16 December 2017

Internet Governance - How do we select people representing India

INTERNET GOVERNANCE - HOW DO WE SELECT PEOPLE REPRESENTING INDIA
--  Maj Gen P K Mallick,VSM (Retd)

I do attend lot of seminars in Delhi. In cyber domain related discussions one does come across terms like cyber governance, ICANN, UN GGE, Multi Stake holder model, Net Mundial and what have you. Certain things come to my mind which I thought I should share. I must admit in the first place I do not have any inside knowledge of the issues I am trying to raise. So the people concerned must correct me.

I find one particular Think Tank is much more concerned than any other in Cyber Governance issues. Naturally many people from that Think Tank attend all the official deliberations on internet governance all over the world. Mostly same set of people attend these. I have no issue on that either.

In the multi stake holder model the country is represented by Government agencies, civil society, industry, technical experts, legal experts, some time academics also. I want to know how do we decide who is going to represent what. What is the selection process. Who decides. In today's world when we are crying hoarse in international fora about multi stakeholder model we ourselves also have to be more transparent. I don’t see any transparency here. Again I am not casting any aspersions on anybody. They may be the most competent people to represent our country in the respective fields. I am talking about the process.

External funding is an important resource for Indian stakeholders who engage with ICANN. A majority of them who engaged with ICANN had been awarded external funding at some point.

When you represent the country in whatever field there is a need to speak in the same language in different forum. The Government has to ensure that by having discussion in a most transparent manner before going abroad. 15 persons from India actively participated at ICANN Meetings in 2015. Were they on the same wave length. The civil society people may have some different views. That has to be tampered with the national views. At least an honest effort has to be made. I am sure some efforts must have been made in the form of some Round Table Discussion organized by MeitY. Point is are those adequate?

I have nothing against anybody. I find there is one person who represents India in all deliberations concerning internet governance in ICANN, net mundial, UN deliberations etc. That person is a member of Carl Bildt chaired Global Commission on Internet Governance, Co chair of the Global Commission on the Stability of Cyberspace. Some of the other commissioners are : Michael Chertoff who was the second United States Secretary of Homeland Security, Chairman of the Board of Directors of BAE Systems, a member of East West Institute’s Board of Directors and Sean Kanuck. Sean Kanuck has a decade of experience in the Central Intelligence Agency, He was at the US National Intelligence Council as National Intelligence Officer for Cyber Issues from 2011 to 2016. He has been appointed as a Distinguished Fellow by the Observer Research Foundation in India. The person I am referring to is with ORF which is funded heavily by American companies, also with American East West Institute which may have vested interests, is Distinguished Fellow in the East West Institute in the US, the Observer Research Foundation in India, and the Centre for International Governance Innovation in Canada. My point is can there be a conflict of interest somewhere.

As per networking is concerned many of the persons involved in these commissions are regular visitors/ speakers in ORF events including the recent CyFy. You don’t get ex Prime Minister’s of countries like Sweden for such events just like that.

I am told Google India, Microsoft Ondia, Facebook India or such big US companies are now considered as Indian companies and represent India in these deliberations. Can these people contradict the views of their head offices sitting across the table.

Again my point is simple : How do we select, what is the criterion, where is the transparency?

I want to be educated.

PS.

I did come across a paper analysing Indian Engagement at Global Internet Governance Institutions 2011-2015 by Puneeth Nagaraj & Aarti Bhavana ,MULTISTAKEHOLDERISM IN ACTION, Centre for communication Governance, available at http://ccgdelhi.org/doc/%28CCG-NLU%29%20Multistakeholderism%20in%20Action%20-%20Analysing%20Indian%20Engagement%20at%20Global%20Internet%20Governance%20Institutions%20%282011-15%29.pdf

A Strong U.S.-India Partnership Is in Our Strategic Interest

James Jay Carafano

Congress has created numerous rules regarding how America goes about establishing strategic relationships. Unfortunately, those rules don’t work well in the world as it exists in the twenty-first century. Over many decades, the United States has established a two-tier system. In the top tier are our formal allies. Alliances were—and to a large extent remain—the coin of the realm for U.S. statecraft and security relationships.

Pakistan’s Military: The Fire Brigade and the Arsonist?

BENNETT SEFTEL

Tensions that mounted during a deadly, Islamist protest in Pakistan last month were resolved not by the country’s civilian government, but by leaders of its military and intelligence agency. The incident was another reminder of who really holds the reins in a tumultuous nation that the U.S. has leaned on to help defeat terrorist adversaries and bring stability to Afghanistan. This reality has serious consequences for U.S. policymakers engaging with Pakistan.

Current Trends in Islamist Ideology


Analysis on The Muslim Brotherhood, Islamism in Turkey, Jamaat-ud-Dawa,jihad in India and Algeria, and Shiite militias in Iraq...View PDF

Pakistan Army as a Politically Disruptive Force in Nation-Building

By Dr Subhash Kapila

Pakistan Army having ruled over Pakistan for nearly half its existence since 1947 has no credits to distinguish itself in terms of Pakistan’s nation-building; the contrary is true in that despite its pretentions of being the “Glue that Holds Pakistan Together”, Pakistan as a nation in 2017 is unstuck and dysfunctional.  Pakistan as the minor inheritor of British India along with much larger India with much larger challenges in nation-building could have emerged as an equally democratic, progressive and economically vibrant nation like India. But what picture does Pakistan project as the second decade of the 21st Century draws to a close?

Why China Won’t Rescue North Korea

By Oriana Skylar Mastro

U.S. officials have long agreed with Mao Zedong’s famous formulation about relations between China and North Korea: the two countries are like “lips and teeth.” Pyongyang depends heavily on Beijing for energy, food, and most of its meager trade with the outside world, and so successive U.S. administrations have tried to enlist the Chinese in their attempts to denuclearize North Korea. U.S. President Donald Trump has bought into this logic, alternately pleading for Chinese help and threatening action if China does not do more. In the same vein, policymakers have assumed that if North Korea collapsed or became embroiled in a war with the United States, China would try to support its cherished client from afar, and potentially even deploy troops along the border to prevent a refugee crisis from spilling over into China.

What to do about China’s “sharp power”


WHEN a rising power challenges an incumbent one, war often follows. That prospect, known as the Thucydides trap after the Greek historian who first described it, looms over relations between China and the West, particularly America. So, increasingly, does a more insidious confrontation. Even if China does not seek to conquer foreign lands, many people fear that it seeks to conquer foreign minds. Australia was the first to raise a red flag about China’s tactics. On December 5th allegations that China has been interfering in Australian politics, universities and publishing led the government to propose new laws to tackle “unprecedented and increasingly sophisticated” foreign efforts to influence lawmakers (see article). This week an Australian senator resigned over accusations that, as an opposition spokesman, he took money from China and argued its corner. Britain, Canada and New Zealand are also beginning to raise the alarm. On December 10th Germany accused China of trying to groom politicians and bureaucrats. And on December 13th Congress held hearings on China’s growing influence.

US forces could potentially lose next war to Russia or China, warns sobering Rand report

By Jeff Daniels

U.S. defense modernization efforts are “failing to keep pace” when compared with its two big adversaries, and American forces are “poorly postured to meet key challenges in Europe and East Asia,” according to a starkly worded new report from think-tank Rand. As tensions with North Korea heighten, Rand’s 190-page report, entitled “U.S. Military Capabilities and Forces for a Dangerous World,” also discussed war scenarios with NATO-Russia involving the Baltic states. It also broke down a possible U.S.-China clash over Taiwan and gaps in existing U.S. capabilities.

Assessment of the Lone Wolf Terrorist Concept


Linda Schlegel holds a BA in Liberal Arts from the University College Maastricht (NL) and an MA in Terrorism, Security and Society from King’s College London (UK). Her main topics of interest are radicalization, the role of identity in extremism, and societal resilience. She can be found on Twitter at @LiSchlegel. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.

North Korean Nuclear Reactor Safety: The Threat No One is Talking About


The ability of North Korea to safely operate its nuclear reactors, according to many experts, is increasingly being called into question given the North’s isolation and lack of safety culture. Pyongyang’s ability to respond to a nuclear accident in a timely fashion will make the difference between a small-scale event and a catastrophic disaster. And while the actual contamination would be localized, the lack of transparency from North Korea in dealing with the situation is likely to cause political panic in the region in excess of the actual radiological exposure and environmental impact. The opening of nuclear safety talks with the North to help prevent such an accident from occurring would provide a rare opportunity for regional dialogue and could pry open the door for realistic and productive discussions of North Korea’s nuclear program. 

In a Second Korean War, U.S. Troops Will Fight Underground

Kris Osborn

There are many facets of a possible North Korean invasion of South Korea, not the least of which are North Korean conventional missiles and artillery would pose a substantial threat to populated areas south of the DMZ. But any kind of ground incursion, with or without the anticipated barrage of conventional missiles, would bring similar threats. Furthermore, mechanized ground conflict would unquestionably call upon a wide range of necessary tactics — large armored vehicle formations, long-range precision-guided weaponry, combined arms maneuvers and air-ground coordination, among other things.

What North Korea's ICBM Means for Japan's Defense Planning

By Yuki Tatsumi

Two weeks have passed since North Korea test-launched the Hwasong-15, Pyongyang’s most advanced nuclear-capable inter-continental ballistic missile (ICBM). Prior to this November 29 test, there was debate among Korean affairs experts over whether a seeming suspension of missile tests by North Korea (no test had been conducted since September 15) might be a gesture on Pyongyang’s part to hint that they may be ready to talk. But the most recent test ended such debate, at least for now. More importantly, the latest test confirmed what U.S. Secretary of Defense James Mattis said months ago — that North Korea is “the most urgent and dangerous threat to peace and security.”

North Korea is hacking bitcoin exchanges as currency value soars, expert says

By Katherine Lam

What is Bitcoin? Bitcoin, a digital currency, was created in 2008. Shares of Bitcoin are sold on internet exchanges where users remain anonymous. As the value of the cryptocurrency continues to hit record highs, here’s how it works. As bitcoin’s value continues to surge, North Korean hackers are taking advantage by targeting exchanges to gain financial profit, experts said on Friday as sanctions against Kim Jong Un’s regime threaten to impede on economic development.

The Ideologues Who Wrecked Libya

By MATT PURPLE 

Out of the New York Times last week came a report that slave auctions are now a reality in Libya. This was hardly breaking news—those who have followed the plight of that traumatized North African country know horrid human rights abuses have been rampant for years—but the existence of such auctions, unheard of by most Americans outside of weirdly macabre Disney World rides, still arouses fresh alarm. Lawless Libya has become an escape route to the Mediterranean for thousands of migrants seeking asylum in Europe, which has given rise to human traffickers promising them safe passage, only to brutalize them and even sell them as chattel. How did this happen? According to the Times: “The migrant crisis in Libya originated with the collapse of the government of Col. Muammar el-Qaddafi six years ago.”

In the Middle East, Russia Seems to Be Everywhere


It can be difficult to separate the important from unimportant on any given day. Reflections mean to do exactly that — by thinking about what happened today, we can consider what might happen tomorrow. Russia's growing prominence in the Middle East was on full display Dec. 11 when Vladimir Putin visited three key Middle Eastern countries in one day. The Russian president followed a surprise trip to Syria with a quick stop in Egypt before ending his day's travels in Turkey. He met with his presidential counterparts in all three countries, and the economic deals, military agreements and political settlements he discussed highlighted Russia's role in the region. While Russia has its own reasons for bolstering its relationships with Syria, Egypt and Turkey, it also benefits from being visible where its regional rival, the United States, is not.

The True Danger of Repealing Net Neutrality

David Pring-Mill

In 2011, as Americans became increasingly angry at Wall Street, many Republican politicians felt the need to defend capitalism overall while condemning its corrupted elements. They invoked the phrase “crony capitalism.” Rep. Michele Bachmann accused her political rivals of crony capitalism. Mitt Romney said, “And if you want to get America going again, you’ve got to stop the spread of crony capitalism.” House Speaker John Boehner said that private-sector job creators had been “undercut by a government that favors crony capitalism and businesses deemed ‘too big to fail,’ over the small banks and small businesses that make our economy go.”

Kamikaze UAVs, Drones on Leashes, Information Bombs Top Pentagon’s Counterterror Wishlist


Want a glimpse of the irregular grey-zone battles of the near future? One great indicator is the annual wishlist of the Pentagon’s Combating Terrorism Technical Support Office, or CTTSO. Released on Wednesday, the office’s broad agency announcement, or BAA, emphasizes drones and ways to counter misinformation. Here are a few highlights:

Loitering Death Drones

Estonia, the Digital Republic


Up the Estonian coast, a five-lane highway bends with the path of the sea, then breaks inland, leaving cars to follow a thin road toward the houses at the water’s edge. There is a gated community here, but it is not the usual kind. The gate is low—a picket fence—as if to prevent the dunes from riding up into the street. The entrance is blocked by a railroad-crossing arm, not so much to keep out strangers as to make sure they come with intent. Beyond the gate, there is a schoolhouse, and a few homes line a narrow drive. From Tallinn, Estonia’s capital, you arrive dazed: trees trace the highway, and the cars go fast, as if to get in front of something that no one can see.

The Most And Least Expensive Countries For Broadband

by Niall McCarthy

The research was conducted by UK-based Cable.co.uk and it found that a monthly bill for broadband in Iran would come to an average of $5.37. Generally, surfing the net is extremely cheap across Eastern Europe with the monthly price averaging $5.51 in Ukraine, $9.93 in Russia and $13.47 in Romania. In Western Europe, prices rise considerably and in Germany for example, somebody would pay an average of $34.07 every month for broadband.

Bitcoin And Financial Governance

by Derryl Hermanutz

Digital Money

The whole world already uses a globally-integrated digital money system: bank deposits. We pay each other bank deposits by check, wire transfer (direct deposit), online banking, debit card, etc; within the central/commercial bank-operated payments system of debiting payments out of payers' bank deposit account balances and crediting the payments into payees' bank deposit account balances.

Cyberattacks And The Digital Dilemma

by Tim Sablik

Over the past year, Americans have been inundated with news of one large-scale cyberattack after another. The Democratic National Committee's email server was compromised during the 2016 election, and the organization's internal emails were posted publicly by WikiLeaks. An October 2016 attack temporarily disrupted service to many of the most trafficked sites on the Web, including Netflix, Amazon, and Twitter. Ransomware - malicious code that locks a computer's files until users pay for a decryption key - infected business, government, and personal computers around the globe in May and June 2017. And in September, credit bureau Equifax disclosed that hackers accessed personal data used to obtain loans or credit cards for as many as 143 million Americans - making it potentially the largest data theft in history. No digital system seems safe.

One-third of US businesses hit by hacks, data breaches

By: Armin Haracic  
Source Link

A leader in business cyber-insurance reports how a lack of cyber knowledge and neglected hardware leads to data breaches and, in turn, lost resources and damaged reputations. A press release from The Hartford Steam Boiler Inspection and Insurance Company (HSB) found that one-third of U.S. businesses (29 percent) suffered from data breaches in 2016. The largest amount of said breaches were caused by business contractors and vendors, followed by employee negligence and stolen or lost storage and mobile devices. Furthermore, affected businesses tended to spend between $5,000 to $100,000 to ameliorate the damage.

Ten trends redefining enterprise IT infrastructure

By Arul Elumalai, Kara Sprague, Sid Tandon, and Lareina Yee

The IT infrastructure landscape is evolving rapidly. What will it look like in 2020?

When people think of enterprise IT infrastructure, they often imagine racks of hardware locked away in data centers and basements. But it is actually a focal point of disruption and innovation in every area, from servers and storage to networking and software. What are the trends that are giving rise to such disruption and innovation? And what are the implications for business-technology strategy? Both IT infrastructure providers and customers must answer these questions as they plan their futures. We have identified ten trends that are already having a major impact on IT infrastructure and will bring even more disruption over the coming years. Here is a look at what is changing and how companies can respond.
Familiar trends at a faster pace and greater scale

Looking Back to the Future: The Beginnings of Drones and Manned Aerial Warfare

Ulrike Franke
Source Link

This essay is part of the #WarBots series, which asked a group of academics and national security professionals to provide their thoughts on the confluence of automation and unmanned technologies and their impact in the conduct of war. We hope this launches a debate that may one day shape policy. On 8 December 1909, British Army Major Baden Fletcher Smyth Baden-Powell was invited to give a talk at the Royal United Services Institute (RUSI). Baden-Powell had been among the first soldiers to see the use of military aviation. He experimented with flying kites and built an aircraft with his sister Agnes, and he had just stepped down as President of the Royal Aeronautical Society, the oldest aeronautical society in the world. On that Wednesday afternoon in December 1909, he spoke about “How Airships are Likely to Affect War.”

Mission Still Not Accomplished in Iraq Why the United States Should Not Leave

By Emma Sky

In July 2017, Iraqi soldiers, backed by U.S. air strikes, liberated Mosul, the city where Abu Bakr al-Baghdadi, the leader of the Islamic State (also known as ISIS), had declared a caliphate just three years before. It was a hard-won victory. For nine grueling months, Iraq’s Counter Terrorism Service, an elite group of U.S.- trained forces, suffered heavy losses as they fought street by street to uproot ISIS fighters, who used the local population as human shields. Thousands of civilians were killed, and a million or so were displaced from their homes. Mosul’s historic monuments have been destroyed. And the city’s infrastructure lies in tatters.

Introducing #WarBots

By Strategy Bridge

This essay is part of the #WarBots series, which asked a group of academics and national security professionals to provide their thoughts on the confluence of automation and unmanned technologies and their impact in the conduct of war. We hope this launches a debate that may one day shape policy.

Infographic Of The Day: Cybersecurity - Fighting A Threat That Causes 450B Of Damage Each Year


With recent high profile hacks of companies such as Uber, Equifax, and HBO, it's safe to say that cybersecurity is already top of mind for many of the world's biggest companies. However, as billions of more devices get connected to the internet every year – including many that are not properly secured – this cybercrime threat is evolving quickly, and the stakes are rising as well. Experts estimate that cybercrime caused $450 billion of damage to the economy in 2016, and that number is expected to increase to $6 trillion by 2021. The potential impact of a large-scale cyber attack is bigger than ever, and today cybersecurity is a number one concern for businesses, governments, and individuals.