Connect with us

Intelligence

The hi-tech war between China and the United States

Published

on

The new directive of the Central Office of the Communist Party of China (CPC), issued on December 8, 2019, ordered all State offices to quickly remove all foreign computer equipment and software within the next three years.

 The CPC directive, which was highlighted only by the Financial Times, has not been made public.

 It is therefore expected that many US companies, especially the likes of Dell, Microsoft, HP and some other smaller companies, will quickly be damaged by this choice of the Party and hence of the Chinese State.

The Chinese press has nicknamed this policy line as “3-5-2” because the substitutions will take place at a pace of 30% in 2020, 50% in 2021 and finally 20% in 2022.

Chinese sources estimate that 20 to 30 million pieces of hardware, mainframes, software and local networks will need to be swapped out throughout China with a large-scale replacement operation.

According to the Financial Times, the source of this news is China Securities, which is one of the companies entrusted by the CPC with the quick switch to domestic information technology.

Obviously this CPC choice is related to the current commercial tension between China and the United States.

Moreover, the IT substitution will allow to isolate government decisions from parallel US technological networks and from the cycle of negotiations and commercial tension between China and the United States.

We can also obviously think that this is a response to the fact that last May the United States entered Huawei into the “black list” of Chinese companies with which all U.S. IT companies and the North American subsidiaries of foreign ones are banned from doing business and carrying out joint operations.

 This means that U.S. companies cannot buy or sell technology to and from Huawei without a specific license issued by the U.S. government’s Bureau of Industry and Security, which is impossible to obtain.

 The Chinese company Huawei immediately responded to the U.S. government, noting that “moving away our company from the American market will not make the United States stronger or safer. Quite the reverse. This choice will force the United States to choose lower quality and more expensive technologies, thus even damaging the interests of U.S. consumers and companies”.

However, the story of relations between Huawei and the United States is long-standing.

 In January 2019, the Department of Justice had announced legal action against two divisions of the Chinese company, on charges of having stolen trade secrets owned by T-Mobile USA, and later stopped the sale or purchase of U.S. government technology by Huawei and by the other Chinese mobile phone company, namely ZTE.

 In December 2018, the Canadian authorities had also arrested Huawei’s CEO, Meng Wanzhou, to comply with an extradition request issued by the United States, based on the fact that the Chinese computer and telephone company had not disclosed payments to and from Iran to some U.S. banks.

 Moreover, the United States included in the “black list” of Chinese companies other undesired ones, such as Hikvison, which sells AI technology for mass surveillance, and the already mentioned ZTE.

It should be recalled that surveillance through Artificial Intelligence technologies is currently used by at least 75 countries, with 56 countries using this technology for road safety and smart cities, and as many as 64 countries using AI technologies for mass facial recognition, of which China alone is accused. Other 52 other countries manage AI systems for smart policing, an activity developed within the American police which brings together advanced databases and the measurement of inspection performance and of computerized mass predictive systems.

 Certainly, thanks to Huawei, Hikvision, Dahua and ZTE, the Chinese technology in the sector takes the lion’s share in this specific global market and sells mass recognition technologies in 63 countries, all members of the China’s Belt & Road Initiative.

Huawei alone sells this AI technology to 55 countries.

 Outside the Chinese market and the Chinese social reconnaissance producers, the world’s largest company in this AI sector is the Japanese NEC.

However, the U.S. companies operating mass control technologies with Artificial Intelligence are still present in 32 countries.

These American companies include IBM, which works for AI facial recognition networks in eleven countries, as well as Palantir, which operates in nine countries and finally CISCO, operating in six countries.

The other countries selling similar AI systems globally are Israel, France, Germany and Japan.

 51% of the universally defined “advanced liberal democracies” use AI mass control technologies, while these control systems are used in only 37% of what the international press calls “closed autocratic States” and in 41% of the States abstractly defined as “illiberal democracies”.

Hence theoften hypocritical alarm for the AI recognition procedures in Xinjiang, sounded by the Chinese government, should remind us of the old Latin Horatian saying De tefabulanarratur.

 All the States we currently call “liberal democracies” use systems of citizens’/users’ facial recognition at various levels.

 There is evidence of partial and uncontrollable use of advanced AI technologies also in countries such as Tunisia, Angola, Azerbaijan, Hungary, Peru, Sri Lanka and Turkmenistan.

 However, the recent Chinese stance on the switching to domestic IT technology regards much of the software currently used in Chinese offices. Nevertheless, there are problems that should not be overlooked.

Lenovo, the world’s largest laptop manufacturer, has been Chinese since 1984, when the Chinese company Legend was entered into the Hong Kong Business Register.

In 2005 Chinese Lenovo bought IBM’s entire personal computer division and IBM’s server-producing division in 2014.

Again in 2014, Lenovo bought the Motorola Mobility Division from the previous owner, namely Google.

 The problem lies in the fact that Lenovo still uses chips produced by the American Inteland the replacement of the old semiconductors seems to be complex.

China may have discovered an effective replacement for Microsoft OS, the operating system of most “Western” computers but, for the time being, this is not known in the West.

Furthermore, the semiconductor industry in China has been greatly stimulated by Huawei’s adventures in the United States and the EU.

 The Chinese “nationalisation” of the semiconductor and computer chip industry, however, is already envisaged in the China 2025 Plan and the Chinese government wants at least 40% of chips to be produced in China and be ready for export by that date.

In vain China tried to negotiate purchases of chips with the American company Xcerra, but the operation was stopped last February for the well-known political reasons mentioned above.

Also the Chinese acquisition of the US company Lattice Semiconductor – a 1.3 million US dollar “deal” – was stopped by the US government.

 Despite the fact that an up-to-date semiconductor industry is hard to set up in a short lapse of time, China’s “National Integrated Circuit Industry Investment Fund” will significantly fund all these operations.

 In its second round of fund-raising, the Chinese Semiconductor Fund raised as many as 200 billion renmimbi (equal to 29 billion US dollars), after a first round of fund-raising which amounted to 138 billion rmb in 2014.

 The Chinese government deems this replacement operation to be absolutely necessary to reduce the dependence of Chinese information technology on U.S. manufacturers.

It should be recalled that in 2017 – the last year of for which data is available – China imported semiconductors to the tune of 300 billion US dollars.

Now China must run twice as fast, otherwise it will lag a technological generation behind, as far as the very fast chip evolution is concerned.

Moreover the Chinese Cyber Security Law, enacted in 2017, requires the user’s real name for registering in any Internet network, as well as very strict rules for the protection of critical infrastructure, and a much greater protection than in the USA and the EU for what China calls “private critical infrastructure”, as well as a few additional control requests for some groups of network operators.

 In 2018 China also enacted new regulations for Personal Information Security Specification, i.e. a set of more stringent web privacy rules than the Western ones.

 In the current year, the Chinese government has also established new rules for checking information technology, for the transfer of personal data abroad, as well as for encryption and cloud security.

 In the EU legislation on network security, the so-called GDPR, the whole set of rules is focused on protecting the user privacy. In addition to legally protecting individuals’ privacy, however, China also protects a specific class of data, which the provisions define as “relevant to national security, the national economy and people’s lives”.

We are far beyond privacy as it is considered and understood in the West.

By mainly using information technology, China wants to stimulate innovation in four areas: a) the manufacturing industry in general; b) digital commercial platforms and their specific markets, especially as regards online payments; c) the development of telematic apps for “social use”, such as those for rented cars or bicycles; d) the enhancement of basic research and development for biotechnology and big computing.

 China currently has around 800 million Internet users, all of whom also having smartphones.

 It should be recalled that the Cyber Security Law enacted in China in 2017 entails the obligation for all web companies to store data on Chinese territory and restricts some data transfers also within China’s national territory.

 In addition to the above mentioned 2025 Plan and the State Fund for Technologies, there is also – in China – the New Generation of Artificial Intelligence Development Plan.

As early as 2017 China has already overtaken the USA as far as investment in Networks and AI is concerned. Currently Research and Development is more funded in China than in the United States, also as to the IT collateral and “hybrid” sectors, such as AI social and medical applications.

 It should also be noted that China is already world leader in the registration of new patents. It currently accounts for 40% of the world total, twice as much as the United States and four times as much as Japan.

 In 2025, China is expected to far exceed the number of papers on Artificial Intelligence – with international citations -developed by the United States.

Furthermore, the fact that China’s domestic IT market is subject to what someone has defined “hi-tech Leninism” makes it obvious -also considering the size of China’s domestic market – that a carefully protected growth of cutting-edge technologies in China slows down the U.S. and Japanese sectoral development also in the short term.

 If Chinese technologies become world market leaders, it will be hard for the USA, the EU and Japan to define and establish reliable and effective data protection criteria.

Certainly there are geoeconomic risks for the United States.

  In the medium term, we will record a Chinese monopoly on international standards, as well as a Chinese leadership on dual-use technologies, considering that the Chinese National Intelligence Law lays down that private or public companies shall provide access and support to the Armed Forces and to the intelligence Services for the collection of sensitive data and for their processing.

Furthermore, the United States, the EU and Japan could be negatively affected by the marketing of Chinese cutting-edge technologies, which would create their own markets and quickly replace “obsolete” or not well-interconnected products and systems.

There is also the possibility that, in the global market of AI surveillance, China may develop data collection models valid also for other countries, thus leading to a structural advantage for its own foreign intelligence.

We should also avoid underestimating the geopolitical effects resulting from China’s non-aggressive foreign policy, starting from Mao Zedong’s Three Worlds Theory (the First World was the USA and the Soviet Union; the Second World was the developed countries, satellites of both powers; the Third World was the “global peripheries” to be led by China) or the saving of often huge economic resources.

 In the last Middle East wars, the United States has spent a total of 7 trillion US dollars, which is more or less the same amount China has invested in Research & Development since 1994.

There is a fact, however, which is in contrast with the above.

Over the last five years both the U.S. and Chinese economies have grown significantly, but the wealth gap between the two countries has remained constant, even using the often misleading measure of GDP.

Moreover, the United States is still “richer” than China by about 7 trillion US dollars.

Hence, apart from the structural fallacy of these measures and putting aside statistical manipulations on both sides, China shall record a much faster development than its GDP to reach, at least, the United States.

China’s global technological victories are now well-known: its Micius satellites; some biotechnologies; hypersonic vehicles; energy technologies, including “green” ones; some AI networks and quantum computers, as well as quantum encryption and obviously the 5G.

 In other sectors, there is still substantial parity between the two countries.

The current U.S. geopolitics, with the usual cyclical return of isolationism, could unintentionally lead to the global expansion of Chinese technologies and to their progressive hegemony, if not worldwide at least in the Belt & Road area, in Africa and in some Asian regions.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Continue Reading
Comments

Intelligence

Indian Chronicle: Exposing the Indian Hybrid warfare against Pakistan

Published

on

In recent years Indian hybrid warfare against Pakistan has intensified manifold to malign Pakistan Internationally through disinformation and propaganda tactics. Hybrid warfare has mainly been described as achieving war-like objectives with the help of fake news, disinformation, and propaganda. The Objectives of Hybrid warfare are mostly to secure long term victory against the opponent. Similarly, India has launched massive hybrid warfare against Pakistan, which was uncovered by EU DisinfoLab in its report called “Indian Chronicle”.

EU DisinfoLab is an independent organization working to expose and tackle disinformation campaigns targeting the European Union and its member states. The organization has claimed that the disinformation campaign against Pakistan has been active since 2005, “a massive online and offline 15-year ongoing influence operation supporting Indian interests and discrediting Pakistan internationally”.

In a recent investigation EU DisinfoLab has exposed a malicious Indian campaign against Pakistan. In the report, “Indian Chronicle” EU DisinfoLab has exposed the dubious use of media outlets, NGOs, and fake personnel by India to malign Pakistan. The disinformation campaign mainly targeted the United Nations and the European Union through more than 750 fake media outlets and 10 fake NGOs. According to the report, “uncovered an entire network of coordinated UN-accredited NGOs promoting Indian interests and criticizing Pakistan repeatedly. We could tie at least 10 of them directly to the Srivastava family, with several other dubious NGOs pushing the same messages.”

According to the report the disinformation campaign is supported by the Srivastava group. The Srivastava group has helped in “resurrected dead NGOs” to spread fake news. The report says that “Our investigation led to the finding of 10 UN-accredited NGOs directly controlled by the Srivastava Group, which our full report introduces at length. Their common trait? The fact that they all rose from the ashes of real NGOs. Indian Chronicles effectively benefited from the track record of these organizations while pursuing their agenda: discrediting Pakistan and promoting Indian interests at UN conferences and hearings,”.

Moreover, Asian News International (ANI), a major news agency in India has provided a platform for suck fake news campaigns. The aim of the Srivastava group and ANI media outlet is “to reinforce pro-Indian and anti-Pakistan (and anti-Chinese) feelings” in India, and “internationally, to consolidate the power and improve the perception of India, to damage the reputation of other countries and ultimately benefit from more support from international institutions such as the EU and the UN”.

The report claim that the organizations funded by the Srivastava group-sponsored trips for European Parliament members to Kashmir. “The organizations created by the Srivastava Group in Brussels organized trips for Members of the European Parliament (MEPs) to Kashmir, Bangladesh, and the Maldives. Some of these trips led to much institutional controversy, as the delegations of MEPs were often presented as official EU delegations when they were in fact not traveling on behalf of the Parliament,”. Such sponsored trips aimed to build a positive image of India, while spreading disinformation about the alleged claims of Pakistan-sponsored terrorism in Kashmir.

Moreover, India has been actively involved in portraying Pakistan as a terrorist-sponsored state through its disinformation and fake news technique. For instance, India is lobbying strongly at FATF to put Pakistan on the blacklist.

India has also supported and sponsored Baloch separatist leaders and spread disinformation through their fake media outlets as mentioned in the EU DisinfoLab report.“These UN-accredited NGOs work in coordination with non-accredited think-tanks and minority-rights NGOs in Brussels and Geneva. Several of them – like the European Organization for Pakistani Minorities (EOPM), Baluchistan House, and the South Asia Democratic Forum (SADF) – were directly but opaquely created by the Srivastava group,”one of the examples is Kulbhushan Jadhav, an Indian spy who was captured in Pakistan.

The Indian Chronicle report has exposed the dubious face of India and the administrative structure of the United Nations and the European Union. Indian involvement in the spread of disinformation and resurrection of dead people and NGOs has exposed its long-standing for Human rights and democracy. Meanwhile, the reports have also exposed the administrative structure of the UN and EU, as they failed to notice the activities of fake UN-accredited NGOs and spread of disinformation through their affiliated NGOs.

Continue Reading

Intelligence

Hybrid Warfare: Threats to Pakistani Security

Published

on

‘Victory smiles upon those who anticipate the changes in the character of war’-Giulio Douhet

Hybrid threats are becoming a norm in Pakistan and if we want to move forward in this age of technological advancements, cybercrimes, and the use of social media, we must have a wholesome response mechanism.

Hybrid warfare is a military strategy that employs not only conventional forms of warfare but irregular with it as well. It involves propaganda, cyber-attacks, state-sponsored terrorism, electoral intervention, and many more means of multi-dimensional approaches towards war which are used by militarized non-state actors. The term ‘Hybrid’ came into use around 2005-2006 due to the Israel-Hezbollah war (“Lessons from Lebanon: Hezbollah and Hybrid Wars – Foreign Policy Research Institute” 2016) and became a hot-topic in 2014 after the annexation of Crimea. Using non-confrontational means can lead to internal struggles and crumbling of the target. What direct force won’t get you can be easily achieved by infiltration and multi-faceted resources. It’s neither character of war nor its outcome that defines it as a hybrid war, but the changing tactics (“State and Non-State Hybrid Warfare” 2018). In a world where everyone, from wealthy states to those caught in throes of hunger, is armed to the teeth, there are ways to achieve socio-political objectives through the use of violent and non-violent non-state actors.

Pakistan – A Target

Pakistan has risen to incredible heights despite it being a relatively young nation and this is only proved further by the interest international players have in its internal workings. Several factors contribute to the important stature Pakistan holds in the international community such as the Pak-China alliance, its geostrategic location, military aptitude, Russian interests in the Indian Ocean, Deep Sea Gwadar Port (One Belt One Road Project), neighbor to Afghanistan (a country existing as a battleground for proxies), etc. All these reasons make sure to keep Pakistan on the radar.

Though it may be secure militarily, Pakistan is still vulnerable to hybrid threats due to internal dynamics, numerous conflicting interests of nations in state-affairs, and increasing non-state actors. South Asian nuclearization has all but guaranteed that a full-fledged war between Pakistan and India is unlikely therefore the latter uses hybrid warfare to weaken Pakistan from within.

Evolutionary Nature of War

There was truth to Heraclites’s words when he claimed that change is the only constant in our world. The social theory of evolutionary change tells us that individuals, communities, societies, and states are always in a state of motion, continuously evolving according to the era. War is born from man, it is only fair that if a man changes, so shall war. It has become more complex; the stakes have raised from territorial boundaries to the maintenance of world order and preservation of state sovereignty. Wars are no longer fought on the borders, skirmishes aside, the real destruction takes place within. Due to the paradigm shift after the Cold War (Ball 2018), there rose a need for legal, economical, socio-political, and informational means of warfare. It is used as a way to undermine other nation-states in pursuit of national power; the international system is not only a race but also a way to tear others down.

Threats to Pakistani Security

To secure Pakistan from all sides, we must first analyze the threats it faces from all sides. Conventional Warfare used to be seen as one dimensional and it only perceived assault to be done through the land, air, or sea channels. However, now it is fought in various intangible zones.

·         External

India

India is a budding regional hegemon due to its political and economic growth including hidden agendas. Pakistan is perceived to be a direct threat to India especially after the launch of the CPEC project, perceived to be undermining its hold over the region, which is why it is employing stratagems of hybrid warfare to internally weaken Pakistan. Till now India has used State-Sponsored terrorism, funded insurgencies, operated terror cells, and even sent fighter jets into Pakistani Airspace as an attempt to ruin its reputation in the international community.

Afghanistan

There has been growing instability in Afghanistan which has led to mass migrations across the porous border into Pakistan, with around 1.4 million registered Afghans (United Nations High Commissioner for Refugees 2018) and 1 million unregistered (“Amnesty International” 2019). India has its claws in Afghan matters as well and will use it to exploit Pakistan’s weaknesses even after US forces leave the arena. Afghan Government’s poor administrative capability especially after the return of DAESH (Tribune 2020) and Tehrik-e-Taliban Afghanistan are threats to Pakistan as well as regional peace and are a major cause of lawlessness in the country and has a spillover effect for its neighbors.

Iran

Ideologically speaking, Iran is a sectarian threat to Pakistan and its Port Chahbahar stands to lose active traffic once CPEC is fully functional which means it stands as an instigator of hybrid warfare and it would be a risk to overlook it based on past good relations.

USA

Even after the Cold War, strategic rivalry and animosity between the powers including Russia, America, and China still exist. The emergence of China as an economic superpower is perceived as a threat to the US due to which there is a major shift in its defensive posture towards the region.

The US has shown significant interest in Pakistan due to its geo-strategic location but not all interest has yielded positive results. They carried out a surgical strike for the capture and assassination of Osama-Bin-Laden. Such a breach of sovereignty and security is a hybrid threat.

·         Internal

Sectarian

There are several lobbies in Pakistan all vying for their own cause. The Iranian lobby has sectarian undercurrents. Sectarianism has always been one of the leading factors of the divide in the Muslim civilization and is the rising trend of terrorism.Such conflict itself is volatile and is deepening the rift between different sects(Shia-Sunni) of Pakistan, causing unrest.

Economic

Rising prices of commodities such as flour and sugar can lead to social unrest and discord. Such industries and their stocks are under the thumb of a select few, the elites. With the right bribes and conditions, even they would agree to sell out society.

Non-State Actors

Non-state actors are groups or organizations that have influence in the state but work independently and have their socio-political agendas (“Towards a Typology of Non-State Actors in ‘Hybrid Warfare’: Proxy, Auxiliary, Surrogate and Affiliated Forces” 2019). They work on political opportunities and mobilized grievances. Groups like BLA (Balochistan Liberation Army), TTP (Tehrik-e-Taliban Pakistan), and Lashkar-e-Taiba (LeT) are some of the major actors. Pakistan needs to focus on curbing Jihadist Terrorism as it is keeping it from leaving the grey list of FATF.

·         Technological

Information

It refers to the spread of miscommunication. Propaganda and circulation of false news through social media are a relatively common way to cause turmoil in a community. Once a rumor is circling, there is no way to erase it. India claims that Pakistan is spreading the false narrative of ‘Islam being in danger’ to justify its actions, although untrue, is something that the Indians fully believe now. That Pakistani Intelligentsia is made solely to create narratives under which to attack India. Such beliefs further antagonize the states against each other.

Indian Chronicles are a prime example of information warfare being waged against Pakistan.

Cyber

Channels such as Cyber-Jihad and Dark Web come under the purview of cyber warfare and are a threat to the fabric of society and its security in Pakistan.

Given the above discussed bleak prevailing internal security situation, Pakistan needs to formulate a short to mid and long-term response that curbs all external and internal parties alongside proxies from infiltrating and influencing the working of the state and affecting the masses.

For a full-spectrum approach, all domains should be covered such as diplomacy, defense, internal and external security, economic, informational, cyber, and media security.

There are steps to be followed through for active and effective quelling of hybrid threats. First, a strategy must be put for, then tactical action should be taken and lastly, the implementation process should be supervised and fully followed through.

The main focus of the state should be on deterrence towards, protection from, and prevention of hybrid threats to the state.

One must not forget that Hybrid war is a mix of both unconventional and conventional warfare, therefore a nation-wide response should include the intertwined operational capabilities of armed forces alongside political actors. Pakistan sees its security being threatened both by internal factors and external hostile/proxy elements. This is hampering state development. State-building and nation-building must go hand in hand if counter and deter such threats effectively.

Continue Reading

Intelligence

The Impact of Management in Information Security

Published

on

Authors: Sajad Abedi and Mahdi Mohammadi

Due to the increasing role of information security in the management of any society, public and private organizations and institutions are inevitably required to provide the necessary infrastructure to achieve this. In addition to material resources, management techniques also have a great impact on the optimal and successful implementation of information security management systems. The recording of management standards in the field of ICT information security can be designed in a planned way to change the security situation of organizations according to the needs of the organization and ensure security in terms of business continuity and to some extent at other levels (crisis management and soft war). Despite extensive research in this area, unfortunately for various reasons, including the level of security of the issue for governmental and non-governmental institutions or the direct relationship of the field with their interests, clear and useful information on how to implement and prioritize the implementation of a system over the years. The past has not happened until today.

The protection of the organization’s information resources is essential to ensure the successful continuation of business activities. The fact that information and information assets play a key role in the success of organizations has necessitated a new approach to protecting them. Until now, risk analysis and management has been used to identify the information security needs of the organization. After analyzing the risks, security controls were identified and implemented to bring the risks to an acceptable level. But it seems that risk analysis is not enough to identify the information security needs of the organization. Evidence of this claim is that risk analysis does not take into account legal requirements, regulations and other factors that are not considered as risk, but are mandatory for the organization.

Identifying, assessing and managing information security risks is one of the key steps in reducing cyber threats to organizations and also preventing the unfortunate consequences of security incidents that make organizations more prepared to face cyber risks. The risk assessment process, which is the first phase of a set of risk management activities, provides significant assistance to organizations in making the right decision to select security solutions. Risk assessment is actually done to answer the following questions: * If a particular hazard occurs in the organization, how much damage will it cause? * What is the probability of any risk occurring? * Controlling how much each risk costs. Is it affordable or not? The results of risk assessment can help in the correct orientation in choosing solutions (which is to eliminate the main threats) and can also be used in formulating and modifying the security policies of the organization. Risk management is a comprehensive process used to determine, identify, control, and minimize the effects and consequences of potential events. This process allows managers to strike the right balance between operating costs and financial costs, and to achieve relevant benefits by protecting business processes that support the organization’s goals. The risk management process can greatly reduce the number and severity of security incidents that occur in the organization. Risk management has 5 steps, which are: 1. Planning: At this stage, how to manage potential risks in the organization is determined and completed by developing a risk management plan. This plan defines the risk management team, defines the roles and responsibilities of individuals and the criteria for assessing identified risks. Documented. 2. Identification: At this stage, team members gather around each other, identify potential hazards, and record them in the organization’s risk list. Arranging group brainstorming sessions is a good way to identify hazards 3. Assessment: In this step, the assessment of identified risks is performed using the criteria defined in the risk management plan. Risks are assessed based on their probability of occurrence and possible consequences.

Continue Reading

Publications

Latest

Africa Today13 mins ago

‘Complex’ emergency unfolding in Mozambique’s Cabo Delgado

UN agencies voiced deep concern on Wednesday over the worsening humanitarian crisis in Mozambique’s Cabo Delgado province, where attacks by...

Terrorism2 hours ago

Global War on Terror: Pakistan’s Role and Evolving Security Architecture for sustainable peace

If Afghanistan, according to former president of the United States (US) George W Bush was the center of terror, then...

Africa4 hours ago

What Social Movements Mean for African Politics

Africa’s transition from a continent of colonial protectorates to independent states has been met with developmental and political challenges. From...

Green Planet6 hours ago

Promoting Green Finance in Qatar: Post-Pandemic Opportunities and Challenges

The recent COVID-19 pandemic had significant implications for both national economies and the global financial system, in addition to hindering...

Reports7 hours ago

Thailand: Growth in Jobs Critical for Sustained COVID-19 Recovery

Thailand’s economy was severely impacted by the COVID-19 pandemic and is estimated to have shrunk by 6.5 percent in 2020....

Economy8 hours ago

The Economy Against the Tide

The world evidently grappled with the effects of the Covid pandemic in 2020 and continues to wedge forward against the...

Human Rights9 hours ago

Over 1.9 billion people in Asia-Pacific unable to afford a healthy diet

The economic impact of the coronavirus pandemic and surging food prices are keeping almost two billion people in Asia and...

Trending