face being sent through an encoder. This encoder is used to create a latent face or a lower dimensional representation of the face. While the latent face will have similar features of the original face, it could be trained for subtle alterations. Training here implies modifying the neural networks (via optimizing its weights) to get desired results. This reconstruction takes place via a decoder. As the programmer has total control over the network’s shape, one can accordingly reconfigure the number of layers, nodes per layer and its interconnectivity. The real mantra of altering image A to B is on the edges of the nodes that connect them. Each edge has some weights, and to find the right weight to ensure that the auto-encoder is able to generate desired results is actually a time consuming process.
In case of face swap, as shown in figure 2, one can pass the latent face of image A to that of decoder B and then decoder B would try to reconstruct the face with the information relative to the image A. Thus, it will re-create an image akin to that of the original but with modifications so intricate that it would be hard to distinguish.
The Dangers
Deep fakes can be used to target people of interest or general public depending on the ulterior motive. The former may be targeted for public trolling or for gaining cheap revenge while the latter can be targeted for garnering false public support, and to achieve cyber propaganda. The potential threat of deep fakes is that it can be used to heavily influence elections or trigger disinformation campaigns. Deep fakes can create trust issues in an already polarised political environment. These deep fakes could actually be misused by anyone at any point of time.
In a sampler presented by Jordan Peele done in association with Buzzfeed, Jordan ventriloquizes the former president of America, Barack Obama, where Obama could be seen talking about random stuff in the video. It is so real that one could easily be convinced that it is authentic. Now imagine a video surfacing online showing a potential candidate talking gibberish or involved in an unethical activity, days before an election. Such an instance would not only take a hit on his supporters but also lead to further confusion and clashes. In fact, many fake videos can be found online of prominent personalities, leaders, many actors and actresses. These days, free applications with user friendly means to swap faces or create fake videos are available online like FakeApp (an easy to use platform for making forged media). Easy availability of such tools exacerbates the issue of deep fakes.
Cyber stalkers can also misuse the technology if someone denies giving into their desires and wants. Just as an online image is sufficient for a teenager to create a false, derogatory video of his love interest and spread it around, thus adding on to the emotional and mental stress of the individual. Another use of deep fakes could be in illegally unlocking smart devices, with the face detection technology getting imbibed in most of the smart devices and even for smart locks. This can lead to misuse of data or even identity thefts.
The Way Ahead
With the growing dangers of deep fakes, researchers have come up with measures that can help spot these deep fakes. One of the means of doing so, as adopted by Apple Iphones, is live face detection, that is, the phone camera detects an actual face as opposed to photographs or videos. Another means of detecting a fake video is via closely looking at the background activities and liveliness. A real video would generate more metadata due to background activities than one that is morphed. One can also protect the videos from being misused by “watermarking” them. It’s like a digital hologram that can actually aid in distinguishing the real from the fake.
The technology for detecting deep fakes is only a means to predict if the video is authentic or not. However, with the plethora of videos and photographs available online, it becomes a Herculean task for authorities to check each and every video for its authenticity. Therefore, the civil society should be made aware to assess the credibility of the source regarding any video or voice clip. It is important to train citizens and make them more prepared and resilient to disinformation campaigns.
A major obstacle in countering fake news has been the lack of laws on the same. Disinformation is not a crime in a democracy. However, increasing menace of deep fakes may lead governments to take preventive measures like content based regulation. This may of course create another dilemma pertaining to individual’s rights versus security. In the coming days, deep fakes are expected to see an exponential rise. It is important to understand that deep fakes could be weaponized in ways that could weaken the fabric of democratic society itself.
Hence, it is essential that governments start investing in effective preventive measures for countering deep fakes. Building a strong AI and deep learning resource base that can stand at the forefront of fighting fakes as well as deep fakes should be the starting point of such actions. Additionally, individual websites and private players should keep a track on the authentication of the content that is being uploaded or circulated. Similarly, individuals should take cognizance of the threat these deep fakes pose and should verify any content before forwarding it. Unless the government, industry and civil society comes together to tackle this menace, deep fakes would remain a difficult cat to bell.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
With John Bolton conceding that the US has limited resources to compete with the tens of billions of dollars that China is pouring into Africa, it is not clear how effective America’s new Africa strategy would prove to be in containing China.
The United States finds its position increasingly challenged by two emerging powers with global ambitions, China and Russia. This rivalry now threatens to engulf the continent of Africa as well. China has expanded its economic interests in Africa even as the US and European countries pulled back from the continent. During the last one decade, China has become the largest trading partner of Africa. Punching above its weight, Russia has also joined the competition and its presence in the continent, which was dormant after World War II, now extends from the Central African Republic (CAR) to Eritrea.1 In response to this new geo-strategic competition, the US has recently devised a new ‘Africa strategy’
The sudden collapse of the Soviet Union had left the US without any rival. As a result, in the post-Cold War era, every year from 1994 to 2001, the US considered terrorism as a significant danger to its national security.2 By 1998, terrorism ranked in the top tier of threats for the US, along with other transnational dangers such as the proliferation of weapons of mass destruction. In February 2001, seven months before September 11, the Director of Central Intelligence (DCI) testified that terrorism was the single greatest threat to US national security.3 That belief, which was strengthened by the September 11 attacks and the War on Terror that the US waged thereafter, is now changing. There seems to be a consensus among both Republicans and Democrats that China poses a more immediate threat to US interests and its security than anything else.
This change in the source of threat perception is now getting reflected in changes being effected in American policy. The US is now trying to counter China through various means and in various regions. One of the largest battle grounds is likely to be Africa. In 2017, China established its first overseas military base in Djibouti. The Chinese military base is in close vicinity of the US base in Djibouti which had been established earlier to aid counter terror operations in Africa.
Speaking at the Washington-based conservative think tank, the Heritage Foundation, on 13 December 2018, the US National Security Adviser John Bolton said that in Africa the greatest threat is not from poverty or Islamic extremism but from the expansionist policies of China and Russia. He accused these countries of deliberately and aggressively targeting investments in the continent to gain a competitive advantage over the United States. He also alleged that China was using bribes, opaque agreements and the strategic use of debt to make African states comply with its wishes and demands. According to Bolton, China’s ultimate goal of using its predatory influence over Africa to advance its global dominance would ultimately leave the continent in a far worse shape. Bolton also accused Russia of seeking to increase its influence in Africa by advancing political and economic relationships with little regard for the rule of law or accountable and transparent governance. He also blamed Russia for continuing to sell arms and energy in exchange for votes in the United Nations and claimed that both China and Russia were extracting resources from the region for their own benefit.
This has led to the Trump administration’s framing of a new Africa strategy whereby it plans to give more attention to the African continent. The new Africa strategy is designed to benefit both America as well as Africa. Bolton stated that under “our new approach, every decision we make, every policy we pursue, and every dollar of aid we spend will further US priorities in the region." The new strategy is expected to bring new jobs to America by increasing trade with Africa, which, in turn, would also be beneficial for the African people. In short, it is transactional in nature.
Under its new Africa Strategy, the US now also wants to re-evaluate its engagement in UN peacekeeping operations in the continent and discontinue the ineffective ones. It also says that America would no longer provide indiscriminate assistance to all African countries. Instead, it would select its partners on the basis of their voting patterns in the United Nations. It would also not support countries that are governed by corrupt leaders who just siphon off money as a result of which benefit flows to the people.
The new US strategy, to a large measure, is also designed to counter growing Chinese influence on the continent. As part of this policy, the Trump administration in October 2018 decided to create a US International Development Finance Corporation (IDFC) with a funding of $ 60 billion. This would provide loan and risk insurance to American companies to make it easier for them to invest in Africa. However, this American plan pales into insignificance when compared with the Chinese plan to spend $60 billion over the next three years.
The US also wants African nations to take ownership over peace and security in their neighbourhood. However, this approach of the US has not worked in the case of Iraq and Afghanistan. African nations need sufficient stability to attract foreign investment, which they are incapable of achieving in the near future on their own. Also, many African leaders who are perceived to be corrupt prefer Chinese economic assistance as it does not ask uncomfortable questions about the rule of law, democracy and human rights. Moreover, Bolton has himself conceded that the US has limited resources to compete with the tens of billions of dollars that China is pouring into Africa. In this situation, it is not very clear how effective America’s new strategy would be in Africa in containing China. But it has definitely made African people worried that their continent might be used to advance the agenda of major global powers.
Dr Anand Kumar is currently Visiting Professor and Chair (India Studies) at the Department of Political Science and Public Administration, University of Dar-es-Salaam, Tanzania
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
In the light of Trump’s decision to withdraw US troops from Syria, Ankara has adopted a cautious approach towards the Syrian Kurds and has decided to take Moscow’s concerns into account before making any move in northern Syria.
President Donald Trump’s December 19, 2018 decision to withdraw US troops from Syria received a euphoric response in Turkey. That was not surprising since the US military presence and support for the Kurdish Democratic Union Party (PYD) and its armed wing the People’s Protection Unit (YPG) has been a source of friction between Washington and Ankara. A week before the US announcement, President Recep Tayyip Erdogan had threatened to launch a military operation in northern Syria to decimate the YPG, which Turkey considers a terrorist organization. In fact, on December 17, Erdogan had said that Turkey is ready to launch an operation “at any moment” to take control of Manbij, a city in northern Syria currently under the control of the US-supported Syrian Democratic Forces (SDF). He had also claimed that Trump has given a “positive response” to this Turkish plan.
Its initial reaction notwithstanding, the US announcement has forced Turkey to take a cautious view of the implications of the withdrawal of US troops. This is because Turkey has to take into account the views of other stakeholders, namely, Russia, Iran, the Assad regime and even the Free Syrian Army (FSA) which it supports. Consequently, on December 21, Erdogan announced the postponement of the military operation in Manbij. Explaining his rationale for the postponement, he said Turkey wants to “see on the ground the result of America’s decision to withdraw from Syria.” Though Erdogan asserted that it is not an “open-ended wait,” another Turkish military offensive in Syria could prove counterproductive in the given situation. Significantly, on December 31, 2018, Trump tweeted that the withdrawal of US troops from Syria will be carried out “slowly.” Reportedly, the final US withdrawal can take up to months, and Turkey will have to consider the full implications of the ensuing vacuum before making any move.
The Russian and Iranian positions in Syria have gained a significant boost due to Trump’s decision to withdraw US forces. Bashar al-Assad’s position has also become stronger. Both Russia and Iran support Assad’s position that the entire Syrian territory should come under his control before any political process can start. There are, however, differences on the Kurdish question between Russia, on the one hand, and Iran and the Assad regime, on the other. President Vladimir Putin is more amenable to having a federal structure to address Kurdish claims for self-determination. But this is not acceptable to Assad and Iran, whose priority is re-establishing the regime’s sovereign control over all the territory of Syria.
For Turkey, the Kurdish question is critical. It is more agreeable to the Iran and Syrian regime’s position on the Kurds because it sees any legalization of Kurdish control in northern Syria as detrimental to Turkish national security. Erdogan wants an immediate end to Kurdish control in northern Syria, and instead prefers a larger role for the FSA which is dominated by Turkmen and Sunni Arabs. This is, however, not acceptable to either Russia or Iran, which favour the Assad regime to take control of areas vacated by the US troops.
Turkey cannot proceed on its planned “East of the Euphrates” operation due to the Russian opposition and the likelihood of clashes with Syrian regime forces as well as with the SDF. This has forced Ankara to send a high level delegation comprising Defence Minister Hulusi Akar, Foreign Minister Cavusoglu, Intelligence Chief Hakan Fidan and presidential adviser Ibrahim Kalin to Moscow to discuss the way forward. The Russian position on the issue has been consistent. Before the arrival of the delegation, the spokeswoman of Russia’s Ministry of Foreign Affairs, Maria Zakharova, stated that “in accordance with international law and considering the path that Syria and the Syrian people have traveled down,” the Syrian government should inherit the control of the areas vacated by US forces. Media reports suggest that, with Russian consent, the Assad regime and SDF have entered into an understanding to coordinate the post-US withdrawal situation in Manbij, thereby thwarting Turkish plans.
Even though Turkish analysts are hopeful of a positive outcome to the delegation level meetings in Moscow and have argued that geopolitics is in Turkey’s favour because of US support and close cooperation with Russia, Erdogan is more cautious. Both Russia and Turkey have come a long way from the time when, in September 2015, Turkey had shot down a Russian warplane. The Russian-Turkish rapprochement has taken serious strides, with the two, along with Iran, working to find a peaceful solution in Syria. This was instrumental in easing tensions in Syria, the establishment of the de-escalation zones under the Astana process, and finding a way to resolve the differences over Idlib. In September 2018, Ankara and Moscow had agreed to establish de-militarised zones in Idlib to avoid a Syrian regime offensive against the rebel-held enclave. Furthermore, Turkey, during its past military operations in Syria, including Euphrates Shield (August 2016-March 2017) and the Afrin offensive (January-February 2018), has coordinated with Russia.
Their growing cooperation in Syria have led to Moscow and Ankara moving to strengthen economic ties, especially in the area of energy cooperation. In November 2018, Putin and Erdogan jointly inaugurated the sea section of TurkStream, a gas pipeline to supply natural gas from Turkmenistan to Europe and Turkey through the Black Sea. The project is being helmed by the Russian energy giant Gazprom and is expected to be ready to supply gas to Turkey by the end of 2019. Turkey, which is going through a difficult economic crisis and is dependent on imports for energy security, cannot afford to antagonise Russia.
Though Turkey’s Defence Minister has said that its armed forces will decimate the Kurdish terrorists, that is, SDF and YPG, Moscow is unlikely to give the green signal for a full-fledged Turkish offensive. The emerging scenario in northern Syria due to the planned US military withdrawal is yet to become completely clear. While Syrian Kurds seem to have lost a crucial supporter in the US, they might move closer to Russia. In such a scenario, and if they seek a political solution within the framework of the Astana process, it is unlikely that Ankara will be allowed to take control of the areas vacated by the US. Erdogan is well aware of the emerging dynamics and is treading a fine line between managing relations with the US, Turkey’s perceived security threats and Russian concerns over the Syrian peace process.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Turkey-Syria Relations, Syria, Russia, United States of America (USA)
Will the Global Compact for Safe, Orderly and Regular Migration solve the crisis?
Rajeesh Kumar
January 02, 2019
The Global Compact for Safe, Orderly and Regular Migration embodies the international community’s collective commitments to promoting cooperation on migration and solve the growing migrant crisis.
At an intergovernmental conference convened under the auspices of the United Nations in Marrakesh, Morocco, 164 nations adopted a pact on 10 December 2018 to manage the global migration crisis. The 'Global Compact for Safe, Orderly and Regular Migration' is the first, intergovernmental agreement that covers all dimensions of global migration. The legally non-binding pact aims to promote efforts to strengthen regular migration pathways and protect the human rights of migrants. Its objectives and commitments provide states and international agencies a means to coordinate migration policies and ensure that migration works for all. However, on the flip side, the non-participation of some important countries raises questions about the future of the pact.
Why a Global Compact
The last few decades have experienced massive population shifts across the globe. The conflicts in West Asia, Africa and South America, and the extreme violence associated with them have forced people to leave their homes and seek a haven in foreign countries. In addition, climate change effects also contributed to the growing number of migrants and refugees. According to the United Nations, approximately 258 million migrants around the world are living outside their country of birth. Out of these, around 68 million are in the “forcibly displaced” category, more than at any time in the recorded history of the modern world. Since 2000, the number of global migrants has grown by 49 per cent, from 2.8 to 3.4 per cent of the global population. The UN data also shows that, since then, more than 60,000 migrants have lost their lives while on the move.
On the other side, resentment against migrants has intensified across the globe, particularly in Europe and the United States. Though the global migrant population constitutes merely 3.4 per cent of the world’s population, burgeoning protests against migrants have created a wider perception that migrants are threats to national economies. The rising tide of resentment in these countries has also produced the impression that most migrants are settled in the developed world whereas the reality is otherwise. Studies show that the developing world hosts more than half of the global migrant population and that migrants have contributed to the development of both sending and hosting countries.
Against this backdrop, recognizing the need for enhanced international cooperation and a comprehensive approach to the issue of migrants, all the 193 members of the UN adopted a resolution called New York Declaration in September 2016. The resolution demanded the protection of the ‘safety, dignity human rights and fundamental freedoms of all migrants, regardless of their migratory status.’ Combating racism, xenophobia and discrimination towards migrants, supporting the host countries, and developing non-binding principles and guidelines for treatment of migrants were the other proposals of the declaration. In addition, the New York declaration recommended two global compacts: a global compact on refugees and a global compact for safe, orderly and regular migration.
Deliberations and Stocktaking
As proposed by the New York Declaration, elaboration of the Global Compact for Migration took place in three phases; consultation, stocktaking, and negotiation. The first phase involving six rounds of informal thematic sessions, which aimed to gather substantive inputs and recommendations for the Global Compact, was held between April and December 2017. The human rights of migrants, drivers of migration, irregular migration, international cooperation, smuggling and trafficking, and contribution of migrants were the main foci of these deliberations. In addition, five UN regional consultations (Africa, Asia and Pacific, Latin America, the Caribbean, and Western Asia), multi-stakeholder hearings, and regional civil society consultations also took place in 2017.
Subsequently, the stocktaking phase reviewed and analysed the information gathered during the consultations. The meeting provided “a platform for delegations and other stakeholders to jointly shape a vision for the Compact and collectively identify actionable commitments as well as respective means of implementation and partnerships the Compact may include.” The outcome was a 'Zero Draft' jointly prepared by Mexico and Switzerland, the co-facilitators of the process. Finally, the third phase, intergovernmental negotiations began with the release of the draft in February 2018 and ended with its finalization in July 2018. The final draft, which was agreed to by all 193 members of the UN, has four sections: vision and guiding principles, objectives and commitments, implementation, and follow up.
Objectives and Commitments
The Global Compact aims to ensure that migration 'works for all' by setting out a common understanding and shared responsibilities. It strives to foster international cooperation among “all relevant actors on migration, acknowledging that no State can address migration alone, and upholds the sovereignty of States and their obligations under international law.” Its central principles are people-centredness, national sovereignty, international cooperation, rule of law and sustainable development. The 23 objectives of the Compact seek to minimize the factors which force people to leave their country, ensure legal identity and documentation, provide regular pathways, eradicate trafficking, and facilitate return and readmission of all migrants. Moreover, to achieve these objectives, it spelt out 187 actions and many commitments.
Objectives for Safe, Orderly and Regular Migration:
(1) Collect and utilize accurate and disaggregated data as a basis for evidence-based policies
(2) Minimize the adverse drivers and structural factors that compel people to leave their country of origin
(3) Provide accurate and timely information at all stages of migration
(4) Ensure that all migrants have proof of legal identity and adequate documentation
(5) Enhance availability and flexibility of pathways for regular migration
(6) Facilitate fair and ethical recruitment and safeguard conditions that ensure decent work
(7) Address and reduce vulnerabilities in migration
(8) Save lives and establish coordinated international efforts on missing migrants
(9) Strengthen the transnational response to smuggling of migrants
(10) Prevent, combat and eradicate trafficking in persons in the context of international migration
(11) Manage borders in an integrated, secure and coordinated manner
(12) Strengthen certainty and predictability in migration procedures for appropriate screening, assessment and referral
(13) Use migration detention only as a measure of last resort and work towards alternatives
(14) Enhance consular protection, assistance and cooperation throughout the migration cycle
(15) Provide access to basic services for migrants
(16) Empower migrants and societies to realize full inclusion and social cohesion
(17) Eliminate all forms of discrimination and promote evidence-based public discourse to shape perceptions of migration
(18) Invest in skills development and facilitate mutual recognition of skills, qualifications and competences
(19) Create conditions for migrants and diasporas to fully contribute to sustainable development in all countries
(20) Promote faster, safer and cheaper transfer of remittances and foster financial inclusion of migrants
(21) Cooperate in facilitating safe and dignified return and readmission, as well as sustainable reintegration
(22) Establish mechanisms for the portability of social security entitlements and earned benefits
(23) Strengthen international cooperation and global partnerships for safe, orderly and regular migration
One of the positive aspects of the Global Compact is the framing of migration in the logic of development. The significant case against migration has been the perceived negative economic impact on host countries. However, migrants spend 85 per cent of their earnings in their host communities. Similarly, migrants across the globe sent approximately USD 600 billion in remittances in 2017, which is three times higher than the global Overseas Development Assistance (ODA). In this way, migrants contribute to the development of both the country of origin and host states. By accepting this known but concealed fact and developing policies to utilize the potential of migrants, the Global Compact aims to minimize the global resentments against migration. The Compact also states that it is rooted in the 2030 Agenda for Sustainable Development.
In addition, the Global Compact puts the rights of migrant women and children at its heart by mainstreaming a gender perspective. Among the 258 million migrants around the world, more than 50 per cent are women and girls. Moreover, women constitute 74 per cent of international migrant domestic workers. The Compact has two guiding principles that articulate the need for ‘gender-responsive’ and ‘child-sensitive’ migration policies. Moreover, many of its objectives and commitments argue for ‘gender equality and the empowerment of women and girls.’ Terms such as 'gender-responsive'/'gender-equality' or 'gender-based violence' appear 29 times in the 34-page document. Similarly, the Compact aims to enhance global cooperation to reduce migration-related deaths, and in combating smuggling and trafficking, all of which are priorities for any government.
Climate change is another global problem contributing to the migration crisis The Global Compact recognizes climate change as a driver for migration and lays out a framework for dealing with it. According to the World Bank, around 143 million people, especially in the developing world, could be forced to relocate within their countries by 2050. Another study shows that about 2 billion people may become climate change refugees by 2100. The Compact proposes building a Platform on Disaster Displacement” and developing an 'Agenda for the Protection of Cross-Border Displaced Persons in the Context of Disasters and Climate Change' to address the issue.
Prospects and Challenges
With its comprehensive approach to migrants and their problems, the Global Compact for Migration provides both opportunities and challenges. First, it puts forth a balanced approach by framing goals that correspond to the interests of different stakeholders. For instance, while Objective 20, promoting the transfer of remittances, serves the interest of states of origin, Objective 21, facilitating return and readmission, satisfies the receiving countries. While respecting national sovereignty and international law, the Compact acknowledges the prerogative of States to decide who they allow onto their territory. It, therefore, provides for enhanced cooperation among states to manage global migration.
Second, migration, provided it can be monitored appropriately, can positively contribute to the development of both the countries of origin and the host. However, fear of the outsider has created massive popular sentiments against migrants in host nations. s. The Global Compact helps to dispel these fears by giving preference to evidence-based policies through data collection and accurate information about migrants. This approach will be helpful in dispelling misguided and xenophobic policies, particularly in Europe and the United States. Proper implementation of the objectives of the Compact will ensure that migration works for all and contribute to solving the global migration crisis. The adoption of the Compact by New Zealand just a few days after the Marrakech Conference shows that the Compact is finding resonance and acceptability and is a step in the right direction.
Third, many see the non-binding nature of the Global Compact as a challenge and the most significant limitation. They fear that the Compact will be just another talking shop without making any real difference to the migration problem. However, in international politics, distinction between binding texts (hard law) and non-binding texts (soft law) is minimal because the parties, i.e., the states themselves, enforce both types of agreements. Moreover, soft law also ensures the support of the maximum number of members and a fast process since it usually does not require voting in domestic parliaments. None of the objectives or commitments of the Compact imposes any new obligation on the signatories. Instead, it reiterates the existing treaties and conventions. Issues with hard law can be seen in the approach of the UN member states towards the 1951 Refugee Convention, a legally binding document. Even after six decades of its adoption, more than 50 countries are yet to sign the agreement.
The most significant challenges before the Compact lie in its implementation and in the many significant countries that have not signed up to it. The refusal of many countries, including the United States, Australia and Hungary, to adopt the Compact corresponds with the rise of populism and anti-immigrant sentiments across the globe. These countries view the adoption of the Compact as an instance of surrender of sovereignty. Addressing the gap between reality and perception about migration and migrants will be a great challenge before the Compact in the coming years. Finally, the Compact does not talk about who will coordinate, monitor and fund its implementation. Since member states are responsible for implementation, they will have to do much more than mere reviews and occasional follow up in order to achieve the goals of the Compact.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Illegal Migration, Global Initiatives, Nontraditional Security
Trump seems to have reconciled himself to the fact that Afghanistan may become an ‘Islamic Emirate of Taliban’ with Sharia Law being imposed with or without the consent of the people.
Following the September 11, 2001 attacks, the US, supported by its western allies, invaded Afghanistan with the stated aim of dismantling the Al Qaeda network, removing Taliban from power and creating a viable democratic state to deny terrorists a base to recruit, train and operate from. 17 years later, after having spent more than a trillion dollars and the death of tens of thousands, violence continues unabated in an inconclusive war in Afghanistan. Unmindful of the violence that continues to be unleashed by the Taliban to maintain pressure, Washington has initiated the process for a dialogue with the terror outfit. Now, it has abruptly announced the withdrawal of 7000 of its 14000 troops deployed in Afghanistan, possibly to convince the Taliban that it is serious about withdrawing its forces.
It is ironical that the US, much against its touted principle of no talks with terrorists, is now seeking the Taliban’s cooperation to end the war and is probably willing to accommodate the terror group within Afghanistan’s power structure, giving an impression that it is desperate to extricate itself. Needless to say, with the 2020 Presidential elections fast approaching, Trump is keen on fulfilling his election promise to end the war in Afghanistan. The Taliban has not responded to the US announcement of partial withdrawal. Instead, in an arrogant message, it has warned the US that if it did not leave Afghanistan it would meet the same fate as the erstwhile Soviet Union.
Taliban’s Stance
The Taliban has been consistent in this stand, having maintained an upper hand militarily. According to the latest quarterly report of the US Congress created office of the Afghanistan Special Inspector General for Afghanistan Reconstruction (SIGAR), as of July 31, 2018, the government of Afghanistan has uncontested control over only 56 percent of the territory, while 32 per cent is contested.
Speaking to reporters in Moscow, Sher Mohammad Abbas Stanikzai, a Taliban representative who attended the Russia-organised meeting on November 09, 2018 on peace in Afghanistan, said: “Our demand for the peace process has two parts, the first part is with Americans; all those matters which are related to Americans like the withdrawal of their forces, the black list and officially recognizing our political office (in Qatar) and other issues which are related to the Americans; they should be discussed with the Americans; they should be discussed with America on the table. And, “Those matters which are related to the Afghan side which are mostly internal affairs like the future government, the constitution and there are many other issues; can be discussed with the Afghan side.” He also stated that the Taliban does not consider the current government in Afghanistan as legitimate.
The Taliban’s demands for peace in Afghanistan have been that all foreign troops must leave, full Islamic law and customs must be implemented, and the political system must not conflict with the Sharia. Wahid Mojdah, an analyst and former diplomatic aide under the Taliban regime from 1999 to 2001 says that the Taliban is not in a hurry and their “goals are religious, not political.”
In an effort to pressure the Trump administration as a part of its physiological warfare, the Taliban, in its capacity as the ‘Islamic Emirate of Afghanistan’, has issued a 17000-word appeal to the American people asking them to pressure US officials to end the 17-year old conflict in Afghanistan.
Diplomatically, the Taliban has gained international recognition, thanks to the efforts of US, Russia and China to get them to the dialogue table. Rightly or wrongly, Russia and China have been viewing the Taliban as a counter to the Islamic State (ISIS), which latter they believe is the main and more toxic threat. With diplomats from different countries frequenting its office in Doha, the Taliban has further added value to its stock.
US – Taliban Dialogue
At the end of July 2018, the US reversed its longstanding policy that any peace process would be ‘Afghan owned and Afghan led’. Days after the Taliban had called on Afghans to boycott the scheduled parliamentary elections, Alice Wells, the US Principal Deputy Assistant Secretary of State in charge of South and Central Asian affairs, met Taliban leaders in Doha. Paradoxically, the Taliban has appointed five former commanders who had spent more than a decade as prisoners in Guantanamo Bay as its representatives at the political office in Doha. The talks were held in the absence of any representatives from the ruling Afghan government.
On September 21, 2018, the US appointed Ambassador Zalmay Khalilzad as the Special Representative for Afghanistan Reconciliation. Since his appointment, Khalilzad has been travelling to Pakistan, Afghanistan, Russia, the United Arab Emirates (UAE), Qatar, Saudi Arabia, Belgium, Uzbekistan and Turkmenistan, in an effort to find a solution to end the Afghan war. He successfully advocated the postponement of the Presidential elections in order to focus attention on the peace process and protect it from political interference. The elections have now been postponed to 2019. It is possible that the postponement of elections was proposed to please the Taliban which is averse to it, being contrary to Islamic Law. Khalilzad held three days of talks with the Taliban from November 16 to 18, 2018 at Qatar. Khairullah Khairkhwa, the former Taliban governor of Herat, and Mohammed Fazel, a former Taliban military chief, attended these talks. Khairkhwa and Fazel were among five senior Taliban members released from Guantanamo Bay in 2014 in exchange for US soldier Bowe Bergdahl, who was captured by the Taliban after walking off his base in Afghanistan in 2009.
The third meeting between US officials and the Taliban took place at Abu Dhabi from December 17 to 19, 2018. Apart from Khalilzad, representatives from Pakistan, UAE, and Saudi Arabia attended this Pakistan sponsored meeting. Taliban officials from the movement's political headquarters in Qatar, two representatives sent by Mullah Yaqub, elder son of Taliban founder the late Mullah Mohammad Omar, and three representatives from the Haqqani Network were said to have been present. It is significant that among those who attended the meeting, Saudi Arabia, UAE and Pakistan were the only three countries that had recognised the Taliban government during its five-year rule from 1996 to 2001. After the meeting, Khalilzad gave an interview to Tolo News on December 20, 2018, which gives an indication of US thinking on its future course of action in Afghanistan. This raises a number of issues and concerns.
Is the Taliban in control of all the terror groups operating in Afghanistan?
The Taliban has a number of splinter groups and there are conflicts of interests among them. The fact that Mullah Yaqub was asked to send two representatives to the Pakistan sponsored talks in Abu Dhabi and three representatives of the Haqqani Network were present in the same meeting says it all. When Mullah Omar’s death became public knowledge, his son Mullah Yaqub is said to have walked out of the meeting convened to appoint Mullah Mansoor as the successor. Will Haqqani Network and Islamic State Khorasan Province (ISKP), an affiliate of ISIS which has its own factions, fall in line with the Taliban? Given internal rivalries between various factions and terror groups, will accommodating the Taliban within the power structure of Afghanistan end terror and bring peace to the country and to its people?
Larger issues being ignored at the peril of long term peace in the region.
The US, Russia and China seem to be ignoring or misreading the larger issues of the conflict in Afghanistan. The Taliban, who refer to themselves as the ‘Islamic Emirate of Afghanistan’, are a Sunni Islamic fundamentalist political movement. The conflict in Afghanistan is not borne out of differences between the Afghan Government and the Taliban to be settled by peace talks. It is a conflict of ideology, faith and beliefs. The Taliban wants to govern the country under Islamic Law and not under a man-made Constitution. Till date, it has not cut off its links with the Al Qaeda. It is also noteworthy that there has not been any major fight between the Taliban, Al Qaeda and ISIL in Afghanistan. They seem to be silently accommodating each other, though many believe that ISIL and Taliban are rivals. Their hidden agenda is to establish a Pan Islamic Caliphate in Afghanistan and beyond governed by Sharia Law. Pakistan, with the tacit support of a few Sunni Muslim countries, is seeking to institute its own control on Afghanistan through the Taliban as its proxy to achieve its larger geopolitical objectives. What we are witnessing today in Afghanistan is not an isolated incident limited to the country. This malady has affected a number of countries cutting across continents in one form or the other. The Islamic movement cannot be contained within the borders of Afghanistan.
Has the Security Situation in Afghanistan changed?
“What we are doing is preventing the homeland from being attacked,” said Lt. Gen. Kenneth McKenzie Jr., the nominee to lead CENTCOM, during a hearing before the Senate Armed Services Committee on December 04, 2018. Speaking about withdrawal and the military capabilities of the Afghan Security Forces, he stated “If we left precipitously right now, they would not be able to successfully defend their country…...” Has this situation changed?
While in power, the Taliban had allowed militants from around the world to congregate in Afghanistan and facilitated the Al Qaeda to plan and execute the 9/11 attacks. Are there any guarantees that the Taliban will prevent Afghanistan from once again becoming a base and a terrorist haven to take forward Islamic Jihad beyond Afghanistan?
The US perhaps realises that it has lost the war and has no chance of winning. It probably doesn’t matter to Trump as to who rules Afghanistan or how its people are governed. He seems to have reconciled himself to the fact that Afghanistan may become an ‘Islamic Emirate of Taliban’ with Sharia Law being imposed with or without the consent of the people. Being far away, Trump probably hopes that the US will be spared a renewed jihadi threat.
Conclusion
Some analysts are of the opinion that the Pakistan-Russia-China nexus will control Afghanistan through Pakistan’s proxy, the Taliban. This may be true in the initial stages. But once the Taliban consolidates itself and prepares itself to launch its next phase, they are bound to lose control. The Taliban may even attempt to establish an Islamic State in Pakistan in keeping with Ayman al-Zawahiri’s first guidelines for jihad, wherein he states: “In Pakistan, the struggle against them complements the fight for the liberation of Afghanistan from American occupation; then it aims at creating a safe haven for the Mujahideen in Pakistan, which can then be used as a launching pad for the struggle of establishing an Islamic system in Pakistan.” In his envisioned model for the state of Pakistan in the book Sapeeda-e-Sahar Aur Timtamata Chiragh, Zawahiri writes: “The state called the Islamic Republic of Pakistan is, in no way, an Islamic state; neither in terms of the ideological base (its constitution) nor its practices… Time is not far away when Islam will gain dominance in South Asia in general and Pakistan in particular.”
Since the US has announced its partial withdrawal from Afghanistan and may probably withdraw completely, the responsibility to ensure that Afghanistan does not go the Jihadi way may fall on Russia. Though China has its security establishment in Badakshan Province of Afghanistan, it is not clear as to how far it will get involved in preventing the establishment of a terror state.
With the Taliban having established its base in the North, the chances are that once it consolidates its position, terrorists based in the country may take forward the Jihadi movement Northwards across the Amu Darya to link up with militant groups in the Ferghana Valley. This area is densely populated with deeply religious people, and is shared between Uzbekistan, Kyrgyzstan and Tajikistan. Hizb ut-Tahrir (HT) and its splinter groups Akramiylar and Hizb un-Nusrat, as well as Uzun Soqol (Long Beards), Nurcular, Tabligh Jamaat, Lashkar-e-Taiba, Hizballah, the Islamic Movement of Uzbekistan (IMU), the East Turkestan Islamic Movement (ETIM), the Islamic Movement of Central Asia (IMCA), and the Islamic Jihad Group (IJG) are all active in the area.
Rather than waiting for the situation to deteriorate, it is time to think through the implications of the US withdrawal from Afghanistan, the possibilities of the US initiated Peace Talks fructifying, and its responses should things go wrong. India has not been invited for peace talks and as such. Apart from keeping a close watch on the developments and movements of militants in and out of Afghanistan, it may not take any active part for the present. Indian Muslims including those in the Valley are unlikely to be swayed by the so called Jihadi movement. However, should Taliban take control of Afghanistan, the country needs to be prepared for Pakistan channelling some of the Afghan based terror groups to the Kashmir Valley. The Government would do well to activate its strategic communications machinery to keep the people, especially those in the Valley, informed about the happenings in Afghanistan and its implications so as to counter Pakistani propaganda which is bound to gather steam as events unfold.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Bangladesh General Elections 2018: What Next for the Opposition
Smruti S. Pattanaik
December 31, 2018
It remains to be seen whether AL in its third term will be able to address the issue of rampant corruption that has deeply permeated the governance structure as well as the issue of free speech that many believe the ICT Act has impaired.
If democracy means peaceful political transition through the ballot, Bangladesh passed that test yesterday by successfully concluding its eleventh parliamentary election. Violence, compared to previous elections, was minimal, with 18 dead and 200 injured in clashes that were confined to a few constituencies. There was also sporadic violence in the run-up to the elections, which some critics argued was a tactic aimed at forewarning opposition supporters to stay away from the vote. The Awami League (AL) gained a comfortable majority to rule the country for the next five years. The seven seats won by the Jatiyo Oikyo Front (National Unity Front) would not be able to provide any meaningful opposition for the ‘nouka’ (Boat – the election symbol of AL) to have a smooth sailing. As the opposition mulls about a strategy going forward, what is at stake is stability and continued development (unnati r dhara), as AL has described. However, an opposition-less parliament is not conducive for the future of democracy.
Politics of Alliance Making
Before the election, the Awami League formed what is known as ‘Mahajot’ (Grand Alliance) with several smaller parties that have been its key allies since 2008. Though many of them were not very happy with the number of seats allotted to them as part of the grand alliance, they had little choice but to remain with the winning group. One of these was the Jatiyo Party (JP) led by former military dictator General H.M. Ershad. Unhappy with the small number of seats allocated to it, JP had fielded 145 rebel candidates, although it withdrew them before voting commenced. Earlier, it had attempted to negotiate an understanding with the AL and for that purpose Ershad had even replaced Ruhul Amin Hawaldar with Moshiur Rahman Ranga as the party’s General Secretary, but to no avail.
Interestingly, the AL had more number of Islamic parties as part of the ‘Mahajot’ compared to the BNP, which latter is seen as a centre right party. Its electoral understanding with Hefajat-e- Islami – a madrassa based ulema coalition which had once demanded implementation of the 13-point radical Islamist agenda in 2013 – made many secularists and minorities uncomfortable. The alliance also created division within HeI, with opposition stemming from those not comfortable with an electoral understanding with AL which is not seen as an Islamic friendly party.
The AL fielded 258 candidates and left the rest to its allies. Its main ally, the Jatiya Party, was given only 29 seats to contest. The returning officers rejected the candidature of three AL nominees. Several rebel candidates from the AL had filed nomination paper against party nominees, but most withdrew following party president Hasina’s appeal.
The Bangladesh Nationalist Party (BNP) has significantly weakened as a political party in the wake of its Chairperson being convicted on corruption charges. It formed a broad based coalition with the Jatiyo Oikyo Front (National Unity Front) under the leadership of veteran freedom fighter and eminent jurist, Dr Kamal Hossain, who was once the Law Minister and then Foreign Minister in the Mujib government and also one of the authors of the 1972 Constitution. Ironically, his decision to form an alliance with the BNP, which has Jamaat-e-Islami (JeI) as an alliance partner, a party that earlier stood against the liberation of Bangladesh, raised several eyebrows. Some in Bangladesh accused Hossain of rehabilitating the ‘anti-liberation force’ by providing it legitimacy. It is true that both the BNP and the Oikyo Front led by Gono Forum (Peoples Forum) needed each other to form a formidable opposition against the ruling party, which is perceived as a common enemy by both. Not surprisingly, their agendas were different. The BNP wanted its leader, former Prime Minister Begum Khaleda Zia, released from jail. Dr Hossain underlined that his objective was to restore the people’s right to choose –a reference to the one-sided election held in 2014, in which the ruling Awami League had won 153 seats uncontested. While the BNP put out a lacklustre manifesto, the Oikyo Front had an ambitious one, which aimed at ‘restoring peoples right’ or jono gono r adhikar. The battle lines between the two major coalitions were drawn thus: pro-liberation vs anti-liberation, and development vs democracy.
Interestingly, this election saw several appeals against the rejection of candidacy by the returning officers. Most of those rejected approached the judiciary and were successful in getting relief from the court. To cater for this contingency, the BNP filed a total of 695 nominations for 298 seats, having a second candidate in reserve in each constituency. However, 141 candidates were rejected after scrutiny by the returning officers and nearly 50 retained their candidature only after the High court ruled in their favour. In spite of such precaution, the BNP and its allies fighting on the election symbol ‘dhaner sish’ (sheaf of paddy) could not manage to retain candidates in 17 seats. Many of the candidates who were previously upazilla chairmen and resigned from the post to contest the election faced a new problem – the government refused to accept their resignation, thereby preventing them from contesting in the election.
Most of the BNP candidates were selected by the Party’s acting Vice Chairman remotely through Skype given his continuing exile in London. The BNP and its allies also had several rounds of negotiations over seat sharing. The JeI was given only 22 seats to contest even though the party demanded more than 40. It had been allotted 32 seats in the 2008 election. However, post the war crimes trials, the BNP reduced the number of seats allotted to the JeI. It could not completely distance itself from the JeI because the latter commands 10 to 12 percentage of votes. The JeI too had filed independent candidates in 20 seats, but withdrew them in favour of the BNP, except in the Cox Bazar seat where BNP extended its support for the JeI candidate. There were 100 new faces among the BNP candidates out of the 238 seats for which the party filed nominations. The BNP had left 60 seats for its allies and extended support to two independent candidates.
What next for the opposition
The BNP, which did not take part in the 2014 election, had to participate in this election with the knowledge that there will be no level playing field. Non-participation meant that the party would lose its registration. It really did not have an alternate option. Its strategy was therefore to participate and fight for the restoration of a caretaker government system to conduct elections. Being out of the parliament also meant the non-availability of an institutional structure through which the opposition can engage the government.
The opposition, as expected, has rejected the election results saying it is a ‘mockery’ and has demanded fresh election under a neutral caretaker government. It is unlikely that the Awami League will heed this demand. This was the third time the election was taking place under an incumbent government. The first one took place in 1988 under the administration of General Ershad, and was rejected by all the political parties. The second was held in January 1996 under a BNP government, which too was rejected by the opposition. That led to the incorporation of a constitutional provision for a neutral caretaker government (CTG) to conduct the general elections. This provision was subsequently set aside through the 15th amendment to the Constitution after the CTG became controversial in 2006. The then ruling BNP wanted to make Chief Justice Hasan the Chief Advisor of the interim CTG. The military backed CTG then took over in January 2007 as massive street violence rocked the country due to disagreement between the two main political parties – AL and BNP – over the CTG. Bangladesh is yet to establish an Election Commission that is seen as neutral and non-partisan and which has the confidence of the opposition to conduct a neutral and credible election. Within the election commission there were divisions and disagreements between members.
As the Awami League celebrates its third consecutive term in power, the Kamal Hossain-led Jatiyo Oikyo Front has rejected the electoral verdict accusing the ruling party of large scale rigging. Yet, the Front does not have the strength to organize street protest. Many BNP workers are fighting cases of arson, killing, violating public order, terrorism etc. instituted against them by the police since 2014. Thousands have been arrested and are behind the bars. The BNP’s organizational structure is in shambles and it is difficult for the party to sustain any movement that could be long drawn and may lead to violence and state reprisal. The Jamaat has the cadres and strength even though many of its cadres have been arrested. But the question is who will give the leadership to anti-government agitation? If Kamal Hossain decides to give leadership, what will be his position on receiving support from the Jamaat for street battles? Many also argue that the government has complete support from the administration and law enforcement authority. A vested interest has already been created among those who have benefited from the AL rule, and it will be difficult for the opposition to break this. Development and political continuity (unnati r dhara) have their own advantage. At the moment, agitational politics may not succeed against the development story that the government has successfully weaved. People really do not have the stomach for violence, as evident from the violence unleashed by the opposition in 2015 which led to the death of nearly 150 people.
It remains to be seen whether AL in its third term will be able to address the issue of rampant corruption that has deeply permeated the governance structure as well as the issue of free speech that many believe the ICT Act has impaired. Another challenging task involves addressing the youth bulge and the demand for jobs. The Awami League needs to learn from the quota protest and the student protest to address the challenge of youth unrest.
Smruti S Pattanaik is currently affiliated to the Bangladesh Institute of International and Strategic Studies, Dhaka.
Bringing Capacity Building in Cybersecurity to the fore
Cherian Samuel
December 26, 2018
For a global build-up of cybersecurity, capacity building needs to be given much more importance than it has received till date.
The quest to create norms in cyberspace has again gathered steam, more than a year after the United Nations Group of Governmental Experts (UNGGE) process proved unable to arrive at a consensus report. This time around, two simultaneous mechanisms have been set in motion: a UN Group of Governmental Experts (UNGGE), like earlier, spearheaded by the United States and the Western allies; and, an Open-Ended Working Group (OEWG) led by Russia and China, and supported by a number of other countries. In the absence of any serious introspection on the part of governments over why the previous UN-led process failed, coupled with the fact that the new initiatives are likely to be competitive rather than complementary, it is hard to be optimistic that norms in cyberspace will materialise anytime soon.
The focus of the state-centric mechanisms such as the UNGGE has been on two tracks: confidence building and capacity building. Both come with their own legacy issues which indirectly impact their use in these mechanisms. Confidence building finds its origins in the Cold War era, when such measures were deemed necessary to reduce the possibilities of conflict between the two nuclear armed blocs. Much of the same discourse, terminology and presumptions have therefore seeped into confidence building measures a propos cyberspace and led to it being viewed through the same prism of conflict. One of the reasons for the collapse of the UNGGE process could be said to be its excessive focus on the security component in the deliberations and in the draft report. Whilst the goal was to arrive at confidence building measures, the existing atmosphere of suspicion and distrust meant that issues such as the rights of states in responding to cyber attacks and taking appropriate countermeasures were viewed by some countries as mechanisms to legitimise “unilateral punitive force actions” and covert attempts to “convert cyberspace into a theatre of military operations.”
Capacity building, on the other hand, has largely been associated with aid programmes and couched in the language of development. Discussions on capacity building have often revolved around issues of the responsibilities of “donor’’ and recipient’’ countries, the ability of recipient countries to absorb and utilise technical knowhow, finding sustainable sources of funding for capacity building efforts, and so on. The spending of resources to build up capacities in other countries has been justified on the grounds that this has considerable spin-off benefits in areas ranging from migration to security. Whilst this has largely been a one way flow in most areas, with the developed countries identifying successful policies, practices and ideas, and then adapting and sharing them with the less developed countries, it is a more equitable process in cybersecurity where no one country can claim to be truly secure. At the same time many of the dilemmas that have hobbled traditional capacity building can also be seen to be at play here, the foremost being that ‘donor” countries have their own priorities and perceptions of what they should pass on to recipient countries which might be completely irrelevant to the needs of latter. Consequently, like confidence building, capacity building has also been viewed with suspicion, seen by some as a tool of foreign policy, a means to advocate a particular model of governance, create market access for domestic companies, or promote specific technical standards.
The mandate of successive UN Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security has been to deliver consensus reports and recommendations to the First Committee of the United Nations which deals with disarmament and international security issues. Given these antecedents, it is but only natural for the UNGGE to concentrate on issues of security and to consider capacity building as an adjunct to confidence building. This is also reflected in the outcome reports of various UNGGEs. Whilst the 2015 Report expressed the “vital importance” of capacity building as a means to “bridge the divide in the security of ICTs and their use,” the preceding 2013 Report described capacity building as a key pillar in global efforts to “reduce risk and enhance security [and to] promote a peaceful, secure, open, and cooperative ICT environment.” Cyber -related issues have also been brought before the UN’s Third Committee, which deals with social, humanitarian and cultural issues. Most recently, Russia initiated a resolution on cybercrime, which was passed with 88 votes in favour, 55 against and 29 abstentions. Essentially, shifting cyber issues to another committee will not make the faultiness go away or shift focus to less contentious issues.
It goes without saying that for a global build-up of cybersecurity, capacity building needs to be given much more importance than it has received till date. The history of benign neglect of capacity building seems to be changing with a number of new initiatives coming to the fore, chief among them being the Global Forum of Cyber Expertise initiated by the Dutch Government under the London Process, which is possibly the first intergovernmental initiative solely dedicated to cybersecurity capacity building. Other initiatives have included the Global Cyber Security Capacity Centre in Oxford, which was set up by the British Government after the first Global Conference on Cyber Space (GCCS). Such initiatives allow countries to share experiences and expertise, an example being India’s Cyber Surakshit Bharat Initiative which has been shared with the GFCE.
Within the rubric of capacity building, the two most useful components are: 1) Maturity Assessments of various countries and even various sectors across countries; and, 2) Simulation Exercises of likely scenarios requiring emergency response. Maturity Assessments serve a variety of purposes; they enable benchmarking of capabilities, and allow policy makers to assess gaps in capabilities and decide priorities. While such exercises are being continually carried out by organisations at the global level, carrying out similar exercises at the regional level would enable countries at a largely similar level of maturity to assess requirements more realistically. Regional initiatives also have the advantage of avoiding any ideological creep and policy advocacy that are implicit in many of the global initiatives on capacity building.
The second component of capacity building, which is a natural corollary of Maturity Assessments, are simulation exercises of likely scenarios requiring emergency response. Again, more associated with confidence building rather than capacity building, it is a useful way to gauge available expertise, inefficiencies in information sharing, and other processes, and ultimately speed up cyber capacity building in countries since it would include cyber security response teams, national critical infrastructure and government agencies, and other stakeholders. It is also a useful bridge between policy makers and practitioners, taking a complex subject out of the conference room and into the operational arena, and enabling each to understand the other’s perspectives and constraints. When used across countries, it becomes both a confidence building as well as a capacity building mechanism with the added addition of enabling networking amongst networks and feeding into the global conversation on cybersecurity.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Cyber Security, United Nations, Global Initiatives
There is a need to close the perception gap in India’s assessment of the state of Chinese politics, to distinguish between transformation and conflict, and respond accordingly.
President Xi Jinping inherited a host of problems when he came to power in 2012: an economic slowdown, disruption of market supply by the all-powerful State-Owned Enterprises (SOE), bribery and extravagance among members of the Communist Party of China (CPC), and a bloated and inefficient military, all of which threatened the Party’s hold on power. Party members were also less ideologically cohesive, impacting the CPC’s unity. As a result, in 2013, Xi postulated the idea of ‘China Dream’, hoping that it would offer a blueprint for implementing reforms in a stagnating economy. The challenge however was that for the reforms to succeed, Xi wanted the very culture of the CPC to be transformed, especially its leadership, management and power structure. This stemmed from the belief of Xi and his supporters that Xi’s predecessor, Hu Jintao, was unable to implement reforms because he pacified the collective leadership to such an extent as to compromise on his policies.
Since Xi and his base believed that reforms would be difficult to implement because of a disinterested bureaucracy and vested interests, they wanted a strong ‘core leader’ in the mould of Deng Xiaoping. They considered both Jiang Zemin and Hu Jintao as weak leaders; the former let technocrats enter the CPC at the cost of ideology, and the latter did not exercise much power over the army. The struggle, it seems, was to extend the legitimacy of the CPC, which they believed had been compromised due to CPC officials forgetting the legacy of the Party’s rule and the ineptitude of officials in wasting public funds and engaging in “formalism” when asked to counter social problems. 1
Xi, unlike any of his predecessors, wanted to leave no room for negotiation, and continued to centralise power to prevent threats to his position from powerful constituencies opposed to his reforms. First, the idea was to use massive political education to make CPC cadres conform to his policies and use disciplinary actions to punish the unwilling.2 The anti-corruption investigations were pursued to break the symbiotic relationship between big business and politicians and introduce accountability at the management level. For Xi, unrelenting corruption within the Party had allowed members to amass massive wealth through bribery from businesses intending to curry favour for contracts or influence.3 It is equally true that Xi used these well-intentioned policies to purge many political opponents.
Political opposition in the Chinese system is one of the lesser-known complexities. Factions are divided on questions relating to legitimacy, reform tendencies, ideology and, importantly, how to usher China into the modern world. Xi and his supporters derive their legitimacy from being sons of the founding fathers of the revolution, known as “second-generation red” (红二代)”. Many of those targeted by Xi are children of high-level officials who have benefitted from China’s economic success, called “second-generation government officials (官二代)”. Predominantly, this latter group opposes Xi’s policies believing that it would disrupt ongoing reforms.
The difference of opinion between the two factions is subtle and nuanced. Both factions believe that the Chinese system as it exists is not conducive to produce further economic growth and stability. However, the disagreement seems to be the method through which these factions would want to reform the system. Xi and his base believe that market forces should decide supply and demand, meaning that the economic growth should not be determined by corrupt officials and vested interests that benefit from maintaining the existing production method, which has resulted in overproduction of goods in backdrop of slowing global demand and saturation in the real estate market. Xi wants to resolve this by micro-managing the economy and strengthening party ideology through his anti-corruption drive, whereas others believe that China should continue to reform the market and its political system.
In other words, these other factions believe that while China could maintain certain authoritarian traits, it does however need to bring more political and economic freedom than control. These reforms could be in breaking the monopoly of SOEs, protecting private entrepreneurs, enabling the Chinese public to address their social grievances through legal measures, and fundamentally reducing the role of state in economic decisions. Xi and his base believes that bringing these reforms without strengthening ideology and control of the CCP central authority would be the road to Western interference, leading to societal instability and corrupt practices. That the West would finally achieve the plundering of China through external pressure by using the call for political reforms that is built on Western values.4
However, Xi’s opponents were unable to oppose his anti-corruption drive, given that the Chinese public welcomed it. Only after the 19th Party Congress were they able to successfully capture the apprehension of rise of “personality cult” of Xi, comparing him to Mao Zedong. Secondly, Xi did not want the disadvantaged groups, such as military pensioners, rights activists, lawyers, intellectuals, etc, to coalesce into an effective opposition. Apprehensive of political factions, disadvantaged groups as well as Western countries which could possibly use such groups to spread criticism of his policies in the media and influence public opinion, Xi imposed widespread restrictions on freedom of speech and threatened punitive actions against the bureaucracy if it fell short in implementing his policies.
However, even with such widespread control, Xi was less than successful in implementing economic restructuring to change China from an investment-based economy into a consumption-based economy. Thus, Xi and his support base believed that the second term is too short a time period for Xi to finish the reform agenda, and nominating a successor would have only reduced his influence. Moreover, they believed that there were no strong leaders among the Standing Committee who could take the reins after Xi, who would push the Belt and Road Initiative required to shed their over-capacity. In the end, they decided to increase Xi’s advantage by eliminating the two-term limit for the presidency.
The addition of “Xi Jinping Thought” in the Chinese constitution might be construed as elevating and equating his views with those of Deng and Mao, but is quite acceptable in the Chinese communist system. In this system, bureaucrats and officials often take their cue from the proclamations and statements of leaders to determine the red lines that shall not be crossed. This is in fact a continuation of Deng’s practice and an efficient way for the Party leadership to exert pressure on the entire system to follow central policies. However, the difference seems to be that the restrictions among officials and cadres seem to be very strict and the penalties are higher. In fact, the recent disciplinary guidelines measures are considered as very harsh.5 Not only that, now one’s “self” has to emotionally and spiritually trust and serve the Party.6
Despite such measures, resistance to Xi’s reforms are plenty. Although Xi has substantially reduced the bureaucrats’ ability to misuse government funds, he has been less than successful in restructuring the economy. No one can doubt that Xi has emerged as a core leader and has dominated his rivals. However, comparing him to Mao could lead to the adoption of wrong policies towards China. While Xi has attempted to reorganise the Party under a ‘unified and centralised leadership’, his power is neither permanent nor absolute. The transformations in the Chinese system after the havoc created by Mao’s policies on the social, cultural, economic and political life of China have been fundamental.
Deng Xiaoping’s creation of a consensus system in the political institutions was an attestation of the vehement opposition to the Mao-style destructive politics. Xi cannot escape such systemic resistance unless he succeeds in further economic growth and success.7 Any wide-scale oppression would also bring resistance within the Chinese society who are used to loosening central government control after economic liberalisation and moved away from Mao’s political excesses. These are already visible in the resistance in elite universities, where students are supporting workers’ rights and opposing Mao-style repressive policies.8
Significance for India
In the wake of the India-China Annual Defence and Security Dialogue recently held in Beijing and the 21st Special Representative Talks in Chengdu, it would seem that temporary arrangements such as “post-Wuhan cooperation” and “intensifying efforts on border talks” will not be enough to mitigate the mistrust in the relationship post the Doklam crisis. There is a need to close the perception gap in India’s assessment of the state of Chinese politics, to distinguish between transformation and conflict and respond accordingly.
What is of significance to India is that Xi’s policies have led to a huge disruption in Chinese politics. He is under tremendous pressure to deliver and his strategy of centralising power does have enormous consequences. He faces questions about the legitimacy of his leadership from sections of society that are apprehensive of an increasingly intrusive CPC, intellectuals who fear the impact of lack of criticism on ill-conceived policies, bureaucrats who are not able to trade loyalties and favours, powerful SOEs dependent on massive loans, and political rivals.
Due to the politics of transformation in China, Xi would engage in intense diplomatic and economic engagement to offset his critics and worsening trade war with the US. While India-China high-level political relations had benefitted in changing the atmospherics through the Wuhan summit, the time is now ripe for capitalising on such overtures. India should leverage the Chinese need for deeper political engagement and explore possibilities for concessions of political nature from China.
At the same time, India should be wary of bilateral tensions being used as a stepping stone by various factions jostling for power in Chinese politics. Also, India should engage various centres of power in China by, for instance, initiating dialogue with political commissars from the Chinese military to improve military-to-military relations, and newly relevant organisations such as Ministry of Public Security, National Audit Office, Ministry of Water Resources, Ministry of Science and Technology, and various provincial governments.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
1. The leadership was very concerned with many issues within the CCP officials. One such was that the inefficiency of the Chinese officials to implement decision-making in a structured and efficient manner. Li Keqiang, China’s Premier Li Keqiang was famous for this criticism of officials that the departments were at constant conflict and the decision-making system was much delayed. His criticisms were known as “(Six Questions and Six Unknowns) 六问六不知”, where he described Chinese officials as lazy.
2. “Xi Jinping Delivered an Important Speech at the Second Plenary Session of the 18th Central Commission for Discipline Inspection” (习近平在十八届中央纪委二次全会上发表重要讲话), 22 January 2013, at http://cpc.people.com.cn/n/2013/0122/c64094-20289660.html. The theme of the speech was “More Scientific and Effective Prevention and Control of Corruption, Unswervingly Push the Construction of Anti-Corruption and Honesty” (更加科学有效地防治腐败 坚定不移把反腐倡廉建设引向深入). Also see this report, where Xi Jinping’s “Four Winds” (formalism, bureaucracy, hedonism, extravagance) are discussed. “Year is Approaching, These Xi Jinping’s Twenty Sentences Against “Four Winds” are Hard to Keep in Mind” (年关将至,习近平总书记这20句反"四风"硬话要牢记), 31 January 2018, CPC News, at http://fanfu.people.com.cn/n1/2018/0131/c64371-29796727.html
7. Katsuji Nakazawa, “Xi Cools his Jets as China’s Political Battle Extends to Autumn”, Nikkei Asian Review, August 23, 2018. Also see, Katsuji Nakazawa, “Xi Jinping Drops Surprise Hint Over Secret Feud”, Nikkei Asian Review,
BIMSTEC: An Unprecedented Opportunity for Collaboration and Cooperation in Cyberspace
Ashish Chhibbar
December 18, 2018
The BIMSTEC region offers tremendous opportunities in the field of cyber space. However, the full scope of digital dividend can only be harnessed if the countries of the region are able to get their act together and work as a team at the earliest.
The Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) is a regional grouping of seven countries i.e. Bangladesh, Bhutan, India, Myanmar, Nepal, Sri Lanka and Thailand that lie in the littoral and adjacent regions of the Bay of Bengal. Recently, the member countries got together in New Delhi to hold the first conference on cyber security cooperation from 05 to 07 December 2018.
The BIMSTEC region has a population of around 1.5 billion people, which constitutes nearly 22 per cent of the global population., The member states have a combined Gross Domestic Product (GDP) of US $ 2.7 trillion. The region is witnessing an exponential growth in internet usage and mobile telephony with social media, especially Facebook, having its largest user base from the region. It is therefore crucial that BIMSTEC takes an active part in various internet governance forums, promulgates best practices and cyber norms and works to ensure speedy build-up of cyber capacity and capability, transparent and quick information sharing, and coordinate their responses in fighting cyber-crime in the rapidly evolving cyber ecosystem of the region.
BIMSTEC Regional Cyberspace Ecosystem
As per Digital in 2018 yearbook, out of the total global population of 7.593 Billion (data as of January 2018), roughly 4.021 Billion (approximately 53 per cent of global population with an annual growth rate of 7 per cent) have access to internet with 3.196 Billion (42% of global population with an annual growth rate of 13%) being active social media users. There are 5.135 billion (68% of global population with an annual growth rate of 4%) unique mobile phone users in the world, a majority of them having the basic mobile handset without internet connectivity with an increasing large number migrating to smart phones with 3G and 4G mobile internet connectivity. Of these, the BIMSTEC countries account for nearly one fourth of the global internet population which is likely to grow in the near future. This is in spite of the fact that South Asia has a low internet penetration of 36 % (above only central and eastern Africa) against a global average of 53%.
The BIMSTEC countries also have the largest share of social media users in the world. Nearly 23% of active social media users (735 Million) are from the region. India has the second highest growth rate of social media users (31%) with the highest number of Facebook users (250,000,000). Bangkok and Dhaka respectively are the top two cities with the largest number of active Facebook users. These figures notwithstanding, social media penetration in South Asia still stands at 20% in against a global average of 42%.
The BIMSTEC region is the largest user of mobile phones in the worldwith 51% of unique mobile phone users (2.630 Billion). India, Nepal and Bhutan on an average generate 3.9 GB of monthly mobile data per smart phone against a global average of 2.9 GB. This is in contrast to the fact that the mobile internet speed in these countries is much below the global average of 21.3 MBPS.
Barring Thailand, which has a robust e-commerce penetration of 62%, the remaining countries of BIMSTEC region have a lower e-commerce penetration but, India with penetration of 26% is the fastest growing e-commerce market in the world. As the internet penetration increases with faster mobile data rates and a greater number of people migrate from basic mobile phones to smartphones, the e-commerce sector is bound to increase drastically and offers enormous opportunities for business and economy.
India has the second highest digital optimism in the world with 79% of the population believing that new technology offers more opportunity than risks. The majority of population living in the region have tremendous faith in internet and digital technology and believe that it is the engine for good governance, poverty alleviation, reducing corruption and providing prosperity to all.
However, even as the BIMSTEC region is at the cusp of a major internet and mobile telephony transformation, its poor literacy rates make the population susceptible to cyber-crime, data thefts, identity frauds and propagation of rumours and fake news - against a global average of female (80%) and male (88%) literacy rate, South Asia has a corresponding literacy rate of 61% (female) and 78%(male).
Cyber Security and Future Trajectory of Cyber-Crime in the BIMSTEC Region
The International Telecommunication Union (ITU) publishes a yearly Global Cyber Security Index as a measure of the commitment of countries to cyber security. The Global Cyber Security Index of 2017 featured 134 countries with Bangladesh securing 53, Bhutan 109, India 23, Myanmar 99, Nepal 93, Sri Lanka 71 and Thailand 22 rank. It is evident that the overall cyber security posture of the region is poor and much needs to be done towards building a safer cyber environment which assumes even greater importance as the region is moving towards greater internet and mobile penetration.
The estimated global cyber-crime revenue in 2018 is around US $ 1.5 Trillion. Of this, illegal online market (U $ 860 Billion), trade secret & online theft (US $500 billion) and data trading (US $ 160 Billion) will be the top earners with negligible revenue being roped in by crime-ware (US$1.6 Billion) and ransomware (US$1 Billion). The above is a good indicator of the future global trajectory of cyber-crime.
As per a white paper “2018 Current State of Cyber Crime”, cyber crime has shifted from web based attacks to mobile phone based attacks as more and more people migrate to smart phones for carrying out banking, e-commerce and other financial transactions. The BIMSTEC region with the largest share of mobile phone users in the world is particularly susceptible to these crimes and frauds primarily due to low cyber security posture coupled with large population of digital illiterates entering the e-commerce and digital banking sector for the first time.
It has also been brought out that due to the massive data breaches in the last two years, there is a growing market of illegal sale of non-financial personal credentials with a 70% growth in the visible fraud activity on social media platforms. Again, the region is likely to witness unauthorised harvesting of private digital data being the largest users of social media platforms.
Conclusion
The BIMSTEC region is witnessing an explosive growth in cyber space infrastructure coupled with a growing number of first-time users of cyber space and e-commerce. In order to fully exploit the digital dividend, it is imperative that the member countries collaborate and cooperate to ensure rapid cyber capacity and capability building, exchange of skilled manpower, development of a regional cyber eco system and joint representation at international internet and mobile telephony governance councils and bodies. Secondly, mass cyber education drives need to be undertaken to educate and protect the interests of the population especially those who will be joining the internet and undertaking e-commerce activities for the first time. Thirdly, the ICT companies need to recognise the immense potential of the BIMSTEC region and participate whole heartedly in nation building and improving the national security environment as a whole. And lastly, intelligence and law enforcement agencies of the BIMSTEC region need to seamlessly cooperate with each other for intelligence sharing, combating crime and maintaining a highly resilient and safe cyber environment.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Paris Call could be seen as a positive step towards finding a middle path between Western democracies and authoritarian regimes on the issue of cyber governance.
Internet today has become a pivot on which the modern life hinges. It has completely altered the way people live, share and work. Internet has opened the door to myriad opportunities and advances, but at the same time made people vulnerable to several threats. Events such as Petya/Not Petya and Wannacry ransomware attacks have not only debilitated institutions and caused considerable financial losses, but also have serious and adverse consequences for the international and national security, global economy, democratic processes, and the security, safety and privacy of individuals. The transnational characteristic of these threats is a source of grave conundrum among the nation states. This has brought to forefront the need to have some sort of common rules and regulations to govern the cyberspace.
In this context, on November 12, 2018, at the UNESCO Internet Governance Forum (IGF) meeting held in Paris, the French President Emmanuel Macron commenced “The Paris Call for Trust and Security in Cyberspace.”1 This high-level declaration on “developing common principles for securing cyberspace” has the support of various major private companies and civil society groups. Even many of the states participating in the forum have fully supported the Paris Call.
Major principles articulated in the Paris Call document talks about protecting the integrity and accessibility of the internet while preventing nefarious activities online and building resilience. The report that was released during the IGF also talks about preventing proliferation of malicious online programmes and promoting multilateral cooperation in order to prevent interference in electoral processes.
Interestingly, the Paris Call also highlights the importance of “cyber hygiene”, a term rarely used in the cyber parlance. Cyber hygiene is often equated with personal hygiene, where, just as the latter is concerned with the well-being and good health of a person, the former connotes data protection and safety. This can be ensured by following basic best practices like regularly changing the passwords, updating the software as well as the hardware, using licensed software, backing up the data regularly, etc. Thus, having a routine cyber hygiene in place for computers and software is beneficial for both “maintenance” and “security” of the system.2
What’s New?
IGF’s call for trust and security in the cyberspace is not the sole initiative on the subject. In 2013, a Group of Governmental Experts (GGE) at the UN came to a consensus that international laws that govern state behaviour in the international setting should also be extended to the cyberspace. In 2015, the same group charted four peace time norms in the cyberspace, which stated that “states should not interfere with each other’s critical infrastructure; they should assist other nations investigating cyberattacks; they should not target each other’s computer emergency response teams; and they are responsible for actions that originate from their territory.” 3
However, the application of international law in the cyberspace has itself become a major debating point. The United States (US) strongly promotes the stated peacetime norms especially when it comes to exercising the inherent right of self-defense and the law of state responsibility, including countermeasures in the cyberspace. It also stresses on creating a new and closed group of Governmental Experts (something akin to the UN Committee on the Peaceful Uses of Outer Space which has guided the adoption of a series of treaties and principles). However, both Russia and China oppose the US idea of forming a new group as they believe that it could be an exclusive club driven only by the US interest. China does not concur with the application of international law in general, rather it stresses on the importance of sovereignty in the cyberspace. Russia on the other hand talks about an open ended working group which would be more inclusive. Thus, increasing the legitimacy but also likely exacerbating the existing obstacles to forging consensus on the issue. Russia’s major concern has been the discussion about countermeasures. As Russia has been named in the hacking of computer network of the Democratic National Committee (DNC) and many other such nefarious cyber activities, Moscow feels that countermeasures may justify the US means of actions for hacking and information operations. 4
Interestingly, many states are of the opinion that the emerging binary model – a “complete self-management, without governance” (the US model) and “compartmented internet, entirely monitored by strong authoritarian states” (the Beijing model) – only caters to the needs of the US and China, respectively.5 The differences in the two models have made consensus building among member states a major challenge. Thus, Paris Call presents itself as a new “collegial method”, or rather a middle ground that would encapsulate not only the member states but also private entities and the civil society. It could also be seen as an effort to end the international deadlock. The fundamental idea behind Paris Call has been to further the already existing institutions to “limit hacking and destabilising activities” in the cyberspace by formulating an all-encompassing multi-stakeholder model that gives due importance to the private entities rather than trying to establish new institutions.
Signatories and Absentees
More than 190 signatures were obtained on the Paris Call, out of which 130 were of the private sector, 90 of the charitable groups and more than 50 of the member nations.6 Although majority of signatories are European countries, one cannot overlook the inclusion of other major countries including Qatar, Mexico, New-Zealand, South Korea, Colombia, Japan, Morocco, Canada and Senegal.7 Ironically, while several major American technologies like Facebook, Microsoft, Google, International Business Machines (IBM) Corporation and Hewlett-Packard (HP) have endorsed the agreement, the US itself took a pass at the deal.8 Even the Kaspersky Lab that was accused of assisting Russia’s hacking effort has signed. Other major players who did not sign the document were China, North Korea, Russia, Iran, Israel, Saudi Arabia and Australia despite the fact that the former four countries have an active cyberwarfare programme.9
Conclusion
Norms building especially in the arena of global commons has been a complex issue. Paris Call, in this context, could be seen as a positive step towards finding a middle path between Western democracies and authoritarian regimes so as to build some form of consensus on issues pertaining to cyberspace. Active participation of private players indicate how tech corporations are playing a crucial role in governing the internet.
However, one cannot deny that the Paris Call failed to put in place the “compliance” mechanism. It does not require governments or corporations legally to adhere to any specific principle. Moreover, this agreement failed to bring major players on board especially the US, China and Russia. This can be attributed to the fact that major players want their own interests and agendas to be forwarded. Many such initiatives have earlier failed to garner popular support across the international community due to divided political objectives. Nevertheless, Paris Call should be seen as a new means to achieve the long-term objectives of securing the cyberspace. By gaining support from top American tech-firms and emerging powers, it seems that Paris Call is here to stay though its impact will depend on the effectiveness of the measures it takes in the foreseeable future.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
With increasing advances in artificial intelligence technologies and machine learning, a new era of deep fakes has emerged, which has the potential to weaken the fabric of democratic society.
Seeing is not always believing, especially so in the Information Age. Information today is being twisted and tweaked to such an extent that segregating facts from fiction would actually need thorough research. Social media has always been ransacked with fake news, via Whatsapp messages or Facebook or Instagram posts. Indeed, fake news has been on the forefront of creating communal divides, enhancing disturbances in sensitive regions, radicalising individuals and tainting reputations.
With increasing advances in artificial Intelligence (AI) technologies and machine learning, a new era of ‘deep fakes’ has emerged. Deep fake technology employs AI based image blending methods to seemingly create real fakes and deceptive videos. This makes differentiating fake from real even more cumbersome and complex. Fake celebrity footages, propaganda videos or revenge porn are all outcomes of the deep fake technology.
Understanding Deep Fakes
Source: Alan Zuconi, “Understanding Deep Fakes,” Machine Learning, March 14, 2018
The figure shows a face being sent through an encoder. This encoder is used to create a latent face or a lower dimensional representation of the face. While the latent face will have similar features of the original face, it could be trained for subtle alterations. Training here implies modifying the neural networks (via optimizing its weights) to get desired results. This reconstruction takes place via a decoder. As the programmer has total control over the network’s shape, one can accordingly reconfigure the number of layers, nodes per layer and its interconnectivity. The real mantra of altering image A to B is on the edges of the nodes that connect them. Each edge has some weights, and to find the right weight to ensure that the auto-encoder is able to generate desired results is actually a time consuming process.
Source: Alan Zuconi, “Understanding Deep Fakes,” Machine Learning, March 14, 2018"
In case of face swap, as shown in figure 2, one can pass the latent face of image A to that of decoder B and then decoder B would try to reconstruct the face with the information relative to the image A. Thus, it will re-create an image akin to that of the original but with modifications so intricate that it would be hard to distinguish.
The Dangers
Deep fakes can be used to target people of interest or general public depending on the ulterior motive. The former may be targeted for public trolling or for gaining cheap revenge while the latter can be targeted for garnering false public support, and to achieve cyber propaganda. The potential threat of deep fakes is that it can be used to heavily influence elections or trigger disinformation campaigns. Deep fakes can create trust issues in an already polarised political environment. These deep fakes could actually be misused by anyone at any point of time.
In a sampler presented by Jordan Peele done in association with Buzzfeed, Jordan ventriloquizes the former president of America, Barack Obama, where Obama could be seen talking about random stuff in the video. It is so real that one could easily be convinced that it is authentic. Now imagine a video surfacing online showing a potential candidate talking gibberish or involved in an unethical activity, days before an election. Such an instance would not only take a hit on his supporters but also lead to further confusion and clashes. In fact, many fake videos can be found online of prominent personalities, leaders, many actors and actresses. These days, free applications with user friendly means to swap faces or create fake videos are available online like FakeApp (an easy to use platform for making forged media). Easy availability of such tools exacerbates the issue of deep fakes.
Cyber stalkers can also misuse the technology if someone denies giving into their desires and wants. Just as an online image is sufficient for a teenager to create a false, derogatory video of his love interest and spread it around, thus adding on to the emotional and mental stress of the individual. Another use of deep fakes could be in illegally unlocking smart devices, with the face detection technology getting imbibed in most of the smart devices and even for smart locks. This can lead to misuse of data or even identity thefts.
The Way Ahead
With the growing dangers of deep fakes, researchers have come up with measures that can help spot these deep fakes. One of the means of doing so, as adopted by Apple Iphones, is live face detection, that is, the phone camera detects an actual face as opposed to photographs or videos. Another means of detecting a fake video is via closely looking at the background activities and liveliness. A real video would generate more metadata due to background activities than one that is morphed. One can also protect the videos from being misused by “watermarking” them. It’s like a digital hologram that can actually aid in distinguishing the real from the fake.
The technology for detecting deep fakes is only a means to predict if the video is authentic or not. However, with the plethora of videos and photographs available online, it becomes a Herculean task for authorities to check each and every video for its authenticity. Therefore, the civil society should be made aware to assess the credibility of the source regarding any video or voice clip. It is important to train citizens and make them more prepared and resilient to disinformation campaigns.
A major obstacle in countering fake news has been the lack of laws on the same. Disinformation is not a crime in a democracy. However, increasing menace of deep fakes may lead governments to take preventive measures like content based regulation. This may of course create another dilemma pertaining to individual’s rights versus security. In the coming days, deep fakes are expected to see an exponential rise. It is important to understand that deep fakes could be weaponized in ways that could weaken the fabric of democratic society itself.
Hence, it is essential that governments start investing in effective preventive measures for countering deep fakes. Building a strong AI and deep learning resource base that can stand at the forefront of fighting fakes as well as deep fakes should be the starting point of such actions. Additionally, individual websites and private players should keep a track on the authentication of the content that is being uploaded or circulated. Similarly, individuals should take cognizance of the threat these deep fakes pose and should verify any content before forwarding it. Unless the government, industry and civil society comes together to tackle this menace, deep fakes would remain a difficult cat to bell.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
With John Bolton conceding that the US has limited resources to compete with the tens of billions of dollars that China is pouring into Africa, it is not clear how effective America’s new Africa strategy would prove to be in containing China.
The United States finds its position increasingly challenged by two emerging powers with global ambitions, China and Russia. This rivalry now threatens to engulf the continent of Africa as well. China has expanded its economic interests in Africa even as the US and European countries pulled back from the continent. During the last one decade, China has become the largest trading partner of Africa. Punching above its weight, Russia has also joined the competition and its presence in the continent, which was dormant after World War II, now extends from the Central African Republic (CAR) to Eritrea.1 In response to this new geo-strategic competition, the US has recently devised a new ‘Africa strategy’
The sudden collapse of the Soviet Union had left the US without any rival. As a result, in the post-Cold War era, every year from 1994 to 2001, the US considered terrorism as a significant danger to its national security.2 By 1998, terrorism ranked in the top tier of threats for the US, along with other transnational dangers such as the proliferation of weapons of mass destruction. In February 2001, seven months before September 11, the Director of Central Intelligence (DCI) testified that terrorism was the single greatest threat to US national security.3 That belief, which was strengthened by the September 11 attacks and the War on Terror that the US waged thereafter, is now changing. There seems to be a consensus among both Republicans and Democrats that China poses a more immediate threat to US interests and its security than anything else.
This change in the source of threat perception is now getting reflected in changes being effected in American policy. The US is now trying to counter China through various means and in various regions. One of the largest battle grounds is likely to be Africa. In 2017, China established its first overseas military base in Djibouti. The Chinese military base is in close vicinity of the US base in Djibouti which had been established earlier to aid counter terror operations in Africa.
Speaking at the Washington-based conservative think tank, the Heritage Foundation, on 13 December 2018, the US National Security Adviser John Bolton said that in Africa the greatest threat is not from poverty or Islamic extremism but from the expansionist policies of China and Russia. He accused these countries of deliberately and aggressively targeting investments in the continent to gain a competitive advantage over the United States. He also alleged that China was using bribes, opaque agreements and the strategic use of debt to make African states comply with its wishes and demands. According to Bolton, China’s ultimate goal of using its predatory influence over Africa to advance its global dominance would ultimately leave the continent in a far worse shape. Bolton also accused Russia of seeking to increase its influence in Africa by advancing political and economic relationships with little regard for the rule of law or accountable and transparent governance. He also blamed Russia for continuing to sell arms and energy in exchange for votes in the United Nations and claimed that both China and Russia were extracting resources from the region for their own benefit.
This has led to the Trump administration’s framing of a new Africa strategy whereby it plans to give more attention to the African continent. The new Africa strategy is designed to benefit both America as well as Africa. Bolton stated that under “our new approach, every decision we make, every policy we pursue, and every dollar of aid we spend will further US priorities in the region." The new strategy is expected to bring new jobs to America by increasing trade with Africa, which, in turn, would also be beneficial for the African people. In short, it is transactional in nature.
Under its new Africa Strategy, the US now also wants to re-evaluate its engagement in UN peacekeeping operations in the continent and discontinue the ineffective ones. It also says that America would no longer provide indiscriminate assistance to all African countries. Instead, it would select its partners on the basis of their voting patterns in the United Nations. It would also not support countries that are governed by corrupt leaders who just siphon off money as a result of which benefit flows to the people.
The new US strategy, to a large measure, is also designed to counter growing Chinese influence on the continent. As part of this policy, the Trump administration in October 2018 decided to create a US International Development Finance Corporation (IDFC) with a funding of $ 60 billion. This would provide loan and risk insurance to American companies to make it easier for them to invest in Africa. However, this American plan pales into insignificance when compared with the Chinese plan to spend $60 billion over the next three years.
The US also wants African nations to take ownership over peace and security in their neighbourhood. However, this approach of the US has not worked in the case of Iraq and Afghanistan. African nations need sufficient stability to attract foreign investment, which they are incapable of achieving in the near future on their own. Also, many African leaders who are perceived to be corrupt prefer Chinese economic assistance as it does not ask uncomfortable questions about the rule of law, democracy and human rights. Moreover, Bolton has himself conceded that the US has limited resources to compete with the tens of billions of dollars that China is pouring into Africa. In this situation, it is not very clear how effective America’s new strategy would be in Africa in containing China. But it has definitely made African people worried that their continent might be used to advance the agenda of major global powers.
Dr Anand Kumar is currently Visiting Professor and Chair (India Studies) at the Department of Political Science and Public Administration, University of Dar-es-Salaam, Tanzania
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Political Science Quarterly, Vol. 121, No. 1 (Spring 2006), p. 40.
In the light of Trump’s decision to withdraw US troops from Syria, Ankara has adopted a cautious approach towards the Syrian Kurds and has decided to take Moscow’s concerns into account before making any move in northern Syria.
President Donald Trump’s December 19, 2018 decision to withdraw US troops from Syria received a euphoric response in Turkey. That was not surprising since the US military presence and support for the Kurdish Democratic Union Party (PYD) and its armed wing the People’s Protection Unit (YPG) has been a source of friction between Washington and Ankara. A week before the US announcement, President Recep Tayyip Erdogan had threatened to launch a military operation in northern Syria to decimate the YPG, which Turkey considers a terrorist organization. In fact, on December 17, Erdogan had said that Turkey is ready to launch an operation “at any moment” to take control of Manbij, a city in northern Syria currently under the control of the US-supported Syrian Democratic Forces (SDF). He had also claimed that Trump has given a “positive response” to this Turkish plan.
Its initial reaction notwithstanding, the US announcement has forced Turkey to take a cautious view of the implications of the withdrawal of US troops. This is because Turkey has to take into account the views of other stakeholders, namely, Russia, Iran, the Assad regime and even the Free Syrian Army (FSA) which it supports. Consequently, on December 21, Erdogan announced the postponement of the military operation in Manbij. Explaining his rationale for the postponement, he said Turkey wants to “see on the ground the result of America’s decision to withdraw from Syria.” Though Erdogan asserted that it is not an “open-ended wait,” another Turkish military offensive in Syria could prove counterproductive in the given situation. Significantly, on December 31, 2018, Trump tweeted that the withdrawal of US troops from Syria will be carried out “slowly.” Reportedly, the final US withdrawal can take up to months, and Turkey will have to consider the full implications of the ensuing vacuum before making any move.
The Russian and Iranian positions in Syria have gained a significant boost due to Trump’s decision to withdraw US forces. Bashar al-Assad’s position has also become stronger. Both Russia and Iran support Assad’s position that the entire Syrian territory should come under his control before any political process can start. There are, however, differences on the Kurdish question between Russia, on the one hand, and Iran and the Assad regime, on the other. President Vladimir Putin is more amenable to having a federal structure to address Kurdish claims for self-determination. But this is not acceptable to Assad and Iran, whose priority is re-establishing the regime’s sovereign control over all the territory of Syria.
For Turkey, the Kurdish question is critical. It is more agreeable to the Iran and Syrian regime’s position on the Kurds because it sees any legalization of Kurdish control in northern Syria as detrimental to Turkish national security. Erdogan wants an immediate end to Kurdish control in northern Syria, and instead prefers a larger role for the FSA which is dominated by Turkmen and Sunni Arabs. This is, however, not acceptable to either Russia or Iran, which favour the Assad regime to take control of areas vacated by the US troops.
Turkey cannot proceed on its planned “East of the Euphrates” operation due to the Russian opposition and the likelihood of clashes with Syrian regime forces as well as with the SDF. This has forced Ankara to send a high level delegation comprising Defence Minister Hulusi Akar, Foreign Minister Cavusoglu, Intelligence Chief Hakan Fidan and presidential adviser Ibrahim Kalin to Moscow to discuss the way forward. The Russian position on the issue has been consistent. Before the arrival of the delegation, the spokeswoman of Russia’s Ministry of Foreign Affairs, Maria Zakharova, stated that “in accordance with international law and considering the path that Syria and the Syrian people have traveled down,” the Syrian government should inherit the control of the areas vacated by US forces. Media reports suggest that, with Russian consent, the Assad regime and SDF have entered into an understanding to coordinate the post-US withdrawal situation in Manbij, thereby thwarting Turkish plans.
Even though Turkish analysts are hopeful of a positive outcome to the delegation level meetings in Moscow and have argued that geopolitics is in Turkey’s favour because of US support and close cooperation with Russia, Erdogan is more cautious. Both Russia and Turkey have come a long way from the time when, in September 2015, Turkey had shot down a Russian warplane. The Russian-Turkish rapprochement has taken serious strides, with the two, along with Iran, working to find a peaceful solution in Syria. This was instrumental in easing tensions in Syria, the establishment of the de-escalation zones under the Astana process, and finding a way to resolve the differences over Idlib. In September 2018, Ankara and Moscow had agreed to establish de-militarised zones in Idlib to avoid a Syrian regime offensive against the rebel-held enclave. Furthermore, Turkey, during its past military operations in Syria, including Euphrates Shield (August 2016-March 2017) and the Afrin offensive (January-February 2018), has coordinated with Russia.
Their growing cooperation in Syria have led to Moscow and Ankara moving to strengthen economic ties, especially in the area of energy cooperation. In November 2018, Putin and Erdogan jointly inaugurated the sea section of TurkStream, a gas pipeline to supply natural gas from Turkmenistan to Europe and Turkey through the Black Sea. The project is being helmed by the Russian energy giant Gazprom and is expected to be ready to supply gas to Turkey by the end of 2019. Turkey, which is going through a difficult economic crisis and is dependent on imports for energy security, cannot afford to antagonise Russia.
Though Turkey’s Defence Minister has said that its armed forces will decimate the Kurdish terrorists, that is, SDF and YPG, Moscow is unlikely to give the green signal for a full-fledged Turkish offensive. The emerging scenario in northern Syria due to the planned US military withdrawal is yet to become completely clear. While Syrian Kurds seem to have lost a crucial supporter in the US, they might move closer to Russia. In such a scenario, and if they seek a political solution within the framework of the Astana process, it is unlikely that Ankara will be allowed to take control of the areas vacated by the US. Erdogan is well aware of the emerging dynamics and is treading a fine line between managing relations with the US, Turkey’s perceived security threats and Russian concerns over the Syrian peace process.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
The Global Compact for Safe, Orderly and Regular Migration embodies the international community’s collective commitments to promoting cooperation on migration and solve the growing migrant crisis.
At an intergovernmental conference convened under the auspices of the United Nations in Marrakesh, Morocco, 164 nations adopted a pact on 10 December 2018 to manage the global migration crisis. The 'Global Compact for Safe, Orderly and Regular Migration' is the first, intergovernmental agreement that covers all dimensions of global migration. The legally non-binding pact aims to promote efforts to strengthen regular migration pathways and protect the human rights of migrants. Its objectives and commitments provide states and international agencies a means to coordinate migration policies and ensure that migration works for all. However, on the flip side, the non-participation of some important countries raises questions about the future of the pact.
Why a Global Compact
The last few decades have experienced massive population shifts across the globe. The conflicts in West Asia, Africa and South America, and the extreme violence associated with them have forced people to leave their homes and seek a haven in foreign countries. In addition, climate change effects also contributed to the growing number of migrants and refugees. According to the United Nations, approximately 258 million migrants around the world are living outside their country of birth. Out of these, around 68 million are in the “forcibly displaced” category, more than at any time in the recorded history of the modern world. Since 2000, the number of global migrants has grown by 49 per cent, from 2.8 to 3.4 per cent of the global population. The UN data also shows that, since then, more than 60,000 migrants have lost their lives while on the move.
On the other side, resentment against migrants has intensified across the globe, particularly in Europe and the United States. Though the global migrant population constitutes merely 3.4 per cent of the world’s population, burgeoning protests against migrants have created a wider perception that migrants are threats to national economies. The rising tide of resentment in these countries has also produced the impression that most migrants are settled in the developed world whereas the reality is otherwise. Studies show that the developing world hosts more than half of the global migrant population and that migrants have contributed to the development of both sending and hosting countries.
Against this backdrop, recognizing the need for enhanced international cooperation and a comprehensive approach to the issue of migrants, all the 193 members of the UN adopted a resolution called New York Declaration in September 2016. The resolution demanded the protection of the ‘safety, dignity human rights and fundamental freedoms of all migrants, regardless of their migratory status.’ Combating racism, xenophobia and discrimination towards migrants, supporting the host countries, and developing non-binding principles and guidelines for treatment of migrants were the other proposals of the declaration. In addition, the New York declaration recommended two global compacts: a global compact on refugees and a global compact for safe, orderly and regular migration.
Deliberations and Stocktaking
As proposed by the New York Declaration, elaboration of the Global Compact for Migration took place in three phases; consultation, stocktaking, and negotiation. The first phase involving six rounds of informal thematic sessions, which aimed to gather substantive inputs and recommendations for the Global Compact, was held between April and December 2017. The human rights of migrants, drivers of migration, irregular migration, international cooperation, smuggling and trafficking, and contribution of migrants were the main foci of these deliberations. In addition, five UN regional consultations (Africa, Asia and Pacific, Latin America, the Caribbean, and Western Asia), multi-stakeholder hearings, and regional civil society consultations also took place in 2017.
Subsequently, the stocktaking phase reviewed and analysed the information gathered during the consultations. The meeting provided “a platform for delegations and other stakeholders to jointly shape a vision for the Compact and collectively identify actionable commitments as well as respective means of implementation and partnerships the Compact may include.” The outcome was a 'Zero Draft' jointly prepared by Mexico and Switzerland, the co-facilitators of the process. Finally, the third phase, intergovernmental negotiations began with the release of the draft in February 2018 and ended with its finalization in July 2018. The final draft, which was agreed to by all 193 members of the UN, has four sections: vision and guiding principles, objectives and commitments, implementation, and follow up.
Objectives and Commitments
The Global Compact aims to ensure that migration 'works for all' by setting out a common understanding and shared responsibilities. It strives to foster international cooperation among “all relevant actors on migration, acknowledging that no State can address migration alone, and upholds the sovereignty of States and their obligations under international law.” Its central principles are people-centredness, national sovereignty, international cooperation, rule of law and sustainable development. The 23 objectives of the Compact seek to minimize the factors which force people to leave their country, ensure legal identity and documentation, provide regular pathways, eradicate trafficking, and facilitate return and readmission of all migrants. Moreover, to achieve these objectives, it spelt out 187 actions and many commitments.
Source: refugeesmigrants.un.org
One of the positive aspects of the Global Compact is the framing of migration in the logic of development. The significant case against migration has been the perceived negative economic impact on host countries. However, migrants spend 85 per cent of their earnings in their host communities. Similarly, migrants across the globe sent approximately USD 600 billion in remittances in 2017, which is three times higher than the global Overseas Development Assistance (ODA). In this way, migrants contribute to the development of both the country of origin and host states. By accepting this known but concealed fact and developing policies to utilize the potential of migrants, the Global Compact aims to minimize the global resentments against migration. The Compact also states that it is rooted in the 2030 Agenda for Sustainable Development.
In addition, the Global Compact puts the rights of migrant women and children at its heart by mainstreaming a gender perspective. Among the 258 million migrants around the world, more than 50 per cent are women and girls. Moreover, women constitute 74 per cent of international migrant domestic workers. The Compact has two guiding principles that articulate the need for ‘gender-responsive’ and ‘child-sensitive’ migration policies. Moreover, many of its objectives and commitments argue for ‘gender equality and the empowerment of women and girls.’ Terms such as 'gender-responsive'/'gender-equality' or 'gender-based violence' appear 29 times in the 34-page document. Similarly, the Compact aims to enhance global cooperation to reduce migration-related deaths, and in combating smuggling and trafficking, all of which are priorities for any government.
Climate change is another global problem contributing to the migration crisis The Global Compact recognizes climate change as a driver for migration and lays out a framework for dealing with it. According to the World Bank, around 143 million people, especially in the developing world, could be forced to relocate within their countries by 2050. Another study shows that about 2 billion people may become climate change refugees by 2100. The Compact proposes building a Platform on Disaster Displacement” and developing an 'Agenda for the Protection of Cross-Border Displaced Persons in the Context of Disasters and Climate Change' to address the issue.
Prospects and Challenges
With its comprehensive approach to migrants and their problems, the Global Compact for Migration provides both opportunities and challenges. First, it puts forth a balanced approach by framing goals that correspond to the interests of different stakeholders. For instance, while Objective 20, promoting the transfer of remittances, serves the interest of states of origin, Objective 21, facilitating return and readmission, satisfies the receiving countries. While respecting national sovereignty and international law, the Compact acknowledges the prerogative of States to decide who they allow onto their territory. It, therefore, provides for enhanced cooperation among states to manage global migration.
Second, migration, provided it can be monitored appropriately, can positively contribute to the development of both the countries of origin and the host. However, fear of the outsider has created massive popular sentiments against migrants in host nations. s. The Global Compact helps to dispel these fears by giving preference to evidence-based policies through data collection and accurate information about migrants. This approach will be helpful in dispelling misguided and xenophobic policies, particularly in Europe and the United States. Proper implementation of the objectives of the Compact will ensure that migration works for all and contribute to solving the global migration crisis. The adoption of the Compact by New Zealand just a few days after the Marrakech Conference shows that the Compact is finding resonance and acceptability and is a step in the right direction.
Third, many see the non-binding nature of the Global Compact as a challenge and the most significant limitation. They fear that the Compact will be just another talking shop without making any real difference to the migration problem. However, in international politics, distinction between binding texts (hard law) and non-binding texts (soft law) is minimal because the parties, i.e., the states themselves, enforce both types of agreements. Moreover, soft law also ensures the support of the maximum number of members and a fast process since it usually does not require voting in domestic parliaments. None of the objectives or commitments of the Compact imposes any new obligation on the signatories. Instead, it reiterates the existing treaties and conventions. Issues with hard law can be seen in the approach of the UN member states towards the 1951 Refugee Convention, a legally binding document. Even after six decades of its adoption, more than 50 countries are yet to sign the agreement.
The most significant challenges before the Compact lie in its implementation and in the many significant countries that have not signed up to it. The refusal of many countries, including the United States, Australia and Hungary, to adopt the Compact corresponds with the rise of populism and anti-immigrant sentiments across the globe. These countries view the adoption of the Compact as an instance of surrender of sovereignty. Addressing the gap between reality and perception about migration and migrants will be a great challenge before the Compact in the coming years. Finally, the Compact does not talk about who will coordinate, monitor and fund its implementation. Since member states are responsible for implementation, they will have to do much more than mere reviews and occasional follow up in order to achieve the goals of the Compact.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Trump seems to have reconciled himself to the fact that Afghanistan may become an ‘Islamic Emirate of Taliban’ with Sharia Law being imposed with or without the consent of the people.
Following the September 11, 2001 attacks, the US, supported by its western allies, invaded Afghanistan with the stated aim of dismantling the Al Qaeda network, removing Taliban from power and creating a viable democratic state to deny terrorists a base to recruit, train and operate from. 17 years later, after having spent more than a trillion dollars and the death of tens of thousands, violence continues unabated in an inconclusive war in Afghanistan. Unmindful of the violence that continues to be unleashed by the Taliban to maintain pressure, Washington has initiated the process for a dialogue with the terror outfit. Now, it has abruptly announced the withdrawal of 7000 of its 14000 troops deployed in Afghanistan, possibly to convince the Taliban that it is serious about withdrawing its forces.
It is ironical that the US, much against its touted principle of no talks with terrorists, is now seeking the Taliban’s cooperation to end the war and is probably willing to accommodate the terror group within Afghanistan’s power structure, giving an impression that it is desperate to extricate itself. Needless to say, with the 2020 Presidential elections fast approaching, Trump is keen on fulfilling his election promise to end the war in Afghanistan. The Taliban has not responded to the US announcement of partial withdrawal. Instead, in an arrogant message, it has warned the US that if it did not leave Afghanistan it would meet the same fate as the erstwhile Soviet Union.
Taliban’s Stance
The Taliban has been consistent in this stand, having maintained an upper hand militarily. According to the latest quarterly report of the US Congress created office of the Afghanistan Special Inspector General for Afghanistan Reconstruction (SIGAR), as of July 31, 2018, the government of Afghanistan has uncontested control over only 56 percent of the territory, while 32 per cent is contested.
Speaking to reporters in Moscow, Sher Mohammad Abbas Stanikzai, a Taliban representative who attended the Russia-organised meeting on November 09, 2018 on peace in Afghanistan, said: “Our demand for the peace process has two parts, the first part is with Americans; all those matters which are related to Americans like the withdrawal of their forces, the black list and officially recognizing our political office (in Qatar) and other issues which are related to the Americans; they should be discussed with the Americans; they should be discussed with America on the table. And, “Those matters which are related to the Afghan side which are mostly internal affairs like the future government, the constitution and there are many other issues; can be discussed with the Afghan side.” He also stated that the Taliban does not consider the current government in Afghanistan as legitimate.
The Taliban’s demands for peace in Afghanistan have been that all foreign troops must leave, full Islamic law and customs must be implemented, and the political system must not conflict with the Sharia. Wahid Mojdah, an analyst and former diplomatic aide under the Taliban regime from 1999 to 2001 says that the Taliban is not in a hurry and their “goals are religious, not political.”
In an effort to pressure the Trump administration as a part of its physiological warfare, the Taliban, in its capacity as the ‘Islamic Emirate of Afghanistan’, has issued a 17000-word appeal to the American people asking them to pressure US officials to end the 17-year old conflict in Afghanistan.
Diplomatically, the Taliban has gained international recognition, thanks to the efforts of US, Russia and China to get them to the dialogue table. Rightly or wrongly, Russia and China have been viewing the Taliban as a counter to the Islamic State (ISIS), which latter they believe is the main and more toxic threat. With diplomats from different countries frequenting its office in Doha, the Taliban has further added value to its stock.
US – Taliban Dialogue
At the end of July 2018, the US reversed its longstanding policy that any peace process would be ‘Afghan owned and Afghan led’. Days after the Taliban had called on Afghans to boycott the scheduled parliamentary elections, Alice Wells, the US Principal Deputy Assistant Secretary of State in charge of South and Central Asian affairs, met Taliban leaders in Doha. Paradoxically, the Taliban has appointed five former commanders who had spent more than a decade as prisoners in Guantanamo Bay as its representatives at the political office in Doha. The talks were held in the absence of any representatives from the ruling Afghan government.
On September 21, 2018, the US appointed Ambassador Zalmay Khalilzad as the Special Representative for Afghanistan Reconciliation. Since his appointment, Khalilzad has been travelling to Pakistan, Afghanistan, Russia, the United Arab Emirates (UAE), Qatar, Saudi Arabia, Belgium, Uzbekistan and Turkmenistan, in an effort to find a solution to end the Afghan war. He successfully advocated the postponement of the Presidential elections in order to focus attention on the peace process and protect it from political interference. The elections have now been postponed to 2019. It is possible that the postponement of elections was proposed to please the Taliban which is averse to it, being contrary to Islamic Law. Khalilzad held three days of talks with the Taliban from November 16 to 18, 2018 at Qatar. Khairullah Khairkhwa, the former Taliban governor of Herat, and Mohammed Fazel, a former Taliban military chief, attended these talks. Khairkhwa and Fazel were among five senior Taliban members released from Guantanamo Bay in 2014 in exchange for US soldier Bowe Bergdahl, who was captured by the Taliban after walking off his base in Afghanistan in 2009.
The third meeting between US officials and the Taliban took place at Abu Dhabi from December 17 to 19, 2018. Apart from Khalilzad, representatives from Pakistan, UAE, and Saudi Arabia attended this Pakistan sponsored meeting. Taliban officials from the movement's political headquarters in Qatar, two representatives sent by Mullah Yaqub, elder son of Taliban founder the late Mullah Mohammad Omar, and three representatives from the Haqqani Network were said to have been present. It is significant that among those who attended the meeting, Saudi Arabia, UAE and Pakistan were the only three countries that had recognised the Taliban government during its five-year rule from 1996 to 2001. After the meeting, Khalilzad gave an interview to Tolo News on December 20, 2018, which gives an indication of US thinking on its future course of action in Afghanistan. This raises a number of issues and concerns.
Is the Taliban in control of all the terror groups operating in Afghanistan?
The Taliban has a number of splinter groups and there are conflicts of interests among them. The fact that Mullah Yaqub was asked to send two representatives to the Pakistan sponsored talks in Abu Dhabi and three representatives of the Haqqani Network were present in the same meeting says it all. When Mullah Omar’s death became public knowledge, his son Mullah Yaqub is said to have walked out of the meeting convened to appoint Mullah Mansoor as the successor. Will Haqqani Network and Islamic State Khorasan Province (ISKP), an affiliate of ISIS which has its own factions, fall in line with the Taliban? Given internal rivalries between various factions and terror groups, will accommodating the Taliban within the power structure of Afghanistan end terror and bring peace to the country and to its people?
Larger issues being ignored at the peril of long term peace in the region.
The US, Russia and China seem to be ignoring or misreading the larger issues of the conflict in Afghanistan. The Taliban, who refer to themselves as the ‘Islamic Emirate of Afghanistan’, are a Sunni Islamic fundamentalist political movement. The conflict in Afghanistan is not borne out of differences between the Afghan Government and the Taliban to be settled by peace talks. It is a conflict of ideology, faith and beliefs. The Taliban wants to govern the country under Islamic Law and not under a man-made Constitution. Till date, it has not cut off its links with the Al Qaeda. It is also noteworthy that there has not been any major fight between the Taliban, Al Qaeda and ISIL in Afghanistan. They seem to be silently accommodating each other, though many believe that ISIL and Taliban are rivals. Their hidden agenda is to establish a Pan Islamic Caliphate in Afghanistan and beyond governed by Sharia Law. Pakistan, with the tacit support of a few Sunni Muslim countries, is seeking to institute its own control on Afghanistan through the Taliban as its proxy to achieve its larger geopolitical objectives. What we are witnessing today in Afghanistan is not an isolated incident limited to the country. This malady has affected a number of countries cutting across continents in one form or the other. The Islamic movement cannot be contained within the borders of Afghanistan.
Has the Security Situation in Afghanistan changed?
“What we are doing is preventing the homeland from being attacked,” said Lt. Gen. Kenneth McKenzie Jr., the nominee to lead CENTCOM, during a hearing before the Senate Armed Services Committee on December 04, 2018. Speaking about withdrawal and the military capabilities of the Afghan Security Forces, he stated “If we left precipitously right now, they would not be able to successfully defend their country…...” Has this situation changed?
While in power, the Taliban had allowed militants from around the world to congregate in Afghanistan and facilitated the Al Qaeda to plan and execute the 9/11 attacks. Are there any guarantees that the Taliban will prevent Afghanistan from once again becoming a base and a terrorist haven to take forward Islamic Jihad beyond Afghanistan?
The US perhaps realises that it has lost the war and has no chance of winning. It probably doesn’t matter to Trump as to who rules Afghanistan or how its people are governed. He seems to have reconciled himself to the fact that Afghanistan may become an ‘Islamic Emirate of Taliban’ with Sharia Law being imposed with or without the consent of the people. Being far away, Trump probably hopes that the US will be spared a renewed jihadi threat.
Conclusion
Some analysts are of the opinion that the Pakistan-Russia-China nexus will control Afghanistan through Pakistan’s proxy, the Taliban. This may be true in the initial stages. But once the Taliban consolidates itself and prepares itself to launch its next phase, they are bound to lose control. The Taliban may even attempt to establish an Islamic State in Pakistan in keeping with Ayman al-Zawahiri’s first guidelines for jihad, wherein he states: “In Pakistan, the struggle against them complements the fight for the liberation of Afghanistan from American occupation; then it aims at creating a safe haven for the Mujahideen in Pakistan, which can then be used as a launching pad for the struggle of establishing an Islamic system in Pakistan.” In his envisioned model for the state of Pakistan in the book Sapeeda-e-Sahar Aur Timtamata Chiragh, Zawahiri writes: “The state called the Islamic Republic of Pakistan is, in no way, an Islamic state; neither in terms of the ideological base (its constitution) nor its practices… Time is not far away when Islam will gain dominance in South Asia in general and Pakistan in particular.”
Since the US has announced its partial withdrawal from Afghanistan and may probably withdraw completely, the responsibility to ensure that Afghanistan does not go the Jihadi way may fall on Russia. Though China has its security establishment in Badakshan Province of Afghanistan, it is not clear as to how far it will get involved in preventing the establishment of a terror state.
With the Taliban having established its base in the North, the chances are that once it consolidates its position, terrorists based in the country may take forward the Jihadi movement Northwards across the Amu Darya to link up with militant groups in the Ferghana Valley. This area is densely populated with deeply religious people, and is shared between Uzbekistan, Kyrgyzstan and Tajikistan. Hizb ut-Tahrir (HT) and its splinter groups Akramiylar and Hizb un-Nusrat, as well as Uzun Soqol (Long Beards), Nurcular, Tabligh Jamaat, Lashkar-e-Taiba, Hizballah, the Islamic Movement of Uzbekistan (IMU), the East Turkestan Islamic Movement (ETIM), the Islamic Movement of Central Asia (IMCA), and the Islamic Jihad Group (IJG) are all active in the area.
Rather than waiting for the situation to deteriorate, it is time to think through the implications of the US withdrawal from Afghanistan, the possibilities of the US initiated Peace Talks fructifying, and its responses should things go wrong. India has not been invited for peace talks and as such. Apart from keeping a close watch on the developments and movements of militants in and out of Afghanistan, it may not take any active part for the present. Indian Muslims including those in the Valley are unlikely to be swayed by the so called Jihadi movement. However, should Taliban take control of Afghanistan, the country needs to be prepared for Pakistan channelling some of the Afghan based terror groups to the Kashmir Valley. The Government would do well to activate its strategic communications machinery to keep the people, especially those in the Valley, informed about the happenings in Afghanistan and its implications so as to counter Pakistani propaganda which is bound to gather steam as events unfold.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
It remains to be seen whether AL in its third term will be able to address the issue of rampant corruption that has deeply permeated the governance structure as well as the issue of free speech that many believe the ICT Act has impaired.
If democracy means peaceful political transition through the ballot, Bangladesh passed that test yesterday by successfully concluding its eleventh parliamentary election. Violence, compared to previous elections, was minimal, with 18 dead and 200 injured in clashes that were confined to a few constituencies. There was also sporadic violence in the run-up to the elections, which some critics argued was a tactic aimed at forewarning opposition supporters to stay away from the vote. The Awami League (AL) gained a comfortable majority to rule the country for the next five years. The seven seats won by the Jatiyo Oikyo Front (National Unity Front) would not be able to provide any meaningful opposition for the ‘nouka’ (Boat – the election symbol of AL) to have a smooth sailing. As the opposition mulls about a strategy going forward, what is at stake is stability and continued development (unnati r dhara), as AL has described. However, an opposition-less parliament is not conducive for the future of democracy.
Politics of Alliance Making
Before the election, the Awami League formed what is known as ‘Mahajot’ (Grand Alliance) with several smaller parties that have been its key allies since 2008. Though many of them were not very happy with the number of seats allotted to them as part of the grand alliance, they had little choice but to remain with the winning group. One of these was the Jatiyo Party (JP) led by former military dictator General H.M. Ershad. Unhappy with the small number of seats allocated to it, JP had fielded 145 rebel candidates, although it withdrew them before voting commenced. Earlier, it had attempted to negotiate an understanding with the AL and for that purpose Ershad had even replaced Ruhul Amin Hawaldar with Moshiur Rahman Ranga as the party’s General Secretary, but to no avail.
Interestingly, the AL had more number of Islamic parties as part of the ‘Mahajot’ compared to the BNP, which latter is seen as a centre right party. Its electoral understanding with Hefajat-e- Islami – a madrassa based ulema coalition which had once demanded implementation of the 13-point radical Islamist agenda in 2013 – made many secularists and minorities uncomfortable. The alliance also created division within HeI, with opposition stemming from those not comfortable with an electoral understanding with AL which is not seen as an Islamic friendly party.
The AL fielded 258 candidates and left the rest to its allies. Its main ally, the Jatiya Party, was given only 29 seats to contest. The returning officers rejected the candidature of three AL nominees. Several rebel candidates from the AL had filed nomination paper against party nominees, but most withdrew following party president Hasina’s appeal.
The Bangladesh Nationalist Party (BNP) has significantly weakened as a political party in the wake of its Chairperson being convicted on corruption charges. It formed a broad based coalition with the Jatiyo Oikyo Front (National Unity Front) under the leadership of veteran freedom fighter and eminent jurist, Dr Kamal Hossain, who was once the Law Minister and then Foreign Minister in the Mujib government and also one of the authors of the 1972 Constitution. Ironically, his decision to form an alliance with the BNP, which has Jamaat-e-Islami (JeI) as an alliance partner, a party that earlier stood against the liberation of Bangladesh, raised several eyebrows. Some in Bangladesh accused Hossain of rehabilitating the ‘anti-liberation force’ by providing it legitimacy. It is true that both the BNP and the Oikyo Front led by Gono Forum (Peoples Forum) needed each other to form a formidable opposition against the ruling party, which is perceived as a common enemy by both. Not surprisingly, their agendas were different. The BNP wanted its leader, former Prime Minister Begum Khaleda Zia, released from jail. Dr Hossain underlined that his objective was to restore the people’s right to choose –a reference to the one-sided election held in 2014, in which the ruling Awami League had won 153 seats uncontested. While the BNP put out a lacklustre manifesto, the Oikyo Front had an ambitious one, which aimed at ‘restoring peoples right’ or jono gono r adhikar. The battle lines between the two major coalitions were drawn thus: pro-liberation vs anti-liberation, and development vs democracy.
Interestingly, this election saw several appeals against the rejection of candidacy by the returning officers. Most of those rejected approached the judiciary and were successful in getting relief from the court. To cater for this contingency, the BNP filed a total of 695 nominations for 298 seats, having a second candidate in reserve in each constituency. However, 141 candidates were rejected after scrutiny by the returning officers and nearly 50 retained their candidature only after the High court ruled in their favour. In spite of such precaution, the BNP and its allies fighting on the election symbol ‘dhaner sish’ (sheaf of paddy) could not manage to retain candidates in 17 seats. Many of the candidates who were previously upazilla chairmen and resigned from the post to contest the election faced a new problem – the government refused to accept their resignation, thereby preventing them from contesting in the election.
Most of the BNP candidates were selected by the Party’s acting Vice Chairman remotely through Skype given his continuing exile in London. The BNP and its allies also had several rounds of negotiations over seat sharing. The JeI was given only 22 seats to contest even though the party demanded more than 40. It had been allotted 32 seats in the 2008 election. However, post the war crimes trials, the BNP reduced the number of seats allotted to the JeI. It could not completely distance itself from the JeI because the latter commands 10 to 12 percentage of votes. The JeI too had filed independent candidates in 20 seats, but withdrew them in favour of the BNP, except in the Cox Bazar seat where BNP extended its support for the JeI candidate. There were 100 new faces among the BNP candidates out of the 238 seats for which the party filed nominations. The BNP had left 60 seats for its allies and extended support to two independent candidates.
What next for the opposition
The BNP, which did not take part in the 2014 election, had to participate in this election with the knowledge that there will be no level playing field. Non-participation meant that the party would lose its registration. It really did not have an alternate option. Its strategy was therefore to participate and fight for the restoration of a caretaker government system to conduct elections. Being out of the parliament also meant the non-availability of an institutional structure through which the opposition can engage the government.
The opposition, as expected, has rejected the election results saying it is a ‘mockery’ and has demanded fresh election under a neutral caretaker government. It is unlikely that the Awami League will heed this demand. This was the third time the election was taking place under an incumbent government. The first one took place in 1988 under the administration of General Ershad, and was rejected by all the political parties. The second was held in January 1996 under a BNP government, which too was rejected by the opposition. That led to the incorporation of a constitutional provision for a neutral caretaker government (CTG) to conduct the general elections. This provision was subsequently set aside through the 15th amendment to the Constitution after the CTG became controversial in 2006. The then ruling BNP wanted to make Chief Justice Hasan the Chief Advisor of the interim CTG. The military backed CTG then took over in January 2007 as massive street violence rocked the country due to disagreement between the two main political parties – AL and BNP – over the CTG. Bangladesh is yet to establish an Election Commission that is seen as neutral and non-partisan and which has the confidence of the opposition to conduct a neutral and credible election. Within the election commission there were divisions and disagreements between members.
As the Awami League celebrates its third consecutive term in power, the Kamal Hossain-led Jatiyo Oikyo Front has rejected the electoral verdict accusing the ruling party of large scale rigging. Yet, the Front does not have the strength to organize street protest. Many BNP workers are fighting cases of arson, killing, violating public order, terrorism etc. instituted against them by the police since 2014. Thousands have been arrested and are behind the bars. The BNP’s organizational structure is in shambles and it is difficult for the party to sustain any movement that could be long drawn and may lead to violence and state reprisal. The Jamaat has the cadres and strength even though many of its cadres have been arrested. But the question is who will give the leadership to anti-government agitation? If Kamal Hossain decides to give leadership, what will be his position on receiving support from the Jamaat for street battles? Many also argue that the government has complete support from the administration and law enforcement authority. A vested interest has already been created among those who have benefited from the AL rule, and it will be difficult for the opposition to break this. Development and political continuity (unnati r dhara) have their own advantage. At the moment, agitational politics may not succeed against the development story that the government has successfully weaved. People really do not have the stomach for violence, as evident from the violence unleashed by the opposition in 2015 which led to the death of nearly 150 people.
It remains to be seen whether AL in its third term will be able to address the issue of rampant corruption that has deeply permeated the governance structure as well as the issue of free speech that many believe the ICT Act has impaired. Another challenging task involves addressing the youth bulge and the demand for jobs. The Awami League needs to learn from the quota protest and the student protest to address the challenge of youth unrest.
Smruti S Pattanaik is currently affiliated to the Bangladesh Institute of International and Strategic Studies, Dhaka.
For a global build-up of cybersecurity, capacity building needs to be given much more importance than it has received till date.
The quest to create norms in cyberspace has again gathered steam, more than a year after the United Nations Group of Governmental Experts (UNGGE) process proved unable to arrive at a consensus report. This time around, two simultaneous mechanisms have been set in motion: a UN Group of Governmental Experts (UNGGE), like earlier, spearheaded by the United States and the Western allies; and, an Open-Ended Working Group (OEWG) led by Russia and China, and supported by a number of other countries. In the absence of any serious introspection on the part of governments over why the previous UN-led process failed, coupled with the fact that the new initiatives are likely to be competitive rather than complementary, it is hard to be optimistic that norms in cyberspace will materialise anytime soon.
The focus of the state-centric mechanisms such as the UNGGE has been on two tracks: confidence building and capacity building. Both come with their own legacy issues which indirectly impact their use in these mechanisms. Confidence building finds its origins in the Cold War era, when such measures were deemed necessary to reduce the possibilities of conflict between the two nuclear armed blocs. Much of the same discourse, terminology and presumptions have therefore seeped into confidence building measures a propos cyberspace and led to it being viewed through the same prism of conflict. One of the reasons for the collapse of the UNGGE process could be said to be its excessive focus on the security component in the deliberations and in the draft report. Whilst the goal was to arrive at confidence building measures, the existing atmosphere of suspicion and distrust meant that issues such as the rights of states in responding to cyber attacks and taking appropriate countermeasures were viewed by some countries as mechanisms to legitimise “unilateral punitive force actions” and covert attempts to “convert cyberspace into a theatre of military operations.”
Capacity building, on the other hand, has largely been associated with aid programmes and couched in the language of development. Discussions on capacity building have often revolved around issues of the responsibilities of “donor’’ and recipient’’ countries, the ability of recipient countries to absorb and utilise technical knowhow, finding sustainable sources of funding for capacity building efforts, and so on. The spending of resources to build up capacities in other countries has been justified on the grounds that this has considerable spin-off benefits in areas ranging from migration to security. Whilst this has largely been a one way flow in most areas, with the developed countries identifying successful policies, practices and ideas, and then adapting and sharing them with the less developed countries, it is a more equitable process in cybersecurity where no one country can claim to be truly secure. At the same time many of the dilemmas that have hobbled traditional capacity building can also be seen to be at play here, the foremost being that ‘donor” countries have their own priorities and perceptions of what they should pass on to recipient countries which might be completely irrelevant to the needs of latter. Consequently, like confidence building, capacity building has also been viewed with suspicion, seen by some as a tool of foreign policy, a means to advocate a particular model of governance, create market access for domestic companies, or promote specific technical standards.
The mandate of successive UN Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security has been to deliver consensus reports and recommendations to the First Committee of the United Nations which deals with disarmament and international security issues. Given these antecedents, it is but only natural for the UNGGE to concentrate on issues of security and to consider capacity building as an adjunct to confidence building. This is also reflected in the outcome reports of various UNGGEs. Whilst the 2015 Report expressed the “vital importance” of capacity building as a means to “bridge the divide in the security of ICTs and their use,” the preceding 2013 Report described capacity building as a key pillar in global efforts to “reduce risk and enhance security [and to] promote a peaceful, secure, open, and cooperative ICT environment.” Cyber -related issues have also been brought before the UN’s Third Committee, which deals with social, humanitarian and cultural issues. Most recently, Russia initiated a resolution on cybercrime, which was passed with 88 votes in favour, 55 against and 29 abstentions. Essentially, shifting cyber issues to another committee will not make the faultiness go away or shift focus to less contentious issues.
It goes without saying that for a global build-up of cybersecurity, capacity building needs to be given much more importance than it has received till date. The history of benign neglect of capacity building seems to be changing with a number of new initiatives coming to the fore, chief among them being the Global Forum of Cyber Expertise initiated by the Dutch Government under the London Process, which is possibly the first intergovernmental initiative solely dedicated to cybersecurity capacity building. Other initiatives have included the Global Cyber Security Capacity Centre in Oxford, which was set up by the British Government after the first Global Conference on Cyber Space (GCCS). Such initiatives allow countries to share experiences and expertise, an example being India’s Cyber Surakshit Bharat Initiative which has been shared with the GFCE.
Within the rubric of capacity building, the two most useful components are: 1) Maturity Assessments of various countries and even various sectors across countries; and, 2) Simulation Exercises of likely scenarios requiring emergency response. Maturity Assessments serve a variety of purposes; they enable benchmarking of capabilities, and allow policy makers to assess gaps in capabilities and decide priorities. While such exercises are being continually carried out by organisations at the global level, carrying out similar exercises at the regional level would enable countries at a largely similar level of maturity to assess requirements more realistically. Regional initiatives also have the advantage of avoiding any ideological creep and policy advocacy that are implicit in many of the global initiatives on capacity building.
The second component of capacity building, which is a natural corollary of Maturity Assessments, are simulation exercises of likely scenarios requiring emergency response. Again, more associated with confidence building rather than capacity building, it is a useful way to gauge available expertise, inefficiencies in information sharing, and other processes, and ultimately speed up cyber capacity building in countries since it would include cyber security response teams, national critical infrastructure and government agencies, and other stakeholders. It is also a useful bridge between policy makers and practitioners, taking a complex subject out of the conference room and into the operational arena, and enabling each to understand the other’s perspectives and constraints. When used across countries, it becomes both a confidence building as well as a capacity building mechanism with the added addition of enabling networking amongst networks and feeding into the global conversation on cybersecurity.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
There is a need to close the perception gap in India’s assessment of the state of Chinese politics, to distinguish between transformation and conflict, and respond accordingly.
President Xi Jinping inherited a host of problems when he came to power in 2012: an economic slowdown, disruption of market supply by the all-powerful State-Owned Enterprises (SOE), bribery and extravagance among members of the Communist Party of China (CPC), and a bloated and inefficient military, all of which threatened the Party’s hold on power. Party members were also less ideologically cohesive, impacting the CPC’s unity. As a result, in 2013, Xi postulated the idea of ‘China Dream’, hoping that it would offer a blueprint for implementing reforms in a stagnating economy. The challenge however was that for the reforms to succeed, Xi wanted the very culture of the CPC to be transformed, especially its leadership, management and power structure. This stemmed from the belief of Xi and his supporters that Xi’s predecessor, Hu Jintao, was unable to implement reforms because he pacified the collective leadership to such an extent as to compromise on his policies.
Since Xi and his base believed that reforms would be difficult to implement because of a disinterested bureaucracy and vested interests, they wanted a strong ‘core leader’ in the mould of Deng Xiaoping. They considered both Jiang Zemin and Hu Jintao as weak leaders; the former let technocrats enter the CPC at the cost of ideology, and the latter did not exercise much power over the army. The struggle, it seems, was to extend the legitimacy of the CPC, which they believed had been compromised due to CPC officials forgetting the legacy of the Party’s rule and the ineptitude of officials in wasting public funds and engaging in “formalism” when asked to counter social problems. 1
Xi, unlike any of his predecessors, wanted to leave no room for negotiation, and continued to centralise power to prevent threats to his position from powerful constituencies opposed to his reforms. First, the idea was to use massive political education to make CPC cadres conform to his policies and use disciplinary actions to punish the unwilling.2 The anti-corruption investigations were pursued to break the symbiotic relationship between big business and politicians and introduce accountability at the management level. For Xi, unrelenting corruption within the Party had allowed members to amass massive wealth through bribery from businesses intending to curry favour for contracts or influence.3 It is equally true that Xi used these well-intentioned policies to purge many political opponents.
Political opposition in the Chinese system is one of the lesser-known complexities. Factions are divided on questions relating to legitimacy, reform tendencies, ideology and, importantly, how to usher China into the modern world. Xi and his supporters derive their legitimacy from being sons of the founding fathers of the revolution, known as “second-generation red” (红二代)”. Many of those targeted by Xi are children of high-level officials who have benefitted from China’s economic success, called “second-generation government officials (官二代)”. Predominantly, this latter group opposes Xi’s policies believing that it would disrupt ongoing reforms.
The difference of opinion between the two factions is subtle and nuanced. Both factions believe that the Chinese system as it exists is not conducive to produce further economic growth and stability. However, the disagreement seems to be the method through which these factions would want to reform the system. Xi and his base believe that market forces should decide supply and demand, meaning that the economic growth should not be determined by corrupt officials and vested interests that benefit from maintaining the existing production method, which has resulted in overproduction of goods in backdrop of slowing global demand and saturation in the real estate market. Xi wants to resolve this by micro-managing the economy and strengthening party ideology through his anti-corruption drive, whereas others believe that China should continue to reform the market and its political system.
In other words, these other factions believe that while China could maintain certain authoritarian traits, it does however need to bring more political and economic freedom than control. These reforms could be in breaking the monopoly of SOEs, protecting private entrepreneurs, enabling the Chinese public to address their social grievances through legal measures, and fundamentally reducing the role of state in economic decisions. Xi and his base believes that bringing these reforms without strengthening ideology and control of the CCP central authority would be the road to Western interference, leading to societal instability and corrupt practices. That the West would finally achieve the plundering of China through external pressure by using the call for political reforms that is built on Western values.4
However, Xi’s opponents were unable to oppose his anti-corruption drive, given that the Chinese public welcomed it. Only after the 19th Party Congress were they able to successfully capture the apprehension of rise of “personality cult” of Xi, comparing him to Mao Zedong. Secondly, Xi did not want the disadvantaged groups, such as military pensioners, rights activists, lawyers, intellectuals, etc, to coalesce into an effective opposition. Apprehensive of political factions, disadvantaged groups as well as Western countries which could possibly use such groups to spread criticism of his policies in the media and influence public opinion, Xi imposed widespread restrictions on freedom of speech and threatened punitive actions against the bureaucracy if it fell short in implementing his policies.
However, even with such widespread control, Xi was less than successful in implementing economic restructuring to change China from an investment-based economy into a consumption-based economy. Thus, Xi and his support base believed that the second term is too short a time period for Xi to finish the reform agenda, and nominating a successor would have only reduced his influence. Moreover, they believed that there were no strong leaders among the Standing Committee who could take the reins after Xi, who would push the Belt and Road Initiative required to shed their over-capacity. In the end, they decided to increase Xi’s advantage by eliminating the two-term limit for the presidency.
The addition of “Xi Jinping Thought” in the Chinese constitution might be construed as elevating and equating his views with those of Deng and Mao, but is quite acceptable in the Chinese communist system. In this system, bureaucrats and officials often take their cue from the proclamations and statements of leaders to determine the red lines that shall not be crossed. This is in fact a continuation of Deng’s practice and an efficient way for the Party leadership to exert pressure on the entire system to follow central policies. However, the difference seems to be that the restrictions among officials and cadres seem to be very strict and the penalties are higher. In fact, the recent disciplinary guidelines measures are considered as very harsh.5 Not only that, now one’s “self” has to emotionally and spiritually trust and serve the Party.6
Despite such measures, resistance to Xi’s reforms are plenty. Although Xi has substantially reduced the bureaucrats’ ability to misuse government funds, he has been less than successful in restructuring the economy. No one can doubt that Xi has emerged as a core leader and has dominated his rivals. However, comparing him to Mao could lead to the adoption of wrong policies towards China. While Xi has attempted to reorganise the Party under a ‘unified and centralised leadership’, his power is neither permanent nor absolute. The transformations in the Chinese system after the havoc created by Mao’s policies on the social, cultural, economic and political life of China have been fundamental.
Deng Xiaoping’s creation of a consensus system in the political institutions was an attestation of the vehement opposition to the Mao-style destructive politics. Xi cannot escape such systemic resistance unless he succeeds in further economic growth and success.7 Any wide-scale oppression would also bring resistance within the Chinese society who are used to loosening central government control after economic liberalisation and moved away from Mao’s political excesses. These are already visible in the resistance in elite universities, where students are supporting workers’ rights and opposing Mao-style repressive policies.8
Significance for India
In the wake of the India-China Annual Defence and Security Dialogue recently held in Beijing and the 21st Special Representative Talks in Chengdu, it would seem that temporary arrangements such as “post-Wuhan cooperation” and “intensifying efforts on border talks” will not be enough to mitigate the mistrust in the relationship post the Doklam crisis. There is a need to close the perception gap in India’s assessment of the state of Chinese politics, to distinguish between transformation and conflict and respond accordingly.
What is of significance to India is that Xi’s policies have led to a huge disruption in Chinese politics. He is under tremendous pressure to deliver and his strategy of centralising power does have enormous consequences. He faces questions about the legitimacy of his leadership from sections of society that are apprehensive of an increasingly intrusive CPC, intellectuals who fear the impact of lack of criticism on ill-conceived policies, bureaucrats who are not able to trade loyalties and favours, powerful SOEs dependent on massive loans, and political rivals.
Due to the politics of transformation in China, Xi would engage in intense diplomatic and economic engagement to offset his critics and worsening trade war with the US. While India-China high-level political relations had benefitted in changing the atmospherics through the Wuhan summit, the time is now ripe for capitalising on such overtures. India should leverage the Chinese need for deeper political engagement and explore possibilities for concessions of political nature from China.
At the same time, India should be wary of bilateral tensions being used as a stepping stone by various factions jostling for power in Chinese politics. Also, India should engage various centres of power in China by, for instance, initiating dialogue with political commissars from the Chinese military to improve military-to-military relations, and newly relevant organisations such as Ministry of Public Security, National Audit Office, Ministry of Water Resources, Ministry of Science and Technology, and various provincial governments.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
The BIMSTEC region offers tremendous opportunities in the field of cyber space. However, the full scope of digital dividend can only be harnessed if the countries of the region are able to get their act together and work as a team at the earliest.
The Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC) is a regional grouping of seven countries i.e. Bangladesh, Bhutan, India, Myanmar, Nepal, Sri Lanka and Thailand that lie in the littoral and adjacent regions of the Bay of Bengal. Recently, the member countries got together in New Delhi to hold the first conference on cyber security cooperation from 05 to 07 December 2018.
The BIMSTEC region has a population of around 1.5 billion people, which constitutes nearly 22 per cent of the global population., The member states have a combined Gross Domestic Product (GDP) of US $ 2.7 trillion. The region is witnessing an exponential growth in internet usage and mobile telephony with social media, especially Facebook, having its largest user base from the region. It is therefore crucial that BIMSTEC takes an active part in various internet governance forums, promulgates best practices and cyber norms and works to ensure speedy build-up of cyber capacity and capability, transparent and quick information sharing, and coordinate their responses in fighting cyber-crime in the rapidly evolving cyber ecosystem of the region.
BIMSTEC Regional Cyberspace Ecosystem
As per Digital in 2018 yearbook, out of the total global population of 7.593 Billion (data as of January 2018), roughly 4.021 Billion (approximately 53 per cent of global population with an annual growth rate of 7 per cent) have access to internet with 3.196 Billion (42% of global population with an annual growth rate of 13%) being active social media users. There are 5.135 billion (68% of global population with an annual growth rate of 4%) unique mobile phone users in the world, a majority of them having the basic mobile handset without internet connectivity with an increasing large number migrating to smart phones with 3G and 4G mobile internet connectivity. Of these, the BIMSTEC countries account for nearly one fourth of the global internet population which is likely to grow in the near future. This is in spite of the fact that South Asia has a low internet penetration of 36 % (above only central and eastern Africa) against a global average of 53%.
The BIMSTEC countries also have the largest share of social media users in the world. Nearly 23% of active social media users (735 Million) are from the region. India has the second highest growth rate of social media users (31%) with the highest number of Facebook users (250,000,000). Bangkok and Dhaka respectively are the top two cities with the largest number of active Facebook users. These figures notwithstanding, social media penetration in South Asia still stands at 20% in against a global average of 42%.
The BIMSTEC region is the largest user of mobile phones in the world with 51% of unique mobile phone users (2.630 Billion). India, Nepal and Bhutan on an average generate 3.9 GB of monthly mobile data per smart phone against a global average of 2.9 GB. This is in contrast to the fact that the mobile internet speed in these countries is much below the global average of 21.3 MBPS.
Barring Thailand, which has a robust e-commerce penetration of 62%, the remaining countries of BIMSTEC region have a lower e-commerce penetration but, India with penetration of 26% is the fastest growing e-commerce market in the world. As the internet penetration increases with faster mobile data rates and a greater number of people migrate from basic mobile phones to smartphones, the e-commerce sector is bound to increase drastically and offers enormous opportunities for business and economy.
India has the second highest digital optimism in the world with 79% of the population believing that new technology offers more opportunity than risks. The majority of population living in the region have tremendous faith in internet and digital technology and believe that it is the engine for good governance, poverty alleviation, reducing corruption and providing prosperity to all.
However, even as the BIMSTEC region is at the cusp of a major internet and mobile telephony transformation, its poor literacy rates make the population susceptible to cyber-crime, data thefts, identity frauds and propagation of rumours and fake news - against a global average of female (80%) and male (88%) literacy rate, South Asia has a corresponding literacy rate of 61% (female) and 78%(male).
Cyber Security and Future Trajectory of Cyber-Crime in the BIMSTEC Region
The International Telecommunication Union (ITU) publishes a yearly Global Cyber Security Index as a measure of the commitment of countries to cyber security. The Global Cyber Security Index of 2017 featured 134 countries with Bangladesh securing 53, Bhutan 109, India 23, Myanmar 99, Nepal 93, Sri Lanka 71 and Thailand 22 rank. It is evident that the overall cyber security posture of the region is poor and much needs to be done towards building a safer cyber environment which assumes even greater importance as the region is moving towards greater internet and mobile penetration.
The estimated global cyber-crime revenue in 2018 is around US $ 1.5 Trillion. Of this, illegal online market (U $ 860 Billion), trade secret & online theft (US $500 billion) and data trading (US $ 160 Billion) will be the top earners with negligible revenue being roped in by crime-ware (US$1.6 Billion) and ransomware (US$1 Billion). The above is a good indicator of the future global trajectory of cyber-crime.
As per a white paper “2018 Current State of Cyber Crime”, cyber crime has shifted from web based attacks to mobile phone based attacks as more and more people migrate to smart phones for carrying out banking, e-commerce and other financial transactions. The BIMSTEC region with the largest share of mobile phone users in the world is particularly susceptible to these crimes and frauds primarily due to low cyber security posture coupled with large population of digital illiterates entering the e-commerce and digital banking sector for the first time.
It has also been brought out that due to the massive data breaches in the last two years, there is a growing market of illegal sale of non-financial personal credentials with a 70% growth in the visible fraud activity on social media platforms. Again, the region is likely to witness unauthorised harvesting of private digital data being the largest users of social media platforms.
Conclusion
The BIMSTEC region is witnessing an explosive growth in cyber space infrastructure coupled with a growing number of first-time users of cyber space and e-commerce. In order to fully exploit the digital dividend, it is imperative that the member countries collaborate and cooperate to ensure rapid cyber capacity and capability building, exchange of skilled manpower, development of a regional cyber eco system and joint representation at international internet and mobile telephony governance councils and bodies. Secondly, mass cyber education drives need to be undertaken to educate and protect the interests of the population especially those who will be joining the internet and undertaking e-commerce activities for the first time. Thirdly, the ICT companies need to recognise the immense potential of the BIMSTEC region and participate whole heartedly in nation building and improving the national security environment as a whole. And lastly, intelligence and law enforcement agencies of the BIMSTEC region need to seamlessly cooperate with each other for intelligence sharing, combating crime and maintaining a highly resilient and safe cyber environment.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Paris Call could be seen as a positive step towards finding a middle path between Western democracies and authoritarian regimes on the issue of cyber governance.
Internet today has become a pivot on which the modern life hinges. It has completely altered the way people live, share and work. Internet has opened the door to myriad opportunities and advances, but at the same time made people vulnerable to several threats. Events such as Petya/Not Petya and Wannacry ransomware attacks have not only debilitated institutions and caused considerable financial losses, but also have serious and adverse consequences for the international and national security, global economy, democratic processes, and the security, safety and privacy of individuals. The transnational characteristic of these threats is a source of grave conundrum among the nation states. This has brought to forefront the need to have some sort of common rules and regulations to govern the cyberspace.
In this context, on November 12, 2018, at the UNESCO Internet Governance Forum (IGF) meeting held in Paris, the French President Emmanuel Macron commenced “The Paris Call for Trust and Security in Cyberspace.”1 This high-level declaration on “developing common principles for securing cyberspace” has the support of various major private companies and civil society groups. Even many of the states participating in the forum have fully supported the Paris Call.
Major principles articulated in the Paris Call document talks about protecting the integrity and accessibility of the internet while preventing nefarious activities online and building resilience. The report that was released during the IGF also talks about preventing proliferation of malicious online programmes and promoting multilateral cooperation in order to prevent interference in electoral processes.
Interestingly, the Paris Call also highlights the importance of “cyber hygiene”, a term rarely used in the cyber parlance. Cyber hygiene is often equated with personal hygiene, where, just as the latter is concerned with the well-being and good health of a person, the former connotes data protection and safety. This can be ensured by following basic best practices like regularly changing the passwords, updating the software as well as the hardware, using licensed software, backing up the data regularly, etc. Thus, having a routine cyber hygiene in place for computers and software is beneficial for both “maintenance” and “security” of the system.2
What’s New?
IGF’s call for trust and security in the cyberspace is not the sole initiative on the subject. In 2013, a Group of Governmental Experts (GGE) at the UN came to a consensus that international laws that govern state behaviour in the international setting should also be extended to the cyberspace. In 2015, the same group charted four peace time norms in the cyberspace, which stated that “states should not interfere with each other’s critical infrastructure; they should assist other nations investigating cyberattacks; they should not target each other’s computer emergency response teams; and they are responsible for actions that originate from their territory.” 3
However, the application of international law in the cyberspace has itself become a major debating point. The United States (US) strongly promotes the stated peacetime norms especially when it comes to exercising the inherent right of self-defense and the law of state responsibility, including countermeasures in the cyberspace. It also stresses on creating a new and closed group of Governmental Experts (something akin to the UN Committee on the Peaceful Uses of Outer Space which has guided the adoption of a series of treaties and principles). However, both Russia and China oppose the US idea of forming a new group as they believe that it could be an exclusive club driven only by the US interest. China does not concur with the application of international law in general, rather it stresses on the importance of sovereignty in the cyberspace. Russia on the other hand talks about an open ended working group which would be more inclusive. Thus, increasing the legitimacy but also likely exacerbating the existing obstacles to forging consensus on the issue. Russia’s major concern has been the discussion about countermeasures. As Russia has been named in the hacking of computer network of the Democratic National Committee (DNC) and many other such nefarious cyber activities, Moscow feels that countermeasures may justify the US means of actions for hacking and information operations. 4
Interestingly, many states are of the opinion that the emerging binary model – a “complete self-management, without governance” (the US model) and “compartmented internet, entirely monitored by strong authoritarian states” (the Beijing model) – only caters to the needs of the US and China, respectively.5 The differences in the two models have made consensus building among member states a major challenge. Thus, Paris Call presents itself as a new “collegial method”, or rather a middle ground that would encapsulate not only the member states but also private entities and the civil society. It could also be seen as an effort to end the international deadlock. The fundamental idea behind Paris Call has been to further the already existing institutions to “limit hacking and destabilising activities” in the cyberspace by formulating an all-encompassing multi-stakeholder model that gives due importance to the private entities rather than trying to establish new institutions.
Signatories and Absentees
More than 190 signatures were obtained on the Paris Call, out of which 130 were of the private sector, 90 of the charitable groups and more than 50 of the member nations.6 Although majority of signatories are European countries, one cannot overlook the inclusion of other major countries including Qatar, Mexico, New-Zealand, South Korea, Colombia, Japan, Morocco, Canada and Senegal.7 Ironically, while several major American technologies like Facebook, Microsoft, Google, International Business Machines (IBM) Corporation and Hewlett-Packard (HP) have endorsed the agreement, the US itself took a pass at the deal.8 Even the Kaspersky Lab that was accused of assisting Russia’s hacking effort has signed. Other major players who did not sign the document were China, North Korea, Russia, Iran, Israel, Saudi Arabia and Australia despite the fact that the former four countries have an active cyberwarfare programme.9
Conclusion
Norms building especially in the arena of global commons has been a complex issue. Paris Call, in this context, could be seen as a positive step towards finding a middle path between Western democracies and authoritarian regimes so as to build some form of consensus on issues pertaining to cyberspace. Active participation of private players indicate how tech corporations are playing a crucial role in governing the internet.
However, one cannot deny that the Paris Call failed to put in place the “compliance” mechanism. It does not require governments or corporations legally to adhere to any specific principle. Moreover, this agreement failed to bring major players on board especially the US, China and Russia. This can be attributed to the fact that major players want their own interests and agendas to be forwarded. Many such initiatives have earlier failed to garner popular support across the international community due to divided political objectives. Nevertheless, Paris Call should be seen as a new means to achieve the long-term objectives of securing the cyberspace. By gaining support from top American tech-firms and emerging powers, it seems that Paris Call is here to stay though its impact will depend on the effectiveness of the measures it takes in the foreseeable future.
Views expressed are of the author and do not necessarily reflect the views of the IDSA or of the Government of India.
Pages