SPECIAL REPORT - The art of economic espionage: why China is crushing America's global supremacy

(Read original content at http://wp.me/pMqmW-2u)

Cyber-security warfare is a growing field in today's strategic planning apparatus where emerging military colossi utilize asymmetric conflict tools to thwart or cripple the ability of established leaders. This article explores china's massive IT investment in light of its geopolitical standing with the US.

by Marquis Codjia

Lire article en français

Modern historiography specialists have long argued that an essential segment in the study of human evolution is inextricably tied to the basic understanding that societies generally emerge, progress and fall cyclically. Such frequency in social evolution is not just a consequence of endogenous factors, it also results from the impact of the external environment, be it close - neighboring constituencies vying for the same resources - or far - as part of a larger geographical area.

History teaches us another fundamental truth, predominantly unveiled in social sciences: humans are inherently prone to believing in the danger of the unknown, the fear that uncertainty - when present in life - brings an intolerable level of complexity in handling daily activities. Economists, in tandem with the larger group of social scientists, ascribe the word "risk" to this angst.

Risk lies in everyday life. From birth to death and in between the terrestrial episode called life, humans experience a sophisticated relationship with risk and utilize it as a powerful catalyst to furthering their interests. We fear the unknown not just in temporal terms - e.g.: what will tomorrow be? - but also in more practical, present-day terms, that is, what will happen today?

In assessing the rectitude of our daily decisions, the analysis of the environment we live in becomes of critical importance. There emerges then the need to know, understand and act on a variety of variables that make up our ecosystemic reality. Neighbors are a major part of that reality.

The indubitable observation that humans are 'sociable animals' implies a life in community, which in turns posits the sharing of interests, destinies and geography. We share our lives with neighbors, other humans whom we don't fundamentally know and whom we believe are different from us. Neighbors, in continental philosophy, are the 'constitutive other' as opposed to 'same'. Neighbors are different, and because of that, they must be hazardous to our very existence, hence "hell is other people" (Jean-Paul Sartre).

Consequently, our desire to know the 'other' and what they're undertaking forces us to constantly be in a question mode: ergo, we resort to spying. Espionage is ingrained in basic human instincts from cradle to grave. First, we ape our relatives, then our acquaintances and later our neighbors. In that quest for knowledge, humans recklessly spy on each other in a bid for power. Once they determine with a reasonable degree of comfort the neighbor's strengths, the overwhelming tendency is to match it, surpass it, annihilate it, keep it at a politically acceptable level, or use a combination of all these options if the socio-historical continuum of events demands it.

Doubtless, the need to control the military and economic standing of neighbors is the quintessential, albeit hidden, dogma of modern geopolitics. Doctrinal differences may abound, but a studious analysis of contemporary events demonstrates clearly that wars and other man-engineered crises have historically proven to be good ways to rebalance powers among neighbors, or more precisely, within geographical zones. Crises, facts have shown, drive innovation and quality of life.

Espionage is not a recent discipline within political science. It has been a staple of human history for the past 2,000 years and even before. Throughout history, nations have risen or fallen based on their ability to collect data from rivals and use that body of knowledge to gain a competitive edge. History also suggests that societies that show a disinclination for 'outer research' of their environment, and consequently, a significantly lower number of exogenous interactions - be it cordial or belligerent - with others have been weakened over time. The high frequency of wars between nations in the 'Old Continent' explains the relative superiority that Europe had over, say, Amerindians and Africans for the past few centuries, first in slavery and then colonization.

Espionage is rooted in modern life

After two atrocious global wars, countless medium-size conflicts and a dogmatic cold-war between capitalism and communism, political and military leaders seem to have finally gauged the idiocy of lethal conflicts with planetary implications. The notion of 'détente', that is, the easing of strained relations in the political phraseology, gives nations the imaginary assurance that they may all coexist pacifically and a major conflict is preventable once greater cooperation between societies subdues the inherent quest for power that causes hostilities.

Acquiescing that there exists a permanent détente within the current geopolitical landscape is an optical illusion because it goes counter the very human urge to monitor the neighbor in order to know him or dominate him, if not annihilate him. This can be very easily illustrated in instances where spies are caught in so-called 'friendly' territories. Take the example of Israel's Mossad agents being arrested in the United States.

The nuts and bolts of modern state espionage lie in a sophisticated and complex apparatus that all nations, and peculiarly global superpowers, have invented to carry out data-collecting and monitoring activities in peace time. Embassies, with their massive bureaucracies, specialized technocrats and their diplomatic inviolability, are preeminent on that list. They are essential in monitoring the host country's social dynamics and report to their respective governments. Simply put, an embassy is, de jure, a stranger turned neighbor.

Next are supranational organizations that populate the global political, social and economic sphere. Their local representations and periodically published studies may also serve an intelligence purpose. Finally, aid agencies and so-called 'humanitarian' organizations are critical in gauging so-called 'underdeveloped' nations' economic ability and progress in their development. It is no coincidence that major countries in the developed sphere do not customarily accept 'aid programs' from their counterparts unless excruciating circumstances dictate that such refusal would be politically unacceptable.

Strategic studies and the modern economic literature are replete with topics referring to Japan's, and to a lesser extent, Asian dragons' ability to use economic espionage at the end of the Second World War to gain a competitive edge over erstwhile powers such as the United States and Great Britain. The necessity to monitor and direct the continent's economic reconstruction, and the panic of a potential dominance by communist Russia, also led the United States to implement the Marshall Plan in Europe from 1948 through 1952.

Businesses thrive from spying more than the military

A noteworthy myth in today's world is that espionage is principally the province of military strategists and national armies. Evidence from authoritative business intelligence magazines, leading governmental studies and a massive body of knowledge from academia have clearly explained the causal relationship between firm profitability and espionage. Differently stated, governments tend to always transfer intelligence data to their domestic industries, whether they are at war or at peace.

As a result, the military-industrial complex benefits considerably from intelligence and such prerogatives are then disseminated into other firms in the economic fabric. As an illustration, it would be fairly understandable that a firm like Boeing, which derives a substantial portion of its revenues from government's contracts and sale of military aircrafts, is more attuned to certain developments in US intelligence gathering than a financial services giant like Citibank.

Nevertheless, businesses have also parlayed their gargantuan economic clout into a very successful data-collection enterprise. The plethora of tools available to business executives nowadays is strikingly sophisticated and effective. Even if it is not exhaustive, a good analysis of such tools must look at their source and their degree of macro-economic interconnectedness.

On one hand, external mechanisms allow at the macro-level business enterprises to gather information from competitors and control how such information can be utilized to thwart rivals, increase their own market primacy, or do both. When they share a community of interests vis-à-vis a new market or are in an oligopolistic situation, companies are routinely willing to join hands provided, of course, that the risk-payoff ratio of a single venture is not immensely superior to that of a joint venture. Tacit collusion, that is, the market situation where two firms agree to play a certain strategy without explicitly saying so, is a fine illustration of business intelligence sharing.

In practice, firms engage in economic espionage via economic sections of embassies, chambers of commerce, lobbying groups, industry groups, specific studies from consultants, and monies granted for academic research in particular fields of interest. Concomitantly, they guard against intelligence threats by massively supporting intellectual property laws.

On the other hand, a sophisticated internal approach allows companies to stay abreast of latest developments within their industry. First and foremost, they hire to their corporate boards or for senior positions, experienced former government officials and high-rank military leaders who had been privy to high-value strategic insights during their public tenure.

This is immensely beneficial to the hiring side because a former cabinet member, a congressman or a four-star general, can possess a breadth and depth of experience and knowledge of past, present and future topics that is considerably worth more than countless external consulting reports. Second, economic intelligence departments and government relations departments also fulfill data gathering roles through research, lobbying and interacting with industry groups.

Cyber-warfare, the new cold war

As the planet becomes technologically more intertwined, novel tools and modus operandi are being made available to governments and private interests to collect specific intelligence. These tools and procedures are an intricate combination of old and new procedures which simultaneously penetrate nations' military, economic and social constructs to extirpate valuable bits of knowledge.

Defense experts are calling these emerging asymmetric conflict tools 'cyber-warfare'. Due to the plethoric ramifications they present and the simultaneous dual tasks they may serve to fulfill (attack and defend) when engineered in certain ways, I label this group Modern Cyber-warfare Gear ("MOCYG").

MOCYG, as it stands, involves the offensive use of various techniques to derail a nation's infrastructure, perturb the military and financial systems of a country with the aim of crippling its defense responsiveness and the integrity of economic data, or accomplish other destructive aims based on the attacker's incentives and strategy. Security specialists and military researchers have classified these techniques into 5 major groups: computer forensics, viral internet tactics, assault on computer networks or software, hacking and espionage.

The idiosyncratic power of cyber-crime lies in its 'stateless' nature, its capacity to be inexpensively controlled and deployed, and the vast damage it can exert. Given the judicial vacuum created by cyber-warfare techniques, nations are rushing to build up legislative safeguards to prosecute offenders even though criminologists argue such undertakings are largely inefficient at the moment.

A memorable cyber-criminal event occurred in Estonia in 2007 when more than 1 million computers, allegedly from Russian-based servers, were used to simultaneously cripple state, business and media websites in a modus operandi analogous to the "shock and awe" military tactic. That attack ended up costing Tallinn's authorities tens of millions of US dollars.

China, a cyber-giant in progress

Upward socioeconomic trends in the People's Republic of China are well known to international masses and covered profusely in western news media. So are Chinese authorities' singular understanding of democracy and human rights as well their overt wish to play a bigger geopolitical role in world affairs. However, the quiet revolution China is experiencing lies within the astronomical investment country authorities are making in top notch universities so as to catapult China into the top league of technological giants, along with the United States and Japan. Given the size of such educational outlays, Chinese authorities must believe that a major competitive edge can be gained in the technology field and such advantage can be converted or transferred into other sectors of their mushrooming economy.

Top western sinologists and other think tanks are closely monitoring these academic developments because they understand the basic notion that future geopolitical dynamics will inextricably be tied to how successful Chinese will be at leveraging technology to boost their future 'global penetration'.

The smart tactic is that...

Continue reading at http://wp.me/pMqmW-2u)

Semoga artikel SPECIAL REPORT - The art of economic espionage: why China is crushing America's global supremacy bermanfaat bagi Anda. Jika kamu suka dengan artikel SPECIAL REPORT - The art of economic espionage: why China is crushing America's global supremacy ini, like dan bagikan ketemanmu.

Post a Comment

ECONOMICS - All Right Reserved.Powered By Blogger
Template SEO Fendly by JimsonTemplate Edit by : Tutorial Blogspot