Building upon the U.S. Intelligence Community “Global Water Security” Assessment

Considering any issue in terms of strategic foresight and warning for national security demands, first and foremost, a minimal understanding of the issue itself, which is notably obtained by reaching out to experts in the related fields, as done by the ICA. This is true for water as for any other issue. Without this initial enquiry, it is impossible to even hope delivering proper foresight and warning to policy-makers. It is only after the issue is understood that we may sieve our analysis through the various filters of national security, mission of the institution carrying the analysis and finally complex policy-making system.

Focusing initially on an understanding of water, without any self-imposed restriction, will underline three major points, already sparsely evidenced in the ICA, and upon which we could build more systematically for an even better, and more actionable strategic foresight and warning on water related security issues.

Moving beyond a deceptive anthropocentric water usage

water, water security, risk

First, and as underlined by all studies on water, including by the ICA, water on Earth is distributed according to various forms and places.

The most widely used estimate of water distribution was established by Igor Shiklomanov (1993) and is similar to a more recent assessment (Gleick, 1996), as the two tables below, extracted from the USGS website, show. It would appear that the ICA uses the same figures, approximations on percentages apart.*

As a result, most studies dealing with water as security issue mainly focus on freshwater, especially freshwater most commonly used by human beings, i.e. rivers and lakes, as well as groundwater. This is how the ICA proceeds, indeed emphasising that “we do not do a comprehensive analysis of the entire global water landscape” (Scope Note). However, one also finds throughout the assessment, evidence that the ICA does not actually limit itself to this approach, as we shall see.

It is indeed necessary to define and most often reduce the scope of any study, as well as to focus on specific objectives, here national interest. Human usage of water is obviously crucial for survival, likely to generate tensions and thus of primary importance to national security. However, because we are here considering potential threats and opportunities to national security, are we sure we can reduce our area of concern to human usage?

Indeed, usage on the one hand and threats or opportunities on the other are not synonymous, notably in the context of climate change and other anthropogenic changes  (i.e. changes caused by humans) we must face nowadays.

For example, we now know that a drop in biodiversity may enhance the risks of epidemics (Suzán et al. 2009; Sohn 2009). Hence, if biodiversity is reduced as a result of water-related changes, then we could have increased risks of diseases, which go beyond those already underlined by the ICA p.5.

“Patterns of threat” by Rivers in Crisis – data

Instances of such risks to biodiversity have been identified, for example, in “Global Threats to Human Water Security and River Biodiversity” (published in Nature in 2010 and with a dedicated website showing, among other, interactive maps of threats). This study finds notably that “80% of the world’s population is exposed to high levels of threat to water security… while “biodiversity,” is jeopardized, “with habitats associated with 65% of continental discharge classified as moderately to highly threatened.” It shows that technological efforts in richer countries focus on reducing threats to human water security, but do not pay attention to biodiversity.

Thus, most probably, the risks of epidemics are not only higher than emphasised in the ICA, but also present on a much larger territory – including most of the so-called richer world, as shown  in yellow on the map – and could involve a wider range of diseases. Such qualifications of threats cannot be neglected in terms of national security.

This example means that our assessments would be enhanced if we were changing the initial focus of investigation. Security issues related to water usage for humans are only one aspect we must address. We need to consider water even when it is not of direct use to humans, i.e. when it affects biodiversity.

Interestingly, the ICA itself underlines this point – and more – when it judges “that, from now through 2040, improved water management will afford the best solutions for water problems” and explains that efficient water management is the “use of an integrated water resource management framework that assesses the whole ecosystem and then uses technology and infrastructure for efficient water use, flood control, redistribution of water, and preservation of water quality” (p.6).

It would be highly beneficial – if difficult – to start working towards a process allowing us to  also include systematically such integrated approach for threats (and opportunities) assessment.

Integrating the whole water cycle

Second, as far as water is concerned, the Earth is most often considered as a closed system (USGS), i.e. a system that only exchanges energy with its environment.**

If we are in the case of a closed system, this means that the overall amount of water on earth, whatever its form, does not vary. It can neither augment nor diminish but is transformed and transported through the water cycle, as depicted by the USGS picture below, where humans are represented as part of fauna. Animals will take in water from freshwater storage and plants and then return water through evapotranspiration and waste products.

The water cycle shows, even more than the previous point, the need to stop limiting ourselves to freshwater usable by humans. We must, on the contrary, consider all types of water. Indeed, freshwater is obviously heavily dependent upon other types of water, spheres (as in biosphere or hydrosphere) and processes.

Any change either to one component of the cycle, to the flow, or, worst, to the cycle itself – and this at both global and local (ecosystems) levels – has a potential to produce threats to security – or opportunities – to alter timelines for both threats occurrence and response, and to change likelihood. For example, to completely remove anything related to the oceans from water-related threats assessment may create very unfortunate blind spots indeed. As, in terms of national security, this “cycle approach” is already adopted in the case of snow, glaciers and melt-water, including in the ICA, it only needs to be applied systematically.

Considering interactions between cycles

Finally, the water cycle is also linked to two other major cycles, the carbon and nitrogen cycles.

The Carbon Cycle by Wikipedia

The water and carbon cycles are linked, notably through the processes of respiration (living beings). Thus, any change in one cycle has the potential to feed back on the other, creating chain reactions with potential threatening impacts, or, on the contrary, opportunities.

Nitrogen is a vital element of life. As explained by John Arthur Harrison, it is “an essential component of DNA, RNA, and proteins, the building blocks of life” (VisionLearning). Without entering into the details of the complex nitrogen cycle (see for example “The Global Water and Nitrogen Cycles” by the University of Michigan), the water and nitrogen cycles can interact in many ways, for example through atmospheric nitrogen and acid rains, changed water pH, freshwater polluted by excess nitrogen, eutrophication, etc. Again, change to one cycle will affect the other with impact on threats and opportunities assessment.

Parts of the feedbacks between cycles are already considered, for example, through the increasingly reduced availability of safe drinking water, and through various water-related impacts on food security. However, it would be necessary to develop a multi-disciplinary effort that would allow us to truly and exhaustively envision potential feedback effects between cycles aiming at improving threats and opportunities identification and evaluation (including impact, timeline and likelihood).

Grounding systematically global water security and related threats and opportunities assessment  in an approach moving away from restrictive and deceptive anthropocentric usage, focusing on the whole water cycle at both global and local level and integrating feedbacks with other related cycles would yield crucial further insights in terms of likelihood, timeline, impacts as well as nature of threats.

It would thus enhance the overall product, as well as pertinence for policy-makers and decision-makers. It would also generate vital improvements in terms of indicators and monitoring, which would need to be organised with outreach, considering the scope of the endeavour.

Transition towards such an approach is already underway as many of its elements, besides the more classical national security orientation, are found in the ICA, if we take the “Global Water Security” assessment as representative of anticipatory products for national security. Change needs however to be systematised.


* The source given by the ICA, “World Bank 2010,” is incomplete and insufficient to trace the data used.

** We should however note that the endogenous and the exogenous (for example “having been delivered by comet impacts – e.g. Morbidelli et al 2000”) appearance of water on Earth seem to be still debated (UCLA IGPP) and that the water system can also be considered as open through exchanges at the level of the atomic constituents of water (hydrogen and oxygen).


This article was selected to be re-posted as part of AlertNet’s special multimedia report Reuters Foundation – “The Battle for Water:” The Battle for Water – Global water security: moving towards worldwide assessment


References

Gleick, P. H., 1996: “Water resources.” In Encyclopedia of Climate and Weather, ed. by S. H. Schneider, (Oxford University Press, New York, vol. 2).

Harrison, John Arthur, “The Nitrogen Cycle: Of Microbes and Men.” VisionLearning, Accessed 27 March 2012.

Morbidelli A. Chambers J. Junine J.I. Petit J.M. Robert F. Valsecchi G.B. and Cyr K.E. 2000. “Source regions and timescales for the delivery of water to the Earth.” Meteoritics & Planetary Science 35: 1309-1320.

Shiklomanov, Igor “World fresh water resources” in Peter H. Gleick (editor), 1993, Water in Crisis: A Guide to the World’s Fresh Water Resources (Oxford University Press, New York).

Sohn, Emily, “Animal Biodiversity Keeps People Healthy.”  Discovery News, May 19, 2009.

Suzán G, Marcé E, Giermakowski JT, Mills JN, Ceballos G, et al. (2009), “Experimental Evidence for Reduced Rodent Diversity Causing Increased Hantavirus Prevalence.” PLoS ONE 4(5): e5461. doi:10.1371/journal.pone.0005461.

U.S. Intelligence Community Assessment, Global Water Security, 2 February 2012.

UCLA IGPP Center for Astrobiology – NASA Astrobiology Institute;  “Cosmochemistry in an astrophysical context – relating the origin of the Solar System to processes of planet building elsewhere (Hansen, Lyons, McKeegan, Morris, Shuping, Wasson, Young); accesed 27 March 2012.

University of Michigan, “The Global Water and Nitrogen Cycles.” Accessed 27 March 2012.

USGS, Water Science fo Schools, last updated 2012. Accessed 27 March 2012.

Vörösmarty, C. J. et al. “Global threats to human water security and river biodiversity.” Nature 467, 555–561 (30 September 2010) doi:10.1038/nature09440.

Wikipedia, various entries.

Global Water Security: a US Intelligence Community Assessment

The ODNI has released the unclassified version of the latest US Intelligence Community Assessment on Global Water Security (Feb 2012). Very interesting! For thoughts on the ICA see Building upon the 2012 “Global Water Security” IC Assessment.

Click on the image below to download the ICA in pdf.

Images to illustrate Complexity Science & Strategic Foresight and Warning

Images related to complexity science I found useful in putting together a presentation dealing with Strategic Foresight and Warning and Complexity

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

2213 – 2218 EVT – A Current Account Surplus? Think again! (Mamominarch)

Last weeks’ summary: In 2212 EVT, Everstate (the ideal-type corresponding to our very real countries created to foresee the future of governance and of the modern nation-state) knows a rising dissatisfaction of its population. To face the various difficulties and widespread discontent, in a first scenario, Everstate’s governing bodies have transformed the conclusions of the Mamominarch Commission into policies. They have thus started implementing the programme of drastic reduction of public expenses through privatization and outsourcing, transfer of responsibilities to local administrations and increased reliance on The Regional Union, accompanied by a temporary increase in income and consumption taxes. The first months of reforms have been successful and the situation appears to improve.(The reader can click on each picture to see a larger version in a new tab – a navigating map of posts is available …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

Featured Images, Symbols & Foresight Product: the Example of The Chronicles of Everstate

(updated 17 April 2012) When an image is featured and is meant to represent the totality of a foresight or anticipatory product, or a large section of it, it must capture the gist of the product. Symbols and symbolism are then crucial to transmit messages. This importance of symbols should anyway be considered for any use of image (as well as when developing a scenario narrative, for example when choosing names). This will be exemplified here with the Chronicles of Everstate. The image aims at capturing symbolically the features of the contemporary (early 21st century) modern nation-state: It, of course, is an heir to Hobbes Leviathan. However, compared with the original image, the head of the sovereign is not displayed …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

Visual Tools and Design for Foresight Products

Delivery to clients of strategic foresight and warning (SF&W) or futures related products is, as we saw, a crucial part of the overall SF&W process. Without delivery, there is neither warning nor foresight, however accurate and brilliant the underlying analyses. As crucial, although very difficult to achieve, is the fact that clients or customers must pay heed to the foresight product or to the warning. Initially, according to the intelligence literature, notably on surprise, or to exchanges with practitioners, this part of the process is seen as so difficult indeed that it is not considered as being the responsibility of the foresight and warning – or risk – analyst, officer or of the scientist if we include science in SF&W, given the predictive …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

2212-2213 EVT – Implementing the Mamominarch conclusions

Last weeks’ summary: In 2012 EVT, Everstate (the ideal-type corresponding to our very real countries created to foresee the future of governance and of the modern nation-state) knows a rising dissatisfaction of its population. To face the various difficulties and widespread discontent, Everstate’s governing authorities decide to follow the conclusions of the Mamominarch Commission that recommend to drastically reduce state expenditures. (The reader can click on each picture to see a larger version in a new tab – a navigating map of posts is available to ease reading – methodological or research note at the bottom of the post). The Mamominarch conclusions become policy All governing bodies thus adopt the conclusions of the Mamominarch Commission. New laws are enacted when needed, which is easily done as the major parties seating in …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

Anonymous: a new political force?

Anonymous: a new political force?

Anonymous, the Anonymous movement, idea or “Internet meme,” to use Wikipedia characterisation, has become an increasingly important actor on the global political scene, which cannot be ignored anymore.

It is, however, rarely seen as a political actor, despite Anonymous’ evolution, as Al Jazeera’s excellent timeline makes quite clear, as Quinn Norton for Wired details with her very interesting three-part series examining the history of Anonymous, or as shown on the video A Short, Strange History of Anonymous posted by Ryan Singel for Wired.

It is rather usually labelled as a group composed of hacktivists (most media), hackers and IT criminals (e.g. Interpol), even recently as hackers who “could have the ability within the next year or two to bring about a limited power outage through a cyber attack” in the US, as reported by The Wall Street Journal, citing comments by the Director of the National Security Agency U.S. Cyber Command Gen. Keith Alexander, done “in private meetings at the White House and elsewhere“(CNET).

On the contrary, for Anonymous participants (Anons), Anonymous is indeed “an idea,” (AP citing twitter) “the will of the people” (CNET interview). Accordingly, Anonymous creates strong reactions on a large spectrum ranging from sympathy and admiration to fear and dislike according to a recent ongoing internet polls done by SodaHeadNews.

As time allows, I shall try to follow and document here, the evolution of Anonymous as a political actor, from a political science point of view.

———-

References

Gorman, Siobhan “Alert on Hacker Power Play: U.S. Official Signals Growing Concern Over Anonymous Group’s Capabilities,” The Wall Street Journal, February 21, 2012. Accessed 5 March 2012.

Haddad, Mohammed, “Interactive timeline: Anonymous – A history of the global cyberactivist movement, from “lulz” to revolutions,” Al Jazeera, Last Modified: 19 May 2011. Accessed 5 March 2012.

Interpol, Media release, “Hackers reportedly linked to ‘Anonymous’ group targeted in global operation supported by INTERPOL,” 28 February 2012. Accessed 5 March 2012.

Keller, Greg “Interpol says suspected Anonymous hackers arrested,” Associated Press, 29 February 2012. Accessed 5 March 2012.

Mills, Elinor, “How Anonymous channels ‘the will of the people – Q&A,” February 28, 2012, CNET. Accessed 5 March 2012.

Norton, Quinn, three-part series examining the history of Anonymous, December 2011 -January 2012, Wired. Accessed 5 March 2012.

Reisinger, Don, “Scared of Anonymous? NSA chief says you should be,” CNET, February 21, 2012. Accessed 5 March 2012.

Singel, Ryan, A Short, Strange History of Anonymous (video), January 6, 2012, Wired. Accessed 5 March 2012.

SodaHead News Polls, “Police Arrest 25 ‘Anonymous’ Hackers: Is Anonymous Admirable or Adverse?” started February 29, 2012, SodaHead News. 1,034 votes and 1,198 opinions on March 5, 2012. Accessed 5 March 2012.

Wikipedia, “Anonymous (group).” Accessed 5 March 2012.

2212 EVT – Scenario 1 – Mamominarch: Off with the State

Last weeks’ summary: In 2012 EVT, Everstate (the ideal-type corresponding to our very real countries created to foresee the future of governance and of the modern nation-state) knows a rising dissatisfaction of its population. Plagued with a deepening budget deficit and an increasing need for liquidity, a related creeping appropriation of resources while the strength of central public power weakens to the profit of various elite groups and with an outdated worldview that promotes misunderstanding, disconnect and thus inadequate actions, the political authorities are increasingly unable to deliver the security citizens seek and risks to the legitimacy of the whole system increases. Alarmed by the rising difficulties and widespread discontent, the governing authorities decide to do something. Three potential scenarios or stories will be told: “Mamominarch: Off with the State,” “Panglossy: Same Old, Same Old,” and …

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

EN