SlideShare a Scribd company logo
Contents
 Stephen M. Walt, 2011, “Where do bad ideas come
from and why don’t they go away?” Foreign Policy
(January/February 184): 48-53.
 Nursulton Nazarbaev, 2011, “The OSCE and global
security in the 21st century,” New Europe, 9 January,
 Charles Homans, 2011, “Wikilosers,” 25 March,
 RFE, 2011, “Social-media expert says conflicting U.S.
foreign-policy goals hamper effective communication,” 20
April,
Stephen M. Walt
Professor
Harvard University
“Where Do Bad Ideas Come
From and Why Don’t They Go
Away?”
Stephen M. Walt
 UNCONVENTIONAL WISDOM
 Bookshelves are filled with such reassuring
PRONOUNCEMENTS, from the sage advice offered by
Richard Neustadt in Thinking in Time: The Use of History for
Decision Makers to the rosy forecast of Matt Ridley’s The
Rational Optimist: How Prosperity Evolves, not to mention Francis
Fukuyama’s famously premature claim that humanity had
reached “the end of history”;
 Human welfare improved as new knowledge challenged and
eventually overthrew popular dogmas, i.e. from aristocracy to
mercantilism;
 Yet , there is no inexorable evolutionary march that replaces our
bad, old ideas with smart, new ones.
Stephen M. Walt (cont.)
 “DOMINO THEORY”
 If the U.S allowed Communist forces to gain control of Vietnam,
it would set off a chain reaction of other countries succumbing
to Communist rule.
 The domino theory has re-emerged, phoenix –like, in the
current debate over Afghanistan.
 Germany’s defeat in World War I, should seemingly have
seared into German's collective consciousness the lesson that
trying to establish hegemony in Europe was almost certain to
lead to disaster.
 The French experience in Vietnam presumably should have
taught the future president not to order the military to do
“regime change” and “nation building” in the developing world.
 The U.S case in Iraq and Afghanistan.
Stephen M. Walt (cont.)
 WHY is it hard for states to learn from history?
 The limits of knowledge;
 There are relatively few iron laws of foreign policy and the facts
about each case are rarely incontrovertible . US invasion Iraq
 Strong but foolish states;
 Countries that have successfully risen to the status of Great
Power may be less inclined to adapt quickly in the future.
 Closed societies and closed minds;
 When governments restrict the public access to information,
bogus ideas & misguided policies are less likely to be
exposed/shown and either corrected.
 Cui bono? Bad ideas come from somewhere
 The reason why foolish ideas persist is that someone has an
interest in defending or promoting them.
www.foreignpolicy.com
Charles Homans
Associate editor
Foreign Policy
“Wikilosers”
Charles Homans “Wikilosers”
Bradley Manning
U.S Army private
 Allegedly gave WikiLeaks
its cache of U.S.
government document
after stealing them from
the U.S. government’s
Secret Internet Protocol
Router Network
(SIPRNet) during his 2009
deployment to Iraq, was
arrested in May.
Charles Homans (cont.)
Zine el-Abidine
Ben Ali
Former Tunisian President
 The State Department
documents put an outside
authority’s imprimatur on
the stories of corruption
and official decadence that
Tunisians had heard for
years, particularly the
degree to which the family
of Ben Ali’s wife had
benefited from his years of
rule.
Charles Homans (cont.)
Howard Davies
The LSE Director
 The reasons to resign his
post were primarily linked
to Qaddafi, but the last
straw is that the School
had been involved in a
multimillion-dollar deal to
provide training to Libyan
civil servants and
professionals in London.
Charles Homans (cont.)
Manmohan Singh
India’s Prime Minister
 ….has been in hot water
due to Singh’s ruling
Congress Party had paid
lawmaker in India’
Parliament eye-popping
sums ($ 2.5 million) to
support a nuclear deal with
the United States.
 $ 2.7 billion telecom
license scandal kept
Parliament tied up for 2
months.
“Social-media expert says
conflicting U.S. foreign-policy
goals hamper effective
communication”
www.rferl.org
Radio Free Europe
Interview with
Prof. Clay Shirky
Clay Shirky
 The U.S. State Department & Twitter in Arabic,
Hindu, Persian, Russian and other languages?
 It is really startling about the State Department’s use of
Twitter is the way in which it has become painfully
obvious that they actually can’t say the same thing to
everybody.
 Can the U.S. State Department will be able
to adjust its Twitter practices in the future?
 …..they will actually never be able to use Twitter
in a complete open way
Clay Shirky (cont.)
 SoS, Hillary Clinton: “the department would be
awarding millions of $ in funding to support digital
activists & technologists as they try to evade
government censors”
 We are going to see an enormous amount of
investment in both pro-censorship & pro-propoganda
technologies.
 Will Mubarak’s attempt to blackout Internet used
by other authoritarian leaders?
 Yes, because it’s a desperation move and in desperate
times people do desperate things.
www.neweurope.eu
Nursulton Nazarbaev
The president of
Kazakhstan,
Former OSCE
Chairman in-Office
“The OSCE and global security in
the 21st century”
N. Nazarbayev
 The Astana Summit of the OSCE, December
1-2, 2011.
 Argument: was there are a point to it?
 “……the value of the OSCE is exactly in the
fact that, at times of different, critical years for
Europe and the world, its goals and principles
have remained a universal basis for maintaining
and strengthening security in the vast area of the
northern hemisphere from Vancouver to
Vladivostok.”
N. Nazarbayev (cont.)
 Reasons to convene the OSCE Summit:
1. “…..in the 21st century, the OSCE can and
must use all of its vast experience to build an
ambitious new security system spanning the
entire Eurasian continent…..”
2. It was important to recover the OSCE from
critical state in which it found itself.
3. It was necessary to restore the value and
effectiveness of direct dialogue among the
leaders of the OSCE.
N. Nazarbayev (cont.)
 The tasks under OSCE Chairmanship:
 to expand and strengthen the field of
consensus on fundamental issues of security;
 to renew and strengthen the regime of arms
control and confidence-building measures;
 to strengthen the OSCE’s capacity in
conflict prevention, crisis management &
post-conf. rehabilitation;
N. Nazarbayev (cont.)
 “Astana Commemorative Declaration: Towards a
Security Community”:
1. It confirms the relevance of the principles on which
the Organization was based and the commitment of
all 56 participating states to the norms and
commitments adopted within it,……..
2. the Eurasian vector of the OSCE has been enshrined
for the first time ever;
3. the document welcomed all initiatives to strengthen
the OSCE and its ability to adequately and effectively
address the challenges of the 21st century.
N. Nazarbayev (cont.)
 Proposed further targeted actions:
1. interaction in strengthening global security among
integration structures of the Eurasian continent. EU &
NATO, = EurAsEC + CSTO;
2. to single out the issues of financial and economic security
as a separate basket of the OSCE;
3. to establish a specific OSCE forum to elaborate new
contractual norms in disarmament and non-proliferation;
4. We have called for honest and open interfaith dialogue;
5. to organize the work on forecasting various security issues
as a separate dimension by creating an OSCE Security
Institute.
Thank you

More Related Content

What's hot

Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
Lori A. Ruff
 
Shooting in the Dark: an analysis of Collateral Murder
Shooting in the Dark: an analysis of Collateral MurderShooting in the Dark: an analysis of Collateral Murder
Shooting in the Dark: an analysis of Collateral Murder
Ricardo D'Aguiar
 
Censorship
CensorshipCensorship
Censorship
Armando Ceballos
 
Ht f42
Ht f42Ht f42
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
Doing What I Do
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
David Sweigert
 
Cyberwar
CyberwarCyberwar
Haaretz
HaaretzHaaretz
Haaretz
MarioEliseo3
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
ahtezaz123
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
https://www.cia.gov.com
 
sample_1
sample_1sample_1
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
Kawtar Laaras
 
The Security Era
The Security EraThe Security Era
The Security Era
jk_welder
 
Censorship
CensorshipCensorship
Censorship
DevyaniY
 
Steven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24P
Steven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24PSteven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24P
Steven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24P
Exopolitics Hungary
 
Toward a Strategy of Public Warning
Toward a Strategy of Public WarningToward a Strategy of Public Warning
Toward a Strategy of Public Warning
John Fenzel
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.
noeliaiiiiii
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
Richard Stiennon
 
Who lied to whom s. hersh
Who lied to whom   s. hershWho lied to whom   s. hersh
Who lied to whom s. hersh
Rabeeh Saâdawi
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
pjoyal
 

What's hot (20)

Counterintelligence Paper
Counterintelligence PaperCounterintelligence Paper
Counterintelligence Paper
 
Shooting in the Dark: an analysis of Collateral Murder
Shooting in the Dark: an analysis of Collateral MurderShooting in the Dark: an analysis of Collateral Murder
Shooting in the Dark: an analysis of Collateral Murder
 
Censorship
CensorshipCensorship
Censorship
 
Ht f42
Ht f42Ht f42
Ht f42
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Psychology of the Insider Threat
Psychology of the Insider ThreatPsychology of the Insider Threat
Psychology of the Insider Threat
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Haaretz
HaaretzHaaretz
Haaretz
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Book studies 63-1-mar2019
Book studies 63-1-mar2019Book studies 63-1-mar2019
Book studies 63-1-mar2019
 
sample_1
sample_1sample_1
sample_1
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Censorship
CensorshipCensorship
Censorship
 
Steven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24P
Steven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24PSteven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24P
Steven Greer - CE5-CSETI - 20. CSETI June 1998 Newsletter, 24P
 
Toward a Strategy of Public Warning
Toward a Strategy of Public WarningToward a Strategy of Public Warning
Toward a Strategy of Public Warning
 
Freedom of expression.
Freedom of expression.Freedom of expression.
Freedom of expression.
 
Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 
Who lied to whom s. hersh
Who lied to whom   s. hershWho lied to whom   s. hersh
Who lied to whom s. hersh
 
Govsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber WarGovsec Georgia 2008 Cyber War
Govsec Georgia 2008 Cyber War
 

Similar to Global Governance: Cyber, Ideological, and Transnational Security

Adaptive Intelligence for an Uncertain Age.pdf
Adaptive Intelligence for an Uncertain Age.pdfAdaptive Intelligence for an Uncertain Age.pdf
Adaptive Intelligence for an Uncertain Age.pdf
Jackie Gold
 
Disinformation post report-eng
Disinformation post report-engDisinformation post report-eng
Disinformation post report-eng
archiejones4
 
Danger of Surveillance in Context of the Novel "1984".pptx
 Danger of Surveillance in Context of the Novel "1984".pptx Danger of Surveillance in Context of the Novel "1984".pptx
Danger of Surveillance in Context of the Novel "1984".pptx
DrashtiJoshi21
 
American Society of International Law is collaborating with .docx
  American Society of International Law is collaborating with .docx  American Society of International Law is collaborating with .docx
American Society of International Law is collaborating with .docx
ShiraPrater50
 
Foreign policy communications in modern Ukraine
Foreign policy communications in modern UkraineForeign policy communications in modern Ukraine
Foreign policy communications in modern Ukraine
Anton Shynkaruk
 
HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES
HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIESHISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES
HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES
Василь Петренко
 
New National Strategy Narrative
New National Strategy NarrativeNew National Strategy Narrative
New National Strategy Narrative
Earth Institute of Columbia University
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
Liz Houghton
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Paper
shelbyard2
 
Mass Media
Mass MediaMass Media
Mass Media
cherylchoo
 
The Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And DevelopmentThe Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And Development
Digital Society
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
Dr Lendy Spires
 
Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowerment
Dr Lendy Spires
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
Dr Lendy Spires
 
Security council topic a, b and committee background
Security council topic a, b and committee backgroundSecurity council topic a, b and committee background
Security council topic a, b and committee background
Gera Morton
 
Walter Mitty Essay.pdf
Walter Mitty Essay.pdfWalter Mitty Essay.pdf
Walter Mitty Essay.pdf
Katy Langley
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
evgeny.morozov
 
PLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docx
PLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docxPLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docx
PLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docx
LeilaniPoolsy
 
Manufacturing Consent
Manufacturing ConsentManufacturing Consent
Manufacturing Consent
Jennifer Letterman
 
MUNUC DISEC Background Guide
MUNUC DISEC Background GuideMUNUC DISEC Background Guide
MUNUC DISEC Background Guide
Srikanth Krishnan
 

Similar to Global Governance: Cyber, Ideological, and Transnational Security (20)

Adaptive Intelligence for an Uncertain Age.pdf
Adaptive Intelligence for an Uncertain Age.pdfAdaptive Intelligence for an Uncertain Age.pdf
Adaptive Intelligence for an Uncertain Age.pdf
 
Disinformation post report-eng
Disinformation post report-engDisinformation post report-eng
Disinformation post report-eng
 
Danger of Surveillance in Context of the Novel "1984".pptx
 Danger of Surveillance in Context of the Novel "1984".pptx Danger of Surveillance in Context of the Novel "1984".pptx
Danger of Surveillance in Context of the Novel "1984".pptx
 
American Society of International Law is collaborating with .docx
  American Society of International Law is collaborating with .docx  American Society of International Law is collaborating with .docx
American Society of International Law is collaborating with .docx
 
Foreign policy communications in modern Ukraine
Foreign policy communications in modern UkraineForeign policy communications in modern Ukraine
Foreign policy communications in modern Ukraine
 
HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES
HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIESHISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES
HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE SERIES
 
New National Strategy Narrative
New National Strategy NarrativeNew National Strategy Narrative
New National Strategy Narrative
 
Spilling+Secrets
Spilling+SecretsSpilling+Secrets
Spilling+Secrets
 
Information Literacy Paper
Information Literacy PaperInformation Literacy Paper
Information Literacy Paper
 
Mass Media
Mass MediaMass Media
Mass Media
 
The Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And DevelopmentThe Spread of Information and its Influence On State Security And Development
The Spread of Information and its Influence On State Security And Development
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
Westby the role of science and technology as empowerment
Westby the role of science and technology as empowermentWestby the role of science and technology as empowerment
Westby the role of science and technology as empowerment
 
The role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and stateThe role of science and technology as empowerment of person and state
The role of science and technology as empowerment of person and state
 
Security council topic a, b and committee background
Security council topic a, b and committee backgroundSecurity council topic a, b and committee background
Security council topic a, b and committee background
 
Walter Mitty Essay.pdf
Walter Mitty Essay.pdfWalter Mitty Essay.pdf
Walter Mitty Essay.pdf
 
Authoritarian Governments in Cyberspace
Authoritarian Governments in CyberspaceAuthoritarian Governments in Cyberspace
Authoritarian Governments in Cyberspace
 
PLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docx
PLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docxPLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docx
PLSI 120.DS_Store__MACOSXPLSI 120._.DS_StorePLSI 120.docx
 
Manufacturing Consent
Manufacturing ConsentManufacturing Consent
Manufacturing Consent
 
MUNUC DISEC Background Guide
MUNUC DISEC Background GuideMUNUC DISEC Background Guide
MUNUC DISEC Background Guide
 

Recently uploaded

一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
osoyvvf
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
hqfek
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdfNamma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
22ad0301
 
Digital Marketing Performance Marketing Sample .pdf
Digital Marketing Performance Marketing  Sample .pdfDigital Marketing Performance Marketing  Sample .pdf
Digital Marketing Performance Marketing Sample .pdf
Vineet
 
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdfOverview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
nhutnguyen355078
 
06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus
Timothy Spann
 
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
Do People Really Know Their Fertility Intentions?  Correspondence between Sel...Do People Really Know Their Fertility Intentions?  Correspondence between Sel...
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
Xiao Xu
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
Senior Software Profiles Backend Sample - Sheet1.pdf
Senior Software Profiles  Backend Sample - Sheet1.pdfSenior Software Profiles  Backend Sample - Sheet1.pdf
Senior Software Profiles Backend Sample - Sheet1.pdf
Vineet
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
A gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented GenerationA gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented Generation
dataschool1
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
Vietnam Cotton & Spinning Association
 
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
eudsoh
 
Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
ArshadAyub49
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
Timothy Spann
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
Rebecca Bilbro
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
perranet1
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
TeukuEriSyahputra
 

Recently uploaded (20)

一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdfNamma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
 
Digital Marketing Performance Marketing Sample .pdf
Digital Marketing Performance Marketing  Sample .pdfDigital Marketing Performance Marketing  Sample .pdf
Digital Marketing Performance Marketing Sample .pdf
 
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdfOverview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
 
06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus
 
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
Do People Really Know Their Fertility Intentions?  Correspondence between Sel...Do People Really Know Their Fertility Intentions?  Correspondence between Sel...
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
Senior Software Profiles Backend Sample - Sheet1.pdf
Senior Software Profiles  Backend Sample - Sheet1.pdfSenior Software Profiles  Backend Sample - Sheet1.pdf
Senior Software Profiles Backend Sample - Sheet1.pdf
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
A gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented GenerationA gentle exploration of Retrieval Augmented Generation
A gentle exploration of Retrieval Augmented Generation
 
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics May 2024
 
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
 
Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
 

Global Governance: Cyber, Ideological, and Transnational Security

  • 1.
  • 2. Contents  Stephen M. Walt, 2011, “Where do bad ideas come from and why don’t they go away?” Foreign Policy (January/February 184): 48-53.  Nursulton Nazarbaev, 2011, “The OSCE and global security in the 21st century,” New Europe, 9 January,  Charles Homans, 2011, “Wikilosers,” 25 March,  RFE, 2011, “Social-media expert says conflicting U.S. foreign-policy goals hamper effective communication,” 20 April,
  • 3. Stephen M. Walt Professor Harvard University “Where Do Bad Ideas Come From and Why Don’t They Go Away?”
  • 4. Stephen M. Walt  UNCONVENTIONAL WISDOM  Bookshelves are filled with such reassuring PRONOUNCEMENTS, from the sage advice offered by Richard Neustadt in Thinking in Time: The Use of History for Decision Makers to the rosy forecast of Matt Ridley’s The Rational Optimist: How Prosperity Evolves, not to mention Francis Fukuyama’s famously premature claim that humanity had reached “the end of history”;  Human welfare improved as new knowledge challenged and eventually overthrew popular dogmas, i.e. from aristocracy to mercantilism;  Yet , there is no inexorable evolutionary march that replaces our bad, old ideas with smart, new ones.
  • 5. Stephen M. Walt (cont.)  “DOMINO THEORY”  If the U.S allowed Communist forces to gain control of Vietnam, it would set off a chain reaction of other countries succumbing to Communist rule.  The domino theory has re-emerged, phoenix –like, in the current debate over Afghanistan.  Germany’s defeat in World War I, should seemingly have seared into German's collective consciousness the lesson that trying to establish hegemony in Europe was almost certain to lead to disaster.  The French experience in Vietnam presumably should have taught the future president not to order the military to do “regime change” and “nation building” in the developing world.  The U.S case in Iraq and Afghanistan.
  • 6. Stephen M. Walt (cont.)  WHY is it hard for states to learn from history?  The limits of knowledge;  There are relatively few iron laws of foreign policy and the facts about each case are rarely incontrovertible . US invasion Iraq  Strong but foolish states;  Countries that have successfully risen to the status of Great Power may be less inclined to adapt quickly in the future.  Closed societies and closed minds;  When governments restrict the public access to information, bogus ideas & misguided policies are less likely to be exposed/shown and either corrected.  Cui bono? Bad ideas come from somewhere  The reason why foolish ideas persist is that someone has an interest in defending or promoting them.
  • 8. Charles Homans “Wikilosers” Bradley Manning U.S Army private  Allegedly gave WikiLeaks its cache of U.S. government document after stealing them from the U.S. government’s Secret Internet Protocol Router Network (SIPRNet) during his 2009 deployment to Iraq, was arrested in May.
  • 9. Charles Homans (cont.) Zine el-Abidine Ben Ali Former Tunisian President  The State Department documents put an outside authority’s imprimatur on the stories of corruption and official decadence that Tunisians had heard for years, particularly the degree to which the family of Ben Ali’s wife had benefited from his years of rule.
  • 10. Charles Homans (cont.) Howard Davies The LSE Director  The reasons to resign his post were primarily linked to Qaddafi, but the last straw is that the School had been involved in a multimillion-dollar deal to provide training to Libyan civil servants and professionals in London.
  • 11. Charles Homans (cont.) Manmohan Singh India’s Prime Minister  ….has been in hot water due to Singh’s ruling Congress Party had paid lawmaker in India’ Parliament eye-popping sums ($ 2.5 million) to support a nuclear deal with the United States.  $ 2.7 billion telecom license scandal kept Parliament tied up for 2 months.
  • 12. “Social-media expert says conflicting U.S. foreign-policy goals hamper effective communication” www.rferl.org Radio Free Europe Interview with Prof. Clay Shirky
  • 13. Clay Shirky  The U.S. State Department & Twitter in Arabic, Hindu, Persian, Russian and other languages?  It is really startling about the State Department’s use of Twitter is the way in which it has become painfully obvious that they actually can’t say the same thing to everybody.  Can the U.S. State Department will be able to adjust its Twitter practices in the future?  …..they will actually never be able to use Twitter in a complete open way
  • 14. Clay Shirky (cont.)  SoS, Hillary Clinton: “the department would be awarding millions of $ in funding to support digital activists & technologists as they try to evade government censors”  We are going to see an enormous amount of investment in both pro-censorship & pro-propoganda technologies.  Will Mubarak’s attempt to blackout Internet used by other authoritarian leaders?  Yes, because it’s a desperation move and in desperate times people do desperate things.
  • 15. www.neweurope.eu Nursulton Nazarbaev The president of Kazakhstan, Former OSCE Chairman in-Office “The OSCE and global security in the 21st century”
  • 16. N. Nazarbayev  The Astana Summit of the OSCE, December 1-2, 2011.  Argument: was there are a point to it?  “……the value of the OSCE is exactly in the fact that, at times of different, critical years for Europe and the world, its goals and principles have remained a universal basis for maintaining and strengthening security in the vast area of the northern hemisphere from Vancouver to Vladivostok.”
  • 17. N. Nazarbayev (cont.)  Reasons to convene the OSCE Summit: 1. “…..in the 21st century, the OSCE can and must use all of its vast experience to build an ambitious new security system spanning the entire Eurasian continent…..” 2. It was important to recover the OSCE from critical state in which it found itself. 3. It was necessary to restore the value and effectiveness of direct dialogue among the leaders of the OSCE.
  • 18. N. Nazarbayev (cont.)  The tasks under OSCE Chairmanship:  to expand and strengthen the field of consensus on fundamental issues of security;  to renew and strengthen the regime of arms control and confidence-building measures;  to strengthen the OSCE’s capacity in conflict prevention, crisis management & post-conf. rehabilitation;
  • 19. N. Nazarbayev (cont.)  “Astana Commemorative Declaration: Towards a Security Community”: 1. It confirms the relevance of the principles on which the Organization was based and the commitment of all 56 participating states to the norms and commitments adopted within it,…….. 2. the Eurasian vector of the OSCE has been enshrined for the first time ever; 3. the document welcomed all initiatives to strengthen the OSCE and its ability to adequately and effectively address the challenges of the 21st century.
  • 20. N. Nazarbayev (cont.)  Proposed further targeted actions: 1. interaction in strengthening global security among integration structures of the Eurasian continent. EU & NATO, = EurAsEC + CSTO; 2. to single out the issues of financial and economic security as a separate basket of the OSCE; 3. to establish a specific OSCE forum to elaborate new contractual norms in disarmament and non-proliferation; 4. We have called for honest and open interfaith dialogue; 5. to organize the work on forecasting various security issues as a separate dimension by creating an OSCE Security Institute.