South Asia

Ways to Integrate Efforts in Furthering Water Dialogue and Cooperation

Overview

The EastWest Institute, the Water Friends Group and the Permanent Missions of Finland, Hungary, Tajikistan and Thailand are hosting “Ways to Integrate Efforts in Furthering Water Dialogue and Cooperation,” a U.N. side-event on Friday, February 22, at 10:00 a.m at the North Lawn Building of the UN Headquarters in New York City. This event underlines UNGA resolution 65/154 declaring 2013 as the International Year of Water Cooperation (IYWC).

History shows that the vital nature of freshwater is a powerful incentive for cooperation and dialogue, compelling stakeholders to reconcile even their most divergent views. Water more often unites than divides people and societies, yet there is still a great need for more effective and coordinated measures, coupled with a stronger political will at all levels. Governments, international and regional organizations, business communities, scholars, and civil society must effectively address current and emerging freshwater problems.

In this context, the International Year of Water Cooperation is intended to unify all efforts, both undertaken and planned by the UN system, other international and regional organizations, governments, civil society and entrepreneurs, in order to increase people's awareness of freshwater-related problems and ways to resolve them. This follows the 2012 UNGA adopted resolution (A/Res/67/204) on the implementation of the IYWC, through convening a series of global high-level events. 

 

Speakers:

H. E. Mr. Rahmat Bobokalonov
Minister of  Land Reclamation and Water Resources of the Republic of Tajikistan; Office of the President of the 67th Session of the United Nations General Assembly (tbc)

Mr. Michael Jarraud
Chair to UN-Water

Mr. John Edwin Mroz
President and Chief Executive Officer of the EastWest Institute

 

Moderator:

Dr. Zafar Adeel
Director of the United Nations University, Institute for Water, Environment and Health

 

Panelists:

Ms. Josefina Maestu
Coordinator of the UN-Water Decade Programme of Advocacy and Communication

Mr. Olcay Ünver
Coordinator of the United Nations World Water Assessment Programme of the UN-Water and Director of the UNESCO Programme Office on Global Water Assessment

Mr. Sanjay Pahuja
Senior Water Resources Specialist of the World Bank

Ms. Ursula Schaeffer-Preuss
Chair of the Global Water Partnership

 

To RSVP and secure your U.N. pass, please contact:

Mr. Raymond Karam, email: rkaram@ewi.info, mobile: +1 646-243-2319

EWI and Hindu Collective Initiative Move Towards a Global Platform for Moderates

Overview

The Hindu community of Sommerset, NJ. discusses how moderates of faith can counter the growing surge of violent extremism.

On November 22, 2008, EWI’s Countering Violent Extremism Initiative continued efforts to create a global movement of moderates with a colloquium of Hindu leaders in Somerset, New Jersey (U.S.A.). The colloquium, convened by the Hindu Collective Initiative at the Arsha Bodha Center, was one of several gatherings in the United States that allow faith communities to openly discuss the nature, causes, and effects of violent extremism. The agenda of the meeting included discussions on varying definitions of violence and extremism, the tools extremists use to spread their ideology, and the role the Hindu community can play to counter the growth of violent extremism.

Promoting Media Responsibility in Countering Violent Extremism

Overview

EWI endorsed the formation of a global media leaders group to promote media responsibility in tackling issues of international peace and security.

Staff members and associates from the EWI recently attended a conference entitled "Responsibility to the Future: Business, Peace, and Sustainability." The conference, organized by the Strategic Foresight Group (SFG) in Mumbai, India, and co-hosted by the UN Global Compact, included a panel that EWI helped to organize on the role of the media in crisis prevention, peace, and intercultural understanding. EWI was able to introduce its concept of a global media leaders group to a diverse audience (over 100 foreign participants were in attendance) and engage in a fruitful discussion on the importance of media responsibility in tackling pressing issues of international peace and security, particulary violent extremism.

Building A Platform for Moderates III: Reconciling Religious Wisdom & Public Life in the 21st Century

Overview

This discussion is the third installment of our Building a Platform for Moderates series is part of the EastWest Institute’s Countering Violent Extremism Initiative, which is being supported by Donald Kendall, Chairman Emeritus of the EastWest Institute and a former Chairman of Pepsi Co. This event will be held in Partnership with the Islamic Speakers Bureau of Atlanta.

The Countering Violent Extremism Initiative is examining how religious identity plays a role in public life, and we are working towards developing a truly global perspective. Violent extremism takes many forms, but some well-known examples use religion as a key marker to enhance and further their agendas. The purpose of this meeting is to discuss the global phenomenon of violent extremism and how it relates to religious leadership.

A few discussion topics have been chosen to explore how this particular community views these issues and have been used in prior sessions. This process, if successful will be duplicated at a variety of locals in the Middle East, Europe, and Asia in order to draw upon the lessons, guidance, and experience of different communities. Feedback from these communities is being logged and synthesized for reporting at years end. The discussion is by invitation only.

Building Trust in Cyberspace

The EastWest Institute released Building Trust in Cyberspace, a report featuring highlights of its 3rd Worldwide Cybersecurity Summit held in New Delhi on October 30-31, 2012. More than 300 participants from 22 countries heard from cyber experts from across the globe representing both the private and public sectors. 

Many of the participants emphasized the importance of the conference's location. "We are all in the room today because we recognize that India is an essential partner on cybersecurity," said Ross Perot, Jr., chairman of the EastWest Institute.

The report contains results of an informal poll of participants, where 93 percent expressed the view that the cybersecurity risk is higher than one year ago. A preview of EWI's 4th Worldwide Cybersecurity Trustbuilding Summit, which will be held in Silicon Valley in 2013, is also included.

High-ranking Indian officialsamong them, Deputy National Security Advisor Latha Reddy and Secretary R. Chandrashekhar of the Department of Telecommunicationsnot only participated in the summit but also helped frame key issues on the agenda. In addition, EWI partnered with the National Association of Software and Service Companies (NASSCOM), the Federation of Indian Chambers of Commerce and Industry (FICCI) and the Data Security Council of India (DSCI), which sponsored three breakthrough groups. The topics were chosen in consultation with the Indian government and private sector leaders. 

Key summit sponsors included Deloitte, Goldman Sachs, Huawei, Knightsbridge Cybersystems, Microsoft, Reliance Industries Limited, Stroz Friedberg, and Vodafone. (For a full list of sponsors, see the opening section of the report.)

Top authorities from both industry and government agreed that the rapid pace of technological change has triggered a corresponding leap in exposure to vulnerabilities that can be exploited by cyber criminals. This has also raised fears about government intrusion that could threaten privacy and individual freedoms. 

Michael Chertoff, chairman of the Chertoff Group and former U.S. Secretary of Homeland Security, pointed out how complicated many of these issues have become. "You cannot have privacy without security," he said, while acknowledging the legitimate fears that some governments will attempt to control Internet content.

Building Trust in Cyberspace illustrates how, as was the case with the previous summits in Dallas and London, the New Delhi summit helped spur the process of producing concrete recommendations for industry and government. If implemented, those recommendations will help make cyberspace and the real world more stable and secure. 

Click here for video highlights of the summit.

For information on the 3rd Worldwide Cybersecurity Summit, please visit www.cybersummit2012.com

India and Pakistan’s Energy Security: Can Afghanistan Play a Critical Role?

India and Pakistan make up close to one-fifth of the world’s population, yet most people in these countries are without stable access to energy and power. As a result of these deficits, overall growth of these nations is stunted by 3 to 4 percent annually, which undermines sustainable development and stability in Southwest Asia.

In India and Pakistan’s Energy Security: Can Afghanistan Play a Critical Role?, EWI Fellow Danila Bochkarev argues that the power shortages can be addressed by building new energy corridors or a “New Silk Road,” which would transform Afghanistan into a regional trade and transit hub. 

The report illustrates how this infrastructure would strengthen economic, political and social ties between Central Asia and South Asia and contribute to a more stable Afghanistan, allowing for improved economic growth.

"There is no shortage of energy resources in the Southwest Asia-Central Asia region and natural gas is abundantly available in this part of the world,” Bochkarev said. “Major centers of energy consumption in India and Pakistan are in proximity to the major producers of gas and hydroelectricity.”

The report describes two planned energy infrastructure projects that would run through Afghanistan—the Trans-Afghanistan Pipeline (TAPI) and the Central Asia South Asia Regional Electricity Trade Project (CASA 1000)—to access Turkmen gas and Central Asian electricity. “Afghanistan’s role as a transit country for gas from Central Asia can hardly be overestimated,” Bochkarev added.

A major challenge to these projects is, of course, the unstable security situation in Afghanistan and lack of genuine multilateral energy cooperation. Nonetheless, Bochkarev argues that the Energy Charter Treaty (ECT) could serve as an appropriate institutional umbrella for participating countries, providing for regional rules and regulations. ECT investment protection mechanisms, his report adds, would help to re-establish international investors’ confidence in the region’s economic and regulatory policies.

The release of this report coincides with the convening of the EastWest Institute’s 9th Annual Worldwide Security Conference in Brussels on November 12-13 at the World Customs Organization. The focus of WSC 9 will be “Reshaping Economic Security in Southwest Asia and the Middle East.”

 

For more information on the 9th Annual Worldwide Security Conference and to register, please visit: http://www.ewi.info/events/9th-annual-worldwide-security-conference.

 

The Cybersecurity Agenda: Mobilizing for International Action

A report by EWI and the Data Security Council of India lays out several recommendations to begin building the legal, technical and administrative foundations for an international system to secure cyberspace.

Cyberspace comprises IT networks, computer resources, and all the fixed and mobile devices connected to the global Internet. A nation’s cyberspace is part of the global cyberspace; it cannot be isolated to define its boundaries since cyberspace is borderless. This is what makes cyberspace unique. Unlike the physical world that is limited by geographical boundaries in space—land, sea, river waters, and air—cyberspace can and is continuing to expand. Increased Internet penetration is leading to growth of cyberspace, since its size is proportional to the activities that are carried through it.

Cyberspace merges seamlessly with the physical world. So do cyber crimes. Cyber attackers can disrupt critical infrastructures such as financial and air traffic control systems, producing effects that are similar to terrorist attacks in the physical space They can also carry out identity theft and financial fraud; steal corporate information such as intellectual property; conduct espionage to steal state and military secrets; and recruit criminals and others to carry out physical terrorist activities.

Anyone can exploit vulnerabilities in any system connected to the Internet and attack it from anywhere in the world without being identified. As the Internet and new technologies grow, so do their vulnerabilities. Knowledge about these vulnerabilities and how to exploit them are widely available on the Internet. During the development of the global digital Internet and communications technology (ICT) infrastructure, the key considerations were interoperability and efficiency, not security. The explosion of mobile devices continues to be based on these insecure systems of Internet protocols.

It is increasingly cheap to launch cyber attacks, but security systems are getting more and more expensive. This growing asymmetry is a game changer. It has another dimension, too—individuals, terrorists, criminal gangs, or smaller nations can take on much bigger powers in cyberspace, and through it, in the physical world, as well. The effects of attacks on critical infrastructure such as electricity and water supplies are similar to those that would be caused by weapons of mass destruction, without the need for any physical attacks.

Proving attribution in cyberspace is a great challenge. In most cases, it is extremely difficult to attribute cyber attacks to nation-states, collecting irrefutable evidence. The very nature of botnets and zombies makes it difficult to do so, leading to the conclusion that “the Internet is the perfect platform for plausible deniability.”

Nations are developing cyber attack capabilities with a view to dominating cyberspace. However, unilateral dominance in cyberspace is not achievable by any country. But uncontrolled growth of cyber attack capabilities—in effect, cyber attack proliferation—is an increasingly troubling phenomenon. Yet another disturbing reality is that cyber attacks can be launched ever more easily, and propagated faster using the same broadband that nations are building for global e-commerce. Finally, the consequences of a cyber attack are more likely to be indirect and more uncertain than most scenarios currently envision; we may not always recognize the damage inflicted by cyber attackers.

Cybersecurity is a global problem that has to be addressed globally by all governments jointly. No government can fight cybercrime or secure its cyberspace in isolation. Cybersecurity is not a technology problem that can be ‘solved’; it is a risk to be managed by a combination of defensive technology, astute analysis and information warfare, and traditional diplomacy. Cyber attacks constitute an instrument of national policy at the nexus of technology, policy, law, ethics, and national security. Such attacks should spur debate and discussion, without any secrecy, both inside and outside governments at national and international levels. This is all the more so because of the growing number of significant actors not tied to, or even loosely affiliated with, nation-states. Over the last few months, events in cyberspace such as the GhostNet attacks on governments and large multinational corporations, whether to steal intellectual property or attack free speech, bear this out. They are not restricted by geographical borders or national laws.

There is an added dimension to this problem: the infrastructures are owned and operated by the private sector, and cyberspace passes through various legal jurisdictions all over the world. Each government has to engage in supporting its private sector for cybersecurity through effective public-private partnership (PPP) models, with clearly-defined roles for government and industry. Because cyberspace is relatively new, legal concepts for ‘standards of care’ do not exist. Should governments create incentives to generate collective action? For example, they could reduce liability in exchange for improved security, or introduce tax incentives, new regulatory requirements, and compliance mechanisms. Nations have to take appropriate steps in their respective jurisdictions to create necessary laws, promote the implementation of reasonable security practices, incident management, and information sharing mechanisms, and continuously educate both corporate and home users about cybersecurity.

International cooperation is essential to securing cyberspace. When it comes to tracking cyber criminals, it is not only the laws dealing with cyber crimes that must exist in various countries, but the collection of appropriate cyber forensics data in various jurisdictions and their presentation in courts of law, which are essential to bring criminals to justice in sovereign countries. The term “cybersecurity” depends upon international cooperation at the following levels:

  • National nodal centers on information infrastructure, based on public-private partnerships, to cooperate;
  • Global service providers such as Google, Microsoft, Twitter, Yahoo, and Facebook to cooperate with law enforcement agencies in all countries and respond to their requests for investigations;
  • Computer Emergency Response Teams (CERTs) to exchange threats and vulnerabilities data in an open way to build an early-watch-and-warning system;
  • Incident management and sharing of information with a view to building an international incident response system;
  • Critical-infrastructure protection: Establishment of an international clearing house for critical-infrastructure protection to share threats, vulnerabilities, and attack vectors;
  • Sharing and deployment of best practices for cybersecurity;
  • Creation of continued awareness on cyber threats, and international coordination as part of early-watch-and-warning system;
  • Acceptable legal norms for dealing with cyber crimes regarding territorial jurisdiction, sovereign responsibility, and use of force to reconcile differing national laws concerning the investigation and prosecution of cyber crimes, data preservation, protection, and privacy. Address the problem of existing cyber laws that do not carry enforcement provisions;
  • Incident response and transnational cooperation, including establishment of appropriate mechanisms for cooperation. Such measures must include provisions to respond to counter cyber terrorism, including acts of sabotage of critical infrastructure and cyber espionage through information warfare
  • Law enforcement agencies to investigate cases, collect forensic evidence at the behest of other countries, and prosecute cyber criminals to bring them to justice.

It is time for the international community to start debates and discussions to encourage nations to create domestic public-private partnerships for cybersecurity, establishing laws for cyber crimes, and, more importantly, to take steps for international cooperation to secure cyberspace.

 

Pages

Subscribe to RSS - South Asia