Ñîâðåìåííàÿ ýëåêòðîííàÿ áèáëèîòåêà ModernLib.Net

The World is Flat

ModernLib.Net / Ïóáëèöèñòèêà / Friedman Thomas / The World is Flat - ×òåíèå (ñòð. 31)
Àâòîð: Friedman Thomas
Æàíð: Ïóáëèöèñòèêà

 

 


If you follow the evolution of supply chains, added Neland, you see the prosperity and stability they promoted first in Japan, and then in Korea and Taiwan, and now in Malaysia, Singapore, the Philippines, Thailand, and Indonesia. Once countries get embedded in these global supply chains, “they feel part of something much bigger than their own businesses,” he said. Osamu Watanabe, the CEO of the Japan External Trade Organization (JETRO), was explaining to me one afternoon in Tokyo how Japanese companies were moving vast amounts of low— and middle-range technical work and manufacturing to China, doing the basic fabrication there, and then bringing it back to Japan for final assembly. Japan was doing this despite a bitter legacy of mistrust between the two countries, which was intensified by the Japanese invasion of China in the last century. Historically, he noted, a strong Japan and a strong China have had a hard time coexisting. But not today, at least not for the moment. Why not? I asked. The reason you can have a strong Japan and a strong China at the same time, he said, “is because of the supply chain.” It is a win-win for both.

Obviously, since Iraq, Syria, south Lebanon, North Korea, Pakistan, Afghanistan, and Iran are not part of any major global supply chains, all of them remain hot spots that could explode at any time and slow or reverse the flattening of the world. As my own notebook story attests, the most important test case of the Dell Theory of Conflict Prevention is the situation between China and Taiwan-since both are deeply embedded in several of the world's most important computer, consumer electronics, and, increasingly, software supply chains. The vast majority of computer components for every major company comes from coastal China, Taiwan, and East Asia. In addition, Taiwan alone has more than $100 billion in investments in mainland China today, and Taiwanese experts run many of the cutting-edge Chinese high-tech manufacturing companies.

It is no wonder that Craig Addison, the former editor of Electronic Business Asia magazine, wrote an essay for the International Herald Tribune (September 29, 2000), headlined “A 'Silicon Shield' Protects Taiwan from China.” He argued that “Silicon-based products, such as computers and networking systems, form the basis of the digital economies in the United States, Japan and other developed nations. In the past decade, Taiwan has become the third-largest information technology hardware producer after the United States and Japan. Military aggression by China against Taiwan would cut off a large portion of the world's supply of these products... Such a development would wipe trillions of dollars off the market value of technology companies listed in the United States, Japan and Europe.” Even if China's leaders, like former president Jiang Zemin, who was once minister of electronics, lose sight of how integrated China and Taiwan are in the world's computer supply chain, they need only ask their kids for an update. Jiang Zemin's son, Jiang Mianheng, wrote Addison, “is a partner in a wafer fabrication project in Shanghai with Winston Wang of Taiwan's Grace T.H.W. Group.” And it is not just Taiwanese. Hundreds of big American tech companies now have R & D operations in China; a war that disrupted them could lead not only to the companies moving their plants elsewhere but also to a significant loss of R & D investment in China, which the Beijing government has been betting on to advance its development. Such a war could also, depending on how it started, trigger a widespread American boycott of Chinese goods-if China were to snuff out the Taiwanese democracy-which would lead to serious economic turmoil inside China.

The Dell Theory had its first real test in December 2004, when Taiwan held parliamentary elections. President Chen Shui-bian's pro-independence Democratic Progressive Party was expected to win the legislative runoff over the main opposition Nationalist Party, which favored closer ties with Beijing. Chen framed the election as a popular referendum on his proposal to write a new constitution that would formally enshrine Taiwan's independence, ending the purposely ambiguous status quo. Had Chen won and moved ahead on his agenda to make Taiwan its own motherland, as opposed to maintaining the status quo fiction that it is a province of the mainland, it could have led to a Chinese military assault on Taiwan. Everyone in the region was holding his or her breath. And what happened? Motherboards won over motherland. A majority of Taiwanese voted against the pro-independence governing party legislative candidates, ensuring that the DPP would not have a majority in parliament. I believe the message Taiwanese voters were sending was not that they never want Taiwan to be independent. It was that they do not want to upset the status quo right now, which has been so beneficial to so many Taiwanese. The voters seemed to understand clearly how interwoven they had become with the mainland, and they wisely opted to maintain their de facto independence rather than force de jure independence, which might have triggered a Chinese invasion and a very uncertain future.

Warning: What I said when I put forth the McDonald's theory, I would repeat even more strenuously with the Dell Theory: It does not make wars obsolete. And it does not guarantee that governments will not engage in wars of choice, even governments that are part of major supply chains. To suggest so would be naive. It guarantees only that governments whose countries are enmeshed in global supply chains will have to think three times, not just twice, about engaging in anything but a war of self-defense. And if they choose to go to war anyway, the price they will pay will be ten times higher than it was a decade ago and probably ten times higher than whatever the leaders of that country think. It is one thing to lose your McDonald's. It's quite another to fight a war that costs you your place in a twenty-first-century supply chain that may not come back around for a long time.

While the biggest test case of the Dell Theory is China versus Taiwan, the fact is that the Dell Theory has already proved itself to some degree in the case of India and Pakistan, the context in which I first started to think about it. I happened to be in India in 2002, when its just-in-time services supply chains ran into some very old-time geopolitics-and the supply chain won. In the case of India and Pakistan, the Dell Theory was working on only one party-India-but it still had a major impact. India is to the world's knowledge and service supply chain what China and Taiwan are to the manufacturing ones. By now readers of this book know all the highlights: General Electric's biggest research center outside the United States is in Bangalore, with seventeen hundred Indian engineers, designers, and scientists. The brain chips for many brand-name cell phones are designed in Bangalore. Renting a car from Avis online? It's managed in Bangalore. Tracing your lost luggage on Delta or British Airways is done from Bangalore, and the backroom accounting and computer maintenance for scores of global firms are done from Bangalore, Mumbai, Chennai, and other major Indian cities. Here's what happened: On May 31, 2002, State Department spokesman Richard Boucher issued a travel advisory saying, “We urge American citizens currently in India to depart the country,” because the prospect of a nuclear exchange with Pakistan was becoming very real. Both nations were massing troops on their borders, intelligence reports were suggesting that they both might be dusting off their nuclear warheads, and CNN was flashing images of people flooding out of India. The global American firms that had moved their back rooms and R & D operations to Bangalore were deeply unnerved.

“I was actually surfing on the Web, and I saw a travel advisory come up on India on a Friday evening/' said Vivek Paul, president of Wipro, which manages backroom operations from India of many American multinationals. ”As soon as I saw that, I said, 'Oh my gosh, every customer that we have is going to have a million questions on this.' It was the Friday before a long weekend, so over the weekend we at Wipro developed a fail-safe business continuity plan for all of our customers.“ While Wipro's customers were pleased to see how on top of things the company was, many of them were nevertheless rattled. This was not in the plan when they decided to outsource mission-critical research and operations to India. Said Paul, ”I had a CIO from one of our big American clients send me an e-mail saying, I am now spending a lot of time looking for alternative sources to India. I don't think you want me doing that, and I don't want to be doing it.' I immediately forwarded his message to the Indian ambassador in Washington and told him to get it to the right person.“ Paul would not tell me what company it was, but I have confirmed through diplomatic sources that it was United Technologies. And plenty of others, like American Express and General Electric, with back rooms in Bangalore, had to have been equally worried.

For many global companies, “the main heart of their business is now supported here,” said N. Krishnakumar, president of MindTree, another leading Indian knowledge outsourcing firm based in Bangalore. “It can cause chaos if there is a disruption.” While not trying to meddle in foreign affairs, he added, “What we explained to our government, through the Confederation of Indian Industry, is that providing a stable, predictable operating environment is now the key to India's development.” This was a real education for India's elderly leaders in New Delhi, who had not fully absorbed how critical India had become to the world's knowledge supply chain. When you are managing vital backroom operations for American Express or General Electric or Avis, or are responsible for tracing all the lost luggage on British Airways or Delta, you cannot take a month, a week, or even a day off for war without causing major disruptions for those companies. Once those companies have made a commitment to outsource business operations or research to India, they expect it to stay there. That is a major commitment. And if geopolitics causes a serious disruption, they will leave, and they will not come back very easily. When you lose this kind of service trade, you can lose it for good.

“What ends up happening in the flat world you described,” explained Paul, “is that you have only one opportunity to make it right if something [goes] wrong. Because the disadvantage of being in a flat world is that despite all the nice engagements and stuff and the exit barriers that you have, every customer has multiple options, and so the sense of responsibility you have is not just out of a desire to do good by your customers, but also a desire for self-preservation.”

The Indian government got the message. Was India's central place in the world's services supply chain the only factor in getting Prime Minister Vajpayee to tone down his rhetoric and step back from the brink? Of course not. There were other factors, to be sure-most notably the deterrent effect of Pakistan's own nuclear arsenal. But clearly, India's role in global services was an important additional source of restraint on its behavior, and it was taken into account by New Delhi. “I think it sobered a lot of people,” said Jerry Rao, who, as noted earlier, heads the Indian high-tech trade association. “We engaged very seriously, and we tried to make the point that this was very bad for Indian business. It was very bad for the Indian economy... [Many people] didn't realize till then how suddenly we had become integrated into the rest of the world. We are now partners in a twenty-four by seven by three-sixty-five supply chain.”

Vivek Kulkami, then information technology secretary for Bangalore's regional government, told me back in 2002, “We don't get involved in politics, but we did bring to the government's attention the problems the Indian IT industry might face if there were a war.” And this was an altogether new factor for New Delhi to take into consideration. “Ten years ago, [a lobby of IT ministers from different Indian states] never existed,” said Kulkarni. Now it is one of the most important business lobbies in India and a coalition that no Indian government can ignore.

“With all due respect, the McDonald's [shutting] down doesn't hurt anything,” said Vivek Paul, “but if Wipro had to shut down we would affect the day-to-day operations of many, many companies.” No one would answer the phones in call centers. Many e-commerce sites that are supported from Bangalore would shut down. Many major companies that rely on India to maintain their key computer applications or handle their human resources departments or billings would seize up. And these companies did not want to find alternatives, said Paul. Switching is very difficult, because taking over mission-critical day-to-day backroom operations of a global company takes a great deal of training and experience. It's not like opening a fast-food restaurant. That was why, said Paul, Wipro's clients were telling him, “'I have made an investment in you. I need you to be very responsible with the trust I have reposed in you.' And I think that created an enormous amount of back pressure on us that said we have to act in a responsible fashion... All of a sudden it became even clearer that there's more to gain by economic gains than by geopolitical gains. [We had more to gain from building] a vibrant, richer middle class able to create an export industry than we possibly could by having an ego-satisfying war with Pakistan.” The Indian government also looked around and realized that the vast majority of India's billion people were saying, “I want a better future, not more territory.” Over and over again, when I asked young Indians working at call centers how they felt about Kashmir or a war with Pakistan, they waved me off with the same answer: “We have better things to do.” And they do. America needs to keep this in mind as it weighs its overall approach to outsourcing. I would never advocate shipping some American's job overseas just so it will keep Indians and Pakistanis at peace with each other. But I would say that to the extent that this process happens, driven by its own internal economic logic, it will have a net positive geopolitical effect. It will absolutely make the world safer for American kids.

Each of the Indian business leaders I interviewed noted that in the event of some outrageous act of terrorism or aggression from Pakistan, India would do whatever it takes to defend itself, and they would be the first to support that-the Dell Theory be damned. Sometimes war is unavoidable. It is imposed on you by the reckless behavior of others, and you have to just pay the price. But the more India and, one hopes, soon Pakistan get enmeshed in global service supply chains, the greater disincentive they have to fight anything but a border skirmish or a war of words.

The example of the 2002 India-Pakistan nuclear crisis at least gives us some hope. That cease-fire was brought to us not by General Powell but by General Electric.

We bring good things to life.

Infosys Versus al-Qaeda

Unfortunately, even GE can do only so much. Because, alas, a new source for geopolitical instability has emerged only in recent years, for which even the updated Dell Theory can provide no restraint. It is the emergence of mutant global supply chains -that is, nonstate actors, be they criminals or terrorists, who learn to use all the elements of the flat world to advance a highly destabilizing, even nihilistic agenda. I first started thinking about this when Nandan Nilekani, the Infosys CEO, was giving me that tour I referred to in Chapter 1 of his company's global videoconferencing center at its Bangalore headquarters. As Nandan explained to me how Infosys could get its global supply chain together at once for a virtual conference in that room, a thought popped into my head: Who else uses open-sourcing and supply-chaining so imaginatively? The answer, of course, is al-Qaeda.

Al-Qaeda has learned to use many of the same instruments for global collaboration that Infosys uses, but instead of producing products and profits with them, it has produced mayhem and murder. This is a particularly difficult problem. In fact, it may be the most vexing geopolitical problem for flat-world countries that want to focus on the future. The flat world-unfortunately-is a friend of both Infosys and al-Qaeda. The Dell Theory will not work at all against these informal Islamo-Leninist terror networks, because they are not a state with a population that will hold its leaders accountable or with a domestic business lobby that might restrain them. These mutant global supply chains are formed for the purpose of destruction, not profit. They don't need investors, only recruits, donors, and victims. Yet these mobile, self-financing mutant supply chains use all the tools of collaboration offered by the flat world-open-sourcing to raise money, to recruit followers, and to stimulate and disseminate ideas; outsourcing to train recruits; and supply-chaining to distribute the tools and the suicide bombers to undertake operations. The U.S. Central Command has a name for this whole underground network: the Virtual Caliphate. And its leaders and innovators understand the flat world almost as well as Wal-Mart, Dell, and Infosys do.

In the previous chapter, I tried to explain that you cannot understand the rise of al-Qaeda emotionally and politically without reference to the flattening of the world. What I am arguing here is that you cannot understand the rise of al-Qaeda technically without reference to the flattening of the world, either. Globalization in general has been al-Qaeda's friend in that it has helped to solidify a revival of Muslim identity and solidarity, with Muslims in one country much better able to see and sympathize with the struggles of their brethren in another country-thanks to the Internet and satellite television. At the same time, as pointed out in the previous chapter, this flattening process has intensified the feelings of humiliation in some quarters of the Muslim world over the fact that civilizations to which the Muslim world once felt superior-Hindus, Jews, Christians, Chinese—are now all doing better than many Muslim countries, and everyone can see it. The flattening of the world has also led to more urbanization and large-scale immigration to the West of many of these young, unemployed, frustrated Arab-Muslim males, while simultaneously making it much easier for informal open-source networks of these young men to form, operate, and interconnect. This certainly has been a boon for underground extremist Muslim political groups. There has been a proliferation of these informal mutual supply chains throughout the Arab-Muslim world today-small networks of people who move money through hawalas (hand-to-hand financing networks), who recruit through alternative education systems like the madrassas, and who communicate through the Internet and other tools of the global information revolution. Think about it: A century ago, anarchists were limited in their ability to communicate and collaborate with one another, to find sympathizers, and to band together for an operation. Today, with the Internet, that is not a problem. Today even the Unabomber could find friends to join a consortium where his “strengths” could be magnified and reinforced by others who had just as warped a worldview as he did.

What we have witnessed in Iraq is an even more perverse mutation of this mutant supply chain-the suicide supply chain. Since the start of the U.S. invasion in March 2002, more than two hundred suicide bombers have been recruited from within Iraq and from across the Muslim world, brought to the Iraqi front by some underground railroad, connected with the bomb makers there, and then dispatched against U.S. and Iraqi targets according to whatever suits the daily tactical needs of the insurgent Islamist forces in Iraq. I can understand, but not accept, the notion that more than thirty-seven years of Israeli occupation of the West Bank might have driven some Palestinians into a suicidal rage. But the American occupation of Iraq was only a few months old before it started to get hit by this suicide supply chain. How do you recruit so many young men “off the shelf” who are ready to commit suicide in the cause of jihad, many of them apparently not even Iraqis? And they don't even identify themselves by name or want to get credit-at least in this world. The fact is that Western intelligence agencies have no clue how this underground suicide supply chain, which seems to have an infinite pool of recruits to draw on, works, and yet it has basically stymied the U.S. armed forces in Iraq. From what we do know, though, this Virtual Caliphate works just like the supply chains I described earlier. Just as you take an item off the shelf in a discount store in Birmingham and another one is immediately made in Beijing, so the retailers of suicide deploy a human bomber in Baghdad and another one is immediately recruited and indoctrinated in Beirut. To the extent that this tactic spreads, it will require a major rethinking of U.S. military doctrine.

The flat world has also been such a huge boon for al-Qaeda and its ilk because of the way it enables the small to act big, and the way it enables small acts-the killing of just a few people-to have big effects. The horrific video of the beheading of Wall Street Journal reporter Danny Pearl by Islamist militants in Pakistan was transmitted by the Internet all over the world. There is not a journalist anywhere who saw or even just read about that who was not terrified. But those same beheading videos are also used as tools of recruitment. The flat world makes it much easier for terrorists to transmit their terror. With the Internet they don't even have to go through Western or Arab news organizations but can broadcast right into your computer. It takes much less dynamite to transmit so much more anxiety. Just as the U.S. Army had embedded journalists, so the suicide supply chain has embedded terrorists, in their own way, to tell us their side of the story. How many times have I gotten up in the morning, fired up the Internet, and been confronted by the video image of some masked gunman threatening to behead an American-all brought to me courtesy of AOL's home page? The Internet is an enormously useful tool for the dissemination of propaganda, conspiracy theories, and plain old untruths, because it combines a huge reach with a patina of technology that makes anything on the Internet somehow more believable. How many times have you heard someone say, “But I read it on the Internet,” as if that should end the argument? In fact, the Internet can make things worse. It often leads to more people being exposed to crazy conspiracy theories.

“The new system of diffusion-the Internet-is more likely to transmit irrationality than rationality,” said political theorist Yaron Ezrahi, who specializes in the interaction between media and politics. “Because irrationality is more emotionally loaded, it requires less knowledge, it explains more to more people, it goes down easier.” That is why conspiracy theories are so rife in the Arab-Muslim world today-and unfortunately are becoming so in many quarters of the Western world, for that matter. Conspiracy theories are like a drug that goes right into your bloodstream, enabling you to see “the Light.” And the Internet is the needle. Young people used to have to take LSD to escape. Now they just go online. Now you don't shoot up, you download. You download the precise point of view that speaks to all your own biases. And the flat world makes it all so much easier.

Gabriel Weimann, a professor of communication at Haifa University, Israel, did an incisive study of terrorists' use of the Internet and of what I call the flat world, which was published in March 2004 by the United States Institute of Peace and excerpted on YaleGlobal Online on April 26, 2004. He made the following points:

While the danger that cyber-terrorism poses to the Internet is frequently debated, surprisingly little is known about the threat posed by terrorists' use of the Internet. A recent six-year-long study shows that terrorist organizations and their supporters have been using all of the tools that the Internet offers to recruit supporters, raise funds, and launch a worldwide campaign of fear. It is also clear that to combat terrorism effectively, mere suppression of their Internet tools is not enough. Our scan of the Internet in 2003-04 revealed the existence of hundreds of websites serving terrorists in different, albeit sometimes overlapping, ways... There are countless examples of how [terrorists] use this uncensored medium to spread disinformation, to deliver threats intended to instill fear and helplessness, and to disseminate horrific images of recent actions. Since September 11, 2001, al-Qaeda has festooned its websites with a string of announcements of an impending “large attack” on US targets. These warnings have received considerable media coverage, which has helped to generate a widespread sense of dread and insecurity among audiences throughout the world and especially within the United States...

The Internet has significantly expanded the opportunities for terrorists to secure publicity. Until the advent of the Internet, terrorists' hopes of winning publicity for their causes and activities depended on attracting the attention of television, radio, or the print media. The fact that terrorists themselves have direct control over the content of their websites offers further opportunities to shape how they are perceived by different target audiences and to manipulate their image and the images of their enemies. Most terrorist sites do not celebrate their violent activities. Instead— regardless of their nature, motives, or location-most terrorist sites emphasize two issues: the restrictions placed on freedom of expression; and the plight of their comrades who are now political prisoners. These issues resonate powerfully with their own supporters and are also calculated to elicit sympathy from Western audiences that cherish freedom of expression and frown on measures to silence political opposition...

Terrorists have proven not only skillful at online marketing but also adept at mining the data offered by the billion-some pages of the World Wide Web. They can learn from the Internet about the schedules and locations of targets such as transportation facilities, nuclear power plants, public buildings, airports and ports, and even counterterrorism measures. According to Secretary of Defense Donald Rumsfeld, an al-Qaeda training manual recovered in Afghanistan tells its readers, “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80 percent of all information required about the enemy.” One captured al-Qaeda computer contained engineering and structural architecture features of a dam, which had been downloaded from the Internet and which would enable al-Qaeda engineers and planners to simulate catastrophic failures. In other captured computers, U.S. investigators found evidence that al-Qaeda operators spent time on sites that offer software and programming instructions for the digital switches that run power, water, transportation, and communications grids.

Like many other political organizations, terrorist groups use the Internet to raise funds. Al-Qaeda, for instance, has always depended heavily on donations, and its global fundraising network is built upon a foundation of charities, nongovernmental organizations, and other financial institutions that use websites and Internet-based chat rooms and forums. The fighters in the Russian breakaway republic of Chechnya have likewise used the Internet to publicize the numbers of bank accounts to which sympathizers can contribute. And in December 2001, the U.S. government seized the assets of a Texas-based charity because of its ties to Hamas.

In addition to soliciting financial aid online, terrorists recruit converts by using the full panoply of website technologies (audio, digital video, etc.) to enhance the presentation of their message. And like commercial sites that track visitors to develop consumer profiles, terrorist organizations capture information about the users who browse their websites. Visitors who seem most interested in the organization's cause or well suited to carrying out its work are then contacted. Recruiters may also use more interactive Internet technology to roam online chat rooms and cyber cafes, looking for receptive members of the public, particularly young people. The SITE Institute, a Washington, D.C.-based terrorism research group that monitors al-Qaeda's Internet communications, has provided chilling details of a high-tech recruitment drive launched in 2003 to recruit fighters to travel to Iraq and attack U.S. and coalition forces there. The Internet also grants terrorists a cheap and efficient means of networking. Many terrorist groups, among them Hamas and al-Qaeda, have undergone a transformation from strictly hierarchical organizations with designated leaders to affiliations of semi-independent cells that have no single commanding hierarchy. Through the Internet, these loosely interconnected groups are able to maintain contact with one another-and with members of other terrorist groups. The Internet connects not only members of the same terrorist organizations but also members of different groups. For instance, dozens of sites supporting terrorism in the name of jihad permit terrorists in places as far-removed from one another as Chechnya and Malaysia to exchange ideas and practical information about how to build bombs, establish terror cells, and carry out attacks... Al-Qaeda operatives relied heavily on the Internet in planning and coordinating the September 11 attacks.

For all of these reasons we are just at the beginning of understanding the geopolitical impact of the flattening of the world.


  • Ñòðàíèöû:
    1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34