Abe nominates economic ally to Bank of Japan board

Abe nominates economic ally to Bank of Japan board

(7th March 2016) Japanese Prime Minister Shinzo Abe’s nomination of Makoto Sakurai, an obscure 70-year-old economist, to the board of the Bank of Japan signals his determination to ensure that the central bank supports Mr. Abe’s stimulative economic policies. Japan, which has the world’s third-biggest economy, has been in the economic doldrums for 25 years and successive governments have tried to pull the nation out of them.

maxresdefault

Mr. Abe will host the G7 Summit May 26-27. He is a winner of The Boston Global Forum’s World Leader in Cyber-Security Award.

“Mr. Sakurai has extensive experience as a researcher at government-affiliated think tanks … and he has repeatedly applauded Abenomics (stimulative fiscal and monetary policies) in his economic speeches.” Naoki Iizuka, an economist at Citigroup in Tokyo, told the Financial Times.

“Assuming other conditions remain unchanged, we think the appointment would make it easier for the BoJ to implement additional easing measures,” Mr Iizuka added.

“The BoJ has recently suffered setbacks in its quest to break Japan free from two decades of stagnant prices and drive inflation to 2 per cent. Weakness elsewhere in the world economy has led to a strengthening of the yen, potentially hitting Japan’s exports and appetite for business investment,’’ the newspaper reported.

The leaders at the G7 Summit will discuss weakness in the world economy and efforts to fend off an international recession that Chinese economic weakness and the European refugee crisis, among other problems, may threaten in coming months. The Boston Global Forum has been collaborating with G7 Summit planners as part of its BGF-G7 Summit Initiative.

Live on Feb 22: John Savage’s talk on Strategies for Combating Cyber-Terrorism

Live on Feb 22: John Savage’s talk on Strategies for Combating Cyber-Terrorism

(Feb. 14, 2016) – The Boston Global Forum (BGF) is pleased to introduce the third in series of online dialogues to build the BGF-G7 Summit Initiative. This session will be with Professor John Savage, An Wang Professor of Computer Science at 7:00 PM (Boston time), Feb.22 at Brown University.

Professor Savage is a fellow of AAAS and ACM, a Life Fellow of IEEE, and a Guggenheim Fellow. He is a recipient of a Fulbright-Hays Research Award and Professorial Fellow of the East West Institute. He also served as a Jefferson Science Fellow in the U.S. State Department during the 2009-2010 academic year. His current research interests are cyber-security technology and policy, reliable computation with unreliable components, computational nanotechnology, efficient cache management on multi-core chips, and I/O complexity. Professor John Savage is also a member of The Boston Global Forum – G7 Summit Committee 

canvas 2

canvas

Michael Dukakis

The 60-minute event will focus on “Strategies for Combating Cyber-Terrorism” and be moderated by former Massachusetts Gov. Michael Dukakis, chairman of the Boston Global Forum.

Discussants are encouraged to send questions to [email protected]. Members of the Boston Global Forum’s Special Editorial Board will gather your insights and send them to the speaker.

The talk will be live-streamed at www.bostonglobalforum.org.

 

About John Savage

Professor Savage earned his PhD in Electrical Engineering at MIT in 1965 specializing in coding and information theory. He joined Bell Laboratories in 1965 and the faculty of the Division of Engineering at Brown in 1967. In 1979 he co-founded the Department of Computer Science and served as its second chair from 1985 to 1991. By the early 1970s his research interests changed to theoretical computer science.

_______________________

RELATED NEWS

CYBER-EXPERT SCHNEIER DISCUSSES NEED FOR ‘NORMS’ AT SECOND ONLINE DIALOGUE TO BUILD THE BGF-G7 SUMMIT INITIATIVE

LIVE ON FEB. 3: DAVID SANGER’S TALK ON STRATEGIES FOR COMBATING CYBER-TERRORISM

The BGF cyber-security initiative draws technical experts, political leaders

(22nd Feb 2016) The Boston Global Forum (BGF) is continuing to host experts and build up its institutional expertise in its cyber-security project this year, a key part of the BGF-G7 Summit Initiative. hom

One of the most important goals of the Initiative is to craft norms for national and international laws and policies  in order to promote  global cyber-security. As part of this mission, the BGF urges that the roles of the G7 nations in  setting and maintaining the norms be clearly established and promoted, hopefully at  the G7 summit in Japan on May 26-27.

Such world-famed experts on cyber-security as David Sanger and Bruce Schneier have already taken part in BGF sessions. They and other experts have discussed in BGF forums the need to set ethical and legal norms for digital activities to replace the current chaotic and sometimes criminal  global digital environment. Cyber-expert Adam Segal also cited the need to build such  norms when he spoke at the Christian Science Monitor on Feb 4.

Other cyber-security experts, such as Prof. John Savage, a renown computer scientist, will join us  in  conversations in coming weeks. And the BGF will continue to discuss cyber-security and other issues of international peace and security with past and present government leaders.

Joining the BGF-G7 Summit Initiative team for a four-hour meeting and a dinner on Feb. 20 in Cambridge, Mass., was Prof. Jose Barroso, former president of the European Commission and former prime minister of Portugal. He contributed strong and useful advice for building the Initiative, based in part on his experience of having attended the G7  Summit (called the G8 Summit before Russia was excluded because of its seizure of  Crimea from Ukraine) 10 times in his role as the leader of the European Commission (a role sometimes called “president of Europe’’).

The BGF has been working on its cyber-security project since last year. The BGF’s Global Cyber-Security Day was held last Dec.  12 and featured discussions with people around the world. It followed the BGF’s creation of the Ethics Code of Conduct for Cyber Peace and Security (ECCC) earlier in 2015.

Besides Mr. Barroso, such major leaders as  U.N. Secretary General Ban Ki-moon, Japanese Prime Minister  Shinzo Abe,  and Vietnamese Prime Minister Nguyen Tan Dung have  also endorsed the principles of the ECCC and Global Cyber-Security Day (GCD).

ECCC and GCD are both affiliated with the Global Citizenship Education Program of the University of California at Los Angeles, a combination  with the United Nations Educational, Scientific and Cultural Organization (UNESCO).

We will continue on this site to bring cyber-security initiative as we approach the G7 Summit in Japan in late May.

Let’s avoid another Cold War

Let’s avoid another Cold War

(22nd Feb 2016) Governor Michael Dukakis  – Founder and Chairman of The Boston Global Forum shared his view about “Avoiding another Cold War”
20140805_putin

Recently, we have seen a surge in the number of people who seem to think that Russia threatens American security.

Both the secretary of defense and the chairman of the Joint Chiefs of Staff have called the Russians our number one threat. Many of our European friends are saying the same thing. George Soros, who has had an impressive history of supporting important philanthropic causes, recently authored an article that sounded like a full-fledged cry for a return to the Cold War.

I am puzzled and concerned. George H.W. Bush and Mikhail Gorbachev did a remarkable job of ending the Cold War and saving us from what had been trillions in unnecessary spending on the military. For a while we enjoyed the fruits of that peace dividend until we decided to invade Iraq and plunge ourselves and the world into what seems now to be almost endless suffering and turmoil in the Middle East, which is threatening the security of the European Union. Now Barack Obama, a president whom I admire greatly, has announced that we will put billions we don’t have into military expansion in eastern Europe, presumably to “stop the Russians.”

I am puzzled. Yes, the Russians have been engaging in troubling policies in eastern Ukraine. And, yes, they have been involved for years with the regime of their ally Syrian President Bashar Assad. But they also played, and continue to play, a crucial role in the successful nuclear negotiations with Iran, and they warned us repeatedly that any intervention by us in Syria would backfire. In fact, they were largely responsible for persuading Assad to get rid of his chemical weapons, an initiative in which we participated.

We will disagree from time to time with the governments of various countries. That is a normal part of life. But let’s not start revving up the Cold War guns again. Let’s use the United Nations’ peacemaking capacity to deal with these issues in ways that can resolve them peacefully, just as we have done with the Iranians with the strong support of the five permanent members of the Security Council, including Russia and China.

Those of us who spent much of our adult lives in a world dominated by the Cold War know how costly and debilitating it was. We don’t need to go down that path again.

China, not Russia, is the main threat

China, not Russia, is the main threat

(14th Feb 2016)  Mr. Nguyen Anh Tuan – CEO of The Boston Global Forum (BGF) and Mr. Robert Whitcomb, Managing Editor, Member of Editorial Board of  The BGF shared their view about how China not Russia is the main threat for Global Cyber Security in respond to the view of George Soros on this article

(140520) -- SHANGHAI, May 20, 2014 (Xinhua) -- Chinese President Xi Jinping (R) and Russian President Vladimir Putin sign a joint statement aimed at expanding cooperation in all fields and coordinating diplomatic efforts to cement the China-Russia all-round strategic partnership of cooperation after their talks in Shanghai, east China, May 20, 2014. (Xinhua/Pang Xinglei) (mp)

(140520) — SHANGHAI, May 20, 2014 (Xinhua) — Chinese President Xi Jinping (R) and Russian President Vladimir Putin sign a joint statement aimed at expanding cooperation in all fields and coordinating diplomatic efforts to cement the China-Russia all-round strategic partnership of cooperation after their talks in Shanghai, east China, May 20, 2014. (Xinhua/Pang Xinglei) (mp)

China, not Russia, is the main threat
George Soros is wrong on how to deal with Russian President Vladimir Putin. Mr. Soros, chairman of Soros Fund Management and of the Open Society Foundations, wrote a column published Feb. 10 by Project Syndicate headlined “Putin Is No Ally Against ISIS’’. In it, he urged Western leaders to more firmly respond to the Russian leader’s actions against Ukraine and his support of Syrian President Bashar Assad.

But Mr. Soros exaggerates Mr. Putin’s strength and intentions.

Yes, the Russian president seeks to strengthen the Russian position in Syria by supporting his ally Assad.

However, Russia is actually rather weak. Russian power – real and perceived — depends far too much on its large but rather antiquated military and the sale of oil. But the price of oil is very low, and may fall further, in part because of stunning American success in using its technology and engineering skills to produce much more oil and gas than anyone thought possible a decade ago. In addition, the U.S., with its big technological lead, and huge wealth, will continue to be much stronger militarily than Russia.

And consider that ISIS is a foe of the Assad regime and that radical Islam seriously threatens Russia itself, which has a substantial Muslim community, some of it radicalized.

Thus it makes much more sense to cooperate more with Russia to fight ISIS than to act as if Russia was the main foe.

The biggest challenge to world peace is China, whose totalitarian regime’s extreme expansionistic nationalism, armed with the world’s second-largest economy, 1.4 billion people (compared to only about 140 million in Russia!) and rapidly improving military, imperils the peace, liberties and other rights of nations in the Asia/Pacific region and beyond.   And note that Russia’s Far East region may well face Chinese expansion in coming years.

The U.S., E.U. and Russia need to work together to face the challenge of Chinese aggression as well as to intensify the battle against ISIS. The West and Russia have stronger interests in common than they have with China.

Cyber-expert Schneier discusses need for ‘norms’ at second Online Dialogue to build the BGF-G7 Summit Initiative

Cyber-expert Schneier discusses need for ‘norms’ at second Online Dialogue to build the BGF-G7 Summit Initiative

(Feb. 12th, 2016) – On Feb. 11 at Harvard Kennedy School, The Boston Global Forum (BGF) held the second in series of online dialogues to build the BGF-G7 Summit Initiative. This session was with Bruce Schneier, fellow at the Berkman Center for Internet and Society at Harvard Law School, and the Chief Technology Officer at Resilient Systems. Schneier was honored as the Business leader in the Cybersecurity “for dedicating his career to the betterment of technology, security, privacy and Internet” in the Boston Global Forum’s Global Cybersecurity Day event which was held on December 12 at Harvard Faculty Club in Cambridge.

 Watch the live-streamed talk here:

Bruce Schneier, a celebrated international cyber-security and cryptology expert, writer and consultant, took part in a wide-ranging discussion on Feb. 11 on cyber-threats and the techniques and policies needed to prevent, or at least reduce, them in what he called the current “cyber arms race.’’ His talk was the second of 12 online dialogues as part of the BGF-G7 Summit Initiative to address cyber-security.

He compared the cyber arms race with the confusing early days of nuclear energy (about whose benefits many people were too optimistic), including the nuclear-arms race between the Soviet Union and the United States. The fact is, Mr. Schneier said, that the world still lacks legal and other “norms,’’ and real treaties, with which to limit cyber-aggression by nations and individual “bad actors.’’ Things are chaotic.

Thus, he emphasized the need to focus on cyber-defense, such as through “patching’’ security holes, to “disarm’’ a foe, rather than offense. The trouble with emphasizing offense, he said, is that, because everyone operates in basically the same “cyber-infrastructure,’’ attackers can expose their own information, making the attackers – be they individuals, businesses or governments — themselves vulnerable. He also noted that “the difference between attack and espionage is one command.’’

Gov Dukakis Feb 11

Photo: Governor Michael Dukakis, Chairman of Boston Global Forum moderated the talk.

Mr. Schneier spent considerable time discussing the China’s massive hacking of massive quantities of employee information from the U.S. Office of Personnel Management and the vulnerabilities we all have regarding our personal information being stolen and used for such things as blackmail. Once people steal, for example, your fingerprints from the Internet, they can have power over you for the rest of your life.

And, of course, he noted, Western companies such as Google and wireless firms, are, like governments, relentlessly collecting personal data on us and generally cooperating with governments in doing so. “There’s not a lot of regulation’’ of this, he said.

“Large businesses want to spy on you’’ to obtain the maximum amount of marketing information.

Mr. Schneier expressed considerable alarm about the dangers posed by the “Internet of Things,’’ in which the Internet, acting like the “hands, eyes, ears and feet’’ of a giant robot, can be used to attack public physical infrastructure, such as electric grids, and even individuals, such as through disabling car brakes and manipulating pacemakers.

Mr Nguyen Anh Tuan and Mr Schneier

Mr. Nguyen Anh Tuan, CEO of Boston Global Forum and Mr. Bruce Schneier in the talk.

Interestingly, Mr. Schneier, though primarily a technical person, said the best ways to improve cyber-security are for nations to have dialogues to set globally governmentally recognized norms on cyber-behavior and to establish new “social mechanisms’’ to keep us safe.

The answer to cyber-aggression is “political, not technical solutions,’’ he asserted.

The BGF’s continuing online dialogues on cyber-security will discuss possible social and political answers to these burgeoning threats in coming weeks.

Cyber Security from China’s Perspective – What the Experts Say

Cyber Security from China’s Perspective – What the Experts Say

(12th Feb 2016) Dick Pirozzolo – Managing Director of Pirozzolo Company Public Relations shared his view about how China thinks about cyber-security. Dick Pirozzolo serves on the editorial board of Boston Global Forum and is co-author, with Michael Morris, of a forthcoming novel that takes place in Vietnam during April of 1975.

Courtesy Photo Dick Pirozzolo (C)2016

Read his view below

Why China hacks may be more in the Communist Party’s DNA and view of the Internet than anything else, according to Sharon Hom, executive director of Human Rights in China, a Chinese Non-Government Organization. Hom spoke during a recent panel discussion organized by the Christian Science Monitor in Boston.

Hom explained, “While in the US and most of the world, citizens regard the Internet as a big open international and transparent communication phenomenon,

the Communist Party wants control of society and information. Though it is not a linear path from censorship and control to hacking the Internet, the Party needs to manage expression online.” In China, “Cyber security means security of the Party.”

The event was organized, in part, to promote the Monitor’s online section Passcode which it bills as a field guide to security and privacy.

When it comes to establishing international norms for Internet behavior that would presumably reduce hacking, Hom is not optimistic pointing out that whenever norms come up, China, Iran, Russia, Pakistan and other bad actors, unite to pose obstacles in a, “race to the bottom.”

In sharp contrast to these nations, Boston Global Forum has recognized Japan, host of the next G7 meeting in March, for supporting international norms. Commenting on the Forum’s international ethics code of conduct, Japan’s Prime Minister Shinzo Abe told Boston-based think tank members: “Japan will continue to cooperate closely with the US and other partners … while playing a leading role in achieving the peace and stability of the international community.”

In addition to Japan and the US, G7 nations include Canada, France, Germany, Great Britain, and Italy.

Panelist Adam Segal added, that the Chinese government sees the Internet from the perspective of “cyber sovereignty and as an entity that the government can develop as it sees fit.”

 

Segal, director of the Digital Cyberspace Policy Program at the Council on Foreign Relations emphasized that a big part of China’s incentive to hack other nation’s computers is to obtain intellectual property from foreign companies. Segal told attendees, “China does not want to be the factory of the world and is worried about the future of technology.” For example, “While China probably manufacturers all the DVD players sold in the world, the head that reads the disc is proprietary and owned by companies in Japan.”

 

Though China’s theft of 22 million personnel records from the Federal Office of Personnel Management is well known, private companies have been closed mouthed about such intrusions until Google announced, “We’ve been hacked along with 30 other companies,” according to Segal. Segal also reported on a hack of Boeing’s computer’s a few years ago in his cover article titled: Why China Hacks the World, in the February 1, 2016 edition of The Christian Science Monitor Weekly.

In addition to stealing intellectual property to gain technological advantage, China is also engaged in what Segal called the world’s oldest profession “espionage” and strives to obtain secrets about the F22 and F35 fighter jets and other weapon systems. China also uses hacking as a form of external censorship by “intimidating reporters, “ who write articles unfavorable to this nation of 1.4 Billion.

“Is there bad hacking and good hacking?” asked moderator Mike Farrell, editor of the Monitor’s Passcode publication. Panelists agreed that government-to-government spying is considered acceptable, but for a government to hack into another country’s businesses steal the information and pass it to companies inside its own borders is outside any acceptable norm.

Michael Sulmeyer, director of the Belfer Center’s Cyber Security Project at the Harvard Kennedy School, pointed out that the current state of cyber security “is like leaving a bag money on your front lawn and being stunned to learn that someone stole it during the night. At least make harder. Make them work. Make sure it’s not the jayvee team but that the varsity team is needed hack into your systems.”

While it might be comforting to think about like-kind retaliation, it is not always possible. Segal explained relationships between the US and China are complex and come with competing values, “Fifty percent of Apple’s revenue comes from China. One of the worlds biggest technology companies is not likely to want heavy-handed retaliation.”

Though Hom devotes much of her time to combatting cyber hacking and theft, she says people in her office continue to ignore fundamental security measures and continue to, “stick Post-it notes to their computers containing their passwords, because they have so many to remember.”

“Cyber defenses though are a stopgap. The real solution is more evolutionary,” says Hom and will come about, ‘When governments like China stop using the Internet as a tool of social engineering.”

 

 

Vaira Vike-Freiberga

Vaira Vike-Freiberga

Dr. Vaira Vike-Freiberga has been the President of the World Leadership Aliance Club of Madrid since 2014  and is former President of Latvia (1999-2007). She was instrumental in achieving membership in the European Union and NATO for her country, and was Special Envoy on UN reform among her international activities. Since 2007, she is an oft invited speaker on social issues, moral values, and democracy. She was Vice-chair of the Reflection group on the long term future of Europe, and chaired the High-level group on freedom and pluralism of media in the EU.

Having left Latvia as a child refugee to Germany in 1945, then French Morocco and Canada, she earned a Ph.D. in psychology (1965) at McGill University. After a distinguished career as Professor at the University of Montreal, she returned to her native country in 1998 to head the Latvian Institute.A year later she was elected President by the Latvian Parliament and re-elected in 2003.

She is member of four Academies, and Board member or patron of 30 international organizations, including the Board of Thinkers of the Boston Global Forum. She has received many highest Orders of Merit, as well as medals and awards, for distinguished work in the humanities and social sciences. She has published 14 books and authored over 200 articles, book chapters, reports, and audiovisual materials.

Allan Cytryn

Allan Cytryn

Allan M. Cytryn is with Risk Masters International, LLC, a consulting firm that advises clients on Risk Mitigation and Management, including business continuity planning, disaster recovery, and recovery from cyber attacks. He has been a senior Information Technology executive for more than 30 years. Prior to Risk Masters, Allan spent 15 years at Deloitte where he was a Director. His roles and responsibilities there included Regional CIO, National Director of Applications, and National Director of Technology for Audit and Enterprise Risk Services. Before joining Deloitte, Allan was the CIO of Simpson Thacher & Bartlett, a Vice President of Corporate Finance with Goldman Sachs, and a Vice-President of Information Technology with Bankers Trust. In all of these roles he led organizations through rapid operational and technological transformations and helped them adopt new and innovative technologies to support their core strategic objectives.

Allan additionally played a critical leadership role for Deloitte in managing the IT recovery from the 9/11/2001 attack in New York and for Simpson Thacher and Bartlett leading their recovery from the 1993 NatWest Tower Bombing in London.

Allan earned a BS in Electrical Engineering and Computer Science and an MS in Operations Research & Applied Mathematics from Columbia Engineering, as well as a M.Arch from Columbia’s Graduate School of Architecture, Planning and Preservation. He is active in alumni affairs, serving as the Chair of the Alumni Board of Visitors of the Columbia University School of Engineering and Applied Sciences and as the Treasurer of The Society of Columbia Graduates

His son, Steven, graduated from Columbia College in 2006.