Three ways to improve cybersecurity

One of The Boston Global Forum’s cybersecurity experts, Prof. Derek S. Reveron of the U.S. Naval War College and Harvard’s Belfer Center for Science and International Affairs, will be one of the speakers at the BGF’s May 9 conference titled “Building Ethics Norms for Cyberbehavior.’’

6993252294_9856faf63e_z

His report for the conference is titled “Cybersecurity Deficits and International Norms.’’ It builds on the norms outlined by Prof. John Savage of Brown University.

Among his recommendations:

 

  • Convening sub-regional summits to outline the scope of cybersecuriy challenges and improve multilateral efforts to promulgate norms.
  • Establishing information-sharing centers where governments can share threat information, coordinate cybersecurity policies and implement best practices for governments and private-sector organizations, including companies, and individuals.
  • Assisting governments in developing countries to strengthen their government networks, improve protection of critical public infrastructure and educate citizens to raise their security posture  by improving human capital.
The BGF-G7 Summit Initiative: Ise-Shima Norms

The BGF-G7 Summit Initiative: Ise-Shima Norms

The Boston Global Forum welcomes this opportunity to provide input to the agenda or the G7 Ise-Shima Summit. Global Economy and Trade, Development, and Quality Infrastructure Investment are three themes of this summit. Given the importance of the Internet in all three areas, we encourage you to address the following actions concerning cybersecurity at the summit. These actions have as their goal to raise the general level of security in cyberspace.

 

Download Ise-Shima Norms 

Securing Cyberspace and the G7 Agenda

The Boston Global Forum welcomes this opportunity to provide input to the agenda for the G7 Ise-Shima Summit. Global Economy and Trade, Development, and Quality Infrastructure Investment are three themes of this summit. Given the importance of the Internet in all three areas, we encourage you to address the following actions concerning cybersecurity at the summit. These actions have as their goal to raise the general level of security in cyberspace.

*The lead author on this document was John Savage (Brown University) with contributions from
Michael Dukakis (Boston Global Forum), Nguyen Anh Tuan (Boston Global Forum), Allan Cytryn
(Risk Masters International.), Ryan Maness (Northeastern University), Derek Reveron (Naval War
College), and Thomas Patterson (Harvard University).

20160104_01_img01

1. Encourage the global adoption of the 2015 G20 cybersecurity norms, which include the 2015 GGE norms by reference, as the Ise-Shima Norms.

2. Endorse private and public efforts to improve ethical Internet behavior. The UCLA Global Citizenship Education Program and the Boston Global Forum’s Ethical Code of Conduct for Cyber Peace and Security are two such examples.

3. Engage vendors of cyberspace technology in the discussion of norms for responsible state behavior.

4. Establish domestic and international centers and mechanisms designed to reduce the risk of cyber conflict.

5. Encourage national cybersecurity experts to voluntarily publicize their best security practices.

6. Recognize that formulation of policy concerning cyberspace technologies requires the participation, on an equal footing, of respected academics and industry experts on the technologies in question.

These proposals stem from several developments.

First, over the last five years, small groups of governments have formulated international norms of state behavior, particularly for peacetime use. Negotiations have been held at the UN and many other forums. Now that a set of reasonable norms have been established it is appropriate to reach out to nations that have not participated in these discussions and encourage them to endorse them as well. In many cases, this will require some capacity development, which is encouraged by UN Resolution 70/237. The G7 nations can help increase confidence in computers and network technology by leading this effort, which could be called the Ise-Shima Challenge.

Second, global citizenship education has an important a role to play in building a sustainable peace and security in cyberspace. We encourage a significant effort in this regard.

Third, we observe that the success of many computer vendors requires that their customers have confidence in their products, which is undermined by unreported cyber vulnerabilities and by state launched weapons that result in mass events. Thus, some vendors, notably, Microsoft, have begun to formulate and promulgate norms of state behavior that are important from their point of view. States should take these nascent efforts seriously and engage these firms in norms formulation.

Fourth, given the large number of states that are developing cyber weapons, the risk of accidental or intentional cyber conflict is rising. All states should recognize this risk and work to mitigate it. Centers designed to reduce the risk of cyber conflict are needed in every country with offensive cyber capability. Operators in these centers must come to know each other so that they can properly assess national intentions during a cyber crisis. This issue has been highlighted in the latest 2015 GGE report.

The fifth recommendation on best practices is illustrated by a public talk given in January 2016 by Rob Joyce, head of NSA’s Tailored Access Operations Department. He offered advice on cybersecurity measures to protect a computing facility from the type of penetration in which his department engages. This event was a remarkable example of the security services of a major nation, the US, offering constructive advice to others. Each G7 nation could assume the same responsibility for improving the security of cyberspace by offering such examples of best practices.

Finally, policy formulation concerning cyberspace can be very challenging. Unless technology experts are at the table with policymakers when such policy is formulated, errors are easily made that may lead to poorly formulated international norms or domestic legislation. Thus, it is essential that academic and technology experts be engaged and treated as co-equals with policymakers during this process.

The appendices that follow provide specific recommendations that have been developed by a variety of parties and are aligned with the above objectives.

 Appendix A: The Ise-Shima Norms

The G7 nations should promote the development of social, legal and technological norms and agreements that will protect the information and communications infrastructures of the world’s nations and their people. In doing so, these norms will promote the abilities of these technologies to fulfill their promise to enhance the lives of all. These actions follow successful precedents in many areas where international, national and private efforts have worked together to enable the world to realize the benefits of new technologies in order to maximize their benefit to all and to mitigate differences between nations and peoples.

I. The G7 nations should encourage adoption of norms set forth by the G20, the United Nations’ Group of Government Experts (GGE), and the Boston Global Forum’s Ethics Code of Conduct for Cybersecurity (ECCC).

1. Key G20 norms

·Nation-state conduct in cyber space should conform to international law and the UN charter.

·No country should conduct or support cyber-enabled intellectual property theft for commercial purposes.

2. Key GGE norms

·No country should intentionally damage the critical infrastructure of another state or impair infrastructure that serves the public and would undermine the human rights guaranteed by the U.N. Declaration.

·No country should act to impede the response of Computer Security Incident Response Teams (CSIRTs) to cyber incidents, nor should CSIRTs be used to create cyber incidents.

·Countries should cooperate with requests from other nations to investigate cybercrimes and mitigate malicious activity emanating from their territory.

3. Key ECCC norms

·Countries should not establish or support policies or actions harmful to cyberspace.

·Countries should not engage in the unlawful taking of the assets or confidential information of private individuals or organizations.

·Nations should not use cyberspace to wrongly damage the reputation of other nations, organizations, or individuals.

II. The G7 nations should engage hardware and software vendors in developing cyber norms, following the six guidelines in the Microsoft report, “International Cyber Security Norms: Reducing Conflict in an Internet-Dependent World.”

1. Countries should not target information and communications technology (ICT) companies to insert vulnerabilities (backdoors) or take action that would undermine public trust in products and services.

 2. Countries should have a clear principle-based policy for handling product and service vulnerabilities that reflects a strong mandate to report them to vendors rather than stockpiling, buying, or selling them.

3. Countries should exercise restraint in developing cyber weapons and should ensure that any which are developed are limited, precise, and not reusable.

4. Countries should commit to nonproliferation activities related to cyber weapons.

5. Countries should limit their engagement in cyber offensive operations to avoid creating a mass event.

6. Countries should assist private sector efforts to detect, contain, respond to, and recover from events in cyberspace.

III. The G7 nations should develop cyber risk reduction measures.

1. Create domestic threat reductions centers equipped with secure communications with other such national centers to mitigate risks before, during and after cyber-incidents.

2. Assess and improve the cyber security of national critical infrastructures.

3. Take steps to reduce the number of domestic compromised computers, particularly those that have been marshalled into botnets.

4. Improve domestic cybersecurity through advisory and legislative measures.

IV. The G7 nations should promote the development, identification, sharing and adoption of “best practices” in the cybersecurity area.

V. The G7 nations should support cyber security capacity building in developing countries.

1. Investments should be made in developing countries to secure their infrastructures as this is essential to securing the connected global infrastructure and preventing a widening gap in the capabilities of nations. In the interconnected world, these investments are essential to reducing costs resulting from cyber-crime and espionage and to increasing the confidence and trust of businesses to operate in developing countries.

2. Investments should be made and cooperation undertaken between developed and developing countries to re-envision methods of education and learning, utilizing the global information and telecommunication infrastructure to enhance the accessibility of suitable educational opportunities for people everywhere.

Appendix B

2015 GGE Norms

(Excerpt from UN A/70/174*)

The 2015 UN GGE committee consisted of experts from 20 representing Belarus, Brazil, China, Columbia, Egypt, Estonia, France, Germany, Ghana, Israel, Japan, Kenya, Malaysia, Mexico, Pakistan, the Republic of Korea, the Russian Federation, Spain, the United Kingdom of Great Britain and Northern Ireland, and the United States of America. The two G7 countries not represented are Canada and Italy.

“13. … (T) present Group offers the following recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour of States aimed at promoting an open, secure, stable, accessible and peaceful ICT environment:

a) Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security;

b) In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences;

c) States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs;

d) States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect;

e) States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression;

f) A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public;

g) States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions;

* Retrieved from http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174 on May 7, 2016. 

h) States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty;

i) States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;

j) States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure;

k) States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cybersecurity incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.

14. The Group observed that, while such measures may be essential to promote an open, secure, stable, accessible and peaceful ICT environment, their implementation may not immediately be possible, in particular for developing countries, until they acquire adequate capacity.” In addition, the 2015 GGE encouraged states to implement confidence-building measures to include

a) identification of domestic technical and policy points of contact “to address serious ICT incidents,”

b) risk reduction measures,

c) sharing of general threat information, known technological vulnerabilities, and best security practices,

and d) identification of critical domestic infrastructures and the legal, technical and assessment steps that nations have taken to protect them. This GGE also encouraged states to exchange law enforcement and cybersecurity personnel as well as to facilitate exchanges between academic and research institutions. The creation of national computer emergency response teams is also encouraged along with exchanges of personnel between such groups. Appendix C

G20 Cybersecurity Norms

Excerpt from the G20 Leaders’ Communiqué Antalya Summit, 15-16 November 2015*

“A26. We are living in an age of Internet economy that brings both opportunities and challenges to global growth. We acknowledge that threats to the security of and in the use of ICTs, risk undermining our collective ability to use the Internet to bolster economic growth and development around the world.

1. We commit ourselves to bridge the digital divide. In the ICT environment, just as elsewhere, states have a special responsibility to promote security, stability, and economic ties with other nations.

2. In support of that objective, we affirm that no country should conduct or support ICT-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.

3. All states in ensuring the secure use of ICTs, should respect and protect the principles of freedom from unlawful and arbitrary interference of privacy, including in the context of digital communications. …

4. (W)e welcome the 2015 report of the UN Group of Governmental Experts in the Field of Information and Telecommunications in the Context of International Security, affirm that international law, and in particular the UN Charter, is applicable to state conduct in the use of ICTs. …

5. (We) commit ourselves to the view that all states should abide by norms of responsible state behaviour in the use of ICTs in accordance with UN resolution A/C.1/70/L.45. †

6. We are committed to help ensure an environment in which all actors are able to enjoy the benefits of secure use of ICTs. “

†G20 Members: Argentina, Australia, Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan, Korea, Mexico, Russia, Saudi Arabia, South Africa, Turkey, United Kingdom, United States, and European Union. All G7 member states are members of the G20. Their names are in boldface.

* Retrieved from http://www.gpfi.org/sites/default/files/documents/G20- Antalya-Leaders-Summit-Communiqu–.pdf May 7, 2016.

† UN resolution A/C.1/70/L.45 incorporates the GGE Norms by reference.

 REFERENCES

Bloom, Les and John E. Savage. “On Cyber Peace.” The Atlantic Council, August 2011, Accessed 3/4/2016 at http://www.atlanticcouncil.org/images/files/publication_pdfs/403/080811_ACUS_OnCyb erPeace.PDF

Boston Global Forum. “Ethics Code of Conduct for Cyber Peace and Security,” December 12, 2015. Accessed 3/14, 2016 at http://bostonglobalforum.org/2015/11/the-ethics-code-of-conduct-for-cyber-peace-andsecurity-eccc-version-1-0/

Nicholas, Paul. “Six Proposed Norms to Reduce Conflict in Cyberspace.” 1/20/2015. Accessed 3/4/2016 at http://blogs.microsoft.com/cybertrust/2015/01/20/six-proposed-norms/

Painter, Christopher. “G20: Growing International Consensus on Stability in Cyberspace.” State.gov, 12/3/2015. Accessed 3/5/2016 at https://blogs.state.gov/stories/2015/12/03/g20-growing-international-consensus-stabilitycyberspace

Valeriano, Brandon and Ryan C. Maness. “The Coming Cyberpeace: The Normative Argument against Cyberwarfare.” Foreign Affairs.5/13/2015. Accessed 3/3/2016. https://www.foreignaffairs.com/articles/2015-05-13/coming-cyberpeace

The 2015 GGE norms are stated in paragraph 13 of “Developments in the field of information and telecommunications in the context of international security,” UN Report A/70/174, July 22, 2015. Accessed 5/7/2016 http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174. The full set of GGE reports can be found at https://www.un.org/disarmament/topics/informationsecurity/

The 2015 G20 norms are stated in paragraph 26 of “G20 Leaders’ Communiqué, Antalya Summit 2015”, November 15-16, 2015. Accessed 5/7/2016 at http://www.gpfi.org/publications/g20-leaders-communiqu-antalya-summit-2015.

“The Ethics Code of Conduct for Cyber Peace and Security (ECCC),” Boston Global Forum, 9/3/2015. Accessed 5/7/2016 at http://bostonglobalforum.org/2015/11/the-ethics-code-of-conduct-for-cyber-peace-andsecurity-eccc-version-1-0/

 

 

The BGF-G7 Summit Initiative Conference on May 9: “Building Ethics Norms for Cyberbehavior”

The BGF-G7 Summit Initiative Conference on May 9: “Building Ethics Norms for Cyberbehavior”

(April 28th, 2016) The Boston Global Forum (BGF) will host a May 9th Conference titled “Building Ethics Norms for Cyberbehavior’’. This conference (time, place and speakers below) is in part a follow-up to the recent creation of the BGF’s “Ethics Code of Conduct for Cyber Peace and Security,’’ which has been informed by BGF online dialogues with cyberexperts from several countries.

It is part of The Boston Global Forum’s BGF-G7 Summit Initiative, in which the BGF has convened leading scholars and business, technology and government leaders  to seek solutions to pressing global issues involving peace, security and development. This BGF group has been working with Japanese officials to draft proposals to present to the national leaders meeting at the G7 Summit on May 26-27 in Japan.

The BGF’s biggest priority leading up to the summit is developing  what it calls “Strategies for Combating Cyberterrorism’’.

The May 9 event:

7pm, May 9th 2016 (Eastern Time)

8am, May 10th 2016 (Tokyo Time)

Venue Harvard University Faculty Club, 20 Quincy Street, Cambridge, MASSACHUSETTS, USA

Live-streamed at www.bostonglobalforum.org

The conference will be directly linked with participants in Tokyo, New York and Bonn.

For further information, including on attending the conference, please send queries to: [email protected].


The conference will be moderated by:

  • Gov. Michael Dukakis, Co-Founder, Chairman, Boston Global Forum

Distinguished Speakers:

  • Tomomi Inada, Chairman of Policy Research Council; Liberal Democratic Party; Member of Japanese House of Representatives
  • Professor Joseph S. Nye Jr., Member of Board of Thinkers, Boston Global Forum; Harvard University Distinguished Service Professor
  • Professor Thomas E. Patterson, Co-Founder, Member of Board of Directors, Member of Editorial Board, Boston Global Forum; Bradlee Professor of Government and the Press, Harvard Kennedy School
  • Professor Jose Barroso, Former President of EU, Former Prime Minister of Portugal  
  • President Vaira Vike-Freiberga, Former President of Latvia, President of Club de Madrid, The BGF-G7 Summit Initiative Committee
  • Professor Koichi Hamada , Special Adviser to Japanese Prime Minister  Shinzo Abe
  • Professor John Savage,  An Wang Professor of Computer Science, Brown University
  • Professor Eisuke Sakakibara (Mr. Yen), Former Japanese Vice Minister of Finance
  • Nguyen Anh Tuan, Co-Founder, CEO, Boston Global Forum; Chair, International Advisory Committee, UNESCO-UCLA Global Citizenship Education Program
  • Professor Derek Reveron, Professor of National Security Affairs and the EMC  Informationist Chair, US Naval War College
  • Professor Stephen M. Walt, Belfer Professor of International Affairs, International Security Program, Belfer Center for Science and International Affairs, Harvard University.
  • Professor Nazli Choucri, Professor of Political Science, MIT; Director of the Global System for Sustainable Development (GSSD)

 10 (1) (1)

Download Brochure of The BGF-G7 Summit Initiative

The most promising ideas from these dialogues and May 9th Conference will be summarized and then reported to the national leaders meeting in Japan. The Boston Global Forum will also cooperate with the Japanese government in organizing an online dialogue on “The Role of Japan in Peace, Security and Development in the World Today.”

About Boston Global Forum

Boston Global Forum ( BostonGlobalForum.org ) was founded nearly three years ago by former Democratic presidential candidate and Massachusetts Gov. Michael Dukakis, who is now a Distinguished Professor at Harvard University; Prof. John Quelch, the Charles Edward Wilson Professor of Business Administration at the Harvard Business School; Prof. Thomas Patterson, the Bradlee Professor of Government and the Press at the Harvard Kennedy School, and Nguyen Anh Tuan, CEO and Editor-in-Chief of the Boston Global Forum, and the Founder and Chairman of VietNamNet Media Company and VietNet, the first Internet Service Provider in Vietnam.

Distinguished Speakers

Governor Michael Dukakis

pes_1009976

Michael Stanley Dukakis was born in Brookline, Massachusetts to Greek immigrant parents. He attended Swarthmore College and Harvard Law School and served in the United States Army from 1955-1957, sixteen months of which was with the support group to the U.S. delegation to the Military Armistice Commission in Korea.

He served eight years as a member of the Massachusetts legislature and was elected governor of Massachusetts three times. He was the Democratic nominee for the presidency in 1988.

Since 1991 he has been a distinguished professor of political science at Northeastern University in Boston, and since 1996 visiting professor of public policy during the winter quarter at UCLA in Los Angeles. He is chairman of Boston Global Forum.

He is married to the former Kitty Dickson. They have three children—John, Andrea and Kara—and eight grandchildren.

Professor Jose Barroso: Former President of EU

barroso

Jose Manuel Durao Barroso was President of the European Commission from 2004-14. He was previously Prime Minister of Portugal from 2002-04.

During his decade as President of the European Commission, Jose Manuel oversaw the fight against ebola; the political handling of climate change issues; the crises in the Ukraine and with the Eurozone as well as the EU’s 2012 triumph as winner of the Nobel Peace Prize. His voice is one of experience and breadth of knowledge, and his vision is informed, wide-ranging and steeped in kudos and a deep understanding of world affairs.

Jose Manuel left university and began a career in academia, employed in the Law department at the University of Lisbon, and in the Department of Political Science of the University of Geneva. He also worked as a visiting professor at the Department of Government and School of Foreign Service in Georgetown University in Washington, D.C. In 1995 he was appointed head of the international relations department of Lusiada at Lisbon University.

Embarking on a political career, Jose was elected President of the PSD Party in Portugal in 1999 and was subsequently re-elected three further times.

During that period, he served as Vice President of the European People’s Party, and then took up a position as Portuguese State Secretary for Foreign Affairs and Cooperation, where he was a primary player in the peace accords for Angola in Bicesse in 1991. When he was Minister for Foreign Affairs, he launched the talks with the Indonesian Minister of Foreign Affairs, under the auspices of the Secretary General of the United Nations, that ultimately led to the independence of East Timor.

Under Jose’s leadership, the PSD won the general election in 2002 and he was appointed Prime Minister of Portugal in April of that year. He remained in office until July 2004 when he was nominated by the European Council and elected by the European Parliament to the position of President of the European Commission.

Jose has been awarded many honorary degrees and has received over 60 decorations, prizes and honours. He has written and published widely on political science, international relations and the European Union.

Former President Vaira Vike-Freiberga: President of the Club of Madrid

Vaira-Vike

Dr. Vaira Vike-Freiberga has been the President of the World Leadership Aliance Club of Madrid since 2014  and is former President of Latvia (1999-2007). She was instrumental in achieving membership in the European Union and NATO for her country, and was Special Envoy on UN reform among her international activities. Since 2007, she is an oft invited speaker on social issues, moral values, and democracy. She was Vice-chair of the Reflection group on the long term future of Europe, and chaired the High-level group on freedom and pluralism of media in the EU.

Having left Latvia as a child refugee to Germany in 1945, then French Morocco and Canada, she earned a Ph.D. in psychology (1965) at McGill University. After a distinguished career as Professor at the University of Montreal, she returned to her native country in 1998 to head the Latvian Institute.A year later she was elected President by the Latvian Parliament and re-elected in 2003.

She is member of four Academies, and Board member or patron of 30 international organizations, including the Board of Thinkers of the Boston Global Forum. She has received many highest Orders of Merit, as well as medals and awards, for distinguished work in the humanities and social sciences. She has published 14 books and authored over 200 articles, book chapters, reports, and audiovisual materials.

Professor Joseph S. Nye

Joseph-Nye-319x400

Joseph S. Nye Jr., is an American political scientist  and former Dean of the John F. Kennedy School of Government at Harvard Univesity.He currently holds the position of  University Distinguished Service Professor.

He received his bachelor’s degree summa cum laude from Princeton University, did postgraduate work at Oxford University on a Rhodes Scholarship, and earned a PhD in political science from Harvard.

He has served as Assistant Secretary of Defense for International Security Affairs, Chair of the National Intelligence Council, and Deputy Under Secretary of State for Security Assistance, Science and Technology. Besides, he is a fellow of the American Academy of Arts & Sciences, The British Academy, and a member of the American Academy of Diplomacy.

The 2011 TRIP survey of over 1700 international relations scholars ranks Joe Nye as the sixth most influential scholar in the field of international relations in the past twenty years. In 2011, he was named by Foreign Policy magazine to its list of top global thinkers

He pioneered the theory of soft power, which is appeared in his book, Soft Power: The Means to Success in World Politics(2004).  He also published other books: Understanding International Conflict (5th edition, 2004); and The Power Game: A Washington Novel (2004), The Powers to Lead (2008) and The Future of Power (2011).

Professor Thomas E. Patterson
20150907090429-1-500x309

Thomas E. Patterson is Bradlee Professor of Government and the Press of Harvard Kennedy School and has served as the Acting Director of Shorenstein Center on Media, Politics, and Public Policy since July 1, 2015. His book, The Vanishing Voter, looks at the causes and consequences of electoral participation. His earlier book on the media’s political role, Out of Order, received the American Political Science Association’s Graber Award as the best book of the decade in political communication. His first book, The Unseeing Eye, was named by the American Association for Public Opinion Research as one of the 50 most influential books on public opinion in the past half century.

He also is author of Mass Media Election and two general American government texts: The American Democracy and We the People. His articles have appeared in Political Communication, Journal of Communication, and other academic journals, as well as in the popular press. His research has been funded by the Ford, Markle, Smith-Richardson, Pew, Knight, Carnegie, and National Science foundation.

Patterson received his PhD from the University of Minnesota in 1971.

Professor Koichi Hamada

Koichi Hamada, an advisor to Japan's Prime Minister Shinzo Abe, speaks during an event in Tokyo, Japan, on Wednesday, Sept. 4, 2013. Hamada said it was too early to know whether Japan's economy has turned the corner under the economic policies known as Abenomics. Photographer: Tomohiro Ohsumi/Bloomberg *** Local Caption *** Koichi Hamada

Koichi Hamada (浜田 宏一Hamada Kōichi, born 8 January 1936 in Tokyo[1]) is the Tuntex Professor Emeritus of Economics at Yale University, where he specializes in the Japanese economy and international economics. Hamada also serves as economic adviser to Japan’s Prime Minister Shinzo Abe and at one time was a contender to head the WTO.

He passed the National Law Bar Examination (Shihoshiken) of Japan in 1957, L.L.B. in 1958 from the University of Tokyo, his B.A. and M.A. in Economics at the University of Tokyo, 1960 and 1962 respectively, his M.A.and Ph.D. in Economics from Yale University in 1964 and 1965 respectively.

His fields of interest are: Labor economics, Macroeconomics, Applied Econometrics, School choice, The Black-White wealth gap, Wage determination, Economic links among relatives, Immigration, Changes in labor force quality. And his specialized fields of interest are Game Theoretic Approach to International Policy Coordination, Microfoundation of International Capital Movements, A Positive Analysis of the Emergence of International Economic Order, Effects of a Free Trade Area and Law and Economics in Japan.

Professor Derek Reveron.

Reveron-Derek-2014-photoDerek Reveron is a Professor of National Security Affairs and the EMC Informationist Chair at the U.S. Naval War College in Newport, R.I.

He is also a faculty affiliate at the Belfer Center for Science and International Affairs at Harvard University where he co-teaches a course on contemporary national security challenges at the Kennedy School.

He specializes in strategy development, non-state security challenges, and U.S. defense policy.

He has authored or edited nine books. The latest are China and Cybersecurity ( co-edited by Oxford University Press, 2015), US Foreign Policy and Defense Strategy (co-authored by Georgetown University Press, 2015), and Cyberspace and National Security (edited by Georgetown University Press, 2012).

In 2015, Governor Raimondo appointed him to the first-ever Rhode Island State Commission on Cybersecurity.

Professor John Savage

Hinh

Professor Savage is the An Wang Professor of Computer Science at Brown University. Professor Savage earned his PhD in Electrical Engineering at MIT in 1965 specializing in coding and information theory. He joined Bell Laboratories in 1965 and the faculty of the Division of Engineering at Brown in 1967. In 1979 he co-founded the Department of Computer Science and served as its second chair from 1985 to 1991. By the early 1970s his research interests changed to theoretical computer science. His current research interests are cybersecurity technology and policy, reliable computation with unreliable components, computational nanotechnology, efficient cache management on multicore chips, and I/O complexity. He is a Fellow of AAAS and ACM, a Life Fellow of IEEE, and a Guggenheim Fellow. He is a recipient of a Fulbright-Hays Research Award. He served as a Jefferson Science Fellow in the U.S. State Department during the 2009-2010 academic year. He is a Professorial Fellow of the EastWest Institute.

His professional service has included service on the editorial board of the Journal of Computer and Systems Sciences and as a member of the MIT Corporation Visiting Committee for the Department of Electrical Engineering and Computer Science from 1991-2002.

Professor Nazli Choucri

Nazli Choucri

Nazli Choucri is Professor of Political Science. Her work is in the area of international relations, most notably on sources and consequences of international conflict and violence. Professor Choucri is the architect and Director of the Global System for Sustainable Development (GSSD), a multi-lingual web-based knowledge networking system focusing on the multi-dimensionality of sustainability. As Principal Investigator of an MIT-Harvard multi-year project on Explorations in Cyber International Relations, she directed a multi-disciplinary and multi-method research initiative. She is Editor of the MIT Press Series on Global Environmental Accord and, formerly, General Editor of the International Political Science Review. She also previously served as the Associate Director of MIT’s Technology and Development Program.

The author of eleven books and over 120 articles, Dr. Choucri is a member of the European Academy of Sciences. She has been involved in research or advisory work for national and international agencies, and for a number of countries, notably Algeria, Canada, Colombia, Egypt, France, Germany, Greece, Honduras, Japan, Kuwait, Mexico, Pakistan, Qatar, Sudan, Switzerland, Syria, Tunisia, Turkey, United Arab Emirates and Yemen. She served two terms as President of the Scientific Advisory Committee of UNESCO’s Management of Social Transformation (MOST) Program.

Tsutomu Himeno, Japanese Consul-General in Boston

CGHimeno

Mr. Himeno served at the Embassies of Japan in the United Kingdom, Washington, D.C. and Singapore, at the Permanent Mission of Japan to the United Nations and Other International Organizations in Geneva, and, immediately prior to his appointment in Boston, as Deputy Permanent Representative and Minister of the Permanent Delegation of Japan to the Organisation for Economic Co-operation and Development (OECD) in Paris.

 Professor Sakakibara (Mr. Yen)

Eisuke Sakakibara

Dr. Sakakibara is a Professor of Aoyama-Gakuin University in Tokyo from 2010. Professor Sakakibara worked for the Ministry of Finance for more than 20 years, most notably as Vice Minister of Finance for International Affairs. He has broad and valuable experience in Government, especially in the area of international finance. He has shown superior ability in policy making and in consensus building among the international community, earning the sobriquet ‘Mr. Yen’ because of his influence over the currency markets.

He is renowned as a key advisor to The Democratic Party of Japan and very influential to Japanese government as a thought leader in Japan. Professor Sakakibara frequently appears on Japanese TV programs and he has also been quoted by The Economist, The Wall Street Journal, The Washington Post, The Nikkei, USA Today, Bloomberg/BusinessWeek, Forbes, BBC, CNBC as well as other leading media in the U.S., Japan, and Europe. He is also served as a President of Institute for Indian Economic Studies.

Prof. Sakakibara received a Ph.D. in economics from the University of Michigan. His expertise and ability as an economist in the area of international finance was enhanced through his experience as an economist in the IMF. He has served as Associate Professor of Economics, Institute for Policy Science, at Saitama University and Visiting Associate Professor of Economics, Economics Department, at Harvard University. He is the recipient of numerous awards, including the Taylor’s Award from the University of Michigan and the Bintang Mahaputra Utama from the Government of The Republic of Indonesia.

Professor Stephan Walt

Stephen Walt

Stephen M. Walt is the Robert and Renee Belfer Professor of International Affairs. He previously taught at Princeton University and the University of Chicago, where he served as Master of the Social Science Collegiate Division and Deputy Dean of Social Sciences. He has been a Resident Associate of the Carnegie Endowment for Peace and a Guest Scholar at the Brookings Institution, and he has also served as a consultant for the Institute of Defense Analyses, the Center for Naval Analyses, and the National Defense University. He presently serves on the editorial boards of Foreign Policy, Security Studies, International Relations, and Journal of Cold War Studies, and he also serves as Co-Editor of the Cornell Studies in Security Affairs, published by Cornell University Press. Additionally, he was elected as a Fellow in the American Academy of Arts and Sciences in May 2005.

Professor Walt is the author of The Origins of Alliances (1987), which received the 1988 Edgar S. Furniss National Security Book Award. He is also the author of Revolution and War (1996), Taming American Power: The Global Response to U.S. Primacy (2005), and, with co-author J.J. Mearsheimer, The Israel Lobby (2007).

Mr. Nguyen Anh Tuan

photo

Nguyen Anh Tuan was the Founder and Chairman of the VietNamNet Media Group and the Founder and Editor-in-Chief of VietNamNet Online Newspaper. Tuan was also the Founder and CEO of the VASC Software and Media Company and VietNet, the first Internet service provider in Vietnam.

In 1996,the Government of Vietnam named Tuan among the Top 10 Most Outstanding Young Talentsin the country.

Under Tuan’s leadership, VietNamNet raised significant political topics for reform in Vietnam. He pioneered an interactive live format called the VietNamNet Online Roundtable that allowed online viewers to participate in interviews of leading political, social and cultural figures as well as foreign dignitaries. In 2009, Tuan conceived a global initiative called the World Compassion and Reconciliation Day on September 9th of each year.

In 2007, as a Shorenstein Center’s Fellow, Tuan researched key trends in the development of electronic media in Vietnam.

In 2011, Tuan was a part of the Pacific Leadership Fellows Program at the School of International Relations and Pacific Studies at the University of California in San Diego. That year, he was also a speaker at the prestigious annual Club de Madrid Conference on the subject of Democracy and Digital Technology.

From February 2011 to July 2014 Tuan was an Associate of the Shorenstein Center on Media, Politics and Public Policy, John F. Kennedy School of Government, Harvard University.

Tuan is currently a Visiting Scholar of  College of Communication , Boston University in academic year 2014 – 2015.

In April 2012, Tuan  founded the Tran Nhan Tong Academy.

In December 2012, Tuan co-founded the Boston Global Forum with the Honorable Michael Dukakis who was Massachusetts Governor and U.S. Presidential candidate, and currently serving as member of its Chief Executive Board and Editor-in-Chief .

Also in 2012, together with Ambassador Swanee Hunt, Tuan established the Charles Ansbacher Music Club to bring classical music to people who live in remote and distant locations.

Tuan has been a member of Harvard Business School Global Advisory Board since 2008. He also serves on the Board of Trustees of the Free for All Concert Fund in Boston, and since July 2015 as Chair of International Advisory Committee of UCLA – UNESCO Chair on Global Citizenship Education.

Live on March 10th: Prof. Ezra Vogel to speak on Cyber-Security

Live on March 10th: Prof. Ezra Vogel to speak on Cyber-Security

  (March 10th, 2016) – Professor. Ezra Vogel, , the Henry Ford II Professor of the Social Sciences Emeritus at Harvard, a world-renown expert on East Asia and a member of The Boston Global Forum (BGF), will speak on Cyber-Security at a talk at 2:30 pm on March 10th at Harvard University.

image

His talk and listeners’ responses to it will be live-streamed at www.bostonglobalforum.org.
https://www.youtube.com/watch?v=tIbD6F2o1P4&feature=youtu.be


dukakis

The talk is one in the series of online dialogues leading up to the G7 Summit in Japan on May 26-27 as part of the BGF-G7 Summit Initiative

unnamed

Discussants are encouraged to send questions to [email protected]. Members of the Boston Global Forum’s Special Editorial Board will gather your insights and send them to the speaker.

 About Prof. Ezra Vogel

Ezra F. Vogel is the Henry Ford II Professor of the Social Sciences Emeritus at Harvard. After graduating from Ohio Wesleyan in 1950 and serving two years in the U.S. Army, he studied sociology in the Department of Social Relations at Harvard, receiving his Ph.D. in 1958. He then went to Japan for two years to study the Japanese language and conduct research interviews with middle-class families. In 1960-1961 he was assistant professor at Yale Universityand from 1961-1964 a post-doctoral fellow at Harvard, studying Chinese language and history. He remained at Harvard, becoming lecturer in 1964 and, in 1967, professor. He retired from teaching on June 30, 2000.

Vogel succeeded John Fairbank to become the second Director (1972-1977) of Harvard’s East Asian Research Center and Chairman of the Council for East Asian Studies (1977-1980). He was Director of the Program on U.S.-Japan Relations at the Center for International Affairs (1980-1987) and, since 1987, Honorary Director. He was Chairman of the undergraduate concentration in East Asian Studies from its inception in 1972 until 1991. He was Director
of the Fairbank Center (1995-1999) and the first Director of the Asia Center (1997-1999). Vogel was Chairman of the Harvard Committee to Welcome President Jiang Zemin (1998). He has also served as Co-director of the Asia Foundation Task Force on East Asian Policy Recommendations for the New Administration (2001).

Drawing on his original field work in Japan, he wrote Japan’s New Middle Class (1963). A book based on several years of interviewing and reading materials from China, Canton Under Communism (1969), won the Harvard University Press faculty book of the year award. The Japanese edition of his book Japan as Number One: Lessons for America (1979) is the all-time best-seller in Japan of non-fiction by a Western author. In Comeback (1988), he suggested things America might do to respond to the Japanese challenge. He spent eight months in 1987, at the invitation of the Guangdong Provincial Government, studying the economic and social progress of the province since it took the lead in pioneering economic reform in 1978. The results are reported in One Step Ahead in China: Guangdong Under Reform (1989). His Reischauer Lectures were published in The Four Little Dragons: The Spread of Industrialization in East Asia (1991). His most recent publication is Is Japan Still Number One? (2000). He has visited East Asia every summer since 1958 and has spent a total of over six years in Asia.

Vogel has received honorary degrees from Kwansei Gakuin (Japan), the Monterrey Institute, the Universities of Maryland, Massachusetts (Lowell), Wittenberg, Bowling Green, Albion, Ohio Wesleyan, Chinese University (Hong Kong) and Yamaguchi University (Japan). He received The Japan Foundation Prize in 1996 and the Japan Society Prize in 1998. He has lectured frequently in Asia, in both Chinese and Japanese.

From fall 1993 to fall 1995, Vogel took a two-year leave of absence from Harvard to serve as the National Intelligence Officer for East Asia at the National Intelligence Council in Washington. He directed the American Assembly on China in November 1996 and the Joint Chinese-American Assembly between China and the United States in 1998.