Using autonomous technologies, artificial intelligence and machine learning in the military sphere leads to the emergence of new threats, and it is crucial that we identify them in time.
Over the last decade, the development of technologies that can provide conventional weapons with unique capabilities typical of “killer robots” has been accelerating. The UN has given these types of weapon the designation of lethal autonomous weapons systems (LAWS). This is the name for weapons that are capable of hitting land, air and water targets without human participation.
AI-based LAWS create threats that can be divided into three groups:
1.The first group comprises risks associated with removing human agents from the decision to use weapons, the so-called “meaningful human control problem.” The global public (NGOs such as Stop Killer Robots, Article 36, the International Committee for Robot Arms Control, businesspersons and scientists, in particular, Steven Hawking, Elon Musk and Steve Wozniak) believe it highly probable that fully autonomous weapons will not be able to comply with international humanitarian law and human rights and will create a problem of identifying the persons to be held liable in case of illegal acts by autonomous units. “Killer robots” are accused of being incapable of sympathy, i.e. a human feeling that often acts as deterrent to the use of weapons. Another argument against LAWS is that their use contradicts the principle of humaneness and the demands of public conscience.
2.The second group of threats is related to breaches of strategic stability. Elements of autonomy and AI are appearing in all areas of military confrontation. In the nuclear sphere, high-precision tactical nuclear bombs and hypersonic devices with new nuclear warheads are now appearing. In outer space, it is unmanned space drones, low-orbit surveillance and satellite communications systems. In the area of missile defence, there are new surveillance and tracking systems linked with communications and control systems. And in the cyber sphere, cyber weapons and automated hacking-back cyber systems are emerging. Some of these weapons, for instance, hypersonic missiles and cyberattacks, could serve as instruments of tactical deterrence along with nuclear weapons. That is, even non-nuclear countries now have the capability of sharply increasing their deterrence and attack potential. These trends entail a series of risks:
— the risk of one country establishing technological and military global superiority;
— a new arms race;
— increased regional and international tensions;
— reduced transparency of military programmes;
— a disregard for international law;
— the spread of dangerous technologies among non-state actors.
Based on the experience of using military and commercial drones, researchers conclude that the manufacturing technologies of LAWS, as well as their components and software, will proliferate abundantly, which will give rise to another arms race resulting in instability and escalation of various risks.
Some experts believe that maintaining strategic stability in the coming decades will require a revision of the foundations of the deterrence theory in the multipolar world.
3.The third group of threats stems from the drastically reduced time allocated for making strategic decisions within the Intelligence, Surveillance & Reconnaissance (ISR) and military Communications, Command and Control (C3) systems. The principal drawback of a human compared to a machine is that the human mind requires too much time to assess the situation and make the right decision. An entire series of military programmes in the leading states (in particular, the Pentagon’s Maven, COMPASS, Diamond Shield) aims to have supercomputers take over the work of analysing various data and developing scenarios for the political and military leadership.
That entails, as a minimum, the following risks:
— The shortage of time to make meaningful decisions.
— Insufficient human control over the situation.
— Making strategic decisions on the basis of mathematical algorithms and machine learning systems, not human logic.
— The lack of mutual understanding between the machine and the human. Neural networks are thus far incapable of explaining the regularities of their work in a human language.
To be fair, it should be noted that globalization and the development of cross-border projects, social networks, transnational corporations, international cooperation, surveillance satellites and radio-electronic surveillance equipment have made the world more transparent. The world now has a huge number of sensors that report new threats before they even materialize.
Let us consider these three groups of threats in more detail.
The Meaningful Human Control Problem
In December 2016, the Fifth Review Conference Fifth Review Conference of the Convention on Conventional Weapons (CCW) weapons adopted the decision to create a Group of Governmental Experts authorized to “explore and agree on possible recommendations on options related to emerging technologies in the area of LAWS.” Commentators believe that, despite various obvious terminological discrepancies, those who attended the conference agreed that the use of force should always take place under “meaningful human control.”
Some experts see four components in the problem:
- The risks that LAWS carry for civilians.
- The risks of human rights and human dignity violations.
- The inability of LAWS to comply with the laws of war.
- The uncertainty concerning legal liability for intentional and unintentional consequences of using LAWS.
It would be a mistake to think that the emergence of LAWS laid bare certain gaps in international law that need to be filled immediately. States and their citizens must comply with the norms and principles of international law in effect, and these norms and principles contain an exhaustive list of rules and restrictions in warfare.
International humanitarian law (IHL) was designed to protect human values, and a number of experts believe that some of its documents have direct bearing on the LAWS problem:
— The Martens Clause: the rule formulated by the Russian lawyer and diplomat Friedrich Martens in 1899 stating that even if a given provision is not included directly in the articles of the current law, in situations of military hostilities, the parties will be guided by the principles of laws of humanity and the dictates of public conscience.
— The “Laws of humanity” stemming from the 1948 Universal Declaration of Human Rights and the 1966 International Covenant on Civil and Political Rights.
— Article 36 of the 1977 Protocol Additional I to the 1949 Geneva Conventions on new weapons.
— Various documents constituting the law of armed conflict with its basic principles:
- The distinction between civilians and combatants.
- The principle of proportionality (commensurability) of the use of force.
- The principle of military expediency.
- Restricting the means and methods of warfare (prohibition of excessive destruction or causing excessive suffering).
Since the international instruments that are currently in effect place give national governments the responsibility to interpret their obligations, international experts fear that the latter will interpret them in their own favour while neglecting moral concepts and human dignity. From this, they conclude that there is a need for a more detailed elaboration of the IHL norms as applied to LAWS.
Whatever the case may be, the latest consultations on the future of LAWS held on August 27–31, 2018 in Geneva at the Convention on Certain Conventional Weapons (CCW) resulted in the approval of ten potential principles that could serve as a future foundation for the international community’s approach to LAWS. The key principle is that all work in military AI should be conducted in compliance with international humanitarian law, and liability for the use of such systems will always lie with a human. The final decision on the future of the Group of Governmental Experts will most likely be made on November 23, 2018 at the conference of CCW signatory countries.
LAWS and Strategic Stability
At the Washington Summit held between the Soviet Union and the United States in June 1990, the parties made a joint declaration on nuclear and space weapons. In it, they outlined the theoretical foundations of strategic stability, which was defined as a state of strategic relations between two powers when neither has the incentive to deliver the first strike. The parties distinguished two notions within strategic stability: crisis stability and arms race stability. Crisis stability was taken to mean a situation in which even in a crisis neither party had serious opportunities or incentives to deliver the first nuclear strike. Arms race stability was determined with regard to the presence of incentives to increase a country’s own strategic potential.
The principles of strategic stability enshrined in the 1990 Declaration were considered the guidelines for weapons control. Later, the notions of “first strike stability” and even “cross-domain strategic stability” emerged.
Military AI has the potential to breach stability within any concept. Some high-ranking Pentagon strategists have already made statements that autonomous robots could ensure global military dominance. They believe that combat drones will replace nuclear weapons and high-precision munitions and will make it possible to implement the so-called “third offset strategy.”
Obviously, machine learning and autonomy technologies open new opportunities for using nuclear munitions (for instance, a high-precision reduced-capacity B61-12 nuclear bomb) for tactical missions and vice versa. Strategic tasks can be handled using non-strategic weapons.
For instance, the development of hypersonic vehicles with high defence-penetration capabilities leads to a lower nuclear conflict threshold.
The Boeing X-37B Orbital Test Vehicle and XS-1 Spaceplane space drones or the X-43A Hypersonic Experimental Vehicle hypersonic drone will change the model of confrontations in space. Combining the Space Tracking and Surveillance System (STSS) with the Command and Control, Battle Management, and Communications (C2BMC) system demonstrates entirely new strike capabilities of ballistic missiles. The strategy of neutralizing missile systems at launchers by using cyber and radio-electronic Left-of-Launch devices opens up a new roadmap for missile defence. The QUANTUM programme and the automated hacking-back cyber weapon can set destructive software into “fire” mode.
The rapid spread of drone technologies throughout the world and the budding competition for the global market between major manufacturers of strike drones are causes for alarm. Today, the United States has over 20,000 unmanned vehicles, including several hundreds of combat strike drones. Small strike drones that in the future may deliver strikes as an autonomous swarm distributing functions without an operator’s input are now in development in future. China is not officially disclosing the number of drones in service of the People’s Liberation Army; however, some experts believe that it is roughly equal to the number in service of the Pentagon. China both manufactures and actively exports strategic drones capable of both intelligence and strike missions. Following the United States with its MQ-25 Stingray programme, China is developing ship-based drones and unmanned vehicles capable of interacting with manned aircraft.
The United Kingdom, Israel, Turkey, Iran and Japan also lay the claim to a place among the world’s leading drone manufacturers. Military strategists of small and large states believe that, in future, unmanned vehicles will form the backbone of their air force. Back in 2015, United States Md. Secretary of the Navy Ray Mabus said that the F-35 will likely be the last manned strike fighter, and unmanned systems will be “the new normal in ever-increasing areas.”
C3ISR Outsourcing and Strategic Time Pressure
Using artificial intelligence (AI) in the military area is gaining momentum. As a rule, a programme of automatic data collection and analysis opens up possibilities for new projects in related areas. The use of the so-called artificial intelligence in the military sphere will probably increase exponentially moving forwards.
AI will also be a reason for the emergence of new weapons and related army units in the near future, such as cyber command, missile defence, AI-based intelligence, information warfare, electronic warfare (EW) systems, laser weapons, autonomous transportation, robotics units, drones, anti-drone weapons, hypersonic aircraft, unmanned underwater drones and aquanaut teams.
In future, conventional army service branches will change shape, forming different combinations to use the advantages of new AI-based systems. Studies have demonstrated a twofold increase in the effectiveness of air and missile defence working in conjunction with EW systems.
Using AI in the military sphere will result in the gradual introduction of robotics and automation in every possible sphere, in materials and logistics in the first place. Logistics of the future is capable of seriously affecting strategic stability through the high automation of logistical processes up to the autonomous delivery of munitions to the battlefield.
Information exchange between service branches will develop both vertically and horizontally, from aircraft pilots in the air to platoon leaders on the ground and vice versa, and AI will filter information so that each party will only receive data that is useful to them, with information noise being removed. That is the idea behind the Diamond Shield air and missile defence that is currently being developed by Lockheed Martin. Data collected on land, in the air and in space, including through the Pentagon’s MAVEN programme, will be processed by neural networks and distributed in real time to commanding officers of all levels. AI will conduct the actions of military units, creating so-called algorithmic warfare.
AI will track clandestine action in times of peace, too. The COMPASS (Collection and Monitoring via Planning for Active Situational Scenarios) programme is one such example. The goal of COMPASS is to analyse a situation and its participants’ behaviour in a “grey” zone, which is understood as a limited conflict on the border between “regular” competition among states and what is traditionally deemed to be war. Strategic time pressure will lead to assessments of national threats and the use of weapons also being automated and outsourced to AI-based command and analytical systems.
The symbiosis of analytical and command programmes on the basis of neural networks increases the risk of the Human-Machine Interaction model, leaving little room for humans, who will have just one button to press to approve decisions made by machines.
The configurations of AI-based analytical and control systems will be highly classified, thereby causing additional concerns to the public.
Allegorically speaking, human civilization is standing in front of the door into a world where the military handles its objectives using AI and autonomous “killer robots.” Thus far, we do not know for sure how dangerous that is. Maybe our worst expectations will not come true. However, in the worst-case scenario, that world will open Pandora’s box, letting out fears and suffering. Preventing such a scenario in advance is the proper course of action.
First published in our partner RIAC
Balochistan `insurgency ‘and its impact on CPEC
A dispute arose between Baloch leader Akber Bugti and then government led by Parvez Musharraf. Bugti was killed. How he was killed remains a mystery. But, his death triggered a lingering `insurgency’, with ebbs and flow in foreign support.
However, there is no let-up in global anti-Pakistan propaganda from Dr. Naila Baloch’s `free Balochistan’ office, working in New Delhi since June 23, 2018. When this office was opened many Bharatya Janata Party parliamentarians and India’s Research and Analysis Wing’s officers attended it.
The office was opened in line with Doval Doctrine that aims at fomenting insurgency in Pakistan’s provinces, including Balochistan and Khyber Pakhtunkhwa. `Free Balochistan’ sponsored offensive posters on taxi cabs and buses in Switzerland and Britain. USA has recently outlawed Balochistan Liberation Army. However, earlier, in 2012, a handful of Republican had moved a pro-separatist bill in US Congress. It demanded `the right to self-determination’ and ` opportunity to choose their own status’ for people of Balochistan.
Pakistan caught a serving Indian Navy officer Kalbushan Jhadav (pseudonym Mubarik Ali) to foment insurgency in Balochistan. Indian investigative journalists Karan Thapar and Praveen Swami suggested that he was a serving officer. India’s security czar,
Along with Baloch insurgents, Pushtun Tahafuzz Movement is being backed up by India. In their over-ebullient speeches, PTM’s leaders openly scold Pakistan’s National Security institutions. Pakistan’s Inter-Services Public Relations had to warn them `not to cross the red line. Yet, sponsored by Pakistan’s enemies they continued their tirade. While addressing a rally at Orakzai (April 20, 2019), Pakistan’s prime minister expressed sympathy with Pashtun Tahafuzz Movement demands. But he expressed ennui at anti-army slogans shouted by them. Earlier, Pakistan’s senate’s special committee had patiently heard their demands. PTM voices concerns that are exterior to Pashtoon welfare. For instance, Manzoor Pashteen, in his interview (Herald, May 2018, p.48), berates Pak army operations and extols drone strikes. He says, ‘The army did not eliminate even a single Taliban leader. All the 87 Taliban commanders killed in the last 18 years were eliminated in drone strikes’. At a PTM meeting in Britain, even Malala Yusafzai’s father (Ziauddin), like His Master’s Voice, echoed anti-army sentiments. He said, “Pakistan army and intelligence agencies knew that Fazalullah was a terrorist who continued to operate radio station in Swat’.
For one thing drone strikes amount to aggression. In an article, David Swanson pointed out that any use of military force, be it a drone attack, amounts to a war. The Kellogg-Briand Pact made war a crime in 1928 and various atrocities became criminal acts at Nuremberg and Tokyo.
Genesis of insurgency: Balochistan has been experiencing an armed insurgency since 2005, when veteran Baloch leader Nawab Akbar Bugti became embroiled in a dispute with then-President of Pakistan General Pervez Musharraf. The differences initially centered on royalties from natural gas mined in the resource-rich town of Dera Bugti, in northeast Balochistan. Subsequently, the building of military cantonments in Balochistan, and the development of Gwadar port by China, also became reasons for conflict (The Quint, August 26 2017). On August 26, 2006, Nawab Akbar Bugti was killed in a mountainous region of Balochistan; although the Pakistani government denied killing Bugti, Baloch groups blamed the government for his assassination, and thus the armed insurgency was further intensified (Dawn, August 27 2006).
Baloch insurgents allege that the China is a “partner in crime” with Pakistan’s government in looting the natural resources of Balochistan (The Balochistan Post, November 25 2018). In December 2018, Pakistan officials foiled a plan to attack Chinese workers on the East Bay Expressway in Gwadar, seizing weapons and ammunition that Baloch insurgents had stockpiled for that purpose (Samaa Digital, December 6 2018).
The most active separatist groups in Balochistan are Baloch Liberation Army, Balochistan Liberation Front, Baloch Republican Army, and United Baloch Army.
Balochistan separatist groups are divided into two distinct groups. The first group consists of BLF, UBA and BRA, whereas the second group includes Balochistan Liberation Army and Balochistan National Liberation Front
Emergence of BRAS: In the early hours of April 18, a group of militants in southwestern Pakistan blocked the coastal highway that connects the port of Gwadar, near the Iranian border, to Karachi farther east. The militants stopped six buses near a mountain pass and checked the identity cards of all the passengers. They singled out 14 members of Pakistan’s armed forces, and then executed them all. Hours later, a coalition of three Baloch separatist groups, known as Baloch Raaji Aajoi Sangar, or BRAS, claimed responsibility. The same group had previously owned attack on the Chinese Consulate in Karachi and a bus of Chinese engineers in the town of Dalbandin, north of Gwadar.
Iran’s woes: Iran worries that Pakistan is allowing Saudi Arabia to use Gwadar as a launching pad to destabilize it. Just as Pakistan accuses Iran of harboring Baloch separatists like BRAS, Iran blames Pakistan for giving sanctuary to militant Sunni Baloch groups such as Jaish al-Adl that have attacked Iranian security forces in Iran’s Sistan and Balochistan province.
Active insurgent groups in Balochistan: Balochistan separatist groups are divided into two distinct groups. One sunni funded by Kingdom of Saudi Arabia for attacks in Iran. And the other shia funded by Iran. The main groups are: Baloch Raaji Aajoi Sangar (involved in attack on Chinese Consulate in Karachi), Baloch Liberation Army, Baloch Liberation Front, , United Baloch Army, Baloch Liberation Tigers, Baloch Nationalists, Baloch Young Tigers, Balochistan Liberation United Front , Balochistan National Army, Lashkar-e-Balochistan, Baloch Republican Party, Baloch Mussalah Diffah Tanzim (Baloch Militant Defense Army), Baloch National Liberation Front, Free Balochistan Army, Baloch Student Organisation, and Baloch Republican Army (BRP). BRP is the political wing of the armed Balochistan Republican Army. However, its central spokesman Sher Mohamad Bugti denies any relation with the BRA.
Strengths and weaknesses: The insurgency draws its sustenance from the popular misconception that China-Pakistan Economic Corridor is detrimental to Baloch interests. When completed, it would follow influx of foreigners. They would grab their land, plunder their resources and change their demography.
Infighting is the main weakness of the insurgency. Unable to harm armed forces, the insurgents began “killing fellow Baloch and non-Baloch settlers, and launching attacks against Sindhi and Pashtun citizens.” Infighting became obvious when the Baloch Liberation Army “killed on of its commanders, Ali Sher, and detained four of its freedom fighters” in 2015,
Seminars need to be held inside the country, instead of in China, to create awareness in gullible masses. Issues relating to royalty should be settled. Economic deprivation of the people should be reduced.
Sardari (chieftain) system is the bane of economic deprivation: Even when the British government had consented to creation of India and Pakistan as independent states, one thing continually badgered Churchill`s mind. It was concern about downtrodden masses who would groan under tyranny of the nawab, wadera and chaudhri, after the Englishman`s exit from the Sub-Continent. Churchill believed that the Englishman`s legacy to the Sub-Continent was a modicum of justice and rule of law.
No-one better knew the psyche of the feudal lords better than the Englishman himself. Loyalty to the British crown was sine qua non of being a protégé of the British raj. After all, the wadera icons were the Englishman`s own creation. Of all the lords, the conduct of late Akber Bugti baffles one`s wits. His father, Mehrab Khan, was given title of `Sir` by the English rulers and allotted land not only in the Punjab but also in the Sindh province. Akber Bugti, former governor of Balochistan (1972), owned houses in Quetta, Sibi, Jacobabad, Kendkot, Sanghar, besides his native house in Dera Bugti along with about 12,000 acres of land.
The wadera in the yesteryears used to be tyrannical only to the inhabitants of their own constituency, not to the whole country. The situation appears to have changed now. Is it justified to aid or abet blowing up of gas pipelines, shooting at army helicopters, dragging the innocent Punjabi from the Punjab-bound buses and shooting them point-blank, looting buses going to the other provinces.
Will killing innocent passengers lead to forced payment of money by the gas companies, in addition to agreed royalty? By no stretch of logic, such a step could be justified. The matter needs a closer pry by the government into the psyche of our Baluch lords. Why Pak army can`t build cantonments on Pak soil?
The grievance appears to stem from the perception that lion`s share of windfall gains from the multi-billion dollar Gwador port and city project will go to affluent and influential non-Baluchi civilians and non-civilians. Well, that issue could be sorted out at talks.
In terms of area, Balochistan is the largest province of Pakistan. It covers 43.6 per cent of the country`s total area with only 5 per cent of the total population. It is rich in natural resources. Pakistan`s industrial infrastructure mainly depends on the gas and coal of this province. The gas from Dera Bugti meets 60 per cent of Pakistan`s, mainly Punjab`s, domestic and industrial needs. The province has 200 coal mines, which again meet the industrial requirements of Punjab. The province is rich in marble and mineral wealth which is being explored by foreigners under contracts from the Government of Pakistan. Balochistan benefits from the resources of the other provinces just as the other provinces benefit from the resources of Balochistan. The Nawabs received crores of rupees as royalty for the gas transmitted. They are to be blamed for the backwardness of the province. Why don`t they spend a pittance out of the received money on economic development of the province?
Not long ago, gas pipelines in Dera Bugti, the source of the Sui Gas, were frequently attacked by missiles. The government said the attackers were from Bugti tribe. The Pakistan government had to detail about 50,000 para-military troops to protect sensitive installations in Dera Bugti.
In the Sui-gas-fields area, Akbar Bugti initially owned no land. In collusion with revenue officials he got 7,000 acres transferred in his name. He has been receiving royalty from two gas companies at the rate of Rs. 14,000/- per acre, to the tune of ten crore rupees annually. But this land was the property of the Kalpar tribe.
In 1992 armed Bugti tribesmen forcefully evicted six thousand Kalpars and Masuri Bugtis and occupied their lands, gardens and houses. These people are wandering hither and thither in different districts.
The PTM’s criticism of Pakistan’s armed forces is not fair. They wrogly defend drone attacks. The UN charter maintained war as a crime, but limited it to an ‘aggressive’ war, and gave immunity to any wars launched with the UN approval. If that is indeed the case, did the UN allow drone attacks on Pakistan? Drone attacks on Pakistan’s territory are a clear violation of the country’s sovereignty as an independent state. Doubtless `patriotism is the last refuge of a scoundrel’. Lest the PTM is dubbed unpatriotic, it should stick on course. And confine itself to its demands.
The root cause of the problem is the medieval sardari system in Balochistan. This system is responsible for suppression of the common man. This system should be abolished. If the Sardars of today had not been constantly loyal to the Englishman, he would have dis-knighted them.
Not all the nawabs are so malevolent, as our Baluch scions of nawabs.
Nawab of Kalabagh tried to abolish the Sardari system by setting up about 40 police stations in Balochistan. However, General Moosa was averse to the policy. The government should seriously consider such steps as would effectively extend its writ in every nook and corner of Balochistan. The Sardari system must be abolished. Meanwhile, a study should be undertaken to evaluate loyalty and political nuisance of the nawab, sardar, waderas, and their ilk. If the Sardars are not loyal to the national interests, what is the fun of propping them up with government`s patronage? Why not take corrective action to cut them to size?
India should stop stoking up insurgencies in Balochistan and Khyber Pakhtunkhwa. Both India and Pakistan are nuclear armed. There is no reason why they should be toujours at daggers drawn. Entente may flare up into a nuclear Armageddon. India need to shun jingoism, stop its evil machinations in Pakistan, and solve differences through talks.
Strategy of Cyber Defense Structure in Political Theories
Since the principle of defense addresses a wide range of threats, it applies both in the field of justice and in the field of military and strategic affairs. But implementing cyber-defense is only recommended if the risks that can be identified have a direct impact on the security and even survival of a state, so each government is obliged to address any challenges that may arise. To eliminate it. Challenges of identifying the author or authors of an attack, estimating the likely impacts and reconstructions of the attack and setting targets, within the context of public networks and actors, distinguish cyberspace from other spaces in which defense is formed. Defense in cyberspace, while feasible, may not only be limited to existing actions, but unique concepts must be developed and presented.
In fact, some of the challenges in cyber defense are similar to those in other forms of defense. For example, the problem of identifying cyberattacks is reminiscent of the challenge of defending nuclear terrorism. Identifying the effects of a cyber-attack is very similar to identifying the effects of biological weapons. Also, the invisibility of computer weapons is, in many cases, very similar to the challenge posed by biological weapons.
Defensive methodological approaches can therefore be used to define some elements of cyber defense: against the threats of terrorism the concepts of “defense through denial” and “indirect defense” can be conceptualized against biological threats. Applied “symmetrical defense”.
In practice, however, we find that, although governments appear to be heavily dependent on computer systems for their deployment, they are not the same as those charged with using malicious equipment against computer systems. . For this reason, the impact of using cyber defense equipment against them is questionable. In fact, hacker groups that sell or lease knowledge or networks of infected machines to others, often to attack, plan malware or spyware or even to detect security flaws in systems, often the only things they need are a few (powerful) computers and an internet connection. So the question arises whether they can be prevented from doing so only by threatening to respond exclusively to cyber.
The need to establish a balance between action and response and the necessity of influencing the answer itself presents another challenge that must be met with the ability to ensure that the response is repeated and repeated as needed. Some experts believe that cyber defense can disrupt or temporarily disrupt a competitor’s activities, or temporarily disrupt the competitor’s activities, despite the physical (physical) measures that more or less neutralize the competitor; but none of the cyber solutions. It cannot lead to definitive neutralization of the threat.
In such a situation, the impact of the Aztemeric countermeasures point-by-point action cannot be ignored. Therefore, better enforcement of cyber defense against criminal groups – whose realization of financial interests is their top priority – can be resorted to by law enforcement (including actions aimed at the financial interests of the actors). Military responses can also be used if confronted with actors with little reliance on information technology.
Achieving safety and security in an age of disruption and distrust
The ability of citizens and businesses to go about their daily lives with a sense of safety and security is vital to prosperity, but citizens in many countries feel unsafe. Whether it’s because of inadequate responses to natural disasters, terrorist attacks, massive data breaches or the spread of disinformation, trust in governments’ ability to protect society is declining.
To address this requires a new, systemic approach to security that broadens its definition beyond defence and policing. Governments, local authorities and the private sector need to work closely together across all areas that contribute to security. PwC identifies four overlapping domains – physical, economic, digital and social — underpinned by trust, that form the foundation of a secure and prosperous society.
That’s the conclusion of PwC’s new report, “Achieving safety and security in an age of disruption and distrust.” Itchallenges the traditionally narrow view of physical safety and security, expanding the concept of what security means to include citizens’ basic needs; including food, water and utilities; and the organisations that deliver them.
The report draws on academic research* and case studies to show the necessity and benefits of a collaborative approach to security. It identifies the different elements that cause citizens and businesses to feel unsafe and the players, from private sector communications firms and infrastructure companies to security forces and non-governmental organisations, who need to work together to deliver security in all the domains.
Tony Peake, PwC Global Leader, Government and Public Services, says:“Unless you create a safe and secure environment in which people can go about their daily lives without fear, they won’t be able to work and sustain their families or carve out a decent standard of living.
The breadth of the challenge of delivering security has never been greater, requiring agility in response and innovation in prevention. And while security is a core task of governments, it can’t be achieved in isolation. It needs to be viewed holistically, with governments taking the lead in facilitating collaboration across organisations, sectors and territorial divides to deliver the security that is vital to a functioning society.”
The building blocks of security: physical, digital, social and economic
The report explains how these domains overlap and impact each other, adding to the complexity of delivering security. For example, economic security is closely tied to cyber security and thwarting data theft. Critical infrastructure services like telecommunications, power and transportation systems that rely on technology to operate must be secured both physically and digitally. Border control systems such as passport readers and iris scanning machines rely on digital interfaces that require cyber security.
Peter van Uhm, former Chief of Defence of the Armed Forces of the Netherlands, summarises in his foreword to the report:“It has become increasingly clear that delivering the safety and security that citizens and businesses need to prosper requires ever closer collaborations across borders, sectors and institutions. I learned that (re)building a failed state means realising that everything in a nation is interlinked and that it is all about the hearts and minds of the people. If you want the people to have trust in their society and faith in their future, safety and security in the broadest terms are the prerequisite.”
How governments can safeguard and protect citizens
PwC has identified six key actions that government leaders can take to develop a collaborative, systemic approach to delivering safety and security to their citizens:
1) Take stock: look at the interplay of the different physical, digital, economic and social domains and spot any weak links across sectors.
2) Identify and engage the right stakeholders and collaborate to develop a joint agenda and a national and/or local safety and security policy.
3) Identify what each stakeholder needs to provide in the process and assess their level of interconnectedness to deliver safety and security, e.g. back-up systems for telecommunications failures.
4) Work with leadership in the different overlapping domains and empower people in the right places to make decisions.
5) Invest in leaders so that they are skilled in engaging the public and instilling a sense of trust.
6) Manage carefully the trade-off of security with safeguarding personal data and citizens’ rights.
The recommendations for private sector firms and non-profit organisations include these steps:
1) Work more closely with trusted governments to improve engagement and collaboration.
2) Align organisational purpose with the broader societal safety and security agenda.
3) Develop the capacity and capability to improve safety and security for stakeholders.
Examples of how this works in practice
Crisis readiness and response to a terrorist attack in Sweden
The 2017 Stockholm terrorist attack illustrates the need for collaboration between governments and non-profit partners. This attack was perpetrated by one individual who drove at high speed down a pedestrian street, killing five people and injuring 10 more. A scenario planning exercise between government and security agencies had been carried out several months before the attack and is credited with limiting the number of casualties and the swift arrest of the attacker.
Government authorities and the private sector collaborate to thwart cyber threat
A major cyber attack in Australia, dubbed Cloud Hopper, was identified and mitigated through close collaboration between cyber security experts in both the public and private sectors.
J.P. Morgan to Support New World Bank Fund for Skills Development of India’s Workforce
J.P. Morgan today announced an up to $10 million commitment to a new World Bank Multi Donor Trust Fund focused...
Balochistan `insurgency ‘and its impact on CPEC
A dispute arose between Baloch leader Akber Bugti and then government led by Parvez Musharraf. Bugti was killed. How he...
An Open Letter to Duke and Duchess of Cambridge
Dear Uncle and Aunty, Greetings, This letter comes to you from your Pakistani nephew whom you do not know. I...
The CIIE: A gorgeous chorus of integrated world economy
The 2nd China International Import Expo (CIIE) will be held in Shanghai, China from November 5th to 10th. Iran will...
Balkans splitting EU apart
The European Union is going through a serious internal crisis over the prospects of its further expansion, with the main...
Five Reasons Why Countries in the Arabian Gulf are Turning to Renewables
As global leaders look to renewables as a way address the growing and multi-dimensional threat of climate change, traditional energy...
Libya: €2 million in humanitarian assistance to cover basic needs
As many continue to suffer from the ongoing conflict in Libya, the European Commission has announced today €2 million in...
Economy3 days ago
Modi’s India a flawed partner for post-Brexit Britain
Terrorism2 days ago
Indian Mujahideen, IS and Hizbul Tahrir: Breeding ground for terrorism in South Asia
Americas3 days ago
AMLO’s Failed State
Environment3 days ago
African financial centres step up efforts on green and sustainable finance
South Asia2 days ago
Will CPEC be a Factual Game Changer?
Southeast Asia2 days ago
Indonesia’s new electric car may disrupt its relations with Japan
Newsdesk3 days ago
New Target: Cut “Learning Poverty” by At Least Half by 2030
Africa1 day ago
The Sochi Summit and the Pride of Africa