Blog Page 264

[Today in PD] Lessons From The World’s Most Tech-Savvy Government

People wave Estonian national flags during a concert in Tallinn, in August 2011. (Ints Kalnins/Reuters)

Lately, I have been getting a lot of questions about Healthcare.gov. People want to know why it cost between two and four times as much money to create a broken website than to build the original iPhone. It’s an excellent question. However, in my experience, understanding why a project went wrong tends to be far less valuable than understanding why a project went right. So, rather than explaining why paying anywhere between $300 million and $600 million to build the first iteration of Healthcare.gov was a bad idea, I would like to focus attention on a model for software-enabled government that works and could serve as a template for a more effective U.S. government.

Early in my career as a venture capitalist, we invested in Skype and I went on the board. One of the many interesting aspects of Skype was that it was based in Estonia, a small country with a difficult history. Over the centuries, Estonia has been invaded by many countries including Denmark, Sweden, Germany, and, most recently, the Soviet Union. Now independent but well aware of their past, the Estonian people are humble, pragmatic, and proud of their freedom, but dubious of overly optimistic forecasts. In some ways, they have the ideal culture for technology adoption: hopeful, yet appropriately skeptical.

 

Supported by this culture, the Estonian government has built the technology platform that everyone wishes we had here. To explain how they did it, I asked an Estonian and one of our Entrepreneurs in Residence, Sten Tamkivi, to tell the story. His response is below.

— Ben Horowitz, co-founder and partner of the venture capital firm Andreessen Horowitz

***

Estonia may not show up on Americans’ radar too often. It is a tiny country in northeastern Europe, just next to Finland. It has the territory of the Netherlands, but 13 times less people—its 1.3 million inhabitants is comparable to Hawaii’s population. As a friend from India recently quipped, “What is there to govern?”

What makes this tiny country interesting in terms of governance is not just that the people can elect their parliament online or get tax overpayments back within two days of filing their returns. It is also that this level of service for citizens is not the result of the government building a few websites. Instead, Estonians started by redesigning their entire information infrastructure from the ground up with openness, privacy, security, and ‘future-proofing’ in mind.

The first building block of e-government is telling citizens apart. This sounds blatantly obvious, but alternating between referring to a person by his social security number, taxpayer number, and other identifiers doesn’t cut it. Estonia uses a simple, unique ID methodology across all systems, from paper passports to bank records to government offices and hospitals. A citizen with the personal ID code 37501011234 is a male born in the 20th century (3) in year ’75 on January 1 as the 123rd baby of that day. The number ends with a computational checksum to easily detect typos.

For these identified citizens to transact with each other, Estonia passed the Digital Signatures Act in 2000. The state standardized a national Public Key Infrastructure (PKI), which binds citizen identities to their cryptographic keys, and now doesn’t care if any Tiit and Toivo (to use common Estonian names) sign a contract in electronic form with certificates or plain ink on paper. A signature is a signature in the eyes of the law.

Estonian Prime Minister Andrus Ansip signs an e-services agreement. (Government of Estonia)

As a quirky side effect, this foundational law also forced all decentralized government systems to become digital “by market demand.” No part of the Estonian government can turn down a citizen’s digitally signed document and demand a paper copy instead. As citizens opt for convenience, bureaucrats see a higher inflow of digital forms and are self-motivated to invest in systems that will help them manage the process. Yet a social worker in a small village can still provide the same service with no big investment by handling the small number of digitally signed email attachments the office receives.

To prevent this system from becoming obsolete in the future, the law did not lock in the technical nuances of digital signatures. In fact, implementation has been changing over time. Initially, Estonia put a microchip in the traditional ID cards issued to every citizen for identification and domestic travel inside the European Union. The chip carries two certificates: one for legal signatures and the other for authentication when using a website or service that recognizes the government’s identification system (online banking, for example). Every person over 15 is required to have an ID card, and there are now over 1.2 million active cards. That’s close to 100-percent penetration of the population.

As mobile adoption in Estonia rapidly approached the current 144 percent (the third-highest in Europe), digital signatures adapted too. Instead of carrying a smartcard reader with their computer, Estonians can now get a Mobile ID-enabled SIM card from their telecommunications operator. Without installing any additional hardware or software, they can access secure systems and affix their signatures by simply typing PIN codes on their mobile phone.

As of this writing, between ID cards and mobile phones, more than a million Estonians have authenticated 230 million times and given 140 million legally binding signatures. Besides the now-daily usage of this technology for commercial contracts and bank transactions, the most high-profile use case has been elections. Since becoming the first country in the world to allow online voting nationwide in 2005, Estonia has used the system for both parliamentary and European Parliament elections. During parliamentary elections in 2011, online voting accounted for 24 percent of all votes. (Citizens voted from 105 countries in total; I submitted my vote from California.)

To accelerate innovation, the state tendered building and securing the digital signature-certificate systems to private parties, namely a consortium led by local banks and telecoms. And that’s not where the public-private partnerships end: Public and private players can access the same data-exchange system (dubbed X-Road), enabling truly integrated e-services.

A prime example is the income-tax declarations Estonians “fill” out. Quote marks are appropriate here, because when an average Estonian opens the submission form once a year, it usually looks more like a review wizard: “next – next – next – submit.” This is because data has been moving throughout the year. When employers report employment taxes every month, their data entries are linked to people’s tax records too. Charitable donations reported by non-profits are recorded as deductions for the giver in the same fashion. Tax deductions on mortgages are registered from data interchange with commercial banks. And so forth. Not only is the income-tax rate in the country a flat 21 percent, but Estonians get tax overpayments put back on their bank accounts (digitally transferred, of course) within two days of submitting their forms.

This liquid movement of data between systems relies on a fundamental principle to protect people’s privacy: Without question, it is always the citizen who owns his or her data and retains the right to control access to that data. For example, in the case of fully digital health records and prescriptions, people can granularly assign access rights to the general practitioners and specialized doctors of their choosing. And in scenarios where they can’t legally block the state from seeing their information, as with Estonian e-policemen using real-time terminals, they at least get a record of who accessed their data and when. If an honest citizen learns that an official has been snooping on them without a valid reason, the person can file an inquiry and get the official fired.

Moving everything online does generate security risks on not just a personal level, but also a systematic and national level. Estonia, for instance, was the target of The Cyberwar of 2007, when well-coordinated botnet attacks following some political street riots targeted government, media, and financial sites and effectively cut the country off from Internet connections with the rest of the world for several hours. Since then, however, Estonia has become the home of NATO Cooperative Cyber Defence Centre of Excellence and Estonian President Toomas Hendrik Ilves has become one of the most vocal cybersecurity advocates on the world stage.

There is also a flip-side to the fully digitized nature of the Republic of Estonia: having the bureaucratic machine of a country humming in the cloud increases the economic cost of a potential physical assault on the state. Rather than ceasing to operating in the event of an invasion, the government could boot up a backup replica of the digital state and host it in some other friendly European territory. Government officials would be quickly re-elected, important decisions made, documents issued, business and property records maintained, births and deaths registered, and even taxes filed by those citizens who still had access to the Internet.

The Estonian story is certainly special. The country achieved re-independence after 50 unfortunate years of Soviet occupation in 1991, having missed much of the technological progress made by the Western world in the 1960s, ’70s, and ’80s. -’80s, including checkbooks and mainframe computers. Nevertheless, the country jumped right on the mid-’90s bandwagon of TCP/IP-enabled web apps. During this social reset, Estonians also decided to throw their former communist leaders overboard and elect new leadership, often ministers in their late-20s capable of disruptive thinking.

But then again, all this was 20 years ago. Estonia has by many macroeconomic and political standards become a “boring European state,” stable and predictable, if still racing to close the gap with Old Europe from its time behind the Iron Curtain. Still, Estonia is a start-up country—not just by life stage, but by mindset.

And this is what United States, along with many other countries struggling to get the Internet, could learn from Estonia: the mindset. The willingness to get the key infrastructure right and continuously re-invent it. Before you build a health-insurance site, you need to look at what key components must exist for such a service to function optimally: signatures, transactions, legal frameworks, and the like.

Ultimately, the states that create these kinds of environments will be best positioned to attract the world’s increasingly mobile citizens.

[Today in PD] Public Diplomacy And The State Of The Union

President Obama delivering the State of the Union address, Feb. 12, 2013. Credit: WhiteHouse.gov

A State of the Union address is always a major public diplomacy moment. Rarely do you have the full attention of the entire world to tell every listener, watcher and tweeter, what exactly your current policy priorities are.

For 2014, it is likely that President Obama will focus on domestic and international topics that are high up on America’s agenda and he is likely to stress that if Congress remains intransigent, he, the President, will have to use his Executive powers to make things happen in 2014 on the following issues:

  • Income Inequality

 

  • Climate Change and Clean Energy

 

  • Reigning in chemical and nuclear weapons

 

  • Winding down costly wars

 

  • Transparency in the national security agency

 

  • Immigration reform

The president is likely to take credit, rightly so, for progress on removing chemical weapons from Syria, progress on a nuclear deal with Iran, and a strong push for peace in the Middle East. But he will also have to acknowledge that the world is pretty messy right now from violent protests from Kiev to Cairo, and that American leadership remains critical to bringing about a more peaceful 2014.

About these ads

div { margin-top: 1em; } #google_ads_div_wpcom_below_post_adsafe_ad_container { display: block !important; }
]]>

What is Bitcoin?

This video is a short animated introduction to Bitcoin, made possible with donations from the Bitcoin community.

We’d like to thank:
– Donators for the Bitcoin Animated Movie Bounty
– Bitcoin users and miners around the world
– Everyone from #bitcoin-dev and #bitcoin-otc on Freenode for help with the technical side and history of Bitcoin
– Gavin Andresen, Mike Hearn for reviewing the script
– Greg, Steve, Dan and Jasmin who provided their professional help and insights for free
– All of our friends, family and random strangers who took the time to read the script and provide feedback

Credits:
Voice – Chris Rice (www.ricevoice.com)
Motion Graphics – Fabian Rühle (fabianruehle.tumblr.com)
Music/Sound Design – Christian Barth (www.akkord-arbeiter.de)
Production – Stefan Thomas

 

 

New Immigration Restrictions Threaten Hong Kong as Business Hub

People proceed to an immigration checkpoint at a border crossing point with mainland China in Hong Kong on March 1, 2013. New visa regulations that go into effect on Sept. 1 will make crossing from Hong Kong to the mainland less convenient for foreign business people. (Philippe Lopez/AFP/Getty Images)

The People’s Republic of China will adopt a new immigration law on Sept. 1, which will affect Hong Kong’s usefulness as an international hub for business. European and American businessmen have been able to enter mainland China with minimal fuss regarding their visas, but the change will make this process more difficult.

The Chinese-language broadcast of Deutsche Welle reported that the stricter visa immigration law will result in a longer visa processing time and a shorter stay on the mainland for foreigners.

German business people in Hong Kong have complained that the quick and simple expedited visa has already been canceled, and the red tape has affected them.

According to reports by mainland media outlets, the new law will add an additional four categories, plus introduce changes in visa application, extension, and renewal.

A human biometric visa system, which will store data on foreign visitors including fingerprints, photos of the face, and other biological information, will be used to verify the identities of visa holders.

The new law stresses the importance for certification of the visa invitation and the candidate’s interview.

Hong Kong has been a convenient transit point into China for North American and European business people, as they could previously stay in Hong Kong for up to 90 days without a visa, and apply for a six-month or one-year stay on the mainland.

As the new law goes into effect, foreign visitors will find it difficult to transit through Hong Kong as a short cut to China.

The German Focus Magazine reported on a German businessman who had previously planned to go to Shanghai for an exhibition. The original plan called for a 10-day stay in China, and from previous experiences he expected the transit from Hong Kong to Shanghai would only take one day.

However, the new law forced him to wait for six days in Hong Kong, and in the end he was only able to spend three days in China.

The European Chamber of Commerce in Beijing cites this as another example of the vagaries of the legal system of China, with the results being inconvenience to foreign business people.

Translation by Michelle Tsun. Written in English by Christine Ford.

By Sun Yun, Epoch Times | August 9, 2013

Last Updated: August 9, 2013 4:05 pm

Ireland Seeks to Strengthen Ties with Diaspora

By Henry Stanek | Henry Stanek | December 5, 2013

Small Irish village (photo credit: Irish Jaunt)

 

Moneygall Ireland is an unassuming village of just over 350 in County Offaly, Ireland. Since 2011, however, the blink-and-you-miss-it town on the R445 between Dublin and Limerick has become infamous across the country as the birthplace of U.S. President Barack Obama’s maternal great-great-great grandfather. The anecdotal story that made headlines around the world perfectly encapsulates the improbable cultural and political clout of a country that for most of its history has .

President Obama’s story isn’t an isolated case. The best estimates put the Irish diaspora at some 70 million. Obama can thank his Irish connection, Falmouth Kearney, who arrived in the U.S. in the 1850s fleeing the potato famine, for an astounding 28 living relatives. In the 2008 census, over 36 million Americans reported Irish ancestry and the number is almost certainly only a fraction of the total number of Americans that can trace back their families to Ireland. Beyond the U.S. Irish also migrated en masse towards many other Anglophone countries, giving birth to large Irish communities in the U.K., Canada, Australia and New Zealand among others.

Due to its unique history as a country of mass emigration, the Irish are becoming increasingly keen on retracing the paths taken by their ancestors as they left their native land to try their luck abroad. It was not an expert, but a rural parish priest who made the presidential genealogical breakthrough back in 2008 when Obama was still battling with Hillary Clinton for the Democratic nomination. For millions of others, their Irish heritage may be well known, but tracing it back to living relatives in Ireland is a daunting task.

Since 2010, volunteers across all of Ireland’s 32 counties have been working together to reconnect with their own relatives in the global diaspora under the auspices of Ireland Reaching Out (IrelandXO). Founded by Irish Independent columnist and economist David McWilliam in 2010, the goal of the non-profit organisation is simple: instead of waiting for Irish descendants abroad to find their roots, why not reach out to them.

The project consists of a country-wide network of volunteers that are grouped around local parishes. Local volunteers provide help and orientation for visitors descended from those who emigrated from the area themselves actively seek out those descendants. While the program has noble goals, it also hopes to produce more tangible benefits for the country by tapping into the economic potential of the Irish diaspora.

IrelandXO has facilitated the contact of tens of thousands of Irish descendants around the world and has brought 9,000 visitors to Ireland in the first eight months of this year alone. The economic potential is all the more vital, because may emigrants cam from rural communities, which are now struggling to exist as more and more youngsters leave for better opportunities in the country’s urban centres. Beyond tourism dollars, the diaspora, it is hoped, can also play an essential role in booting the small island nation’s political influence abroad, particularly with its powerful Anglophone cousins.

President Obama has struck up something of an unlikely relationship with his Irish cousin Henry Healy after a 2011 photo-op when the president visited his ancestral village while on a whirlwind trip of Europe. The Moneygall native, who has since become the public face of the Ireland Reaching Out, has met with America’s First Family several times since 2011, even given VIP treatment during Obama’s second inauguration last year. Seemingly innocuous, these ancestral relations can have a powerful effect on the country’s political clout abroad. Almost a quarter of America’s presidents could claim Irish roots.

The project has even spawned a popular bilingual television series, Tar Abhaile (Come Home), which airs on TG4 and follows local Irish communities as they welcome their Irish descendants from across the globe. The show, which began airing last month, follows 12 different Irish descendants and their families, from the U.S., Canada, Australia, New Zealand and the UK, as they travel to Ireland to reconnect with their Irish ancestors.

http://www.theepochtimes.com/n3/blog/ireland-seeks-to-strengthen-with-diaspora/

Internet: from digital diplomacy to cyber warfare

Gennady Yevstafiev, Retired Lieutenant General of the Russian Foreign Intelligence Service, talks on the evolution of the Internet from a social networking platform to an international cyber-battlefield

It is not already a fancy chiller but it something of a practical nature. And we are more and more getting involved into the wars of the 21st century, and those wars slowly but surely are moving to outer space and cyber space. Of course Internet is still operating and it has not been broken but there is already a danger, numerous dangers I would say. Of course most of the people think these are the dangers of economic crimes. That’s true, it is very important but it is nothing new. The danger lays more and more in the field of protection of the users of personal data and this protection is inefficient still. And I would say that people in Russia are yet to understand that many people using American network sites are at very big risk because through these network sites a lot of information is leaked out of Russia and not only to the US but also to the data processing centers in developing countries.

We are witnessing very complicated viral attacks. Such viruses are the Flame which were mostly aimed at collecting secret data and information, and scanning and monitoring the social networks are complemented by extremely dangerous viruses like the Stuxnet and Duqu which are aggressive viruses, which destroy certain governmental, but not only governmental but also private information systems and put the operation of certain entities into a complete chaos. And so we are facing a very dangerous situation.

Photo: EPA

Download audio file

But the Americans are saying – no, we are not going to excuse for using the cyber space for international politics. They say that we want to make the diplomacy digital, and that means it should be digital and contemporary, and effective. And it is one of the greatest tasks of American diplomacy – we are fighting the censorship, we are not trying to achieve hidden purposes and we want to allow people around the world freely communicate with each other. So, that’s what we have and they consider that digital diplomacy is one of the major and the most effective instrument of American foreign policy. And in Russian foreign affairs they call this digital diplomacy the new method of colonial activity.

So, you see the real extremely serious differences around the whole thing. And of course some naïve people who are using the social networks, they believe that everything is ok, very good and safe. But I would like to mention the American reports that in the CIA there is a special unit which every day monitors up to 5 million settings in Twitter, and then on Facebook and other social networks. They analyze them and they are considered to be a very important source of information for the American state institutions, and especially for the military units of the American Army which are collecting information about possible rivals about the real state of affairs in particular countries. And I would say what you’ve mentioned is nothing new because it appeared last year.

And I think 2011 was a crucial year because the American Government has undertaken a new doctrine of cyber information security and it was adopted by the Obama Government. And this Obama Government immediately developed it into a very sophisticated and broad system of approaches because this Mr. Howard Schmidt – the assistant of Obama Government on cyber security – insisted that it is extremely important for the American Government to sophisticate and develop and to be an undisputed leader in the field of controlling the cyber space. It was in July last year, and I think in August last year Pentagon immediately produced its own doctrine of controlling cyber space and it has been a really very sophisticated idea because it is called the Social Media in Strategic Communication (SMISC) and it is at the moment the governing doctrine of the Pentagon in the cyber space. You know, the focuses are made exclusively on the control and monitoring of social services.

On the other hand it is funny when some other countries are trying to buy some technological gadgets for the same purpose, they are trying to really prosecute them. For example there is an investigation case of the so called Bluetooth systems Sunnyvale of California which was trying, and I think sold some equipment to Syria. And it has been prosecuted because it was found that they worked against the interests of the state. So, the idea is to control the cyber space. And I think the further development is clearly underlined by a creation in Germany of the center to fight the cyber threats which is aimed at exposing, monitoring and taking measures against the threats in the field of cyber security.

The problem here is very serious because in 2001 American Administration under Mr. Bush has confirmed the previous decision of Mr. Nixon about War Powers Resolution, after 911, and they are now operating on the basis of this War Powers Resolution, Obama has accepted the idea. And the idea is that any attack on the US by whatever groups – governmental or private terrorist group – in the cyber field, any attack on the American military installations and Pentagon or governmental installations is considered to be an attack on the security of the US and could be responded with all the might of the US including the weapons of mass destruction, including the nuclear arms.

So, having said that they really don’t care about the way they are performing. And the problem is – in the field of cyber space it is very difficult to identify the source of attack. And as it stands now, maybe in the future it will be a different thing, but as it stands now they are trying to cover themselves with the idea that nobody will find the source of the state attack which Americans are trying to perform because everybody is really sure that attacks on Iran, Stuxnet, Duqu and Flame are originating from the efforts of American-Israeli state sources.

So, in this sense we are facing a tremendously dangerous situation which is quickly arriving to the international arena and we should be trying to stop it because it could become too late. And when people claim that they would fight for freedom and security of the United States including Internet with the means which go beyond the framework of Internet, that is something which is getting very dangerous. And for example the head of the Joint Chiefs of Staff Admiral Michael Chertoff, he said that though the definition of the source of a cyber attack is an extremely difficult issue, nevertheless they are going to respond to this cyber attack with any possible means.

And of course we understand the Americans because people say that for example hacker attacks on the American military Pentagon institutions led to the leakage of 24 000 important from the military point of view files and what is happening is exposing the American foreign policy. And we know, even the WikiLeaks is something which is extremely devastating to some of the American claims about the purposes and aims of their foreign policy.

You know, the Deputy Foreign Minister of the US, there is some Mr. William III, he is really handling the issue, he said that the US would consider the cyber space as a potential battlefield. This comes from the American defense strategy for operating in the cyber space which I’ve mentioned before, it is really absolutely the same idea of considering the cyber space as the battlefield in the field of international affairs. The Americans being in the lead on the technological side are trying to use Internet to their own interests. The worry of the people in the field of Internet being used for political purposes and military purposes by the American side is in the minds of very important countries. For example China, Russia and some others have proposed international code of conduct for information security.

[Today in PD] How A Colombian Internet Address Became The Online Home For Startups

This item has been corrected.

In less than four years, more than 1.6 million individuals and businesses, mostly start-ups, have created a website with an address ending with .co. That is a staggering number for a new top-level domain (the last bit of a web address). Contrast that with .biz, which was introduced in 2000 and by April last year had chalked up just 2.4 million registrations.

People went to .co because, on .com, with over 111 million registrations, the short, simple names are mostly taken. They went also because .co is one letter shorter than .com, which matters in the age of Twitter. But most of all, they went because some very canny marketing convinced them that it’s where sexy, innovative start-ups go.

Of course, .co is not a new top-level domain like the 1,000 or more being introduced this year; it’s the one that was assigned in 1991 to Colombia. Juan Diego Calle, a Colombian-American entrepreneur, won the contract to run it in 2009, after years of effort and a 1,165-page bid. In exchange for exclusive rights to market .co, Calle pays a fee to the Colombian government that goes towards improving the country’s internet infrastructure.

How to market a two-letter product

But Calle then had to convince the world that .co was worth buying. A .com address is recognizable; it has some degree of legitimacy. Newer entrants such as .name, .jobs, and .travel have steadfastly refused to take off. To gain traction, Calle decided to target the ample supply of tech start-ups.

Two factors made .co successful. One was what Calle calls “brand protection.” When new domains launch, professional domain-buyers pick up hundreds of common nouns. Less scrupulous ones also buy trademarked names to try to sell to the trademarks’ owners. Calle wanted big companies to be sure that .co was professionally managed, so he reserved and gave away for free domain names to tech companies and to businesses like American Express. “That generated a lot of goodwill,” says Calle. Big brands have since adopted .co with gusto: Twitter’s Biz Stone used it for his new service Jelly; Jelly.com belongs to a food company.

The second factor was getting the tech industry on board. Calle gave away domains to big firms such as Twitter, which now uses t.co as a URL shortener. AngelList, a website where start-ups meet investors, also picked up a .co domain, giving it legitimacy in the eyes of the start-ups that frequent it. Calle says the fact that .co was a start-up itself lent credence to the notion that it understood other startups. To add to that credence, he started the “.co membership program,” which gives its customers free passes to conferences and connections to other start-ups and investors.

Calle’s success with .co holds a lesson for other companies entering the domain-name business this year. Web addresses ending in everything from .ninja and .guru to .web and .xyz will soon be available. If Calle’s experience is anything to go by, extra services and fancy packaging will be just as important to customers as a snazzy name. These services could include web hosting, email, and help with building webpages, as well as building and nurturing a community of like-minded companies. On its own, a domain name is just an empty piece of land. But build an office block with an efficient mailroom, support staff, and a program of business services, and the value shoots up.

Correction (Sept. 15, 2013): An earlier version of this article incorrectly stated that Google received g.co for free. In fact, Google paid for it.

Reset in digital format *text from 2011*

Alec Ross, the Senior Adviser for Innovation to the US State Secretary Hillary Clinton, is due on an official visit to Moscow later this week to put the dialogue with Moscow back on track. Experts believe that the seemingly peaceful State Department methods violate the principles of other countries’ national security.

Alec Ross, the Senior Adviser for Innovation to the US State Secretary Hillary Clinton, is due on an official visit to Moscow later this week to put the dialogue with Moscow back on track. Experts believe that the seemingly peaceful State Department methods violate the principles of other countries’ national security.

The main innovation that Ross is in charge of is the so-called digital or Internet diplomacy. Today, it is almost exclusively via the Internet that propaganda is being made as against via traditional mass media in the past. The State Department alone boasts more than 200 Facebook pages and almost 100 Twitter microblogs. Alec Ross is, besides, responsible for the introduction of new technologies into US embassy performance abroad. It is on his suggestion that new posts have been ushered in, in the US embassies, says an expert in competitive intelligence Andrei Mosalovich in an interview with the Voice of Russia, and elaborates.

“Many embassies, Andrei Mosalovich says, have now got the new post of a digital diplomacy counselor. Alec Ross’s visit is not just a one-off trip, but a component of a US targeted strategy that can’t help but cause apprehension. All this amounts to improving the developed countries’ instruments of interference in the affairs of developing nations.”

Alec Ross said earlier that he was going to Moscow to meet Russian officials, diplomats and University students (he is due to deliver a number of public lectures), in other words, he is going to Moscow not to offer excuses, but to explain. But it is precisely the freedom of expression that played the key role in the course of what came to be known as the ‘Arab Spring’. The Deputy Assistant to the NATO Secretary-General, Stephanie Babst, said recently that Facebook boasting 2 million subscribers who communicate in 70 languages worldwide, as well as other social networks are a convenient instrument in addition to the traditional methods of informing and mobilizing the public. In this context Anton Korobkov-Zemliansky, a member of the Russian Public Chamber, says that the concept of digital diplomacy may pose a direct threat to national sovereignty. Here’s more from Anton Korobkov-Zemliansky.

“The promotion of democracy via the Internet is something relative, Anton Korobkov-Zemliansky said. We have only recently borne witness to what was happening in Egypt and other countries when provocateurs used social networks and blogs to foment internal conflicts.”

Notably, the United States is preaching democracy on the web, while often using non-democratic methods to limit it at home, Anton Korobkov-Zemliansky says, and elaborates.

“The WikiLeaks story is quite indicative in that context, Anton Korobkov-Zemliansky says. On the one hand, the freedom of speech and universal openness are proclaimed, while on the other, WikiLeaks comes under attack, Julian Assange’s bank accounts have been blocked, efforts are being made to block the website, Assange’s private correspondence has been cracked etc.”

Another digital brainchild of the US State Department is the so-called shadow Internet. The system that the Pentagon has helped to create makes it possible for dissenters in different countries to exchange information in circumvention of the local censure mechanisms. Experts admit that the Alec Ross mission to Moscow is important as a “reset” element, whatever the apprehensions. One visit may prove insufficient to change the positions of Russia and the United States. But it was only recently that the two countries chose to avoid discussions completely.

The Voice of Russia on Hillary Clinton’s Senior Adviser for Innovation Alec Ross’s forthcoming visit to Moscow.

‘Ping-pong diplomacy’ pioneer Zhuang Zedong dies

Table tennis legend Zhuang Zedong, a key figure in 1971’s ‘ping-pong’ diplomacy that helped foster relations between communist China and the US during heightened Cold War tensions, has died.

Zhuang passed away Sunday at the age of 72, the Xinhua news agency reported. He had been battling cancer since 2008.

The three-time world table tennis champion was famous for presenting a painting of the Huangshang Mountains to American player Glen Cowan in 1971. His gift led to a US tour of China later that year, and preceded the historic visit of President Richard Nixon to communist China in 1972.

Bildnummer: 12767194 Datum: 10.02.2013 Copyright: imago/Xinhua
(130210) -- BEIJING, Feb. 10, 2013 (Xinhua) -- In this file photo taken on April 9, 1961, Zhuang Zedong (R) competes in the men s team finals of the 26th World Table Tennis Championship in Beijing, capital of China. Zhuang Zedong, a former Chinese table tennis player known for his participation in Sino-U.S. Ping-Pong Diplomacy in the 1970s, died at the age of 73 in Beijing on Feb. 10, 2013. (Xinhua/Zhang Hesong) (lmm) CHINA-BEIJING-TABLE TENNIS-PING-PONG DIPLOMACY-ZHUANG ZEDONG-DEATH (CN) PUBLICATIONxNOTxINxCHN ; Tischtennis x2x xmb 2013 quer 
Image number 12767194 date 10 02 2013 Copyright imago Xinhua Beijing Feb 10 2013 Xinhua in This file Photo ON April 9 1961 Zhuang Zedong r Compet in The Men s team Finals of The 26th World Table Tennis Championship in Beijing Capital of China Zhuang Zedong A Former Chinese Table Tennis Player for His participation in Sino u s Ping Pong Diplomacy in The 1970s died AT The Age of 73 in Beijing ON Feb 10 2013 Xinhua Zhang lmm China Beijing Table Tennis Ping Pong Diplomacy Zhuang Zedong Death CN PUBLICATIONxNOTxINxCHN Table Tennis x2x xmb 2013 horizontal

The event, which created an international sensation at the time, coined the phrase “ping-pong diplomacy.”

Cowan and Zhuang’s inadvertent role in global affairs occurred when the American was given a ride on the Chinese team’s bus after missing his lift while competing in Nogoya, Japan.

After the two were photographed together, Chinese leader Mao Zedong invited the US team to his country. The next year, Nixon became the first American president to visit the People’s Republic of China. The breakthrough led to improved relations between the US and China, which had been rocky since 1949, and eventually led to the establishment of diplomatic ties in 1979.

Zhuang, a national hero with millions of fans, was world champion in 1961, 1963 and 1965.

He was a favorite of Mao’s wife, Jiang Qing, a member of the Gang of Four, a political faction that rose to prominence during the 1966-76 Cultural Revolution. Jiang appointed Zhuang to a number of political posts in the sports ministry.

After the Gang was deposed and Mao died in 1976, Zhuang was imprisoned before being released and going on to coach provincial table tennis. He returned to Beijing in 1985 and coached youth players for several years.

Zhuang was married twice and had one daughter.

dr/hc (AFP, AP, dpa)

http://www.dw.de/ping-pong-diplomacy-pioneer-zhuang-zedong-dies/a-16589574

GORAN TEŠIĆ: JAVNA DIPLOMATIJA, MEKA SILA I BIG DATA

četvrtak, 21 novembar 2013 13:38

Javna i digitalna diplomatija i korišćenje Big data u funkciji meke sile predstavljaju danas važne instrumente u borbi za uticaj u svetu
U poslednje vreme u javnom društveno-političkom životu pojavljuju se termini kao što su javna diplomatija i meka sila. Da vidimo šta se krije iza njih.

JAVNA DIPLOMATIJA I MEKA SILA Javna diplomatija se razlikuje od tradicionalne po tome što se tradicionalna diplomatija sprovodi posredstvom ljudi koji imaju profesiju kao što su diplomate, političari i obaveštajci, dok u slučaju javne diplomatije jedna država utiče na drugu preko pojedinih instrumenata društva te druge države da vodi politiku u željenom pravcu, pri čemu ljudi koji se bave tim poslovima ne pripadaju obavezno pomenutom krugu profesionalnih diplomata, političara ili obaveštajaca. U te instrumente, uopšteno govoreći, spadaju elementi nevladinog sektora, kao što su registrovane i neregistrovane nevladine organizacije, udruženja građana i pojedinci.

Sam termin „javna diplomatija“ predložio je 1965. godine američki diplomata Edmund Galion, dekan Flečerove škole prava i diplomatije pri Taft Univerzitetu. On je javnu diplomatiju smatrao eufemizmom za propagandu. U ruskom jeziku termin propaganda nema negativno značenje, dok u engleskom ima, i podrazumeva laž i nepoštenu komunikaciju. Javna diplomatija se kao termin odnosi prema propagandi kao što se termin obaveštajac odnosi prema špijunu – to jest naši su obaveštajci, a strani su špijuni.

Termin javna diplomatija se najviše koristio za vreme hladnog rata, da bi po njegovom završetku više počeo da se koristi termin – meka sila (soft power). Autor termina meka sila je Džozef Naj sa Harvardskog univerziteta, koji je bio i član administracije Bila Klintona. Neki svrstavaju Naja u najuticajniju petorku politikologa 20. veka. Prema Naju, meka sila je sposobnost dostizanja svojih ciljeva uz pomoć privlačnosti, a ne putem prinude, tojest da drugi rade kako ti hoćeš, a ti ih ne prinuđuješ na to (vojno, ekonomski). Ali to ne znači da ta strategija nije povezana sa novcem. Bogatije zemlje raspolažu većom mekom silom. Iz ovoga je očigledno da su javna diplomatija i meka sila komplementarne.

Danas se govori o „novoj javnoj diplomatiji“, koja uzima u obzir sve promene koje su se desile krajem 20. i početkom 21. veka, a tu spadaju:

1) Promene u globalnom komunikacionom kontekstu – pojava satelitske televizije, kanala Al Džazira, interneta. Proizvodnja informacija je praktično postala svima dostupna, a ne samo specijalizovanim informativnim kućama. Tako se, na primer, za vreme rata u Iraku, u trenucima napada na Bagdad, u gradu nalazio bloger koji je širio vesti o tome šta se dešava na licu mesta. Pratilo ga je oko hiljadu čitalaca, a on je posle svega postao kolumnista lista Gardijan. Iz toga vidimo da se sve više gubi razlika između profesionalnih novinara i blogera. To je sve išlo u korist promena u globalnim međunarodnim komunikacijama. Šta je to značilo za javnu diplomatiju? Devedesetih godina prošlog veka bilo je neophodno da se bude velika država da bi se širile informacije – da bi se povećavao tiraž štampanog materijala, da bi se jačali signali radio i televizijskih stanica. Danas to nije potrebno. Dovoljno je imati računar sa osnovnom pratećom opremom i možete postavljati video snimke na Jutjub. U tom horu narodnih glasova države moraju da se bore da budu u prvom informativnom planu;

2) Promene u svetskom političkom kontekstu – pojava raznih NVO, alternativnih pokreta i terorističkih grupa koje su i ranije postojale, ali sada ih ima neuporedivo više i imaju nove komunikacione kanale za izražavanje svojih stavova, što dovodi do toga da oni koji su do sada imali monopol nad proizvodnjom informacija ne samo da treba da se staraju kako će da ih publikuju već treba i da slušaju odgovor onih kojima su ih uputili i da posmatraju šta oni konkretno rade;

3) Uloga nevladinih organizacija i orijentacija na meku silu – ciljevi javne diplomatije su se izmenili tako da pored ideološke komponente, koja je dominirala u ranijem hladnoratovskom periodu, pojavili su se i drugi parametri. Prema Džozefu Naju, meku silu čine tri glavne komponente: politička dejstva, kultura i vrednosti. Efekti koji se postižu dejstvom po ovim komponentama sa razlikuju po vremenu. Posmatrajući politička dejstva, uzmimo na primer spoljnu politiku. Ona može da se izmeni za nekoliko godina. Kultura može da se promeni za nekoliko decenija, a vrednosti mogu da se promene na rasponu života nekoliko generacija. Kada se drugim državama i društvima govori o nečijim vrednostima, to ne može da bude kratkoročni projekat. Nije dovoljno prikazivanje jednog filma da bi se drugima predstavio nečiji sistem vrednosti. Radi se o dugoročnom projektu koji treba da se odvija u fazama, gde treba da postoje konkretni zadaci na kojima rade timovi specijalista. Ako je reč o kulturi, neophodno je organizovati izložbe, koncerte i slično;

4) Brendiranje država – radi se o koncepciji koja dolazi iz sfere marketinga prema kojoj je država „brend“. Ovde postaju važne stvari poput popularnosti turizma, investiciona privlačnost i slično, a veliku ulogu igraju biznis i poslovni kontakti.

Na osnovu svega ovoga možemo zaključiti da javna diplomatija nije samo propaganda već mnogo više od toga i da njen značaj sve više raste.

KO SE BAVI JAVNOM DIPLOMATIJOM? Javnom dimplomatijom se praktično bave svi oni koji učestvuju u međunarodnoj komunikaciji. Pre svih tu je, naravno, sama država koja se bavi spoljnom politikom. Pored države, javnom diplomatijom se bavi i biznis. Pri tome spoljna politika jedne države može da utiče na poslovne rezultate kompanija. Kao primer možemo da uzmemo promene u stavu Amerikanaca prema Francuzima. Od 2003. godine primećena je tendencija značajnog pada pozitivnog stava, koja je 2008. došla do maksimuma koji se čak mogao okvalifikovati kao mržnja. To je bilo povezano sa ratom u Iraku, gde Francuska nije podržala poziciju SAD. Amerikanci su bili uvređeni i smatrali su Francuze izdajnicima, što je dovelo do toga da su u Americi bili učestali pozivi da se ne kupuje francuska roba. Usled toga Francuzi su registrovali pad prodaje svojih proizvoda u SAD za 13 odsto tokom pola godine.

Ovde treba reći da, iako su danas mnoge kompanije multinacionalne, one se često asociraju na neku nacionalnost. Tako na primer u video reklami automobilske kompanije Volkswagen Das Auto rečca Das pokazuje da se radi o nemačkom proizvodu.

Pored čisto ekonomskih razloga, sprega politike i biznisa ima i drugu dimenziju koja se naziva – korporativna društvena odgovornost. U tom segmentu države se trude da rad njihovih kompanija van svojih granica ima i komponentu javne diplomatije, to jest da kompanije ne predstavljju samo sebe, već i državu iz koje dolaze. Tako se na primer 2009. godine Hilari Klinton sastala sa čelnicima američkog biznisa i razmotrila sa njima pitanje uticaja biznisa na imidž zemlje u inostranstvu. Pri tome se u poslovnu agendu kompanija ugrađuju pozitivne vrednosti kao što su demokratičnost, ekologija, sponzorstvo i drugo.

Još jedna značajna pojava u sferi korporativne društvene odgovornosti je lobiranje. Uzmimo primer organizacije Foreign Investment Advisory Council (FIAC), koja postoji od 1996. godine. U sastav ove organizacije ulaze inostrane kompanije koje rade na ruskom tržištu. Predstavnici FIAC se sreću sa predsednikom, predsednikom vlade, pomažu rusku nauku i obrazovanje. Tako je na primer FIAC podržao rusku Višu školu ekonomije kroz finansiranje istraživanja pojave koja se naziva paralelni uvoz. O čemu se radi? Primećeno je da se neki predstavnici ruske države vraćaju sa poslovnih sastanaka iz Londona sa laptop računarima marke Sony, što jeste bio paralelni uvoz, a što je suprotno pravilima, to jest kompanija Sony nije imala zvaničan ugovor sa vladom Rusije. Isti slučaj je bio i sa i-fon uređajima, pri čemu su zvanični dileri bili ti koji su bili pogođeni, pa su tražili da se takve pojave zabrane. Zato je Viša škola ekonomije finansirana od FIAC uradila istraživanje kao podršku ideji zabrane paralelnog uvoza u Rusiju. A to upravo jeste lobiranje.

Javnom diplomatijom se bave i univerziteti koji su u principu registrovani kao neprofitne organizacije, ali koji imaju svoje fondove iz kojih se deo sredstava koristi za privlačenje stranih studenata. Privlačnost univerziteta za studiranje, tojest uslovi i nivo obrazovanja koji se na njima stiče takođe govore o zemlji u kojoj se nalaze. Kao dokaz uspešnosti univerziteta prave se liste najboljih po određenim kriterijumima i, iako te liste nisu zvanične, one u moru informacija ostavljaju određeni utisak.

Postoje i takve pojave kao što su privatne ambasade. Tu se može uzeti primer Republike Srpske, koja nije međunarodno priznata nezavisna država, već deo Bosne i Hercegovine, ali koja propagira svoje političke i druge interese kroz privatnu kompaniju koja je postala njeno nezvanično predstavništvo.

Naravno, u sferu javne diplomatije spadaju i svima dobro poznate fondacije i organizacije kao što su Britanski savet, fondovi Fridrih Ebert i Konrad Adenauer, USAID, Rossotrudničestvo, Institut Konfučija i drugi.

DIGITALNA DIPLOMATIJA I „BIG DATA“ Svet se radikalno promenio pod uticajem tehnologije, digitalizovao se. Silicijumska budućnost je počela. U skladu sa ovim promenama, menja se i oblik diplomatije. U junu 2012. godine na savetovanju ambasadora predsednik Rusije je okarakterisao digitalnu diplomatiju kao jedan od najefektivnijih instrumenata spoljne politike, pa je u tom smislu pozvao ambasadore da više koriste nove tehnologije u promovisanju državnih interesa.

Pored očiglednih mogućnosti za direktnom komunikacijom sa auditorijumom korišćenjem raznih internet kanala poput blogova, diskusionih grupa, Fejsbuka ili Tvitera, važan segment digitalne diplomatije predstavlja i analiza dostupnih podataka. Tu dolazimo do pojma Big data. Big data je termin koji se koristi za veliki i složen skup podataka koji je teško procesirati korišćenjem klasičnih baza podataka zasnovanih na SQL jeziku ili tradicionalnim aplikacijama. Najveći izvor tih masivnih nestrukturiranih podataka je upravo internet. Izazovi obrade Big data uključuju njihovo dobijanje, smeštanje, pretragu, deljenje, analizu i vizuelizaciju. Na internetu se danas dešava kolosalno vrenje iz koga treba izvući korisne informacije pomoću kojih bi mogli da se predvide događaji. Tako na primer, ako bi na osnovu jedne takve složene analize bilo moguće predvideti kada i gde će doći do terorističkog napada, to bi bio veliki pomak za bezbednost u svetu. To za sada ipak nije moguće. Ali na procesiranju Big data nastavlja intenzivno da se radi. Godine 2001. Gartner grupa (tada META grupa) sastavila je izveštaj u kome je analitičar Dag Lejni definisao porast količine podataka kao trodimenzionalan, pa je tako nastala shema 3Vs kao opis Big dataVolume, Variety and Velocity, to jest – obim, raznovrsnost i brzina.

Naravno Big data je moguće koristiti u raznim oblastima kao što su nauka, biznis, medicina, politika i drugo. Tako je na primer 2012. godine Obamina administracija u Americi je predstavila Big Data Research and Development Initiative, koja je trebala da istraži kako bi Big data mogli da budu iskorišćeni za rešavanje važnih problema sa kojima se suočava vlada. Ta inicijativa je dala dobre rezultate u kampanji za reizbor Baraka Obame za predsednika SAD iste godine. Takođe, u američkoj saveznoj državi Juta je od strane National Security Agency (NSA) formiran centar za obradu podataka koji će, kada bude završen, imati mogućnost da obradi ogromnu količinu informacija sakupljenu od strane NSA preko interneta.

ZAKLJUČAK Javna i digitalna diplomatija i korišćenje Big data u funkciji meke sile predstavljaju danas važne instrumente u borbi za društveno-politički uticaj u svetu. Svako ko želi da ostane u igri mora da razume značaj pomenutih kategorija i da ih koristi.

Evroazijska Srbija

http://www.standard.rs/goran-tesic-javna-diplomatija-meka-sila-i-big-data.html