Tuesday, August 6, 2019
Is Cyber Warfare the Future of War?
Is Cyber Warfare the Future of War? Introduction Undoubtedly, the twentieth century could be counted as the bloodiest in human history; man has been at war for much longer than he has been at peace. The death tolls are incalculable although historians put estimates at somewhere between 170 million to 210 million. No true figures are available but what is undisputed is the proliferation and effect of war on all aspects of society. Its impact on the soldier and the civilian as well as the economy and society or culture has given birth to the concept of ââ¬Ëtotal warââ¬â¢Ã (Marwil, 2000). The last time total war was experienced was the Second World War which invariably led to the Cold War and its all-encompassing nature on every aspect of societyà (Stavrianakis & Selby, 2012). Particularly with technology, the 20th century has seen the advancement of technology to epistemic levels where it has produced the concept of ââ¬Ëmodern warââ¬â¢ ââ¬â atomic weapons, satellite guided missiles, chemical and biological weapons and electronic drones; none of which have eclipsed the older forms of warfareà (Barkawi, 2011). A new form of warfare has evolved and it is part of the 4th Industrial Revolution; it is cyber warfare. To understand its significance, one only has to look at former President Barack Obama declaring the digital infrastructure of the US as strategic national asset to be protected with the entire resources available to the United States. Obama prompted the formation of a special unit in the Pentagon called Cybercom whose sole purpose is to prepare the US for the inevitable cyber war that America will be embroiled in. The UK has also set up the National Cyber Security Programme and NATO has released the Tallinn Manual on the International Law Applicable to Cyber Warfare; a three-year study by international scholars setting out ninety-rules to govern conflicts among nations. Cyber warfare is definitely gearing up as a new arena for conflict. This dissertation looks at the subject of cyber warfare and examines how widespread a concern this is to nations and if indeed it is just a concern of the super powers. Just like atomic weapons has become a military weapon of magnitude, the world has still not experienced a nuclear war. Instead nuclear energy is being used to advance economies and aid production and meet energy needs. Is cyber space similar to the threat of nuclear weapons? Does it actually do more good that the proposed harm that is being touted? This dissertation will carry out a secondary data analysis to understand the current literature on the subject and determine if indeed cyber warfare is the new arena of conflict. Narrative The organising principle of every theme in this dissertation is layered; each begins with a general historical and contextual appraisal invariably moving to specifics and constantly looking at the problem-solution dilemma. To substantiate or clarify explanations, arguments, themes, findings etc., footnotes will be included and/or non-integral citations will be used to focus attention more on the research being discussed and less on the researchers or authors. All related studies to this dissertation will be research/information prominent. With a few exceptions, English is used entirely in this dissertation and therefore tense usage is important in the organisational narrative. Where reference is made to a single study, the past simple tense will be used. Where reference is made to more than one study or an area of research, the present perfect tense will be used. Where reference is made to generally accepted knowledge, particularly with respect to cyber warfare or generally accepted knowledge in international relations, information technology or geopolitics, the present tense will be used. Finally, the choice of reporting verbs in this dissertation will inadvertently express a certain attitude be it critical distance, doubt, certainty, confusion etc. As much as possible, I have tried to maintain the same reporting verbs used in citing research and evoking emotion in my reflexive thoughts. Sometimes this has not been possible and the same reporting verb will express different attitudes depending on the context. Where this has occurred, I have elaborated any misconception or misunderstanding in the corresponding footnotes. Themes and concepts The chronological order of the table of contents gives a straightforward description of the chapter and sub-chapter headings in this dissertation. Thematically, the dissertation is divided into 4 chapters. Chapters 1-3 deal with the research justification as well as academic and methodological underpinnings. These chapters set the terms of reference for the dissertation and elaborate its research direction and deal with the subject matter, cyber warfare. Chapter 4 deals with the results, discussion of the results and conclusion. Theoretical and conceptual framework War, Conflict and Anarchy It is imperative to understand international relations and the theories and concepts underpinning them before looking at cyber warfare as a new arena for war. The Melian Dialogue in the great 5th century BC classic of Thucydidesââ¬â¢ ââ¬Å"History of the Peloponnesian Warâ⬠best describes the context in which one looks at the international system. At a point in the Peloponnesian Wars, the Athenians wanted to take over the neutral island of Melos to obtain control over the Aegean Sea. An Athenian fleet was dispatched to Melos to try and negotiate a surrender and the ensued dialogue, as told by Thucydides, captures the essence and birth of our international system today. The Athenians declared to the Melians that ââ¬Å"since you know as well as we do that right, as the world goes, is only in question between equals in power, while the strong do what they can and the weak suffer what they must.â⬠(Thucydides) The international system today is premised on the fact that nation states can and do exert their power over weaker states although some do work through a collaborative system to ensure a common purpose. The study of international relations begins with the very notion that there is no central authority which acts as the ultimate arbiter in world affairs. Nations simply do what they can through mutually beneficial alliances and discard them when their interests are no longer served. If we look at world history before the 20th century, international relations could be said to be in a state of anarchy as there was no central figure. From 1078, China was the worldââ¬â¢s major producer of steel, the worldââ¬â¢s leader in technical innovations, the worldââ¬â¢s leading trading nation, possessed the largest commercial ships and these are just to mention a few. Few academics would now dispute that China was the worldââ¬â¢s hyperpower for 800 years before the rise of British imperialism in the 19th century. Despite China being a hyperpower for 800 years, there is no record of any central authority governing the behaviour of nation-states. They simply did what they could to nations who couldnââ¬â¢t fight back. Ironically China was insular and did not engage in any international conflicts. Every study of international relations or politics beyond that makes assumptions about the state of anarchy and offers a counter explanation of an international system with inter-state relations and a hierarchical intrastate system. A system that we have now with bodies like the United Nations, the World Trade Organization regulating economic relations and the International Criminal Court prosecuting crimes against humanity.à International relations deals with how nation states decide to exist without a central authority or with no structure or how they choose to create one. Waltz (1979) describes the juxtaposition of the international system and the domestic system by explaining thatà domestic systems are centralized and hierarchicâ⬠, international systems are decentralized and anarchicâ⬠Waltz 1979, p. 88 All approaches to international relations and studying the behaviour of nation-states begins with an assessment of the anarchic structure in the international system. Anarchy is the starting point of viewing international relations but that view depends on the perspective a country chooses to take. Letââ¬â¢s begin with the oldest view recorded since the Melian dialogue between the Athenians and the Melians. The ââ¬Ëpolitical realistââ¬â¢ perspective is known as a theory one subscribes to in international relations. A political realist is under no illusions that countries behave with the single purpose of self-interest and therefore actions and reactions are done to defend that interest. Nation states are geared towards survival, according to the realist and this can often mean exerting strength over a weaker enemy or acceding to a collaboration with a stronger foe. All is done for the purpose of ensuring the continuation of the state by any means necessary. Therefore, the only way to predict behaviour is to predict survival. Realists do not see a set of behavioural guidelines but a survival of the fittest in the ââ¬Ëinternational jungle of world politicsââ¬â¢. Or as one might put it succinctly, ââ¬Ëmight is rightââ¬â¢. To the realist, the international order is that of ensuring that power relations are conducted in such a manner that outcomes are mutually exclusive. One party will always gain over the other so the purpose for the nation-state in any negotiations is to be the winner. Where this cannot be achieved then the realist will view this as a precarious position to be in. Realistsââ¬â¢ view of the anarchical order can describe the behaviour of nation-states in various ways from the classical realist to the neorealist and several forms in between. Whichever view is subscribed to, anarchy forms the basis of that world view and the expected behaviour of nation-statesà (Heginbotham, 2015). Liberalist recognise the importance of anarchy in the international system in just the same way as the realists. Both liberal and realist accept the absence of a supreme authority directing the affair of nation-states. Where liberals and the liberal view differ on the subject is what can be done within the anarchic system. Liberals believe that nation-states and state actors can actually come together to build rules, guideline, set up institutions and appoint various monitoring bodies to govern or at least modify the behaviour of nation-states so that they can work together for a common personà (Barkawi, 2011). Outcomes do not have to be mutually exclusive but can be mutually beneficial in an anarchic system, according to the liberal view of international relations. Through joint cooperation, liberals believe that the behaviour of nation-states can be changed to achieve a level of power where states feel secure about their relationships with other states and do not seek to consolidate power at the expense of others. This classical liberal view can be seen in the world today as neoliberalism. Liberals still see anarchy in the international system but see it as something that can be overcome through a concerted effort. Whatever view one prescribes, the prevailing wisdom is that nation states will shift between theories and concepts to advance their own agenda and not confine themselves to an enduring guiding principle. The concept of cyber warfare, I would argue, follows suit. Defining the cyber world Almost twenty-five years ago, ââ¬Ëcyberspaceââ¬â¢ as we know it did not exist beyond the primitive computers placed in research laboratories and academic institutions. In fact, cyberspace was merely a theoretical concept that was considered unachievable. Today that has drastically changed. Our world would be unfathomable without cyberspace. To put its vastness into perspectives, approximately 4 billion people are online with roughly 50 billion devices ranging from super computers to desktops to laptops to smartphones to tablets. On a yearly basis, 90 trillion emails are sent and two trillion transactions are conducted in cyberspace (Turns, 2012). Cyberspace permeates are lives so much that we use it for everything from international trade, to logistics, communications, record keeping, financial transactions to sending flowers! All these positive contributions are the benevolent side of cyberspace. The malevolent aspect of cyberspace is ignored by the public unless a scare or scandal brings it to the surface. Figures estimate that on a daily basis, around 55,000 pieces of malware are found, 200,000 computers are ââ¬Ëhijackedââ¬â¢[1]as well as the countless number of frauds that go unreported. How exactly does one define cyberspace? That question is not easy to answer as there are as many answers as there are experts in the field. A notable expert worth considering is Daniel Kuehl who collected a series of definitions from various sources and analysed his findingsà (Curran, et al., 2008). He concluded that cyberspace consisted of a few dimensions namely; An operational space ââ¬â it is an operational space where proponents of the domain ply their trade and perfect their skills. An electronic domain ââ¬â it is an electronic network comprising of computers and a vast network of electromagnetic activityInformation domain ââ¬â it is a network of information that is not limited to a particular location, time and space Kuehl analysed all these aspects and offered his own definition which will be used in this dissertation: ââ¬Å"A global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interdependent and interconnected networks using information-communication technologies.â⬠Kuehl, 2009 Cyber terrorism is a portmanteau of the words cyberspace and terrorism and was first recognised and used in 1996 but became popular after a 1998 report from the Center for Strategic and International Studies titled Cybercrime, Cyberterrorism, Cyberwarfare: Averting an Electronic Waterloo. The report discussed the possibilities of an electronic attack, likely outcomes and expected methodsà (Carr, 2011). Three terms are often confused when discussing Cyber terrorism so it is crucial that they are defined here. Cyber terrorism: ââ¬Å"It is premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets (Colarik & Janczewski, 2012).â⬠Information warfare: ââ¬Å"It is a planned attack by nations or their agents against information and computer systems, computer programs, and data that result in enemy losses (Colarik & Janczewski, 2012).â⬠Cyber crime: ââ¬Å"Cyber crime is a crime committed through the use of information technology (Colarik & Janczewski, 2008).â⬠This is more of the documented cyber related terms because it has received adequate coverage due to its proliferation in domestic law enforcement. In the U.S., the Computer Fraud and Abuse Act defines Internet criminal acts (Jensen, 2009). Furthermore, the ââ¬Å"European Union members of the NATO alliance have domestic laws implementing the 1995 E.U. Data Privacy Directiveâ⬠(Knapp & Boulton, 2006). For argumentââ¬â¢s sake, cybercrime includes offences such as; the impairment of data, misuse of devices, interception of data offenses. traditional criminal offenses facilitated through the use of the internet, e.g. fraud, copyright infringement, child pornography Cybercrime has received a lot of international attention and was formally discussed at the Council of Europes 2001 Convention on Cybercrimeà (Robinson, et al., 2015). This convention is still the only international understanding in place that exclusively focusses on cybercrimes. Terrorism: ââ¬Å"The unlawful use or threatened use of force or violence by a person or an organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons (Dragan, et al., 2012).â⬠Research Approach Research Questions This research will attempt to explore and answer three questions regarding the broad themes that preliminary research has shown and in line with the gaps in current academic research; What exactly is cyber space?Is an information war a ââ¬Ëwarââ¬â¢ in the conventional sense?Is Russia engaging in a cyber war with the West? The dissertation considered various approaches to address the questions above as well as examine different options such as sources of data, type of research framework, timescale and methodology. In trying to answer any of the research questions, it was clear that any primary data used to carry out the research and with the available time limit would not be possible or indeed produce valuable information. This dissertation needed to design an analytical framework to counter this problem. Thus, I attempt to make a justification for carrying out secondary analysis of qualitative data and the benefits and limitations of the approach Secondary Data Collection In setting about the data collection, it was imperative I included boundaries for the study, the protocol for recording the data as well as the methodology for analysing it which are all set out below. The secondary data included qualitative documents and qualitative audio and visual materials. The list of secondary evidences kept evolving and the research continued. However, below is the final list of secondary evidences used. Data from various government departmentsNews articles from newspapersData and analysis from periodicals, books, journals etc.Data from non-governmental agencies and public bodiesData from online sources Secondary Analysis of Qualitative Data Secondary data analysis is essentially re-analysis of data collected by another researcher (Elliot, 2015). Andrews et al gave a definition of secondary data analysis as the collection and use of previously collected data for another purposeà (Andrews, et al., 2012). In addition, they also explained that the use of secondary data analysis first appeared when one of the founders of Grounded Theory (Glaser) discussed the possibility of re-analysing data that had already been collected for other purposes (Andrews, et al., 2012). Notwithstanding, secondary analysis is still not very popular and there have been very limited reviews of its use (Hinds, et al., 1997). At this point, it is pertinent that a distinction be made between secondary analysis, documentary analysis, systemic reviews and meta-analysis. Secondary data analysis is the examination of primary data[2] from previous research studies. Such data would include examples such as semi-structured interviews, research diaries, responses to open-ended questions in questionnaires, transcripts of interviews/conversations etc. On the other hand, documentary analysis would involve the analysis of data such as auto-biographies, personal diaries, photographs etc. Heaton does point out that there could be some considerable overlap between secondary analysis and documentary analysis (Heaton, 2008). Meta-analysis and Systematic Reviews both involve both involve going over published findings of previous research studies unlike secondary data analysis that looks at the primary data and not just the published findings. Review & Discussion Introduction Cyber warfare has different definitions depending on which theorist is applying it and which country is examining and applying the concept; for example, the U.S. military view cyber warfare in very different terms from the Russians. To begin with the word ââ¬Å"cyberâ⬠is a completely new phenomenon that arose after the dot com boom and the start of the 4th Revolution. Not surprisingly, it has not filtered into the established rules of war or armed conflict adhered to by other nation statesà (Chen, 2010). For starters, the word ââ¬Å"cyberâ⬠is not found in the 1949 Geneva Conventions and any of the additional Protocols (it has not been inserted there). The word, in common usage, relates to a whole host of things ranging from computers and their networks to the information in these computers to even the process of uploading and retrieving this information. By extension, the word cyber warfare will include acts committed in furtherance of any act against and adversary using everything that is considered part of the ââ¬Ëcyberââ¬â¢ domain. In looking at acts, cyber warfare would include offensive acts, defensive acts or acts of deterrence. By this explanation, it will include disseminating offensive information through computers or computer networksà (Andress & Winterfeld, 2011). Cyber warfare is one that has no clear boundaries or actors which makes a lot of the current legislation unhelpful. Acts of war or states of war are usually assigned to recognised states and combatants. But in this case, cyber warfare can be conducted by states, agents of states, non-state actors, international groups or any collection of people with a single vested interest or even one individualà (Cornish, et al., 2010).à Cyber Warfare and the legal question This dissertation started off with trying to determine if cyber warfare is the new arena of conflict. Even though I have attempted to define ââ¬Ëcyberââ¬â¢ and ââ¬Ëcyber warfareââ¬â¢, there are still large parts of this area of study that need to be examined. A lot of the current research already makes the assumption that cyber warfare is warfare because of its obvious name or that a few of the permanent members of the UN Security Council are making the case. But what is the legal argument to justify treating cyber warfare as warfare? Letââ¬â¢s begin with the least disputed agreement and definition of what leads to armed conflict. It is generally accepted that ââ¬Å"armed forceâ⬠is the necessary requirement for ââ¬Å"armed conflictâ⬠. The UN Charter Article 2(4) provides, All members [of the UN] shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any State . . .,. Exceptions are use of force authorized by the Security Council, and self-defence pursuant to Article 5 1.â⬠Even customary law that applies to non-UN members still has the expectation of the same necessary requirement although it must be pointed out that this is only applicable to state actors (Kelsey, 2008). Non-state actors where not envisioned when the Charter was framed. Nonetheless, this is still the legal argument as it stands. Cyber warfare does not seem to meet the threshold of ââ¬Ëarmed forceââ¬â¢ although many would argue otherwise. And it is this argument that is usually translated into the foreign policy of some statesà (Gompert & Libicki, 2014). Even the UN Charter Article 51 still proposes that a response to attack is only justified if the initial or first attack is an armed attack. As it stands today, cyber warfare is not recognised as a legitimate war just in the same way that the ââ¬ËWar on Terrorââ¬â¢ is not a legitimate war but a cornerstone of US foreign policy. By extension, it stands to reason that a cyber attack is not in reality an attack recognised by the UN (Droege., 2012). Ultimately the view of whether an act is a cyber attack or part of cyber warfare is merely one that is only determined by the recipient of the act and how they choose to respond; through dialogue or retaliation? In addition, the judgement of the international community plays a significant part even though state actors often form alliances that ensures that an attack on one nation state could be an attack on the entire alliance; e.g. a cyber attack on a NATO member state. Not having a legal basis for an action does not in any way imply that it is not treated as a conflict or war. We only have to look at the U.S. justifications for bombing, Iraq, Afghanistan and Syria in clear violation of the U.N. Charter; none of these states had perpetrated an armed attack against the U.S. The international community enjoined the U.S. even though other states had pointed out at the clear hypocrisy being committed by the U.S. If one is to consider cyber warfare and cyber attacks, then answering the legal question is insufficient. One must refer to the prevailing theory of international relations one subscribes to or comment on wider matters governing a stateââ¬â¢s behaviour. This dissertation will look at empirical examples of cyber warfare. Global Cyber warfare: China vs US In todays information age, the Peoples Republic of China has replaced and even improved upon KGB methods of industrial espionage to the point that the Peoples Republic of China now presents one of the most capable threats to U.S. technology leadership and by extension its national security.Dan Verton, Cyber Warfare Expert (Hjortdal, 2011) It is easy to forget that in 1820, Greece had revolted against the Ottoman Empire, Britain had opened the first modern railway and was on its way to an exploding industrial revolution, Brazil had nervously declared independence from Portugal and that China was the worldââ¬â¢s superpower with the largest share of global GDP. In fact, it is easy to forget because history has been written specifically to gloss over these facts. Western academia has repeatedly highlighted China as a collective of starved, dispossessed and slaughtered people and not a prosperous, dynamic and global power from 1100 ââ¬â 1820. From 1078, China was the worldââ¬â¢s major producer of steel, the worldââ¬â¢s leader in technical innovations, the worldââ¬â¢s leading trading nation, possessed the largest commercial ships and these are just to mention a few. Few academics would now dispute that China was the worldââ¬â¢s hyperpower for 800 years before the rise of British imperialism in the 19th century. Western imperialism and Chinaââ¬â¢s decline has been documented in detail which this book cannot do justice to. The rise of Chinese economic and political strength is unquestionably due to the Communist Party of China which began when the Third Plenary Session of the 11th Central Committee of Communist Party of China adopted a reform policy triggering the private sector[3]. à Since 1978, entrepreneurship has driven the Chinese economy and the economic and political changes since then remain unprecedented. So transformative has this change been that China is now a threat to the US in the information superhighway. A recent event in 2016 puts this threat into context. China builds worldââ¬â¢s fastest supercomputer without U.S. chips ââ¬Å"China on Monday revealed its latest supercomputer, a monolithic system with 10.65 million compute cores built entirely with Chinese microprocessors. This follows a U.S. government decision last year to deny China access to Intels fastest microprocessors. There is no U.S.-made system that comes close to the performance of Chinas new system, the Sunway TaihuLight. Its theoretical peak performance is 124.5 petaflops, according to the latest biannual release today of the worlds Top500 supercomputers. It is the first system to exceed 100 petaflops. A petaflop equals one thousand trillion (one quadrillion) sustained floating-point operations per second.â⬠ComputerWorld (June 20, 2016 http://www.computerworld.com/article/3085483/high-performance-computing/china-builds-world-s-fastest-supercomputer-without-u-s-chips.html) It has earlier been argued that cyberspace is open to both state actors and non-state actors. Because actions can be taken by an individual in a state, it is extremely hard to prove culpability of the state. In other words, a cyber attack from a computer in China in no way implies that the cyber attack was orchestrated by the Chinese state. Proving culpability is extremely hard and this fact alone hinders the argument that cyber warfare could be a new arena of conflict. Having said this, the media is awash with stories of Chinese cyber attacks on the U.S. but it is always lacking in evidence. Ironically, one never hears of U.S. cyber attacks on China or at the very least the mainstream media never reports it. Despite Chinaââ¬â¢s repeated denials of culpability and its demand for proof that its citizens are responsible for cyber attacks on U.S. interests, the U.S. have taken the bold step in 2011 to issue a statement from the National Counterintelligence Executive that China is the ââ¬Å"most active and persistent perpetrator of cyber intrusions into the United Statesâ⬠(Heginbotham, 2015). à As there are no clearly defined rules on cyber warfare, any escalation of tensions between China and the U.S. could be construed and framed in the words of a potential conflict similar to the rhetoric that started and fuelled the Cold War between the U.S. and the U.S.S.R. This Cold War metaphor is how commentators are viewing the Cyber race between China and the U.S. According to President Barack Obamaââ¬â¢s 2011 Cyberspace Policy Review, ââ¬Å"cybersecurity risks pose some of the most serious economic and national security challenges of the 21st centuryâ⬠(Solis, 2014). This rhetoric is backed up by the steps the U.S. has taken to secure its strategic advantage in the domain. In 2009, the U.S. created the Cyber Command under the National Security Agency (NSA) with the express purpose of putting cyber warfare in the forefront of its military and defensive strategy. In addition, the Department of Defence (DoD) also has the Pentagon Strategy for Operating in Cyberspace with China clearly set in its sights. These aggressive overtures by the U.S. have not been ignored. According to the Chinese Ministry of Public Security, they are of the opinion that cyber attacks on Chinese computer installations grow at a rate of 80% annually making China the largest and most venerable recipient of cyber attacksà (Robinson, et al., 2015). To put it into context, in 2011, China succumbed to a cyber attack where 100 million usernames, passwords and emails were leaked unto the internet. What is commonly acknowledge is that the U.S. practically controls the entire internet and other states are using every means possible to reduce the influence of that control and threat even though the US was instrumental in the development of the internet. For the global internet to be fully operational, it requires 13 root serves. 10 of the 13 are based in the US and the other 3 are based in Japan, Sweden and the Netherlands. ICANN, the body that authorises domain names and designations is based in the U.S. With these facts in mind, the U.S. has the most potential to turn cyber space into a cyber threat. At least that is the argument posed by China and they insist on being able to protect their national interests. With both sides staking a national interest priority, it is not surprising that cyber warfare could be the next arena between the U.S. and China (Lieberthal & Singer, 2012). Global Cyber warfare: Russia vs the rest of the world The Russians view cyber and cyberspace in completely contradictory terms to the U.S. and the West in general. First and foremost, the Russians do not generally refer to the term cyber as a distinct concept in the way political theorists in the West do. Russia, and to some extent China, have a wider understanding of information and its control regardless of the medium chosen. So, given its long history with controlling information about and through the state during the era of the Soviet Union, electronic information is just one conduit or category of information that can be utilized, manipulated and harnessed for the greater good of the state. That is to say that the notion of cyber is just another mechanism by which information is relayed and does not take priority over other mechanisms in importance just in practical relevance. In Russian military doctrine, information and disinformation go hand in hand and are tools used by the state apparatus to achieve a desired objective for its citizens or against its adversaries. It is utilized with judicious foresight towards a purpose in addition to other traditional methods and processes. In practical terms, if information (or disinformation) helps another weapon to tool, then Russian military theorists see electronic information merely as an enabler or facilitator. Therefore information is relevant to already established practices of the state such as disinformation operations, electronic warfare, Psychology Operations (also known as PsyOps), political subversion and subterfuge, economic warfare etc. According to (Carr, 2011), ââ¬Å"this is stated clearly in the Military Doctrine of the Russian Federation (2010) â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. features of modern military conflicts is the prior implementation of measures of information warfare in order to achieve political objectives without the utilization of military force and, subsequently, in the interest of shaping a favourable response from the world community to the utilization of military force.â⬠Carr, 2011 Cyber warfare, according to Russian theorists, is just information warfare by another means but more efficient than other types of information warfare. Cyber warfare is a legitimate tool of the state, so the argument goes, in peacetime and in conflict. It does not hold a special prominence like it does in the U.S. Cyber warfare is regulated to accompanying other tools of the state but given its nature, it has no set rules, no boundaries, no prescribed limits and no real restrictions or applications. Such a view is diametrically opposite to that of the concept of cyberspace held in the West. In support of this theory, the Russian state apparatus is structured quite differently from the U.S. Cyberspace and cyber warfare started under the remit of the Federal Security Service (Federalââ¬â¢naya Sluzhba Bezopastnosti: FSB) which was tasked with initiating information and disinformation wars using whatever means necessary including cyber warfare. The FSB also maintains and controls SORM, the Stateââ¬â¢s internal cyber surveillance system. In addition to the FSB, The Federal Service for Supervision in the Sphere of Telecommunications, Information Technologies and Mass Communications (Roskomnadzor), is also tasked with controlling the civilian media, telecommunications, the internet, the radio and any electronic media. Russiaââ¬â¢s strategy of seeing cyber warfare as a continuation of normal political and military overtures was witnessed in the war with Georgia in 2008à (Robinson, et al., 2015). To date, Russia is still the only country to use all three of military, economic and cyber warfare on an adversary in the international arena. Russia had a two-pronged attack when it used military weapons and cyber warfare to defeat Georgia. Similarly, in its conflict with Ukraine in 2014, its conventional use of military weapons and cyber warfare resulted in Ukrainian government websites being shut down, massive ââ¬Ëdenial of serviceââ¬â¢ attacks being reported and energy installations being hacked into. This is the first of many of these sorts of ââ¬Ëtotal warfareââ¬â¢ that will continue in the new future. One only has to read newspaper reports of cyber attacks occurring on a daily basis. But does this constitute a new arena of conflict? I think given what is already going on in conflicts around the world, the question has already been answered. Whether by design or accident, states are using cyber warfare as a tool against their adversaryà (Lieberthal & Singer, 2012). Worldââ¬â¢s first Cyber War No other body of research could be more persuasive that presenting details of the worldââ¬â¢s first cyber war to support the argument that cyber warfare is now a new arena of conflict. The first known incident of an entire country being subjected to an all out cyber war was Estonia. To understand the gravity of this event is to look at the history of Estonia.à Estonia was controlled by the Soviet Union for nearly 50 years and obtained its independence in 1991. Then it was a desolate country which has been starved of infrastructure and economic development. With a population of just under 2 million, it has carved a future for itself as one of the most wired and technological advanced countries in the world. It is truly a model of a smart country with widespread ecommerce and e-government services almost unparalleled anywhere in the world. As a state once controlled by the Soviets until 1991, the country is punctuated with Soviet history and struggle. The capital city, Tallinn, had monuments erected to the Soviet soldiers who fought and died in the struggle to keep Germany out of Russia. Estonia, as it is their right, decided to move the monument to a cemetery which met angry objections from Russian leaders and the large Russian community that grew out of a 50 year occupation. Russia saw Estonia as a symbol of struggle and the Estonians saw Russia as a symbol of oppression. After altercations in the city centre following the removal of the monument, Estonia found that its entire electronic infrastructure was disrupted. The state administration was paralysed, banks and companies had to freeze their operations, the internet was practically down and nothing was working. Culpability was had to prove but it was the first recorded total cyber war against a state. Again, there is no proof that the perpetrators were state spon sored or indeed it was a malicious attack but the timing and the magnitude points to more than a criminal cohort (there was no financial advantage gained in the event) and to a state sponsored cyber attack. More importantly, Estonians pointed the finger at Russia and being members of NATO, they retained the prerogative to invoke Article 5 of NATO: an attack against one is an attack against all. Postscript If there was any uncertainty about cyber warfare becoming the new arena of conflict then the headlines below might seem ominous as they are similar to the headlines that preceded the First World War and the Second World War. And these were in just over 3 days. ââ¬Å"Malta accuses Russia of cyber-attacks in run-up to election The embattled Maltese government has claimed that it has come under attack from a Russian-backed campaign to undermine it, amid worsening relations with the Kremlin. Malta assumed the presidency of Europeââ¬â¢s Council of Ministers in January, an important position under which it chairs high-level meetings in Brussels and sets Europeââ¬â¢s political agenda. Since then, the Maltese governmentââ¬â¢s IT systems have seen a rise in attacks, according to a source working within its information technology agency, a government body. He claimed the attacks, which have increased ahead of next monthââ¬â¢s general election, are designed to damage the government. ââ¬Å"In the last two quarters of last year and the first part of this year, attacks on our servers have increased,â⬠the source said.â⬠à (Doward, 2017) ââ¬Å"Trump executive order aims to protect US from ââ¬Ëcatastrophicââ¬â¢ cyber attack US President Donald Trump this month signed an executive order that aims to increase protection for US essential services in case of a cyber attack that results in catastrophic regional or national effects on public health or safety, economic security, or national securityâ⬠. (Kuchler, 2017) Nth Korea launches cyber attacks on US North Koreas main spy agency has a special cell called Unit 180 that is likely to have launched some of its most daring and successful cyber attacks, according to defectors, officials and internet security experts. North Korea has been blamed in recent years for a series of online attacks, mostly on financial networks, in the United States, South Korea and over a dozen other countries. Cyber security researchers have also said they have found technical evidence that could link North Korea with the global WannaCry ransomware cyber attack that infected more than 300,000 computers in 150 countries this month.à Pyongyang has called the allegation ridiculous. (Reuters, 2017) The research question of whether cyber warfare is a new arena of conflict is probably not in any doubt. The argument reverts back to the beginning of this research when examined the realist approach to international relations. Even if one were to look at the vast number of institutions in the international system and make a please for calmer heads prevailing, the realpolitik of current geopolitics shows that cyber attacks can, and will most likely, be used as a pretext and as a tool of war. It is no longer a question of if but when. Bibliography Andersen, P. H. & Kragh, H., 2011. Beyond the inductive myth: New approaches to the role of existing theory in case research. . In: R. Marschan-Piekkari & C. Welch, eds. Rethinking the case study in international business and management research. s.l.:Edward Elgar Publishing Ltd, pp. 146-167. Andress, J. & Winterfeld, S., 2011. Cyber Warfare Techniques, tactics and Tools for Security Practitioners. s.l.:Elsevier Science. Andrews, L., Higgins, A., Andrews, M. & Lalor, J., 2012. Classic Grounded Theory to Analyze Data: Reality and Reffecions. Grounded Theory Review: An International Journal, June.11(1). Barkawi, T., 2011. From War to Security: Security Studies, the Wider Agenda and the Fate of the Study of War. Millenium: Journal of International Studies, Volume 39(Issue 3), pp. 701-716. Bernard, H. R., 2011. Research methods in anthropology: Qualitative and quantitative approaches.. s.l.:Rowman Altamira.. Carr, J., 2011. Inside cyber warfare: Mapping the cyber underworld. Sebastopol: OReilly Media, Inc.. Chen, T., 2010. Stuxnet, the real start of cyber warfare?. IEEE Network, Volume 24(Issue 6), pp. 2-3. Cobban, S. J., Edgington, E. M. & Pimlott, J. F., 2008. An ethical perspective on research using shared data.. Canadian Journal of Dental Hygiene, 42(5), pp. 233-238. Colarik, A. & Janczewski, L., 2008. Introduction to Cyber Warfare and. In: L. Janczewski & A. Colarik, eds. Cyber Warfare and Cyber Terrorism. New York: Information Science Reference. Colarik, A. & Janczewski, L., 2012. Establishing Cyber Warfare Doctrine. Journal of Strategic Security, Volume 5(Issue 1), pp. 31-48. Cornish, P., Livingstone, D., Clemente, D. & Yorke, C., 2010. On Cyber Warfare. London: Chatham House. Corti, L. & Bishop, L., 2005. Strategies in teaching secondary analysis of qualitative data. Forum: Qualitative Social Research, 6(1). Curran, K., Concannon, K. & McKeever, S., 2008. Cyber Terrorism Attacks. In: A. Colarik & L. Janczewski, eds. Cyber Warfare and Cyber Terrorism. New York: Infformation Science Reference. DeWeese, S., 2009. Capability of the Peopleââ¬â¢s Republic of China (PRC) to conduct cyber warfare and computer network exploitation. s.l.:Diane Publishing. Doward, J., 2017. Malta accuses Russia of cyber-attacks in run-up to election. [Online] Available at: https://www.theguardian.com/world/2017/may/27/russia-behind-cyber-attacks-says-malta-jseph-muscat [Accessed 29 May 2017]. Dragan, M., Danko, M. & Mirjana, D., 2012. Defining Cyber Warfare. Vojnotehnià ki Glasnik, Volume 60(Issue 2), pp. 84-117. Droege., C., 2012. Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross,, Volume 94(Issue 886), pp. 533-578. Elliot, D. C., 2015. SECONDARY DATA ANALYSIS. In: F. Stage & K. Manning, eds. Research in the College Context: Approaches and Methods. s.l.:s.n. Elman, C., Gerring, J. & Mahoney, J., 2016. Case Study Research: Putting the Quant Into the Qual. Sociological Methods & Research, 45(3), pp. 375-391. Fielding , N., 2004. Geting the most from archived qualitative data: epistemological, practical and professional obstacles. International Journal of Social Research Methodology, 7(1), pp. 97-104. Gladstone, B. M., Volpe, T. & Boydell, K. M., 2007. Issues encountered in a qualitative secondary analysis of help seeking in the prodrome to psychosis. The Journal of behavioural Health Sciences and Research, 34(4), pp. 431-442. Gompert, D. & Libicki, M., 2014. Cyber Warfare and Sino-American Crisis Instability. Survival, Volume 56(Issue 4), pp. 7-22. Heaton, J., 1998. Secondary analysis of qualitative data. Social Research Update, Issue 22. Heaton, J., 2004. Reworking Qualitative Data. London: Sage Publications Ltd. Heaton, J., 2008. Secondary Analysis of Qualitative Data: An Overview. Historical Social Research, 3(3). Heginbotham, E., 2015. The U.S.-China Military Scorecard Forces, Geography, and the Evolving Balance of Power 1996-2017, Santa Monica: The RAND Corporation. Hinds, P. S., Vogel, R. J. & Clarke-Steffen, L., 1997. The Possibilities and Pitfalls of Doing a Secondary Data Analysis of Qualitative Data Set. Qualitative Health Research, 7(3), pp. 408-424. Hjortdal, M., 2011. Chinas Use of Cyber Warfare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, Volume 4(Issue 2), pp. 1-24. Hjortdal, M., 2011. Chinas Use of Cyber Warfare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, Volume 4(2), pp. 1-24. Irwin, S., Bornat, J. & Winterton, M., 2012. Timescapes secondary analysis: Comparison, context and working across data sets. Qualitative Research, 12(1), pp. 66-80. Jensen, E. T., 2009. Cyber warfare and precautions against the effects of attacks. Texas law review, Volume Volume 88, p. 1533. Johnston, M., 2014. Secondary Data Analysis. A Method of which Time Has Come, Volume 3, pp. 619-626. Kelsey, J. T., 2008. Hacking into international humanitarian law: The principles of distinction and neutrality in the age of cyber warfare. Michigan Law Review, pp. 1427-1451. Knapp, K. J. & Boulton, W. R., 2006. Cyber-warfare threatens corporations: expansion into commercial environments. Information Systems Management, Volume 23(Issue 2), p. 76. Krasner, S., 1983. International Regimes. Ithaca: Cornell University Press. Kuchler, H., 2017. Trump executive order aims to protect US from ââ¬Ëcatastrophicââ¬â¢ cyber attack. [Online] Available at: https://www.ft.com/content/1e46dd84-2422-11e7-a34a-538b4cb30025 [Accessed 29 May 2017]. Kuehl, D., 2009. From cyberspace to cyberpower: Defining the problem.. In: F. Kramer, S. Starr & K. Wentz, eds. Cyberpower and national security. Washington D.C.: Potomac Books Inc., pp. 24-42. Lagner, R., 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, Volume 9(Issue 3), pp. 49-51. Lieberthal, K. & Singer, P., 2012. Cybersecurity and U.S.-China Relations. [Online] Availableat:https://www.brookings.edu/wpcontent/uploads/2016/06/0223_cybersecurity_china_us_lieberthal_singer_pdf_english.pdf [Accessed 25 May 2017]. Lindsay, J. R., 2013. Stuxnet and the limits of cyber warfare. Security Studies, Volume 22(Issue 3), pp. 365-404. Long-Sutehall, T., Sque, M. & Addington-Hall, J., 2011. Secondary analysis of qualitative data: A valuable method for exploring sensitive issues with an elusive population. Journal of Research in Nursing, 16(4), pp. 335-344. Mackenzie, N. & Knipe, S., 2006. Research dilemmas: Paradigms, methods and methodology.. Issues In Educational Research, 16(2), pp. 193-205. Marwil, J., 2000. Photography at War. [Online] Available at: http://www.historytoday.com/jonathan-marwil/photography-war [Accessed 21 May 2017]. Nicholson, A. et al., 2012. SCADA security in the light of Cyber-Warfare.. Computers & Security, Volume 31(Issue 4), pp. 418-436. Palys, T., 2008. Purposive Sampling. In: L. M. Given, ed. The Sage Encyclopedia of Qualitative Research Methods. Los Angeles: Sage, pp. 697-698. Reuters, 2017. Nth Korea launches cyber attacks on US. [Online] Available at: http://www.skynews.com.au/news/world/asiapacific/2017/05/21/nth-korea-launches-cyber-attacks-on-us.html [Accessed 29 May 2017]. Robinson, M., Jones, K. & Janicke, H., 2015. Cyber warfare: Issues and challenges. Computers & Security, Volume Volume 49, pp. 70-94. Robinson, M., Jones, K. & Janicke, H., 2015. Cyber warfare: Issues and challenges. Computers & Security,, Volume 49(Issue 25), p. 70. Shakarian, P., Shakarian, J. & Ruef, A., 2013. Introduction to cyber-warfare: A multidisciplinary approach. Oxford: Newnes. Solis, G., 2014. Cyber Warfare. Military Law Review, Volume Volume 219, pp. 1-52. Stavrianakis, A. & Selby, J., 2012. Militarism and International Relations. In: A. Stavrianakis & J. Selby, eds. Militarism and International Relations Political Economy, Security and Theory. s.l.:Taylor and Francis. Tashakkori, A. & Teddlie, C., 2010. Sage handbook of mixed methods in social & behavioral research. s.l.:Sage. Tennis, J. T., 2008. Epistemology, Theory and Methodology in Knowledge Organization: Toward a Classification, Metatheory, and Research Framework. In Knowledge Organization, 35(2/3), pp. 102-112. Tesch, R., 1990. Qualitative research: Analysis types and software tools.. New York: Falmer. Thorne, S., 1990. Secondary Analysis in Qualitative Research: Issues and Implications. In: J. M. Morse, ed. Critical Issues in Qualitative Research Methods. London: Sage. Turns, D., 2012. Cyber Warfare and the Notion of Direct Participation in Hostilities. Journal of Conflict and Security Law,, Volume 17(Issue 2), pp. 279-297. Van den Berg, H., 2005. Reanalyzing qualitative interviews from different angles: the risk of de-contextualization and other problems of sharing qualitative data.. Forum: Qualitative Social Research, , 6(1). Vasilachis De Gialdino, I., 2009. Ontological and Epistemological Foundations of Qualitative Research. Forum: Qualitative Social Research, 10(2), pp. 1438-5627.. Wang, H. & Wang, S., 2004. Cyber warfare: steganography vs. steganalysis. Communications of the ACM, Volume 47(Issue 10), pp. 76-82. Wolcott, H. T., 2009. Writing up qualitative research. Thousand Oaks, California: Sage. [1] These are computers that have been hijacked and remotely taken over by a person other than the owner. [2] Primary data is that which is from a study where the researcher personally collects the information but secondary data is data that has already been collected (Andrews, et al., 2012). [3] From December 18 to 22, 1978, the Third Plenary Session of the 11th Central Committee of Communist Party of China was held in Beijing. The party decided that China should start shift its economic focus from class struggle-oriented to economic construction-oriented, from semi-rigid/rigid to comprehensive reform, and, from semi-closed/closed to opening up.Invalid source specified.
Monday, August 5, 2019
Theories of International Microeconomics
Theories of International Microeconomics 1. Introduction Economic theory can be considered as a system of ideas that contains a set of models designed to explain economic outcomes and make predictions for future events. The choice of the model will depend principally on the explanatory value and the certainty of the model in explaining current situations and predicting future outcomes. International trade is the difference between production and consumption. The theory of international trade has heavily been influenced by the works of classical economists. According to David Ricardo, trade occurs between countries because of differences in technology. For Eli Heckscher and Bertil Ohlin, trade arises mainly due to differences in factor endowments and factor intensities of respective countries. 2. Ricardian Model The Ricardian Model was developed in 1817 by David Ricardo (1817) with two goods, two countries and a single input as components of the model. This model assumes differences in technology between countries as basis of trade. Ricardo stated that both countries could benefit from trade on the condition that labor input of countries should be different, irrespective of the fact that one country might has an absolute advantage in the production of both goods. Being a one factor model, the Ricardian Model is not the appropriate model to study the effects of technology on trade patterns because of its simplicity. 3. The Heckscher Ohlin Model The Heckscher Ohlin (HO) theory holds two assumptions; countries have different factor endowments and factor intensities as sources of differences in opportunity costs of production. Trade is restricted between 2 countries, 2 factors of production and 2 goods traded. This model generates 4 predictions: (a) The Heckscher ââ¬â Ohlin theorem, whereby the capital abundant country will export the capital intensive good, (b) The Factor Price Equalization Theorem, with production of different goods, international trade will equalize factor prices, (c) The Stopler-Samuelson Theorem, with production of different goods, an increase in the price of a labor intensive good will reduce the real and relative return to capital and will increase the real and relative return of the labor intensive good, (d) The Rybczynski Theorem, with production of different goods, a rise in the endowment of labor, will lead to a more than proportionate increase in the output of the labor intensive good and a fa ll in the capital intensive good. 3. 1 The Heckscher ââ¬â Ohlin Theorem The Heckscher ââ¬â Ohlin theorem implies that a country will export those goods that are produced through intensive use of factors of production found locally in an abundant amount. In a 2 2 2 model, countries produce the same pair of commodities, engage in free trade in a competitive environment with countries benefitting from constant returns to scale in accordance with technology. The supply of factors of production is perfectly inelastic in both countries. These conditions are present when there is relative factor abundance. A second situation can arise where autarkic factor prices are present in both countries. Demand and supply conditions dictate autarkic factor prices. Despite a country being relatively abundant in labor, it may nonetheless impose autarkic wage rate if domestic preferences pattern strongly favors the labor intensive produced good relative to the foreign produced good. The trade pattern will reflect the factor price comparison between countries. 3.2 The Factor Price Equalization Theorem This theorem assumes a situation where there are 2 countries in free trade; they have different factor endowments but have the same level of technologies. If both countries are diversified and Factor Intensity Reversal (FIR) does not occur, factor price equalization will happen in these countries. For Heckscher, identical production techniques were prerequisite for the equalization of factor prices. Different factor prices can be a sufficient cause for international trade to happen. However, Heckscher did not account for the number of factors and international markets. The initial model was a 3 2 classical model with 3 factors such as land, labor and capital, and two goods: textile and machinery. 3.3 The Stopler-Samuelson Theorem The Stopler-Samuelson Theorem was developed as a 2 2 model, with two traded goods and two non ââ¬â traded factors. It sets forth that an increase in the relative price of a good will lead to an increase of real return of that factor used intensively in producing that good and will reduce real return to the second factor. Four possible interpretations arise from this theorem: (a) winners and losers corollary; If a relative price change occurs, there will be a minimum of one loser ans one winner (b) Factor ââ¬â industry detachment corollary; external price changes will have an impact on the return to a factor irrespective of which industry the factor is employed (c) scarce factor corollary 1; trade barriers will help a scarce factor; an abundant factor is hurt (d) scarce factor corollary 2; depending on the scarcity of the factors, trade barriers will help. 3.4 The Rybczynski Theorem The two ââ¬â factor two good Rybczynski Theorem posits that if there is an increase in factor endowment of an industry that uses that factor fully, an increase in output is likely to occur compared to a decrease in output in the other industry. There are 4 levels of interpretation that can be observed from the Rybczynski Theorem: (a) a minimum of one Rybczynski derivative will be negative, (b) a homothetic relationship exists between output and factor supplies, (c) the relationship will be a linear one, (d) the total amount of current factor supplies is important. 4. International Trade: The Evidence International microeconomics seems little affected by empirical evidence. Despite trade flows being measured with the greatest accuracy, the data obtained has not been really reliable and to certain extent inaccessible. Empirical studies based on this data can hardly be reviewed or taken seriously as a proper revaluation of the theories proposed by classical economists. Attempts to bridge the gap between the trade patterns and the theoretical assumptions made by the various classical and neo classical models have been made and several problems arose. The first problem that rises is that international trade is arbitrage. This is principally due to price discrepancies governing the international markets. Autarkic prices differences have not been observed and these discrepancies are hypothetical in nature. There is no solid evidence as international trade gets rid of these discrepancies. Another difficulty linked to this is causality. Whatever the consequence, the human mind has always hoped that a single cause must be behind its initial inception. The Ricardian Model and the Heckscher Ohlin model are unicausal. Everything has a single root. For arbitrage in international trade, autarkic prices discrepancies cannot be the only explanation as to why there is arbitrage in the first place. Changes in factor endowments, tastes and preferences or difference s in technologies can form part of the supplementary explanations. In the last 4 decades, there have been 3 types of empirical studies on international trade. These are tests of the Ricardian and HO models, studies trying to find a link between bilateral trade, national incomes and geographical distances between trading countries, and finally, a number of informal accounts yet to be tested and accounted for. MacDougall (1951, 1952) carried out a study using 1939ââ¬â¢s data for a UK-US comparison to find whether exports of good of different countries were correlated in pairs with third markets as the Ricardian model presumed. Results were positively and significant. Later empirical studies provided additional support to these results (MacDougall et al., 1962, Stern, 1962; Balassa, 1963) The assumption that consumers have homothetic preferences has been empirically refuted. Following studies carried out by Prebisch (1950) and Singer (1950), results have showed that the terms of trade for poor countries has been deteriorating continuously. As world economy experiences economic growth, the relative demand shifts from the South to the industrialized North, a region that specializes in goods with higher income elasticity. The South benefits little from improvement in production in exports sectors, principally because the extra purchasing power generated by lower southern commodities will be spent on purchase of northern commodities. Studies carried out by scholars affected significantly the reliability of the HO theorem. Patterns of trade were examined between US, West Germany, Japan and Canada with the rest of the world. Results obtained were not in consensus with the HO theorem whereas results of East Germany and India showed support (Bharadwaj, 1962; Leontief, 1953, 1956; Roskamp, 1961; Stolper and Roskamp, 1961; Tatemoto and Ichimura, 1959; and Wahl, 1961). Another study carried out by Clifton, Jr and Marxsen (1984) obtained relatively the same results. They used a multi-commodity, two-country, and two factor model to test for trade based on profit and wages instead of using capital and labor as factors of production. Results obtained show trade patterns for the year 1968 of Australia, Ireland, Japan, Korea, New Zealand, and the United States support the theorem while results of UK, Kenya and Israel do not. In his study to discover the sources of the success of the American industry for the years 1879, 1899, 1909, 1914, 1928, and 1940, Wright (1990) concluded that the capital to labor ratio was an important source of comparative advantage in the early years but it soon became a comparative disadvantage by 1940. Natural resources did not contribute to exports success in the 19th century but in the 20th century it impacted exports significantly. The reasons provided by the HO theorem that difference in capital and labor endowments are the primary reasons for trade is wrong and thus a need for further study in this area. The most important study of trade patterns through use of HO models was carried out by Leontief (1953). The results showed that in 1947, U.S imports were more capital intensive compared to labor than the ratio in U.S exports. This paradox exists if U.S is well endowed in capital. This paradox can be solved through 2 ways: (a) by creating demand or factor intensity reversals (FIRs), (b) the introduction of international technological differences. By introducing these solutions, the American labor intensive industries benefited from significant advantage in terms of costs arising due to factor endowments. Linnemann (1966) using data from more than 40 countries carried out a study to find a link between bilateral trade, national incomes and geographical distances between trading countries. He wanted to find answers relating to the bilateral trade volumes and trade size with different trading partners. Results illustrated that the volume of trade depends much on the geographical proximity of trading partners inclusive of transport costs. The importing countryââ¬â¢s national income and the exporting countryââ¬â¢s national income also had an impact on the size of tradable commodities. Minhas (1963) carried out a study to question the applicability of the FPE theorem due to the presence of Factor Intensity Reversals (FIRs). Minhas came to the conclusion that when elasticity of substitution differs between countries, FIRs are likely to occur. Through trade, equality of commodity prices will not guarantee a price equalization of factor prices in respective countries. Conclusion Trade occurs simply because of the price discrepancies that exist in the markets. Technological differences and factor endowments are the main reasons for these discrepancies. The numerous and complex literature on the Ricardian Model and Heckscher Ohlin Model have outlines various faults of these models but they nonetheless remain healthy. However, additional modifications need to be done. The models need to account for technological differences, multiple cones of diversification and home bias. References: Ronald Winthrop Jones. A, 1979, ââ¬ËInternational Trade: Essays in Theoryââ¬â¢, Oxford North Holland Publishing Co, Amsterdam, New York Ronald Winthrop Jones. A and Kenen Peter B. (Eds.), 1984, Handbook of International Economics 3, North Holland Balassa, B. 1963, ââ¬ËAn Empirical Demonstration of Classical Comparative Cost Theoryââ¬â¢, The Review of Economics and Statistics, Aug, Vol. 45, No. 3, pp. 231-238 Mac Dougall, G. D. A, 1951, ââ¬ËBritish and American Exports: A Study Suggested by the Theory of Comparative Costs. Part Iââ¬â¢, The Economic Journal, Dec, Vol. 61, No. 244, pp. 697-724 Mac Dougall, G. D. A, 1952, ââ¬ËBritish and American Exports: A Study Suggested by the Theory of Comparative Costs. Part IIââ¬â¢, The Economic Journal, Aug, Vol. 62, No. 247, pp. 487-521 Feenstra Robert, C. 2002, ââ¬ËAdvanced International Trade: Theory and Evidenceââ¬â¢, University of California, Davis, and National Bureau of Economic Research, Aug. Prebisch, R. 1950, ââ¬ËThe Economic Development of Latin America and Its Principal Problemsââ¬â¢, New York: United Nations, Econ. Comm. Latin America Clifton, D. S, Jr and William B. Marxsen, 1984, ââ¬ËAn Empirical Investigation of the Heckscher-Ohlin Theoremââ¬â¢, The Canadian Journal of Economics / Revue canadienne dEconomique, Feb, Vol. 17, No. 1,pp. 32-38 Matsuyama, K., 2000, ââ¬ËA Ricardian Model with a Continuum of Goods under Nonhomothetic Preferences: Demand Complementarities, Income Distribution, and Northà ¢Ã¢â ¬Ã South Tradeââ¬â¢, Journal of Political Economy, Dec, Vol. 108, No. 6, pp. 1093-1120 Redding Stephen J., 2006, ââ¬ËEmpirical Approaches to International Tradeââ¬â¢, Oct, London School of Economics and CEPR
Sunday, August 4, 2019
The Narratorââ¬â¢s Attitude in The Pugilist at Rest :: Pugilist at Rest Essays
The Narratorââ¬â¢s Attitude inà The Pugilist at Restà à à à à à à à à Websterââ¬â¢s Dictionary defines it as a mental position or the feeling one has for oneself.à In life our attitudes help define who you are or what you are like.à Attitude helps create your personality and how you would react under certain situations.à In ââ¬Å"The Pugilist at Restâ⬠Thom Jones tells us of one manââ¬â¢s attitude and how adversity and a disability changed his attitude completely.à The narratorââ¬â¢s attitude under goes changes from boot camp, bludgeoning Hey Baby,à recon Marine duty and finally obtaining Dostoyevskiââ¬â¢s epilepsy from a boxing match. à à à à à à à à à à à The narrator of the story undergoes changes in boot camp that will forever change his attitude towards life and his fellow Marines.à The story begins by showing a young foolish narrator that only wanted to charge into battle.à The narrator wanted to be all he could be and strived to become the best United States Marine Corp soldier the United States has to offer.à Jones describes the narratorââ¬â¢s determination and ambitions as, ââ¬Å"Whenever danger appears on the scene, truth and justice will be served as I slip into the green U.S.M.C. utility uniform and become Earthââ¬â¢s greatest hero.â⬠(485).à The narratorââ¬â¢s attitude would be altered drastically by a motivating speech that his Sergeant delivered to the boot camp.à Jones describes this speech as, ââ¬Å"You men are going off to war, and itââ¬â¢s not a pretty thing,ââ¬â¢ etc. & etc., ââ¬Ëand if Luke the Gook knocks down one of your buddies, a fellow Marine, you are going to risk your life and go in and get that Marine and you are going to bring him out.à Not because I said so. No!à You are going after that Marine because you are a Marine, a member of the most elite fighting force in the world, and that man out thee whoââ¬â¢s gone down is a Marine, and heââ¬â¢s your buddy.à He is you brother!à Once you are a Marine, you are always a Marine and you will never let another Marine down.ââ¬â¢ Etc. & etc. à ââ¬ËYou can take a Marine out of the Corps but you canââ¬â¢t take the Corps out of a Marine.ââ¬â¢ Etc. & etc.à At the time it seemed to me a very good speech,
Saturday, August 3, 2019
Women in the Quran :: A Level Essays
Women in the Qur'an The traditions of Islam revolve around the blessed words of Muhammad revealed to him through Allah. These revelations guide Muslims through not only the act of worship, but also through a lifestyle strictly designated in the words of the Qur'an. Those who criticize Islamic customs often accuse the Qurââ¬â¢an of attempting to govern society under prehistoric law. This holy book dates back to the lifetime of the prophet Muhammad in the 7th centuries Clearly times have changed; yet many Islamic customs have not evolved through time. One of the most controversial topics in Islam today addresses womenââ¬â¢s issues. Popular American culture portrays Islamic women as veiled and silenced figures living in a world of submission. Feminist groups in the United States focus on Muslim women and attempt to liberate the strong hold of Islamic tradition on womenââ¬â¢s freedom. Over 900 million Muslims continue to worship Allah worldwide. Islam continues to thrive as one of the major monothe istic religions across cultures and the followers of Islam respect and defend the words and customs laid out in the Qurââ¬â¢an. Qur'an Text: Word ââ¬Å"womanâ⬠used only 18 times in the Qur'an, usually in reference to what she will contribute to a family or what her duties are as a wife, her roles are defined vividly when the word woman is used. From: The Cow [2.221] And do not marry the idolatresses until they believe, and certainly a believing maid is better than an idolatress woman, even though she should please you; and do not give (believing women) in marriage to idolaters until they believe, and certainly a believing servant is better than an idolater, even though he should please you; these invite to the fire, and Allah invites to the garden and to forgiveness by His will, and makes clear His communications to men, that they may be mindful. From: The Family of Imran [3.35] When a woman of Imran said: My Lord! Surely I vow to Thee what is in my womb, to be devoted (to Thy service); accept therefore from me, surely Thou art the Hearing, the Knowing. The word ââ¬Å"manâ⬠is used 304 times, and it most often used to describe the human experience of work, economic status, and interactions with Allah. From: The Cow [2.184] For a certain number of days; but whoever among you is sick or on a journey, then (he shall fast) a (like) number of other days; and those who are not able to do it may effect a redemption by feeding a poor man; so whoever does good spontaneously it is better for him; and that you fast is better for you if you know. Women in the Qur'an :: A Level Essays Women in the Qur'an The traditions of Islam revolve around the blessed words of Muhammad revealed to him through Allah. These revelations guide Muslims through not only the act of worship, but also through a lifestyle strictly designated in the words of the Qur'an. Those who criticize Islamic customs often accuse the Qurââ¬â¢an of attempting to govern society under prehistoric law. This holy book dates back to the lifetime of the prophet Muhammad in the 7th centuries Clearly times have changed; yet many Islamic customs have not evolved through time. One of the most controversial topics in Islam today addresses womenââ¬â¢s issues. Popular American culture portrays Islamic women as veiled and silenced figures living in a world of submission. Feminist groups in the United States focus on Muslim women and attempt to liberate the strong hold of Islamic tradition on womenââ¬â¢s freedom. Over 900 million Muslims continue to worship Allah worldwide. Islam continues to thrive as one of the major monothe istic religions across cultures and the followers of Islam respect and defend the words and customs laid out in the Qurââ¬â¢an. Qur'an Text: Word ââ¬Å"womanâ⬠used only 18 times in the Qur'an, usually in reference to what she will contribute to a family or what her duties are as a wife, her roles are defined vividly when the word woman is used. From: The Cow [2.221] And do not marry the idolatresses until they believe, and certainly a believing maid is better than an idolatress woman, even though she should please you; and do not give (believing women) in marriage to idolaters until they believe, and certainly a believing servant is better than an idolater, even though he should please you; these invite to the fire, and Allah invites to the garden and to forgiveness by His will, and makes clear His communications to men, that they may be mindful. From: The Family of Imran [3.35] When a woman of Imran said: My Lord! Surely I vow to Thee what is in my womb, to be devoted (to Thy service); accept therefore from me, surely Thou art the Hearing, the Knowing. The word ââ¬Å"manâ⬠is used 304 times, and it most often used to describe the human experience of work, economic status, and interactions with Allah. From: The Cow [2.184] For a certain number of days; but whoever among you is sick or on a journey, then (he shall fast) a (like) number of other days; and those who are not able to do it may effect a redemption by feeding a poor man; so whoever does good spontaneously it is better for him; and that you fast is better for you if you know.
Friday, August 2, 2019
the Accident - Short Story :: essays research papers
The "Accident" The pick-up bounced jarringly down the old dirt road. The driver sat up straight in the front seat, checking over her shoulder every few seconds to make sure that her cargo hadn't fallen out. * * * * * She wasn't sure why she had done it, but the fact was, she had and she did not want to get caught. There was no way she could tell anyone, not even her best friend. What was she supposed to do? Go to the police? Tell them that it was an "accident"? She wasn't sure how you "accidentally" stabbed someone 6 times in the back. It had partially been his fault too. If he hadn't made her so mad, she wouldn't have jokingly gotten the knife out of the kitchen drawer. 'I'm going to kill you', she had said. But she didn't really mean it. Did she? Their argument got more heated, until he was screaming at her. And then he hit her. She was too shocked to say anything. He had always been so gentle. She stared at him for a minute, and then he turned around to leave. She's not sure what came over her at that minute, she doesn't even remember what she was thinking. But she does remember jumping on him, and knocking him to the floor, and then taking her knife and plunging it in and out of his back. She had no recollection of what happened for the next 10 minutes, perhaps she blacked out, but when she finally stood up, she knew what she had to do. She walked out to the garage and got a tarp down off the shelf. Her father used it to cover the wood pile, but she figured he probably wouldn't notice it was gone for a while. She took the tarp back into the kitchen and rolled the body on to it, checking to make sure that she didn't get blood onto anything that would be noticeably stained. The large pool of blood on the floor would be a problem, but she'd take care of that when she got back. She finally managed to get his body into the back of her truck. He had been a fairly good sized boy, and it was a struggle for her. She made sure that it was secure in the back, since the gate didn't always close right. She didn't want any accidental spills in the middle of the road.
Thursday, August 1, 2019
Biography of William Steele Sessions
On May 27, 1930 in Fort Smith, Arizona William Steele Sessions was born. This future Director of the FBI and Federal Judge however did not grow up in the Arizona area. Shortly after his birth his family moved to Kansas City, Kansas (ââ¬Å"1988 Yearbookâ⬠1988). This is where William attended his entire grade school career. Instead of following his father's footsteps of being a minister, William chose to enlist in the Air Force. In 1951 shortly after he graduated high school William enlisted. He was commissioned in 1952 and served as an airborne radar intercept instructor until his service was up in 1955, he had acquired the rank of captain in those four years. During those four years in the Air Force, Mr. Sessions fell in love and married. Her name was Alice June Lewis. Upon his leaving the Air Force, the couple moved to Waco, Texas where he then began attending Baylor University. He received his bachelors of arts in 1956 and then immediately began attending Baylor University School of Law, which he graduated in 1958 with a law degree. Once Texas placed William on the states bar he went into private practice, which he continued until 1969 (ââ¬Å"The FBI: A Comprehensive Reference Guideâ⬠1999). With the Sessions private law practice doing well and with him gaining recognition, Mr. Sessions was appointed Chief of government operations section, in the Criminal Division of the U. S. Department of Justice and remained there until 1971 (ââ¬Å"Judges of the United States Courtsâ⬠2000). So with his career really starting to take off there didn't seem much more he could do, but in 1971 Mr. Sessions had been appointed U. S. Attorney for the Western District of Texas and along with that, the President at the time, Gerald Ford, placed Mr. Sessions to be district judge for that Western District. He served in the city of El Paso until December of 1979, which he was then transferred to San Antonio to replace the assassinated District Judge John H. Wood. That following year in February he was named Chief Judge and would be until his appointment to the FBI in 1987. During the twelve years William Sessions was on the U. S. District Court for the Western District of Texas he had earned a reputation for being tough, but hair in law and order justice. He received a great deal of attention in 1982 when he gave stiff sentences to five convicted conspirators that were involved in the 1979 murder of his own colleague, John Wood Jr. , the only federal judge to be assassinated in U. S. history (ââ¬Å"1988 Yearbookâ⬠1988). William Sessions was at the height of his career when on July 24, 1987 President Regan named him to be Director of the FBI. On September 25 of that year the senate gave Mr. Sessions a unanimous vote for him to become Director and on November 2 he took the oath of office. So now that he was in the ultimate position what was he to do? To start off on the right foot, William's first move was to reorganize the bureau's senior staff. He created a new post, deputy director, which carried the responsibility of day-to-day operations and the deputy was assisted by two associate deputy directors (ââ¬Å"The FBI: A Comprehensive Reference Guideâ⬠1999). Next on his list was that with the Cold War no longer in existence, Mr. Sessions redeployed the agents formerly engaged in counterintelligence work to handle violent and white-collar crimes. Another reason for this move was in response to a forty percent increase over ten years of violent crimes. He designated the investigation of violent crime the FBI's sixth national priority in 1989, and by November 1991 the FBI created ââ¬Å"Operation Safe Streetâ⬠, in Washington, D. C. It was a concept of federal, state, and local police task forces targeting fugitives and gangs. With the successes of this operation the FBI was ready to expand the operational assistance to police nationwide (ââ¬Å"A Short History of the FBIâ⬠2000). In addition to this fight toward violent crime, on April 18, 1988, Director Sessions jump-started the Drug Demand Reduction Program by placing the program in important sections of the FBI. Those sections were the research unit and the office of congressional and public affairs (ââ¬Å"The FBI: A Comprehensive Reference Guideâ⬠1999). He felt it would prove very useful to have the program instilled in these sections. The purpose of this program was for FBI offices nationwide to begin working closely with local school and civic groups to educate young people on the dangers of drugs. As a result of the community outreach efforts under the program separate ideas branched off into systems such as Adopt-A-School and Junior G-Man programs, all involved in the education of drug dangers (ââ¬Å"A Short History of the FBIâ⬠2000). Probably Director Sessions greatest accomplishment while he was with the FBI was how he dealt with the problem of discrimination with in the bureau. In 1990 a survey of the Bureau Employees, which was requested by Director Sessions, found a majority of FBI employees were dissatisfied with bureau personnel practices, especially with assignments and promotions. The unhappiness was widespread starting among blacks, Hispanics, women and then white males. Seventy percent of these people believed promotions were unfair and given to unqualified agents. The survey also found discrimination due to a person's race, color, national origin, religion, disability, sex or age. Along with that finding it found that women felt ââ¬Å"the old boy networkâ⬠was keeping them from assignments. While in the white males it was found they felt the effects of reverse discrimination. So after all of these findings Director Sessions made minority recruitment a top priority (ââ¬Å"The FBI: A Comprehensive Reference Guideâ⬠1999). He made it a top priority by instituting strong affirmative action hiring policies and measures to remedy past discrimination, as well as, revising the FBI applicant tests to ensure fairness in the selection process (ââ¬Å"The FBI: A Comprehensive Reference Guideâ⬠1999). It seems that all leaders at some point in there tenure are involved in some situation that attracts national attention. In Director Sessions case, there were two such events. These situations had a major impact on FBI policies and operations. First was the FBI's response to the shooting death of Deputy U. S. Marshal William Degan. He was killed at Ruby Ridge, Idaho while he was on a surveillance detail of federal fugitive Randall Weaver. During the standoff Weaver's wife was accidentally shot and killed by an FBI sniper. The result of that was Weaver and his children received a money settlement for the FBI's mistake (ââ¬Å"A Short History of the FBIâ⬠2000). The second event was the fifty-one day standoff with a religious sect located just outside of Waco, Texas. Members of the sect had killed four ATF officers along with wounding many others. Instead of successfully ending the standoff the agents could only watch in horror as the compound burnt to the ground (ââ¬Å"A Short History of the FBIâ⬠2000). These two unfortunate events set up public and congressional inquires into the FBI's ability to respond to crisis situations. So in the end these horrible events could ultimately benefit the agency by weeding out flaws in their policies. Along with having these large situations arise, in 1993 Director Sessions was criticized within the FBI for violations, by his wife and assistant Sarah Munford, of Bureau regulations, federal and state laws. The violations were minor breaches of security by Mrs. Sessions and Mr. Sessions was also involved in most of these violations. Some examples of Director Sessions abuses and neglects ranged from his home alarm system did not alert the FBI and his fencing was not that government provided security enhanced wrought iron fence (Robins 1993). The Director was entirely inconsistent in his actions with respect to accepting the advice of the Bureau's professionals. This shows a clear pattern of his taking advantage of the government and his position. Some more examples of his abuses are: using an FBI plane to haul firewood from New York Cit to Washington, Carried an unloaded gun in the trunk of his car in order to classify it as a ââ¬Å"law enforcement vehicleâ⬠so he could avoid paying taxes on the cost of driving to work, and may have obtained a sweetheart deal from a Washington bank on a $375,000 home mortgage (Sachs 1993). That is just a couple of the abuses Mr. Sessions committed. Mrs. Sessions did not help the abuses either. Along with the abuses stated earlier, Sachs states that she used bureau cars as transportation to get her hair and nails done (1993). Among other things she on numerous occasions barged in on official business, which obviously caused a great disturbance. As a result of all of these ethical charges, they led to intense resentment of a double standard in the highly disciplined agency where agents are routinely punished for minor infractions (Sachs 1993). So in the end President Clinton asked Mr. Sessions to resign, but he refused which ultimately resulted in his termination on July 19, 1993. President Clinton stated ââ¬Å"his greatest accomplishment was getting more women and minorities into the agencyâ⬠(Sachs 1993). Today Mr. And Mrs. Sessions reside in San Antonio, Texas where he is in private law practice with his sons. So as we have seen Mr. Sessions seemed to be headed in the right way with this agency, but for some reason or another ran into some rough waters. In the beginning of his career with the FBI Mr. Sessions had the right idea; it was a time for change in most law enforcement communities. Mr. Sessions had picked the most widely known and most prestigious one to change. So his steps toward equal and diverse employment were very excellent. Also he showed he had the knowledge for reallocating resources when they were not needed anymore as in with the Cold War agents and placing them on something that needed attention, white collar crime and street violence. Where Mr. Sessions fails is in his tactical knowledge. For example with Waco and Ruby Ridge, if he had known what to do tactically in those situations mistakes might not have taken place. Another problem could have been that he hadn't surrounded himself with people that could handle those specific situations. As a result things did eventually change. Mr. Sessions had a great knowledge of the federal law and how to go about enforcing it at a court level, but to do that right at the enforcement level is totally different. That kind of knowledge allows for a good internal management style not an external one. So in agreement with President Clinton former Director William Sessions greatest achievement with this agency was improving the organizations recruitment to avoid discrimination.
Make-Up
Make-up for pre-teens? Recently is seems that more and more girls under the age of eleven are starting to wear makeup, but why? They do not need to their still children. First, many feel that makeup causes damage to the skin, for both older women and younger women. It can be especially damaging to the skin of younger children. Besides, do young children really need to wear makeup? Of course, we all get that awkward stage and you start not liking the way you look. Many doctors feel that this is just one of the growing pains of life.This may be very difficult for a pre-teen girl to accept. Another reason why some parents feel that young girls should not wear makeup is because they will not learn to appreciate their own natural beauty. Of course, most pre-teens do not even want to hear that . It does damage your skin badly; however, it is okay to wear make-up sometime for a special occasion. However, the majority of them did feel that it is important not to overdo it on the makeup. Just a little lip-gloss should be okay.Some of the pre-teens begin to get skin irritations from the makeup. The bottom line is that many parents feel that allowing young children to wear makeup can be hazardous to third skin, but if it is just for fun then it is ok. I am sure that we could all come up with dozens of reasons why young girls should not wear makeup, but it is the parent's decision. We should not look down at the any parent who chooses to allow their child to wear makeup at a young age. Justine Stevens
Subscribe to:
Posts (Atom)