• United States
    Steering a New Course on Foreign Policy
    As election season approaches, and global crises in Greece and elsewhere intensify, U.S. foreign policy is in a state of drift that puts the United States at the risk of falling behind its rivals, says Eurasia Group President Ian Bremmer. 
  • China
    Friday Asia Update: Top Five Stories for the Week of June 5, 2015
    Ashlyn Anderson, Lincoln Davidson, Lauren Dickey, Darcie Draudt, William Piekos, and Ariella Rotenberg look at the top stories in Asia today. 1. Up to 440 presumed dead after Chinese cruise ship capsizes. A Yangtze River cruise ship sank during a torrential rainstorm in Hubei Province Monday evening. While emergency services rushed to respond, four days later only fourteen passengers have been rescued, making this the most deadly peacetime maritime disaster in China’s recent history. Concerned, as usual, about media representations of tragic events, Chinese censors quickly sent out an order to media outlets to stop dispatching reporters to the scene and only run reports from Xinhua and CCTV, and authorities on site began turning away journalists and even some rescue workers. That response may represent a change from a previous strategy of information denial to one more concerned with shaping public perceptions. 2. Secretary Carter travels to Asia to add oomph to the U.S. rebalance. On a ten-day trip across the Asia Pacific, U.S. Secretary of Defense Ashton Carter made stops in Hawaii, Singapore, Vietnam, and India. Carter attended the change-of-command ceremonies for the U.S. Pacific Command and U.S. Pacific Fleet before traveling to partner countries in South and Southeast Asia to shift into the “next phase of the rebalance.” In Singapore, Carter delivered the keynote address at the Shangri-La Dialogue in which he emphasized a shared regional architecture to connect and create opportunities for Asia-Pacific people and nations. The South China Sea featured prominently in his meetings in Vietnam and India. With the Vietnamese defense minister, Carter proposed a complete end to island militarization and reclamation projects. Carter also pledged $18 million to help Vietnam purchase American patrol boats. In India, Carter and his counterpart renewed the defense framework agreement and ramped up defense cooperation under the Defense Technology and Trade Initiative. 3. U.S. government employees’ data breached by Chinese hackers. Four million current and former federal government employees’ personal data was accessed starting late last year by hackers based in China, the Obama administration announced Thursday. The hackers, who the New York Times claims are the same group that hacked health insurance companies Anthem and Primera, obtained personal identifying information for the employees held by the Office of Personnel Management (OPM),  including Social Security numbers. While the attack comes just a week after the Chinese government released a white paper on military strategy advocating a more active approach to cyberspace, it’s unlikely that the attack came from the Chinese government, as the data stolen would be more useful to criminals than intelligence analysts. Chinese authorities agree, calling the Obama administration’s claims “unverified … irresponsible and unscientific.” Prior to the announcement of the OPM breach, the Chinese Ministry of Foreign Affairs spent the week pointing to a report that Chinese government agencies have been the target of a state-backed hacker group for three years as evidence that the PRC is the “biggest victim” of cyberattacks. 4. South Korea reports four deaths in MERS outbreak. The latest death brings the outbreak’s fatality rate in South Korea to 9.8 percent; the worldwide death rate is 27 percent, reports the WHO. Also on Friday, the Ministry of Health and Welfare also announced five new cases of the disease and also identified the hospital in Pyeongtaek, a city about thirty-five miles from Seoul, where the outbreak originated. MERS was also found in an Korean Air Force sergeant stationed at a U.S. base in South Korea; 6 Korean civilians and 164 Korean soldiers were put in quarantine. The total number of people diagnosed with MERS in South Korea is 41. 5. Remembering Tiananmen. This Thursday, June 4, marked the twenty-sixth anniversary of the crackdown on protestors in Beijing’s Tiananmen Square; tens of thousands turned out for the annual candlelight vigils in Hong Kong. However, in the wake of the 2014 Umbrella Movement, this year there were competing rallies and divisions over the purpose of the gatherings, as Hong Kong residents question their identity, Hong Kong’s relationship with mainland China, and the next step for democracy protests. Back on the mainland, though, not much changed from previous years, as censorship was the word of the day. WeChat users were even unable to transfer money in amounts related to the Tiananmen incident—64, for June 4, and 89, for 1989, the year of the protests. Bonus: Indonesia has a new and friendly neighborhood tax collector. From pizza delivery to spider-web weaving, creative uses of drones are rapidly proliferating. Indonesia hopes to use the technology to catch tax evaders across their chain of seventeen islands. Many plantation owners in Indonesia underreport either the size or the extent of their activities, resulting in less revenue the tax drone aims to recover.
  • Cybersecurity
    Sanctioning Cyber Crime: The New Face of Deterrence
    Zachary K. Goldman is the Executive Director of the Center on Law and Security at NYU School of Law. He formerly served in the Department of the Treasury’s Office of Terrorism and Financial Intelligence and at the Department of Defense.  With the new cybersecurity sanctions program adopted by the Obama administration last month, the U.S. government is finally beginning to develop the tools to deter financially-motivated cybercrime. With a price tag estimated at $400 billion per year, cyber-enabled theft imposes a substantial tax on American businesses. And while the U.S. government has focused on deterring attacks against critical infrastructureand on the military dimensions of cyber deterrence, financially motivated cyber crime is far more prevalent. In order to stem the kinds of digitally-facilitated crime that saps American competitiveness, the Obama administration should focus on deterring financially-motivated cyber thieves by targeting what they value most: their money. The White House’s new cybersecurity sanctions program provides the perfect framework to do so—if it’s used correctly. Deterrence is fundamentally about manipulating an adversary’s cost/benefit calculations to dissuade him from doing something you want to prevent. Over the last several years, strategists have struggled to adapt venerable Cold War concepts like deterrence to the information age. But deterring financially-motivated cyber criminals—the kinds of people that attacked Target, Anthem Health, and many others—requires an approach tailored to hackers that seek to steal sensitive information that can be monetized quickly. Many companies are also hacked because they hold commercially valuable intellectual property or trade secrets, the theft of which can provide competitive advantages to industry rivals. Indeed, last year the U.S. Department of Justice indicted five members of the Chinese military for stealing this type of information from leading American companies, including Westinghouse and U.S. Steel—data that would be useful to competitors in China, including state-owned enterprises. Law firms, too, have been subject to cyberattack because they hold valuable information about mergers, IPOs, and other corporate activities that can provide an advantage to a competitor (or a company on the other side of the negotiating table). Companies or groups of hackers steal this information for commercial purposes. They do so for profit, and as such, are sensitive to the costs of their activities. Raise the costs high enough and they will move on to other targets or other activities. Criminals involved in cyber theft therefore have different motivations from state-sponsored actors that target the U.S. military or critical infrastructure. The motivations of cyber thieves also differ from those who engage in cyber espionage to steal government secrets, or “hacktivist” groups that commit acts of cyber vandalism to make a political point. This is where the new sanctions program, inaugurated by the Obama Administration in April, comes in. The cybersecurity sanctions program in some respects resembles traditional sanctions programs. It freezes the assets of people designated for harming computer networks and posing a significant threat to U.S. national security, foreign policy, economic health, or financial stability. But the sanctions program also contains an innovative provision that allows the government to impose sanctions on companies that are responsible for cyber crime, or who receive or use the proceeds of cybercrime for commercial advantage or private financial gain. Using this authority, the U.S. government could target, for example, banks in Eastern Europe that function as the back office for cybercrime rings, moving and storing their ill-gotten gains. It could also sanction Chinese companies that receive stolen intellectual property and incorporate it into their products, disadvantaging their American or European competitors. Doing so will freeze targeted companies and individuals out of the international financial system, neutralizing the advantage they thought they procured by using stolen data or intellectual property. In so doing, the program has the potential to dry up the market for information stolen by cyber means. If companies cannot make money by engaging in cyber theft, they are much less likely to do so. They will, in other words, be deterred. There will be challenges to using the new sanctions in this way. For starters, the government must feel confident that it can control the potential for escalation, and mitigate the risk that U.S. companies operating abroad will be targeted in retaliation. It also must feel confident in its ability to attribute attacks, and to identify the beneficiaries of commercially-motivated cyber theft. But the first step is to recognize that deterring financially-motivated cyber crime is different from deterring other kinds of cyberattacks. And with the new cybersecurity sanctions program, the United States is beginning to develop and deploy a set of tools designed for the task.
  • Cybersecurity
    A Chinese Response to the Department of Defense’s New Cyber Strategy
    Last week, a Chinese Ministry of Defense spokesman condemned the Pentagon’s new cybersecurity strategy. Geng Yansheng not only opposed the "groundless accusations" about Chinese cyber espionage contained  in the strategy, but also suggested it "will further escalate tensions and trigger an arms race in cyberspace." Geng called on the United States to promote common security and mutual trust, rather than "seeking absolute security for itself." This week a scholar from the Chinese Academy of Military Science published a short critique of the strategy. Lu Jinghua summarizes the strategy in three words: deterrence, offense, and alliances. As did many U.S.-based analysts, Lu also stresses the importance of the shift to offense in the report. In contrast to analysts outside of China, Lu gives greater weight to the strategy’s emphasis on alliances, highlighting NATO and the Middle East but paying special attention to the revisions of the U.S.-Japan Security Guidelines. Lu argues that while the document is intended to give strategic guidance, questions remain about implementation. First, Lu is skeptical about the DoD’s ability to deter attacks, raising the fact that attacks can come from state or non-state actors and questioning the U.S. ability to ascribe responsibility. This is another example of Chinese analysts doubting the U.S. ability to attribute attacks, despite U.S. insistence that attribution is getting easier. Second, Lu assumes that the offense always has the advantage, and the defense will always fail to keep the attacker out and so the defense will have to retaliate. But when? How closely does the retaliatory strike have to follow the attack to create deterrence? Third, given the lack of consensus on a code of conduct for cyberspace, Lu wonders under what legal basis U.S. offensive operations will be conducted. Finally, Lu notes the damage done to alliance relations by the Snowden revelations, especially the relationship with France and Germany. He wonders if there is enough trust among partners to exchange the sensitive information needed for network operations. In the strategy, the Pentagon seems to acknowledge the possibility that building offensive capabilities could stoke a security dilemma and so "will always be attentive to the potential impact of defense policies on state and non-state actors’ behavior." The official Chinese response has so far played up that angle, warning of an arms race. Lu’s analysis was reprinted online widely, but is only one voice, and we will have to wait to see how else China responds.
  • Saudi Arabia
    The New Saudi Foreign Policy
    Saudi Arabia’s intervention in Yemen marks a more assertive foreign policy that is less inclined to rely on the United States and could intensify the sectarian rift with Iran across the region, writes CFR’s Ray Takeyh.
  • Grand Strategy
    Revising U.S. Grand Strategy Toward China
    Overview "China represents and will remain the most significant competitor to the United States for decades to come. As such, the need for a more coherent U.S. response to increasing Chinese power is long overdue," write CFR Senior Fellow Robert D. Blackwill and Carnegie Endowment for International Peace Senior Associate Ashley J. Tellis in a new Council Special Report, Revising U.S. Grand Strategy Toward China. "Because the American effort to 'integrate' China into the liberal international order has now generated new threats to U.S. primacy in Asia—and could result in a consequential challenge to American power globally—Washington needs a new grand strategy toward China that centers on balancing the rise of Chinese power rather than continuing to assist its ascendancy." The authors argue that such a strategy is designed to limit the dangers that China's geoeconomic and military power pose to U.S. national interests in Asia and globally, even as the United States and its allies maintain diplomatic and economic interactions with China. Blackwill and Tellis recommend that Washington do the following: Revitalize the U.S. economy "Nothing would better promote the United States' strategic future and grand strategy toward China than robust economic growth…This must be the first priority of the president and Congress." Strengthen the U.S. military "Congress should remove sequestration caps and substantially increase the U.S. defense budget...Washington should intensify a consistent U.S. naval and air presence in the South and East China Seas," and "accelerate the U.S. ballistic-missile defense posture" in the Pacific. Expand Asian trade networks "U.S. grand strategy toward China will be seriously weakened without delivering on the TPP [Trans-Pacific Partnership trade agreement]. A major push by the White House for ratification should therefore begin immediately in the new Congress, including seeking trade promotion authority." Create a technology-control regime "Washington should pay increased attention to limiting China's access to advanced weaponry and military critical technologies." The United States should encourage its allies "to develop a coordinated approach to constrict China's access to all technologies, including dual use." Implement effective cyber policies Washington should "impose costs on China that are in excess of the benefits it receives from its violations in cyberspace…increase U.S. offensive cyber capabilities . . . continue improving U.S. cyber defenses," and "pass relevant legislation in Congress, such as the Cyber Information Security Protection Act." Reinforce Indo-Pacific partnerships "The United States cannot defend its interests in Asia without support from its allies," and "should build up the power-political capabilities of its friends and allies on China's periphery." Energize high-level diplomacy with Beijing The United States should work to mitigate tensions with China, and "reassure U.S. allies and friends in Asia and beyond that Washington is doing everything it can to avoid a confrontation with China . . . U.S.-China discourse should be more candid, high-level, and private than is current practice." Professors: To request an exam copy, contact [email protected]. Please include your university and course name. Bookstores: To order bulk copies, please contact Ingram. Visit https://ipage.ingrambook.com, call 800.234.6737, or email [email protected]. ISBN: 978-0-87609-621-5
  • Asia
    Little Mention of Southeast Asia in Secretary of Defense’s Rebalance Speech
    In a speech at Arizona State University earlier this week, Secretary of Defense Ashton Carter laid out a kind of relaunch of the Obama administration’s rebalance to Asia---a plan for moving the rebalance forward over the final years of the president’s second term. Carter hit many key points that the administration hopes to emphasize: the importance of passing the Trans-Pacific Partnership both for the region’s economic future and for America’s own strategic interests; the growth in maritime partnerships with longtime allies like Australia and Japan; the increase in training programs for partner militaries in the Asia-Pacific region. But, other than relatively brief references to Malaysia, Vietnam, and Indonesia, the defense secretary largely avoided talking about Southeast Asia, which originally was a focus of the rebalance. He almost completely skipped mainland Southeast Asia, other than Vietnam. He did not mention the budding U.S. strategic and economic relationship with Myanmar, supposedly one of the administration’s great foreign policy triumphs. He also did not mention other authoritarian mainland Southeast Asian nations, like Cambodia, where the White House has pursued a policy of building closer strategic ties. And Carter did not make reference to Thailand, a treaty ally, at all either. If Carter’s speech highlights a shift in the rebalance away from focusing on mainland Southeast Asia---other than Vietnam---it may signal a wise policy change. As I wrote in a recent working paper, pursuing rapprochement with many nations in mainland Southeast Asia, including Cambodia, Myanmar, and even junta-ruled Thailand, has delivered minimal strategic benefit for the United States while exacerbating repressive human rights climates in these countries. Only the relationship with Vietnam has delivered significant strategic benefits to the United States in the past six years---benefits worth the damage to the United States’ image by partnering with the authoritarian government in Hanoi. Although the White House, during Obama’s first term, argued that rapprochement with Southeast Asian nations like Myanmar would foster improvements in democratic governance in the region, there has been little evidence to support this claim. Thailand suffered a military coup in May 2014, and the Thai junta recently suggested that it could stay in power indefinitely, a contrast to previous junta promises that it would hand power to an elected government in early 2016. Myanmar, though headed for elections later this year, has moved backward, according to most rights monitoring organizations, from the reforms of 2011 and 2012. Vietnam’s human rights situation “remained critical” in 2014, according to Human Rights Watch’s most recent annual report on the state of human rights in the world. “The [Vietnamese] security forces increased various forms of harassment and intimidation of critics.” Malaysia has put its opposition leader in jail, filed charges against his daughter, also an MP, for making a speech in Parliament, and reportedly used the Sedition Law to arrest activists and other opposition politicians. Perhaps, at this point, the Obama administration is realizing that the rebalance, or pivot, is not delivering enough strategic gains in mainland Southeast Asia, which is why Carter’s speech ignored Myanmar, Cambodia, and Thailand. If the speech suggests that the White House will focus instead on Indonesia, the Philippines, Vietnam, and Singapore---as well, of course, as focusing on Australia, and partners in South Asia and Northeast Asia---then the revamped rebalance might be more effective in Southeast Asia.
  • Cybersecurity
    The Relationship Between the Biological Weapons Convention and Cybersecurity
    Today, the Biological Weapons Convention (BWC)—the first treaty to ban an entire class of weapons—marks the 40th anniversary of its entry into force. Reflections on this milestone will examine the BWC’s successes and travails, such as its ratification by 173 countries, its lack of a verification mechanism, and what the future holds. Although not prominent in these discussions, the BWC relates to cybersecurity in two ways. First, the BWC is often seen as a model for regulating dual-use cyber technologies because the treaty attempts to advance scientific progress while preventing its exploitation for hostile purposes. Second, the biological sciences’ increasing dependence on information technologies makes cybersecurity a growing risk and, thus, a threat to BWC objectives. The BWC as a Model for Cybersecurity The BWC addresses a dual-use technology with many applications, including the potential to be weaponized. Similarly, cyber technologies have productive uses that could be imperiled with the development of cyber weapons. Those concerned about cyber weapons often turn to the BWC for guidance because of characteristics biology shares with cyber—the thin line between research and weaponization, the global dissemination of technologies and know-how, the tremendous benefits of peaceful research, and the need to adapt to new threats created by scientific and political change. The BWC supports actions to prevent weaponization and foster peaceful exploitation of the biological sciences, including: Prohibitions on weaponization and transferring the means of developing bioweapons; Requirements to implement domestic measures to prevent weaponization; Obligations to cooperate and provide assistance in addressing BWC violations; and Undertakings to facilitate exchange of information, materials, and technologies for peaceful research. However, the BWC maps poorly against cybersecurity problems. Cyber weapons, weaponization, and attacks by states and criminals have become ubiquitous. The BWC required destruction of stockpiles of bioweapons, but many countries accepted this obligation and the weaponization ban because they concluded bioweapons had little national security utility. The same cannot be said for cyber technologies. States find cyber exploits useful for multiple national security tasks, including law enforcement, counter-intelligence, espionage, sabotage, deterrence, and fighting armed conflicts. Tools used to prevent biological weaponization, such as imposing licensing and biosecurity requirements on biological research facilities, make little sense for cyber given the nature of cyber technologies and their global accessibility. Experts have called for a norm requiring countries to assist victims of cyberattacks, which echoes the BWC’s provision on assistance in cases of treaty violations. However, political calculations, not normative considerations, determine whether governments offer assistance to countries hit by cyberattacks—behavior consistent with other contexts where states provide discretionary assistance, such as after natural disasters. Nor have countries embraced export controls on cyber technologies in the manner seen with biological technologies. Countries harmonizing export controls on dual-use technologies through the Wassenaar Arrangement added "intrusion software" to this regime in December 2013. However, this decision reflected human rights concerns about authoritarian governments using such software, a reason having no counterpart in export controls supporting the non-proliferation of bioweapons. Perhaps led by the United States, the Wassenaar Arrangement might create more export controls for cyber technologies, but here the BWC offers a cautionary tale. Developing countries have long considered that export controls on biotechnologies imposed for non-proliferation reasons violate their BWC right to gain access to equipment, materials, and information for peaceful purposes. Whether a similar controversy emerges if Wassennaar participants agree to more export controls on cyber technologies remains to be seen, but this path is not one the BWC suggests would be easy or effective. The Cybersecurity Challenge in the Biological Sciences The more important aspect of the BWC-cyber relationship involves the biological sciences’ increasing exploitation of, and dependence on, information technologies (IT). In describing scientific developments for the BWC review conference in 2011, the BWC Implementation Support Unit noted that "[i]ncreasingly the life sciences are referred to as information sciences. Digital tools and platforms not only enable wetwork but are increasingly able to replace it." Cybersecurity problems increase as dependence on information technologies deepens. Biological research enabled by information technologies is vulnerable to cyber infiltration by foreign governments, criminals, or terrorists and theft of data or manipulation of facilities. The cybersecurity challenge has been recognized in some policies. In the United States, Executive Order 13546 (2010) identified the need for cybersecurity in facilities handling dangerous pathogens, which led to amended regulations. As the biological and information sciences converge, cybersecurity becomes increasingly important for responsible biological research. Despite awareness of this dependence, the BWC process has not focused on cybersecurity. Neither the 2011 review conference nor meetings in 2012-14 identified the security of information and the ubiquity of IT systems as issues arising from developments relevant to the BWC. As planning for the next BWC review conference in 2016 unfolds, cybersecurity should be included to ensure the BWC’s next chapter does not ignore a problem the biological sciences face now and in the future.
  • Cybersecurity
    Three Questions about Admiral Rogers’ Testimony on Cyber Deterrence
    Last week, Admiral Mike Rogers, commander of U.S. Cyber Command, testified before the Senate Committee on Armed Services. Most of the media attention (see this, this, and this) has focused on Rogers’ argument that deterrence is not working, and that defense in cyberspace will be "will be both late to need and incredibly resource intensive." As a result, Rogers argued, Cyber Command needs "to think about how can we increase our capacity on the offensive side to get to that point of deterrence." The argument that additional offensive capabilities are critical to deterrence seemed to be widely accepted by the senators’ questioning Rogers. Senator Angus King went further, saying that it was not enough to have the offensive capabilities but that the public has to know about them. Alluding to Dr. Strangelove, the classic movie on the absurdities of the Cold War, King argued “If you build the doomsday machine, you’ve got to tell people you have it. Otherwise the purpose is thwarted." Rogers’ opening comments and written testimony raise at least three follow up questions. First, in regards to the exchange with Senator King, is talking about offensive capabilities enough? For effective deterrence, do you also have to demonstrate that they would work? The United States and the Soviet Union conducted a combined 1745 known underground and atmospheric nuclear tests between 1945 and 1996, along with countless launch exercises from submarines, bombers, and missile silos. The physical effects of a nuclear weapon were well known to both sides. None of this is available in cyberspace. The effects, so far, are invisible and contested, and they may be unpredictable as attacks spill over into connected networks. You can’t march a cyber weapon in a parade and even if the United States, Russia, and China built cyber ranges where they launched practice destructive digital attacks, would the other side necessarily believe that their systems were vulnerable in the same way or could not be quickly reconfigured for defense? Second, do we have any idea of how adversaries might interpret or react to the effort to develop a greater deterrence through offensive cyber capabilities? In his written testimony, Rogers implicitly suggests that U.S. efforts will not be destabilizing by making a comparison to the nuclear age: "Building these nuclear forces and the policy and support structures around them took time and did not cause a nuclear war or make the world less safe." But is this both a rosy remembering of Cold War history and an optimistic hope for future cyber conflict? Given that many defense analysts believe that offense has the advantage over defense in cyberspace, do efforts to develop deterrence through offense create a security dilemma and an arms race? Finally, Rogers says in his written testimony that Cyber Command has gained "priceless experience in cyber operations" and insight into how force "can be employed in cyberspace." He also mentions that Cyber Command has "had the equivalent of a close-in fight with an adversary." Does it matter who that adversary was? Are the lessons learned from an encounter with one adversary applicable to other potential rivals in cyberspace? Is Cyber Command’s knowledge about fighting China’s People’s Liberation Army transferrable to fighting the Iranian Revolutionary Guard Corps? The answer to all these questions is we do not know yet. We can assume, however, that Admiral Rogers knows that cyber deterrence, if it is to work at all, will not operate like nuclear deterrence. Nuclear deterrence was primarily a military strategy designed to prevent one completely unacceptable outcome—nuclear war with the Soviet Union. Cyber deterrence will be the use of political, economic, diplomatic, and military tools not to stop attacks entirely but instead to reduce the volatility and intensity of cyber conflicts. It will require flexibility, adaptability and a lot of thinking about how to tailor policies to specific actors. Offensive capabilities will be important, but they will only be one part of deterrence.
  • United States
    The Future of American Power and Influence
    Play
    Experts discuss the role of the United States in a changing global power structure.
  • South Korea
    Cybersecurity, Nuclear Safety, and the Need for a Security Regime in Northeast Asia
    The U.S.-DPRK tit-fo-tat over the Sony hack has continued into the new year, with the Obama administration announcing sanctions on three organizations and ten individuals on January 2 and North Korea responding with indignation two days later. But the media focus on the Sony hack obscures a potentially much more dangerous hacking incident that has also been attributed to North Korea involving release of personal information of over 10,000 employees of the Korea Hydro and Nuclear Power Company (KHNP), which operates twenty-three nuclear reactors in South Korea. This story line includes demands by the hackers that KHNP shut down at least one South Korean reactor by Christmas Day (a threat that was ignored). There are also reports that the origins of the hack may have been traced to Shenyang, a city that houses a known platform for North Korean cyber operations. Specialists on nuclear plant systems assert that the hacking incident posed no real danger to the operation of South Korean plants, but they do highlight the sensitivity—and potential vulnerability—of South Korean nuclear facilities to a potential North Korean attack. This eventuality is potentially as damaging as the threat of North Korean nuclear use that South Korea now faces if indeed North Korea has developed a mid-range payload delivery capability. In addition to the dangers of nuclear terrorism, the KHNP hack underscores a common interest among South Korea, Japan, and northeastern China, which have one of the greatest concentrations of nuclear energy production facilities on the planet. China is the country with the fastest-growing nuclear energy sector, but stands to gain much by raising nuclear standards to avoid possible accidents. Following the Fukushima triple-disaster, Japan has valuable experience in management of damage from a nuclear accident including its potentially debilitating regional effects. South Korea, with its relatively small size, dense population, nascent nuclear reactor export business, and relatively high reliance on nuclear energy to meet its energy needs, has a large stake in taking steps to forestall potential nuclear accidents either on its home soil or in neighboring countries, including North Korea. The KHNP hack underscores South Korea’s vulnerability to both the cyber and nuclear threats. These challenges to both cybersecurity and nuclear safety are shared challenges that governments in Northeast Asia should be prepared to confront together. Yet there is no viable regional organization within Northeast Asia that brings together the countries to cooperate on these shared challenges. The Six Party Talks had envisioned establishment of a multilateral regime for Northeast Asia following the resolution of the North Korean nuclear issue, but they have not met since 2008 and cannot reconvene without North Korea’s commitment to denuclearization. North Korean intransigence on its nuclear program should not be allowed to hold hostage the prospect of Northeast Asian cooperation on other issues. In fact, recent events illustrate that North Korean intransigence provides an even more compelling rationale for its neighbors to redouble their cooperation efforts, starting with functional areas such as nuclear safety and cybersecurity. This is precisely the purpose that South Korea’s recent proposal of a Northeast Asia Peace and Cooperation Initiative (NAPCI) hopes to achieve in this volatile and dynamic region. The United States has in the past welcomed and promoted the establishment of a multilateral regime that would help regulate behavior in Northeast Asia, a historical flashpoint recently renewed, to prevent possible confrontation among major powers. In fact, the United States envisioned the establishment of precisely such a mechanism as a legacy that would remain following the satisfactory resolution of the North Korean nuclear issue. I argue in a CFR Working Paper with the Asan Institute’s Woo Jung-yeop (downloadable here) that North Korea’s non-cooperation should not be allowed to prevent such a mechanism from being established to promote cooperation on these issues; nor should the United States withhold its support for South Korea’s Northeast Asia–focused efforts in favor of region-wide multilateralism through the East Asia Summit (EAS), especially since the main objective of both efforts is to translate existing international norms into the regional context of East Asia. U.S. support for South Korea’s NAPCI initiative can be reciprocated by South Korea through more active participation in region-wide forums such as the EAS. Given the gravity of the challenges facing the region, a two-pronged effort along these lines is worth trying.
  • United States
    New Challenges for the U.S.-ROK Alliance
    The U.S.-South Korea alliance has grown deeper since 2009, when Presidents Obama and Lee Myung-bak announced a U.S.-ROK Joint Vision Statement that expanded the framework for bilateral cooperation beyond the Korean peninsula to regional and global issues. This statement set the stage for both deeper U.S.-ROK security coordination toward North Korea and for South Korean contributions to anti-piracy missions in the Gulf of Aden and South Korean participation in the ISAF mission in Afghanistan. The vision was reaffirmed by Park Geun-hye last year in Washington on the occasion of the 60th anniversary of the founding of the alliance. I argue in my chapter for National Bureau of Asian Research’s most recent volume, Strategic Asia 2014-2015: U.S. Alliances and Partnerships at the Center of Global Power, that further implementation of this broadened vision has created new internal and external challenges. The internal challenge is one that derives from the growth in South Korea’s military capabilities that has accompanied the evolution of the U.S.-ROK security alliance from a patron-client relationship to a strategic partnership. Now that South Korea brings substantial capabilities to the table, it is inevitable that there will be domestic debates over the extent to which South Korea should pursue homegrown capabilities (internal balancing) versus relying on procurement or supply of capabilities through the alliance (external balancing). The challenge is to find a mix that enables development of indigenous capabilities without coming at the expense of the alliance. To illustrate how these tensions have been manifested and managed, I describe the evolution of South Korea’s approach management of operational control arrangements and missile defense. The external challenge to the alliance comes from a China that increasingly seeks to limit U.S.-ROK alliance cooperation to the peninsula and to confine U.S.-ROK alliance aims and rationales  solely to North Korea. As a result, China has objected to South Korean military equipment sales to other U.S. allies such as the Philippines and is currently mounting a vociferous public campaign against the stationing of Theater High Altitude Advanced Defense (THAAD) capabilities on the Korean peninsula. But China’s objection to the placement of THAAD capabilities on the peninsula will ring hollow as long as North Korea continues to test and develop missile capabilities that could overwhelm or compromise South Korea’s existing missile defenses. Instead, China’s objections highlight a gap between China’s characterization of alliances as Cold War relics and the U.S. position that its alliances are vital as both an important contributor to U.S. power and as a logical starting point for the U.S. rebalance. In this respect, the U.S.-ROK alliance will likely face larger challenges in the future to the extent that China contests it. However, China’s objections to the alliance themselves may ultimately serve as a compelling rationale for why broadened alliance cooperation should be sustained.
  • United States
    Obama’s Rebalance to Asia In His Own Words: Where Does it Stand?
    A version of this post also appeared as a Pacific Forum CSIS PacNet publication, and can be found here. President Obama had a better than expected visit to Asia for annual Asia-Pacific Economic Cooperation (APEC), East Asia Summit (EAS), and G-20 gatherings, due largely to a productive summit with Xi Jinping. At the end of his trip in Brisbane, Obama gave his second major speech on the U.S. rebalancing policy to Asia, coming almost three years to the day following an address to the Australian parliament on his previous visit to Australia. A side-by-side reading of President Obama’s two major Australian speeches on the subject (he has yet to give a major policy speech on the rebalance in the United States) provides a useful benchmark for assessing the administration’s progress in implementing the policy. I found the following takeaways from my reading of the two speeches: The fundamental goals of the rebalance to Asia have remained consistent, focusing around the goals of shared security, shared prosperity, and commitments to advancing universal human rights in Asia. The Obama administration can justifiably point to progress in deepening alliances with Japan, Australia, South Korea, and the Philippines and strengthened partnerships with Singapore, Vietnam, Malaysia, and India, but fallout from a coup d’etat has taken Thailand out of the mix (and out of Obama’s Brisbane speech). Modernization of U.S. military forces in Asia has made slow and steady progress. The Obama administration’s rhetorical commitment to energizing institutions such as the East Asia Summit as vehicles for applying international norms to regulate regional behavior remains constant.  The United States has reiterated the importance of maritime security, freedom of navigation, and peaceful resolution of territorial disputes, but the Obama administration’s words are at risk of being made hollow if China takes actions to change the facts on the ground.  As a vehicle for upholding mutual restraint among its members, the capacity of the East Asia Summit remains limited.  There is clearly more work to be done on this front. On the goal of sustainable and shared economic growth, evidence of progress remains slim. Obama’s claim that “the United States has put more people back to work than all other advanced economies combined” rings hollow in Asia, which features growth rates that rival the United States.China’s slowing growth rate at 7.5 percent still doubles that of the United States. Moreover, the economic pillar of the rebalance depends wholly on TPP. This is especially the case now that China appears to have overtaken the United States rhetorically in its support for the Free Trade Area of the Asia-Pacific (FTAAP) concept that the U.S. officials in the Clinton administration had championed as their own. Without TPP, there will in effect be no rebalance. The Obama administration turned allegations of distraction into a virtue by bringing the global agenda to Asia, arguing that the rebalance is “not only about the United States doing more in Asia, it’s about the Asia Pacific region doing more with us around the world.” In fact, the Obama administration’s major successes in Beijing involved catalyzing China to show greater responsibility on global issues such as climate change, the Ebola crisis, and cooperation on countering violent extremism. Some Australian commentators have taken offense at Obama’s touting of climate change policies in his Brisbane speech that are at odds with the Abbott administration.  But a comparison of  Obama’s Brisbane  speech with the one he gave three years ago in Canberra shows that it is not Obama’s policies that have changed but those of the Abbott administration compared with its predecessor.  Despite policy differences on this issue, security cooperation between the United States and Australia has grown closer. While pursuing a “constructive relationship with China” and welcoming “the continuing rise of a China that is peaceful and prosperous and stable and that plays a responsible role in world affairs,” President Obama insisted that “China adhere to the same rules as other nations,” drawing a sharp line against Chinese exceptionalism or efforts to bend international rules to China’s favor.  In practical terms, the U.S. response to new Chinese initiatives such as the BRICS bank and the Asian Infrastructure Investment Bank (AIIB) is simultaneously testing both the Obama administration’s ability to accept China’s rise and whether new Chinese initiatives will abide by or challenge international practices and standards of good governance. Despite expanded functional cooperation with China on global issues, the rebalance to Asia continues to draw stark lines between the United States and China on universal human rights and rule of law. The Canberra speech in 2011 highlighted those values by pointing to the failure of forms of non-democratic “rule by one man or rule by committee” that “ignore the ultimate source of power and legitimacy—the will of the people.” This time around, in Brisbane, Obama argued for independent judiciaries and open government “because the rule of force must give way to the rule of law.” The universality of human rights has not generally been perceived (or advertised by Obama administration officials) as a centerpiece of the U.S. rebalance to Asia, but it may offer the strongest justification for the policy, even if it is also the most starkly divisive issue with which the region must grapple, as well as the most sensitive issue in the U.S.-China relationship. So where does the rebalance to Asia stand? The consistency of Obama’s two speeches in Australia makes the case that the rebalance is real and credible. But whether or not it is sustainable or sufficient will not depend only on the Obama administration’s continued commitment to the policy. It will also depend on the ability of the next American president to carry forward the rebalance in an Asian and global environment that will undoubtedly pose new and even more difficult challenges to U.S. leadership.
  • Asia
    Obama Returns Home to Harsh Reality
    President Barack Obama’s recent visit to Asia has been described as a triumph by some observers as well as by the administration itself. On the trip, which included meetings with Chinese and Myanmar leaders and appearances at two Asian regional organizations, the White House announced a new climate agreement with Beijing that would commit both countries to meeting targets for cutting their carbon emissions. It also announced other supposed breakthroughs. The United States and China agreed to a new system of notifying each other of military movements in the region and agreed to cut tariffs on other IT equipment. Obama also declared that the Pacific nations were getting close to concluding the Trans-Pacific Partnership trade deal. The reality is harsher. Many of the supposed breakthroughs won in Asia will be impossible for Obama to implement. And the administration’s attempts to turn U.S. policy toward Asia, a strategy known as “the pivot,” or the “rebalance to Asia,” has actually made the economic and political situation in East Asia worse. For more on my analysis of the president’s Asia trip and his Asia policy, see my latest piece at Business Week.
  • Thailand
    Obama, Asia, and Democracy
    It’s nice, in a way, to see issues one has worked on appear in major, globally important publications. This past week, just before President Obama’s trip to Asia, the Banyan column in The Economist, a column that focuses on Asia, detailed the Obama administration’s general disinterest in issues related to democracy and human rights in Asia. Banyan notes that President Obama has kept quiet as protests for suffrage have raged in Hong Kong. Banyan also writes that the Obama administration also has ignored a serious regression in political freedoms in Malaysia, maintained the close bilateral relationship with Thailand even as a military junta took over in Bangkok, and spent little time working on relations with the new Indonesian president, Joko Widodo, as authentic a democrat as you will get anywhere. The Washington Post editorial board last week echoed these same sentiments. In an editorial, the board focused on the growing crackdown on dissent in Malaysia, noting that, “Mr. Obama has made a point of cultivating [Malaysian Prime Minister] Najib [tun Razak] and his government as part of his policy of ‘rebalancing’ toward Asia, and so far the administration has had little to say about the political crackdown [in Malaysia].” I have been detailing the administration’s lack of interest in democracy promotion and human rights issues in Southeast Asia for several years now, including in a book, a working paper, and many articles. But though it’s nice to see others hitting the same notes, I see little evidence that the White House’s policies are changing. The president still has said nothing about Anwar Ibrihim’s trial, which almost surely will conclude with him being sentenced this week or next. The White House has been mum about the general deteriorating climate of free speech in Malaysia, which Anwar’s case fits into. The administration also has decided to push ahead with rapprochement with Myanmar despite the country’s deteriorating political environment, and the White House has made the decision to keep the Cobra Gold multilateral military exercises in Thailand in 2015. The decision to retain Cobra Gold in Thailand is a choice the Thai (military) government is interpreting as a signal that U.S.-Thai relations are returning to normal, even though Thai politics surely is not. As Human Rights Watch notes, the Thai government continues to ban public gatherings and has detained hundreds of activists and journalists and academics; the initial reporting of the government’s plans for a return to legislative rule suggest that the legislature will be comprised in an extremely gerrymandered way that allows people in Bangkok to dominate despite being, numerically, a minority of the population. As the Banyan column notes, these decisions have a cumulative effect, and that effect is not just a symbolic tarnishing of ideals. Ignoring rights in Asia, Banyan writes: Has a cost....It squanders part of America’s “soft power,” a great asset.…For all its flaws and missteps, [America] represents not just economic and military might, but an ideal to aspire to, in a way that China does not. And when American leaders appear to give less weight to that ideal, they not only diminish America’s attractions, they also lend more credence to the idea of its relative economic and military decline. Having written for The Economist, I know its editors love one-word sentences, so I can say only...Indeed.