Latest
 News
 
 Most
 Read
 
 Most
 Commented
 Hot
 Topics
On Point

Two Big Stories in 2010


by Austin Bay
January 5, 2010

Two topics ought to rate persistent headlines in 2010: governmental corruption and cyber security.

We know corruption is pervasive, a pan-human affliction, but in the developing world endemic corruption truly robs the present, steals the future and keeps oppressed populations mired in poverty. As it saps fragile economies and sows cynicism, corruption seeds conflict. Corruption in Afghanistan, Pakistan and Iraq has frustrated American and allied war-fighters (and the frustrated allies include Afghanis, Pakistanis and Iraqis). The Mexican government's Cartel War is both a war on narcotics traffickers and internal political corruption.

As for cyber security? Cyber crime obviously overlaps with certain types of criminal corruption, but the world's increasing dependence on vulnerable digital networks makes deterring computer crime and computer snooping key domestic and international goals.

 A recent report from Kenya provides a hideous example of corruption robbing the present and future. The Voice of America reported on Dec. 22 that $1.3 million "disappeared" from a national fund which supports primary school education for Kenyan children. The fund had received almost $100 million "to help pay for textbooks, curriculum development and teacher training until 2010."&S232; The theft was discovered in June (likely with a nudge from Britain). Two-dozen officials are "under investigation," but there have been no arrests.

This is more than a sad story about cheating children. Disgust with governmental corruption combined with ethnic distrust added emotional fuel to political violence ignited by Kenya's disputed December 2007 national election. One thousand two hundred people died in the post-election turmoil. Many Kenyans understand the threat. One Kenyan group described the scandal as "so egregious, there could be mass unrest unless the government acts quickly to identify and punish those responsible for the theft."

Al-Qaida's survival strategy relies on corruption. Payoffs to warlords buys protection in Somalia and Pakistan. So do its war plans. A terrorist with financial wherewithal (say, money provided by wealthy Persian Gulf "donors") can buy tips from a corrupt police official or military officer. Who says? The Iraqi government does.

Public anger at governmental corruption undermines political and economic development. This year, the Pakistani government objected to aid restrictions mandated by Congress designed to thwart corruption. The U.S. State Department mangled the diplomacy, but ensuring aid goes into field projects and not Swiss bank accounts is a must. Attacking corruption is vital to winning the War on Terror, but that, too, is a long-term struggle.

In December, Afghanistan's President Hamid Karzai chaired a conference on combating corruption in his own government and throughout Afghanistan. AFP quoted Karzai as saying: "I know that corruption in our government and society cannot be eliminated overnight. We cannot even eliminate it in years."

Like I said, as a news story, corruption has legs.

Ten observant minutes on a street corner or a college campus illustrates the pervasiveness of personal digital devices. Human beings lead what pop sociologists have called an increasingly "digitally centered life." It doesn't matter if the device is a mobile phone, laptop computer or digital camera -- they all create and share digital data.

Cyber crime and its brother, cyber warfare, involve stealing data, altering data, denying data,or destroying data. Tapping personal phone conversations or emails is crime enough, but modern "information age" financial institutions, defense ministries and communications companies absolutely depend on the reliable and secure transmission of digital data.

Electrical power grids also rely on computers, and these computer systems may be vulnerable to cyber vandalism. Using a computer virus to knock out a power grid prior to a robbery or even an attack by a terrorist or enemy power also worries cyber defense experts.

The fears are not theoretical. Bonnie and Clyde were small-change chumps compared to cyber bank thieves. On Dec. 22, The Wall Street Journal reported that the FBI is investigating a "computer security breach" at Citibank. Several "tens of millions of dollars" were filched by hackers who may be "linked to a Russian cyber gang."

Though this is still five or six major steps from taking down a nation's banking system (which interests cyber warriors), and Citi is denying any breach occurred, the story demonstrates the terrible possibilities.

The digitally centered life and digitally centered economy are in the bull's-eye.

Send Link to a Friend
Comment    
Return to Index For More Austin Bay    



To find out more about Austin Bay and read features by other Creators Syndicate writers and cartoonists, visit the Creators Syndicate Web page at www.creators.com.

COPYRIGHT 2001 - 2014CREATORS SYNDICATE, INC.


StrategyWorld.com 1998 - 2014StrategyWorld.com. All rights Reserved. StrategyWorld.com, StrategyPage.com, FYEO, For Your Eyes Only and Al Nofi's CIC are all trademarks of StrategyWorld.com Privacy Policy