Tag Archive for: Technology

Keeping up with conflict: weapons reviews and the laws of war

As the Geneva Conventions turn 70, the International Committee of the Red Cross (ICRC) is changing its guide to how new weapons are reviewed. Here’s why we need to pay attention.

After witnessing the Battle of Solferino in 1859, one of the bloodiest battles of the 19th century, the founder of the Red Cross wrote, ‘If the new and frightful weapons of destruction which are now at the disposal of the nations seem destined to abridge the duration of future wars, it appears likely, on the other hand, that future battles will only become more and more murderous.’

In his reflection, Henry Dunant was right on one count and wrong on another. In 2019, shortened conflicts are not the experience of the ICRC. At the same time, the emergence of new weapons due to rapid technological change urgently requires a humanitarian check. That check consists of barely five lines of text, forming Article 36 in the first additional protocol to the Geneva Conventions.

Article 36 obliges countries that are party to the protocol to assess the legality of new weapons, methods and means of warfare during development or acquisition. It seeks to prevent or reduce suffering by setting limits on warfare, whether using traditional, cyber, space or autonomous weapons. While many countries acknowledge their shared interest in assessing the legality of new weapons, the practical steps in conducting such reviews are less well known.

This is where the ICRC plays an active role, encouraging states to learn from each other on process and practice. In the light of rapidly developing weapons technologies, and with an update to the ICRC’s guide to legal reviews on the way, it’s time to revisit Article 36.

This crucial article limits the use of weapons that target indiscriminately or cause superfluous injury or unnecessary suffering. For this reason, it’s seen as a useful stopgap in ensuring compliance with the laws of war. It’s bolstered by other areas of that law stressing that conducting warfare is not without its limits. In particular, Article 36 obliges parties to the protocol to conduct legal reviews during the study, development, acquisition or adoption of new weapons. The review applies to weapons in the widest sense of the word, as well as to how they’re used.

The ICRC holds that the obligation to review is an ongoing one. Should a previously cleared weapon be modified in a way that affects its use, the review process would be triggered once more. These legal reviews seek to determine whether the weapon is already specifically prohibited by any binding treaty or by customary international law. If not, it still needs to be held up against a number of other bodies of law.

If the weapon isn’t covered by treaty law, the ICRC holds that it needs to be considered in the light of a rule known as the ‘Martens Clause’, which applies ‘principles of humanity’ and the ‘dictates of public conscience’ to the weapon in question. The scope of these reviews can require a significant amount of evidence to inform them, prompting further questions.

While Article 36 sets the obligation, it doesn’t lay down a practical path for conducting legal reviews of new weapons. This lack of detail poses challenges of legal interpretation, but also of policy. Who should be responsible for the review? Who should participate? When will legal reviews occur? How will decisions be made and records kept? These practical questions are compounded by challenges arising from the environment in which the reviews operate.

Rapid technological change is the clear example that underscores Article 36’s importance and challenges countries to keep up with new weapon capacities. But, as weapons become more sophisticated, the process of reviewing them becomes more complex—and more expensive. Finding the evidence required for reviews (technical description, performance, health and environmental effects) can be resource intensive. Fewer than 20 countries worldwide are known to conduct legal reviews of new weapons. In the Asia–Pacific region, only Australia and New Zealand are on the record as doing so.

But considering what all these practical challenges amount to also provides the greatest incentive for countries to work together. Legal reviews are international obligations with the onus on individual countries to comply. They may vary in format or method from country to country, but cooperation and information sharing can render them less costly in resources and more effective in outcome. The ICRC is updating its guide to legal reviews to acknowledge these hurdles and to advance the conversation in lockstep with them.

The discussion should focus on both the need for legal reviews of new weapons and the practical path towards them. The global community has come together for such conversations before. The role of the ICRC in this space is to facilitate information sharing and to provide support and advice on weapons reviews. Its original 2006 legal review guide proposed types of weapons to include and empirical data and legal frameworks to consider, while recommending structures and formats.

In conversation with countries, the ICRC also identified a body of best practice. Reviews should start as early as possible. They should be multidisciplinary in terms of those involved, giving evidence and adjudicating. Military lawyers should receive technical training in the systems that they’re examining. Examining empirical evidence and the weapon’s intended use is critical.

In late 2018, the ICRC invited representatives from 13 countries for a three-day seminar in Australia dedicated to discussing Article 36 and the implications of new weapons. It provided an opportunity for countries in the region to learn from each other about emerging technologies and how to fulfil their obligations according to the laws of war.

The seminar was designed to get countries talking, encouraging more engagement with legal reviews and the challenges posed by new weapons. Ahead of the release of the ICRC’s updated guide to legal reviews, conversations like these aren’t a bad place to start.

China’s play for global 5G dominance—standards and the ‘Digital Silk Road’

China is actively seeking to lead in setting technical standards across a range of emerging industries, from ultra-high voltage (UHV) transmission to artificial intelligence. Developing homegrown standards and internationalising them can enable Chinese companies to increase their market share, even dominance, globally.

China’s highly strategic approach to standardisation, including seeking greater ‘discursive power’ (话语权) in relevant international organisations, reflects an understanding of the competitive advantage that influence in this domain can confer. The Standardisation Administration of China plans to issue the ‘China Standards 2035’ (中国标准2035) to promote Chinese technical standards across a range of industries.

In its quest for 5G dominance, Beijing is actively engaged at this intersection of the abstruse and the geopolitical. It views the nascent and emerging technical standards in new technologies as a ‘golden opportunity’ that Chinese national champions are poised to take advantage of, including through their promotion of a new ‘Digital Silk Road’ (数字丝绸之路).

China is positioning itself at the forefront of 5G, recognising that  fifth-generation mobile communications will be a vital ‘information expressway’ (信息高速公路) that can enhance national competitiveness. 5G promises much higher speeds, greater capacity and lower latency. Such next-generation connectivity will enable the deployment of internet of things (IoT) and AI technologies, including self-driving cars and smart cities.

5G is seen as critical to the growth of China’s vibrant digital economy, not to mention its national ambitions in AI. Beijing’s AI plans include a focus on 5G and the improved low-latency, high-throughput transmission capabilities that these technologies will deliver. Anticipating its economic benefits, China has taken a proactive approach to testing and commercialising 5G, and is on track to start rolling the technology out in 2019. China’s 5G industry is expected to be worth ¥1.15 trillion (US$180.5 billion) by 2026.

China wants to actively shape new standards for 5G, thus ensuring its centrality in designing this new ecosystem. In 2012, the International Telecommunications Union started a program to define the future landscape for international mobile telecommunication (IMT) systems, aiming for 2020 and beyond. China’s Ministry of Industry and Information Technology (MIIT), National Development and Reform Commission and Ministry of Science and Technology then jointly established China’s IMT-2020 (5G) promotion group in February 2013.

Its members include the China Academy of Information and Communications Technology, which is directly under MIIT, and major players like ZTE, Huawei and Datang. The group’s intent is to ‘organise and coordinate Chinese participants’ in the process of standard-setting, while supporting the implementation of a major national project on 5G.

At this point, 5G is still taking shape, based on a complex and rather obscure process of standards-setting, convened by the 3rd Generation Partnership Project (3GPP), a collaboration among groups of national telecommunications standards associations. The China Communications Standards Association (中国通信标准化协会), established by MIIT, is a partner to 3GPP, and acts in accordance with ‘guidance and supervision’ from MIIT. At 3GPP, representatives from Chinese companies and institutions reportedly have 10 of 57 chair and vice-chair positions, including representation on key decision-making institutions. For instance, Wang Zhiqin, deputy head of the China Academy of Information and Communications Technology, a think-tank under the aegis of MIIT, serves as the vice-chair of a technical specification working group.

In 5G, China’s commercial and geopolitical objectives are closely aligned. China’s One Belt, One Road (一带一路) strategy reflects the grand scope and scale of Beijing’s ambitions to leverage Eurasian integration and engagement to advance national interests on a global stage, reshaping the current regional order in the process. Beyond its signature infrastructure projects, the concept of the Digital Silk Road has emerged as a key aspect of this strategy, particularly as China makes its major play to become the world leader in 5G and to shape the 5G standardisation process. As ‘national champions’ such as Huawei emerge as central players in 5G standardisation and commercialisation, their ‘going out’ (走出去) to pursue ventures and partnerships worldwide will advance this agenda.

 Huawei has become a self-described ‘key architect and contributor’ to 5G standards, standing out for its level of participation on these issues. However, its engagement in 3GPP has been criticised at times for ‘flood[ing] the process’. In particular, Huawei has trialled and backed a Polar Code standard (a particular approach to encoding data) for 5G control channels.

Although the standards process is intended to be collaborative and technocratic, its outcome is starting to be perceived in China as a matter of national significance. Strikingly, when Chinese tech company Lenovo voted for a standard developed by the American company Qualcomm, rather than a Huawei alternative, the incident provoked an outcry online, with Chinese netizens condemning the company as a ‘traitor’. In response, Lenovo’s founder released a public statement on the topic to defend the company’s brand and ‘honor,’ in which he highlighted Lenovo’s support of Polar Code in the second round of voting.

The leadership of Chinese companies in deploying 5G technologies worldwide will support and enable the creation of the Digital Silk Road, which will also be leveraged to promote preferred indigenous standards. In the process, Huawei is partnering closely with Europe, including on issues of standardisation.

Notably, the Standardisation Administration of China (国国家标准化管理委员会) has released the ‘Standards China Unicom Joint Construction “One Belt, One Road” Action Plan’ (标准联通共建“一带一路”行动计划) (2018–2020), which calls for promoting the implementation of national standards for 5G and smart cities in One Belt, One Road countries, while supporting the expansion of the infrastructure of China Unicom, a state-owned telecommunications operator that has emerged as a major player in 5G, including partnering with Huawei. As a ‘5G pioneer’, ZTE has also committed to supporting the development of the Digital Silk Road, including by leveraging its 5G trials and partnerships in Europe and the Asia–Pacific.

China’s promotion of the Digital Silk Road—and particularly the deployment of 5G infrastructure—is often greeted with enthusiasm. But it’s also provoking intense controversy. The construction of this new critical infrastructure by a Chinese national champion that could be required by law (or coopted beyond the law) to support and participate in Chinese intelligence raises concerns about the implications for China’s future espionage capabilities, while also creating leverage that could be exercised for coercive purposes.

While there are reasons to welcome the potential benefits of China’s leadership in 5G, this global agenda also raises real questions of risk. Could Chinese 5G infrastructure prove to be a gift horse, or a Trojan horse?

Our infant information revolution

It is frequently said that we are experiencing an information revolution. But what does that mean, and where is the revolution taking us?

Information revolutions are not new. In 1439, Johannes Gutenberg’s printing press launched the era of mass communication. Our current revolution, which began in Silicon Valley in the 1960s, is bound up with Moore’s Law: the number of transistors on a computer chip doubles every couple of years.

By the beginning of the 21st century, computing power cost one-thousandth of what it did in the early 1970s. Now the internet connects almost everything. In mid-1993, there were about 130 websites in the world; by 2000, that number had surpassed 15 million. Today, more than 3.5 billion people are online; experts project that, by 2020, the ‘internet of things’ will connect 20 billion devices. Our information revolution is still in its infancy.

The key characteristic of the current revolution is not the speed of communications; instantaneous communication by telegraph dates back to the mid-19th century. The crucial change is the enormous reduction in the cost of transmitting and storing information. If the price of an automobile had declined as rapidly as the price of computing power, one could buy a car today for the same price as a cheap lunch. When a technology’s price declines so rapidly, it becomes widely accessible, and barriers to entry fall. For all practical purposes, the amount of information that can be transmitted worldwide is virtually infinite.

The cost of information storage has also declined dramatically, enabling our current era of big data. Information that once would fill a warehouse now fits in your shirt pocket.

In the middle of the 20th century, people feared that the computers and communications of the current information revolution would lead to the type of centralised control depicted in George Orwell’s dystopian novel 1984. Big Brother would monitor us from a central computer, making individual autonomy meaningless.

Instead, as the cost of computing power has decreased and computers have shrunk to the size of smartphones, watches and other portable devices, their decentralising effects have complemented their centralising effects, enabling peer-to-peer communication and mobilisation of new groups. Yet, ironically, this technological trend has also decentralised surveillance: billions of people nowadays voluntarily carry a tracking device that continually violates their privacy as it searches for cell towers. We have put Big Brother in our pockets.

Likewise, ubiquitous social media generate new transnational groups, but also create opportunities for manipulation by governments and others. Facebook connects more than two billion people, and, as Russian meddling in the 2016 US presidential election showed, these connections and groups can be exploited for political ends. Europe has tried to establish rules for privacy protection with its new General Data Protection Regulation, but its success is still uncertain. In the meantime, China is combining surveillance with the development of social credit rankings that will restrict personal freedoms such as travel.

Information provides power, and more people have access to more information than ever before, for good and for ill. That power can be used not only by governments, but also by non-state actors ranging from large corporations and non-profit organisations to criminals, terrorists and informal ad hoc groups.

This does not mean the end of the nation-state. Governments remain the most powerful actors on the global stage; but the stage has become more crowded, and many of the new players can compete effectively in the realm of soft power. A powerful navy is important in controlling sea-lanes; but it does not provide much help on the internet. In 19th-century Europe, the mark of a great power was its ability to prevail in war, but, as the American analyst John Arquilla has pointed out, in today’s global information age, victory often depends not on whose army wins, but on whose story wins.

Public diplomacy and the power to attract and persuade become increasingly important, but public diplomacy is changing. Long gone are the days when foreign service officers carted film projectors to the hinterlands to show movies to isolated audiences, or people behind the Iron Curtain huddled over short-wave radios to listen to the BBC. Technological advances have led to an explosion of information, and that has produced a ‘paradox of plenty’: an abundance of information leads to scarcity of attention.

When people are overwhelmed by the volume of information confronting them, it is hard to know what to focus on. Attention, not information, becomes the scarce resource. The soft power of attraction becomes an even more vital power resource than in the past, but so does the hard, sharp power of information warfare. And as reputation becomes more vital, political struggles over the creation and destruction of credibility multiply. Information that appears to be propaganda may not only be scorned, but may also prove counterproductive if it undermines a country’s reputation for credibility.

During the Iraq War, for example, the treatment of prisoners at Abu Ghraib and Guantanamo Bay in a manner inconsistent with America’s declared values led to perceptions of hypocrisy that could not be reversed by broadcasting images of Muslims living well in America. Similarly, President Donald Trump’s tweets that prove to be demonstrably false undercut American credibility and reduce its soft power.

The effectiveness of public diplomacy is judged by the number of minds changed (as measured by interviews or polls), not dollars spent. It is interesting to note that polls and the Portland index of the Soft Power 30 show a decline in American soft power since the beginning of the Trump administration. Tweets can help to set the global agenda, but they do not produce soft power if they are not credible.

Now the rapidly advancing technology of artificial intelligence or machine learning is accelerating all of these processes. Robotic messages are often difficult to detect. But it remains to be seen whether credibility and a compelling narrative can be fully automated.

What can supercomputers tell us about the Third Offset?

Image courtesy of Pixabay user blickpixel.

Paraphrased, the US Third Offset strategy runs something like ‘bolstering US conventional deterrence through technological and operational innovation’. The strategy hinges on innovation, and sees the integration of autonomy into weapon systems and organisational constructs as a decisive advantage. But innovation is prized around the world, and it’s risky to pin hopes on a possible monopoly on innovation, or the ability to leverage innovation into military effects.

Last year Xi Jinping, recognising that ‘core technologies’ aren’t yet indigenously controlled in China, issued a clear directive for scientists to ‘respond to major strategic demands’. Substantial alignment between China’s state and technological sectors is increasingly evident, and strategically-targeted science funding is ramping up as part of the 13th five-year plan. Evidence in the public domain suggests that, at least in certain key areas, dividends are emerging. In the fields of artificial intelligence and quantum information science, China is ascendant on the world stage. There’s a similar story in supercomputing, which serves as a good case study, and it reminds us that the US isn’t the only nation attempting to flip technological innovation into operational capability.

High performance computing (HPC) is vital because of the ‘classic trinity’ of national security applications: cryptanalysis, weapons design and weather forecasting. Historically, the US has led the way, but several recent developments leave an American lead in serious doubt. The Top500 list indexes the fastest commercial supercomputers in the world; as of June 2016, China has the top two, and has held the number one spot since 2013. In June 2015, there were 233 American machines in the top 500, compared to 37 from China. In June 2016 China edged out the US to lead the tally, and most recently in November 2016 there was parity, with both at 171 entries.

While the Top500 tracks commercial systems, applications like decryption require specialised, classified machines. The Intercept recently reported that detailed plans for an NSA supercomputer were hosted unwittingly on the internet. The easily-accessible plans dated from 2012, and one expert guessed that the machine could ‘pretty much wipe the floor’ with past and current commercial systems for codebreaking. But it’s true that, like a pyramid, a broad commercial base of expertise supports the know-how enabling more sensitive undertakings.

Secret plans left lying around don’t help the cause, but, even if there’s more to that story, those in the know still worry that the strategic landscape is shifting. In a report released in March (PDF), HPC experts at the NSA and US Department of Energy argued that absent ‘aggressive action’ and a surge of investment, the US ‘will not control its own future’ in supercomputing. While that’s a not-so-subtle call for more funding, the technical meeting from which the report resulted was held before President Trump announced relevant budget cuts. With only ‘minor disagreement on the timescale,’ the consensus was that China would qualitatively lead the US from as early as 2020, particularly as hardware reflected China’s ‘impressive advancements in indigenously developed system software and HPC applications’.

Underlying the American assessment is the Chinese-developed and manufactured TiahuLight system, the fastest (publicly-revealed) supercomputer in the world. According to the NSA-DOE report, unlike previous Chinese supercomputers, which were ‘unimpressive except for running benchmarks,’ the TiahuLight system is a ‘serious, innovative “capability” machine’ that demonstrates ‘real-world applications running well at scale’.

Chinese researchers envisage the system predominantly as ‘a strategic capability for improving the country’, but US experts noted that heightened interest in HPC represents a ‘good proxy’ for the tools needed to design, develop and analyse many national security and modern weapons systems. In other words: ‘Leading-edge HPC is now instrumental to getting a world-class, large-scale engineering system out the door.’ The TiahuLight system shows the substantial will to operationalise the products of intense innovation—and the ability to do it successfully.

Other factors might argue against the idea that innovation can be quarantined. Commercial technology development increasingly precedes military requirements, and that’s a program that Beijing can direct far better than the US. The indigenisation of China’s semiconductor industry, for example, has been rapid and thus-far successful (the TiahuLight system uses all-Chinese chips), and was prioritised after US chipmakers embargoed certain supercomputing projects in China. That highlights the challenges the US will face in keeping technologies to itself. If Shenzhen, China’s ‘Silicon Delta,’ received orders to jump, there’d be no doubting the outcome. In a post-Snowden, Silicon Valley-dominated world, the Pentagon’s probably wishing it had that kind of clout.

What’s more, even as China builds its own innovative capability, it’s hedging its bets by investing in US startups and high-tech European firms. The scale of this effort is worrying the Pentagon, and that’s independent of largescale IP theft, and the outright efforts to steal sensitive technology (PDF).

The US Third Offset strategy is ultimately contingent on the ability to innovate faster and better than the adversary, on the ability to leverage that into operational capability, and on the capacity to maintain the advantages afforded by the first two abilities. Provided the need to “offset” an adversary remains, and that technology is viewed as the best vector to accomplish that task, any future strategy will have to make a similar gamble on innovation. But, on the face of current trends in supercomputing and in other high-tech fields, it’s not at all clear that the bet will land in favour of the US and its allies.