Chat with us, powered by LiveChat essay question | Writedemy

essay question

essay question

415

China-United States Manhattan Project, a crash program to jointly develop clean

alternative energies, bringing together China’s best scientists and its political

ability to implement pilot projects, with America’s best brains, technology, and

money. It would be the ideal model and the ideal project for creating value

horizontally, with each side contributing its strength. Said Scott Roberts, the

Cambridge Energy Research Associates analyst in China, “When it comes to renewable

technology and sustainable energy, China could be the laboratory of the world-not

just the workshop of the world.” Why not?

::::: TWELVE

The Dell Theory of Conflict Prevention

Old-Time Versus Just-in-Time

Free Trade is God’s diplomacy. There is no other certain way of uniting people in

the bonds of peace. -British politician Richard Cobden, 1857

Before I share with you the subject of this chapter, I have to tell you a little bit

about the computer that I wrote this book on. It’s related to the theme I am about

to discuss. This book was largely written on a Dell Inspiron 600m notebook, service

tag number 9ZRJP41. As part of the research for this book71 visited with the management

team at Dell near Austin, Texas. I shared with them the ideas in this book and in

return I asked for one favor: I asked them to trace for me the entire global supply

chain that produced my Dell notebook. Here is their report: My computer was conceived

when I phoned Dell’s 800 number on April 2, 2004, and was connected to sales

representative Mujteba Naqvi, who immediately entered my order into Dell’s order

management system. He typed in both the type of notebook I ordered as well as the

special features I wanted, along with my personal information, shipping address,

billing address, and credit card information. My credit card was verified by Dell

through its work flow connection with Visa, and my order was then released to Dell’s

production system. Dell has six factories around the world-in Limerick, Ireland;

Xiamen, China; Eldorado do Sul, Brazil; Nashville, Tennesee; Austin, Texas; and

Penang, Malaysia. My order went out by e-mail to the Dell notebook factory in Malaysia,

where the parts for the computer were immediately ordered from the supplier logistics

centers (SLCs) next to the Penang factory. Surrounding every Dell factory in the world

are these supplier logistics centers, owned by the different suppliers of Dell parts.

These SLCs are like staging areas. If you are a Dell supplier anywhere in the world,

your job is to keep your SLC full of your specific parts so they can constantly be

trucked over to the Dell factory for just-in-time manufacturing.

“In an average day, we sell 140,000 to 150,000 computers,” explained Dick Hunter,

one of Dell’s three global production managers. “Those orders come in over Dell.com

or over the telephone. As soon these orders come in, our suppliers know about it.

They get a signal based on every component in the machine you ordered, so the supplier

knows just what he has to deliver. If you are supplying power cords for desktops,

you can see minute by minute how many power cords you are going to have to deliver.”

Every two hours, the Dell factory in Penang sends an e-mail to the various SLCs nearby,

416

telling each one what parts and what quantities of those parts it wants delivered

within the next ninety minutes-and not one minute later. Within ninety minutes, trucks

from the various SLCs around Penang pull up to the Dell manufacturing plant and unload

the parts needed for all those notebooks ordered in the last two hours. This goes

on all day, every two hours. As soon as those parts arrive at the factory, it takes

thirty minutes for Dell employees to unload the parts, register their bar codes, and

put them into the bins for assembly. “We know where every part in every SLC is in

the Dell system at all times,” said Hunter.

So where did the parts for my notebook come from? I asked Hunter. To begin with, he

said, the notebook was codesigned in Austin, Texas, and in Taiwan by a team of Dell

engineers and a team of Taiwanese notebook designers. “The customer’s needs, required

technologies, and Dell’s design innovations were all determined by Dell through our

direct relationship with customers,” he explained. “The basic design of the

motherboard and case-the basic functionality of your machine-was designed to those

specifications by an ODM [original design manufacturer] in Taiwan. We put our

engineers in their facilities and they come to Austin and we actually codesign these

systems. This global teamwork

brings an added benefit-a globally distributed virtually twenty-four-hour-per-day

development cycle. Our partners do the basic electronics and we help them design

customer and reliability features that we know our customers want. We know the

customers better than our suppliers and our competition, because we are dealing

directly with them every day.” Dell notebooks are completely redesigned roughly every

twelve months, but new features are constantly added during the year- through the

supply chain-as the hardware and software components advance.

It happened that when my notebook order hit the Dell factory in Penang, one part was

not available-the wireless card-due to a quality control issue, so the assembly of

the notebook was delayed for a few days. Then the truck full of good wireless cards

arrived. On April 13, at 10:15 a.m., a Dell Malaysia worker pulled the order slip

that automatically popped up once all my parts had arrived from the SLCs to the Penang

factory. Another Dell Malaysia employee then took out a “traveler”-a special carrying

tote designed to hold and protect parts-and started plucking all the parts that went

into my notebook.

Where did those parts come from? Dell uses multiple suppliers for most of the thirty

key components that go into its notebooks. That way if one supplier breaks down or

cannot meet a surge in demand, Dell is not left in the lurch. So here are the key

suppliers for my Inspiron 600m notebook: The Intel microprocessor came from an Intel

factory either in the Philippines, Costa Rica, Malaysia, or China. The memory came

from a Korean-owned factory in Korea (Samsung), a Taiwanese-owned factory in Taiwan

(Nanya), a German-owned factory in Germany (Infineon), or a Japanese-owned factory

in Japan (Elpida). My graphics card was shipped from either a Taiwanese-owned factory

in China (MSI) or a Chinese-run factory in China (Foxconn). The cooling fan came from

a Taiwanese-owned factory in Taiwan (CCI or Auras). The motherboard came from either

a Korean-owned factory in Shanghai (Samsung), a Taiwanese-owned factory in Shanghai

(Quanta), or a Taiwanese-owned factory in Taiwan (Compal or Wistron). The keyboard

came from either a Japanese-owned company in Tianjin, China (Alps), a Taiwanese-owned

factory in Shenzen, China (Sunrex), or a Taiwanese-

417

owned factory in Suzhou, China (Darfon). The LCD display was made in either South

Korea (Samsung or LG.Philips LCD), Japan (Toshiba or Sharp), or Taiwan (Chi Mei

Optoelectronics, Hannstar Display, or AU Optronics). The wireless card came from

either an American-owned factory in China (Agere) or Malaysia (Arrow), or a

Taiwanese-owned factory in Taiwan (Askey or Gemtek) or China (USI). The modem was

made by either a Taiwanese-owned company in China (Asustek or Liteon) or a Chinese-run

company in China (Foxconn). The battery came from an American-owned factory in

Malaysia (Motorola), a Japanese-owned factory in Mexico or Malaysia or China (Sanyo),

or a South Korean or Taiwanese factory in either of those two countries (SDI or Simplo).

The hard disk drive was made by an American-owned factory in Singapore (Seagate),

a Japanese-owned company in Thailand (Hitachi or Fujitsu), or a Japanese-owned

factory in the Philippines (Toshiba). The CD/DVD drive came from a South Korean-owned

company with factories in Indonesia and the Philippines (Samsung); a Japanese-owned

factory in China or Malaysia (NEC); a Japanese-owned factory in Indonesia, China,

or Malaysia (Teac); or a Japanese-owned factory in China (Sony). The notebook carrying

bag was made by either an Irish-owned company in China (Tenba) or an American-owned

company in China (Targus, Samsonite, or Pacific Design). The power adapter was made

by either a Thai-owned factory in Thailand (Delta) or a Taiwanese, Korean, or

American-owned factory in China (Liteon, Samsung, or Mobility). The power cord was

made by a British-owned company with factories in China, Malaysia, and India (Volex).

The removable memory stick was made by either an Israeli-owned company in Israel

(M-System) or an American-owned company with a factory in Malaysia (Smart Modular).

This supply chain symphony-from my order over the phone to production to delivery

to my house-is one of the wonders of the flat world.

“We have to do a lot of collaborating,” said Hunter. “Michael [Dell] personally knows

the CEOs of these companies, and we are constantly working with them on process

improvements and real-time demand/supply balancing.” Demand shaping goes on

constantly, said Hunter. What is “demand shaping”? It works like this: At 10 a.m.

Austin time, Dell discovers that so many customers have ordered notebooks with

40-gigabyte

418

hard drives since the morning that its supply chain will run short in two hours. That

signal is automatically relayed to Dell’s marketing department and to Dell.com and

to all the Dell phone operators taking orders. If you happen to call to place your

Dell order at 10:30 a.m., the Dell representative will say to you, “Tom, it’s your

lucky day! For the next hour we are offering 60-gigabyte hard drives with the notebook

you want-for only $10 more than the 40-gig drive. And if you act now, Dell will throw

in a carrying case along with your purchase, because we so value you as a customer.”

In an hour or two, using such promotions, Dell can reshape the demand for any part

of any notebook or desktop to correspond with the projected supply in its global supply

419

chain. Today memory might be on sale, tomorrow it might be CD-ROMs.

Picking up the story of my notebook, on April 13, at 11:29 a.m., all the parts had

been plucked from the just-in-time inventory bins in Penang, and the computer was

assembled there by A. Sathini, a team member “who manually screwed together all of

the parts from kitting as well as the labels needed for Tom’s system,” said Dell in

their production report to me. “The system was then sent down the conveyor to go to

burn, where Tom’s specified software was downloaded.” Dell has huge server banks

stocked with the latest in Microsoft, Norton Utilities, and other popular software

applications, which are downloaded into each new computer according to the specific

tastes of the customer.

“By 2:45 p.m., Tom’s software had been successfully downloaded, and [was] manually

moved to the boxing line. By 4:05 p.m., Tom’s system [was] placed in protective foam

and a shuttle box, with a label, which contains his order number, tracking code, system

type, and shipping code. By 6:04 p.m., Tom’s system had been loaded on a pallet with

a specified manifest, which gives the Merge facility visibility to when the system

will arrive, what pallet it will be on (out of 75+ pallets with 152 systems per pallet),

and to what address Tom’s system will ship. By 6:26 p.m., Tom’s system left [the Dell

factory] to head to the Penang, Malaysia, airport.”

Six days a week Dell charters a China Airlines 747 out of Taiwan and flies it from

Penang to Nashville via Taipei. Each 747 leaves with twenty-five thousand Dell

notebooks that weigh altogether 110,000 kilograms,

or 50,000 pounds. It is the only 747 that ever lands in Nashville, except Air Force

One, when the president visits. “By April 15, 2004, at 7:41 a.m., Tom’s system arrived

at [Nashville] with other Dell systems from Penang and Limerick. By 11:58 a.m., Tom’s

system [was] inserted into a larger box, which went down the boxing line to the

specific external parts that Tom had ordered.”

That was thirteen days after I’d ordered it. Had there not been a parts delay in

Malaysia when my order first arrived, the time between when I phoned in my purchase,

when the notebook was assembled in Penang, and its arrival in Nashville would have

been only four days. Hunter said the total supply chain for my computer, including

suppliers of suppliers, involved about four hundred companies in North America,

Europe, and primarily Asia, but with thirty key players. Somehow, though, it all came

together. As Dell reported: On April 15, 2004, at 12:59 p.m., “Tom’s system had been

shipped from [Nashville] and was tenured by UPS shipping LTL (3-5-day ground,

specified by Tom), with UPS tracking number 1Z13WA374253514697. By April 19, 2004,

at 6:41 p.m., Tom’s system arrived in Bethesda, MD, and was signed for.”

I am telling you the story of my notebook to tell a larger story of geopolitics in

the flat world. To all the forces mentioned in the previous chapter that are still

holding back the flattening of the world, or could actually reverse the process, one

has to add a more traditional threat, and that is an outbreak of a good, old-fashioned,

world-shaking, economy-destroying war. It could be China deciding once and for all

to eliminate Taiwan as an independent state; or North Korea, out of fear or insanity,

using one of its nuclear weapons against South Korea or Japan; or Israel and a

soon-to-be-nuclear Iran going at each other; or India and Pakistan finally nuking

it out. These and other classic geopolitical conflicts could erupt at any time and

either slow the flattening of the world or seriously unflatten it.

The real subject of this chapter is how these classic geopolitical threats might be

moderated or influenced by the new forms of collaboration fostered and demanded by

the flat world-particularly supply-

420

chaining. The flattening of the world is too young for us to draw any definitive

conclusions. What is certain, though, is that as the world flattens, one of the most

interesting dramas to watch in international relations will be the interplay between

the traditional global threats and the newly emergent global supply chains. The

interaction between old-time threats (like China versus Taiwan) and just-in-time

supply chains (like China plus Taiwan) will be a rich source of study for the field

of international relations in the early twenty-first century.

In The Lexus and the Olive Tree I argued that to the extent that countries tied their

economies and futures to global integration and trade, it would act as a restraint

on going to war with their neighbors. I first started thinking about this in the late

1990s, when, during my travels, I noticed that no two countries that both had

McDonald’s had ever fought a war against each other since each got its McDonald’s.

(Border skirmishes and civil wars don’t count, because McDonald’s usually served both

sides.) After confirming this with McDonald’s, I offered what I called the Golden

Arches Theory of Conflict Prevention. The Golden Arches Theory stipulated that when

a country reached the level of economic development where it had a middle class big

enough to support a network of McDonald’s, it became a McDonald’s country. And people

in McDonald’s countries didn’t like to fight wars anymore. They preferred to wait

in line for burgers. While this was offered slightly tongue in cheek, the serious

point I was trying to make was that as countries got woven into the fabric of global

trade and rising living standards, which having a network of McDonald’s franchises

had come to symbolize, the cost of war for victor and vanquished became prohibitively

high.

This McDonald’s theory has held up pretty well, but now that almost every country

has acquired a McDonald’s, except the worst rogues like North Korea, Iran, and Iraq

under Saddam Hussein, it seemed to me that this theory needed updating for the flat

world. In that spirit, and again with tongue slightly in cheek, I offer the Dell Theory

of Conflict Prevention, the essence of which is that the advent and spread of

just-in-time global supply chains in the flat world are an even greater restraint

on geopolitical adventurism than the more general rising standard of living that

McDonald’s symbolized.

421

The Dell Theory stipulates: No two countries that are both part of a major global

supply chain, like Dell’s, will ever fight a war against each other as long as they

are both part of the same global supply chain. Because people embedded in major global

supply chains don’t want to fight old-time wars anymore. They want to make

just-in-time deliveries of goods

422

and services -and enjoy the rising standards of living that come with that. One of

the people with the best feel for the logic behind this theory is Michael Dell, the

founder and chairman of Dell.

“These countries understand the risk premium that they have,” said Dell of the

countries in his Asian supply chain. “They are pretty careful to protect the equity

that they have built up or tell us why we should not worry [about their doing anything

adventurous]. My belief after visiting China is that the change that has occurred

there is in the best interest of the world and China. Once people get a taste for

whatever you want to call it-economic independence, a better lifestyle, and a better

life for their child or children-they grab on to that and don’t want to give it up.”

Any sort of war or prolonged political upheaval in East Asia or China “would have

a massive chilling effect on the investment there and on all the progress that has

been made there,” said Dell, who added that he believes the governments in that part

of the world understand this very clearly. “We certainly make clear to them that

stability is important to us. [Right now] it is not a day-to-day worry for us …

I believe that as time and progress go on there, the chance for a really disruptive

event goes down exponentially. I don’t think our industry gets enough credit for the

good we are doing in these areas. If you are making money and being productive and

raising your standard of living, you’re not sitting around thinking, Who did this

to us? or Why is our life so bad?”

There is a lot of truth to this. Countries whose workers and industries are woven

into a major global supply chain know that they cannot take an hour, a week, or a

month off for war without disrupting industries and economies around the world and

thereby risking the loss of their place in that supply chain for a long time, which

could be extremely costly. For a country with no natural resources, being part of

a global supply chain is like striking oil-oil that never runs out. And therefore,

getting dropped from such a chain because you start a war is like having your oil

wells go

dry or having someone pour cement down them. They will not come back anytime soon.

“You are going to pay for it really dearly,” said Glenn E. Neland, senior vice

president for worldwide procurement at Dell, when I asked him what would happen to

a major supply-chain member in Asia that decided to start fighting with its neighbor

and disrupt the supply chain. “It will not only bring you to your knees [today], but

you will pay for a long time-because you just won’t have any credibility if you

demonstrate you are going to go [off] the political deep end. And China is just now

starting to develop a level of credibility in the business community that it is

creating a business environment you can prosper in-with transparent and consistent

rules.” Neland said that suppliers regularly ask him whether he is worried about China

and Taiwan, which have threatened to go to war at several points in the past half

century, but his standard response is that he cannot imagine them “doing anything

more than flexing muscles with each other.” Neland said he can tell in his

conversations and dealings with companies and governments in the Dell supply chain,

particularly the Chinese, that “they recognize the opportunity and are really hungry

423

to participate in the same things they have seen other countries in Asia do. They

know there is a big economic pot at the end of the rainbow and they are really after

it. We will spend about $35 billion producing parts this year, and 30 percent of that

is [in] China.”

If you follow the evolution of supply chains, added Neland, you see the prosperity

and stability they promoted first in Japan, and then in Korea and Taiwan, and now

in Malaysia, Singapore, the Philippines, Thailand, and Indonesia. Once countries get

embedded in these global supply chains, “they feel part of something much bigger than

their own businesses,” he said. Osamu Watanabe, the CEO of the Japan External Trade

Organization (JETRO), was explaining to me one afternoon in Tokyo how Japanese

companies were moving vast amounts of low- and middle-range technical work and

manufacturing to China, doing the basic fabrication there, and then bringing it back

to Japan for final assembly. Japan was doing this despite a bitter legacy of mistrust

between the two countries, which was intensified by the Japanese invasion of China

in the last century. Historically, he noted, a strong Japan and a strong

China have had a hard time coexisting. But not today, at least not for the moment.

Why not? I asked. The reason you can have a strong Japan and a strong China at the

same time, he said, “is because of the supply chain.” It is a win-win for both.

Obviously, since Iraq, Syria, south Lebanon, North Korea, Pakistan, Afghanistan, and

Iran are not part of any major global supply chains, all of them remain hot spots

that could explode at any time and slow or reverse the flattening of the world. As

my own notebook story attests, the most important test case of the Dell Theory of

Conflict Prevention is the situation between China and Taiwan-since both are deeply

embedded in several of the world’s most important computer, consumer electronics,

and, increasingly, software supply chains. The vast majority of computer components

for every major company comes from coastal China, Taiwan, and East Asia. In addition,

Taiwan alone has more than $100 billion in investments in mainland China today, and

Taiwanese experts run many of the cutting-edge Chinese high-tech manufacturing

companies.

It is no wonder that Craig Addison, the former editor of Electronic Business Asia

magazine, wrote an essay for the International Herald Tribune (September 29, 2000),

headlined “A ‘Silicon Shield’ Protects Taiwan from China.” He argued that

“Silicon-based products, such as computers and networking systems, form the basis

of the digital economies in the United States, Japan and other developed nations.

In the past decade, Taiwan has become the third-largest information technology

hardware producer after the United States and Japan. Military aggression by China

against Taiwan would cut off a large portion of the world’s supply of these

products . . . Such a development would wipe trillions of dollars off the market value

of technology companies listed in the United States, Japan and Europe.” Even if

China’s leaders, like former president Jiang Zemin, who was once minister of

electronics, lose sight of how integrated China and Taiwan are in the world’s computer

supply chain, they need only ask their kids for an update. Jiang Zemin’s son, Jiang

Mianheng, wrote Addison, “is a partner in a wafer fabrication project in Shanghai

with Winston Wang of Taiwan’s Grace T.H.W. Group.” And it is not just Taiwanese.

Hundreds of big American tech companies now have R & D operations in China; a war

that disrupted them could

424

lead not only to the companies moving their plants elsewhere but also to a significant

loss of R & D investment in China, which the Beijing government has been betting on

to advance its development. Such a war could also, depending on how it started, trigger

a widespread American boycott of Chinese goods-if China were to snuff out the

Taiwanese democracy-which would lead to serious economic turmoil inside China.

The Dell Theory had its first real test in December 2004, when Taiwan held

parliamentary elections. President Chen Shui-bian’s pro-independence Democratic

Progressive Party was expected to win the legislative runoff over the main opposition

Nationalist Party, which favored closer ties with Beijing. Chen framed the election

as a popular referendum on his proposal to write a new constitution that would formally

enshrine Taiwan’s independence, ending the purposely ambiguous status quo. Had Chen

won and moved ahead on his agenda to make Taiwan its own motherland, as opposed to

maintaining the status quo fiction that it is a province of the mainland, it could

have led to a Chinese military assault on Taiwan. Everyone in the region was holding

his or her breath. And what happened? Motherboards won over motherland. A majority

of Taiwanese voted against the pro-independence governing party legislative

candidates, ensuring that the DPP would not have a majority in parliament. I believe

the message Taiwanese voters were sending was not that they never want Taiwan to be

independent. It was that they do not want to upset the status quo right now, which

has been so beneficial to so many Taiwanese. The voters seemed to understand clearly

how interwoven they had become with the mainland, and they wisely opted to maintain

their de facto independence rather than force de jure independence, which might have

triggered a Chinese invasion and a very uncertain future.

Warning: What I said when I put forth the McDonald’s theory, I would repeat even more

strenuously with the Dell Theory: It does not make wars obsolete. And it does not

guarantee that governments will not engage in wars of choice, even governments that

are part of major supply chains. To suggest so would be naive. It guarantees only

that governments whose countries are enmeshed in global supply chains will have

425

to think three times, not just twice, about engaging in anything but a war of

self-defense. And if they choose to go to war anyway, the price they will pay will

be ten times higher than it was a decade ago and probably ten times higher than whatever

the leaders of that country think. It is one thing to lose your McDonald’s. It’s quite

another to fight a war that costs you your place in a twenty-first-century supply

chain that may not come back around for a long time.

While the biggest test case of the Dell Theory is China versus Taiwan, the fact is

that the Dell Theory has already proved itself to some degree in the case of India

and Pakistan, the context in which I first started to think about it. I happened to

be in India in 2002, when its just-in-time services supply chains ran into some very

old-time geopolitics-and the supply chain won. In the case of India and Pakistan,

426

the Dell Theory was working on only one party-India-but it still had a major impact.

India is to the world’s knowledge and service supply chain what China and Taiwan are

to the manufacturing ones. By now readers of this book know all the highlights: General

Electric’s biggest research center outside the United States is in Bangalore, with

seventeen hundred Indian engineers, designers, and scientists. The brain chips for

many brand-name cell phones are designed in Bangalore. Renting a car from Avis online?

It’s managed in Bangalore. Tracing your lost luggage on Delta or British Airways is

done from Bangalore, and the backroom accounting and computer maintenance for scores

of global firms are done from Bangalore, Mumbai, Chennai, and other major Indian

cities. Here’s what happened: On May 31, 2002, State Department spokesman Richard

Boucher issued a travel advisory saying, “We urge American citizens currently in India

to depart the country,” because the prospect of a nuclear exchange with Pakistan was

becoming very real. Both nations were massing troops on their borders, intelligence

reports were suggesting that they both might be dusting off their nuclear warheads,

and CNN was flashing images of people flooding out of India. The global American firms

that had moved their back rooms and R & D operations to Bangalore were deeply unnerved.

“I was actually surfing on the Web, and I saw a travel advisory come up on India on

a Friday evening/’ said Vivek Paul, president of Wipro, which manages backroom

operations from India of many American multinationals. “As soon as I saw that, I said,

‘Oh my gosh, every customer that we have is going to have a million questions on this.’

It was the Friday before a long weekend, so over the weekend we at Wipro developed

a fail-safe business continuity plan for all of our customers.” While Wipro’s

customers were pleased to see how on top of things the company was, many of them were

nevertheless rattled. This was not in the plan when they decided to outsource

mission-critical research and operations to India. Said Paul, “I had a CIO from one

of our big American clients send me an e-mail saying, 1 am now spending a lot of time

looking for alternative sources to India. I don’t think you want me doing that, and

I don’t want to be doing it.’ I immediately forwarded his message to the Indian

ambassador in Washington and told him to get it to the right person.” Paul would not

tell me what company it was, but I have confirmed through diplomatic sources that

it was United Technologies. And plenty of others, like American Express and General

Electric, with back rooms in Bangalore, had to have been equally worried.

For many global companies, “the main heart of their business is now supported here,”

said N. Krishnakumar, president of MindTree, another leading Indian knowledge

outsourcing firm based in Bangalore. “It can cause chaos if there is a disruption.”

While not trying to meddle in foreign affairs, he added, “What we explained to our

government, through the Confederation of Indian Industry, is that providing a stable,

predictable operating environment is now the key to India’s development.” This was

a real education for India’s elderly leaders in New Delhi, who had not fully absorbed

how critical India had become to the world’s knowledge supply chain. When you are

managing vital backroom operations for American Express or General Electric or Avis,

or are responsible for tracing all the lost luggage on British Airways or Delta, you

cannot take a month, a week, or even a day off for war without causing major disruptions

for those companies. Once those companies have made a commitment to outsource business

operations or research to India, they expect it to stay there. That is a major

commitment. And if geopolitics

427

causes a serious disruption, they will leave, and they will not come back very easily.

When you lose this kind of service trade, you can lose it for good.

“What ends up happening in the flat world you described,” explained Paul, “is that

you have only one opportunity to make it right if something [goes] wrong. Because

the disadvantage of being in a flat world is that despite all the nice engagements

and stuff and the exit barriers that you have, every customer has multiple options,

and so the sense of responsibility you have is not just out of a desire to do good

by your customers, but also a desire for self-preservation.”

The Indian government got the message. Was India’s central place in the world’s

services supply chain the only factor in getting Prime Minister Vajpayee to tone down

his rhetoric and step back from the brink? Of course not. There were other factors,

to be sure-most notably the deterrent effect of Pakistan’s own nuclear arsenal. But

clearly, India’s role in global services was an important additional source of

restraint on its behavior, and it was taken into account by New Delhi. “I think it

sobered a lot of people,” said Jerry Rao, who, as noted earlier, heads the Indian

high-tech trade association. “We engaged very seriously, and we tried to make the

point that this was very bad for Indian business. It was very bad for the Indian

economy . . . [Many people] didn’t realize till then how suddenly we had become

integrated into the rest of the world. We are now partners in a twenty-four by seven

by three-sixty-five supply chain.”

Vivek Kulkami, then information technology secretary for Bangalore’s regional

government, told me back in 2002, “We don’t get involved in politics, but we did bring

to the government’s attention the problems the Indian IT industry might face if there

were a war.” And this was an altogether new factor for New Delhi to take into

consideration. “Ten years ago, [a lobby of IT ministers from different Indian states]

never existed,” said Kulkarni. Now it is one of the most important business lobbies

in India and a coalition that no Indian government can ignore.

“With all due respect, the McDonald’s [shutting] down doesn’t hurt anything,” said

Vivek Paul, “but if Wipro had to shut down we would af-

428

feet the day-to-day operations of many, many companies.” No one would answer the

phones in call centers. Many e-commerce sites that are supported from Bangalore would

shut down. Many major companies that rely on India to maintain their key computer

applications or handle their human resources departments or billings would seize up.

And these companies did not want to find alternatives, said Paul. Switching is very

difficult, because taking over mission-critical day-to-day backroom operations of

a global company takes a great deal of training and experience. It’s not like opening

a fast-food restaurant. That was why, said Paul, Wipro’s clients were telling him,

“‘I have made an investment in you. I need you to be very responsible with the trust

I have reposed in you.’ And I think that created an enormous amount of back pressure

429

on us that said we have to act in a responsible fashion … All of a sudden it became

even clearer that there’s more to gain by economic gains than by geopolitical gains.

[We had more to gain from building] a vibrant, richer middle class able to create

an export industry than we possibly could by having an ego-satisfying war with

Pakistan.” The Indian government also looked around and realized that the vast

majority of India’s billion people were saying, “I want a better future, not more

territory.” Over and over again, when I asked young Indians working at call centers

how they felt about Kashmir or a war with Pakistan, they waved me off with the same

answer: “We have better things to do.” And they do. America needs to keep this in

mind as it weighs its overall approach to outsourcing. I would never advocate shipping

some American’s job overseas just so it will keep Indians and Pakistanis at peace

with each other. But I would say that to the extent that this process happens, driven

by its own internal economic logic, it will have a net positive geopolitical effect.

It will absolutely make the world safer for American kids.

Each of the Indian business leaders I interviewed noted that in the event of some

outrageous act of terrorism or aggression from Pakistan, India would do whatever it

takes to defend itself, and they would be the first to support that-the Dell Theory

be damned. Sometimes war is unavoidable. It is imposed on you by the reckless behavior

of others, and you have to just pay the price. But the more India and, one hopes,

soon Pakistan get enmeshed in global service supply chains, the greater disin-

centive they have to fight anything but a border skirmish or a war of words.

The example of the 2002 India-Pakistan nuclear crisis at least gives us some hope.

That cease-fire was brought to us not by General Powell but by General Electric.

We bring good things to life.

Infosys Versus al-Qaeda

Unfortunately, even GE can do only so much. Because, alas, a new source for

geopolitical instability has emerged only in recent years, for which even the updated

Dell Theory can provide no restraint. It is the emergence of mutant global supply

chains -that is, nonstate actors, be they criminals or terrorists, who learn to use

all the elements of the flat world to advance a highly destabilizing, even nihilistic

agenda. I first started thinking about this when Nandan Nilekani, the Infosys CEO,

was giving me that tour I referred to in Chapter 1 of his company’s global

videoconferencing center at its Bangalore headquarters. As Nandan explained to me

how Infosys could get its global supply chain together at once for a virtual conference

in that room, a thought popped into my head: Who else uses open-sourcing and

supply-chaining so imaginatively? The answer, of course, is al-Qaeda.

Al-Qaeda has learned to use many of the same instruments for global collaboration

that Infosys uses, but instead of producing products and profits with them, it has

produced mayhem and murder. This is a particularly difficult problem. In fact, it

may be the most vexing geopolitical problem for flat-world countries that want to

focus on the future. The flat world-unfortunately-is a friend of both Infosys and

al-Qaeda. The Dell Theory will not work at all against these informal Islamo-Leninist

terror networks, because they are not a state with a population that will hold its

leaders accountable or with a domestic business lobby that might restrain them. These

mutant global supply chains are formed for the purpose of destruction, not profit.

They don’t need investors, only recruits,

430

donors, and victims. Yet these mobile, self-financing mutant supply chains use all

the tools of collaboration offered by the flat world-open-sourcing to raise money,

to recruit followers, and to stimulate and disseminate ideas; outsourcing to train

recruits; and supply-chaining to distribute the tools and the suicide bombers to

undertake operations. The U.S. Central Command has a name for this whole underground

network: the Virtual Caliphate. And its leaders and innovators understand the flat

world almost as well as Wal-Mart, Dell, and Infosys do.

In the previous chapter, I tried to explain that you cannot understand the rise of

al-Qaeda emotionally and politically without reference to the flattening of the world.

What I am arguing here is that you cannot understand the rise of al-Qaeda technically

without reference to the flattening of the world, either. Globalization in general

has been al-Qaeda’s friend in that it has helped to solidify a revival of Muslim

identity and solidarity, with Muslims in one country much better able to see and

sympathize with the struggles of their brethren in another country-thanks to the

Internet and satellite television. At the same time, as pointed out in the previous

chapter, this flattening process has intensified the feelings of humiliation in some

quarters of the Muslim world over the fact that civilizations to which the Muslim

world once felt superior-Hindus, Jews, Christians, Chinese – are now all doing better

than many Muslim countries, and everyone can see it. The flattening of the world has

also led to more urbanization and large-scale immigration to the West of many of these

young, unemployed, frustrated Arab-Muslim males, while simultaneously making it much

easier for informal open-source networks of these young men to form, operate, and

interconnect. This certainly has been a boon for underground extremist Muslim

political groups. There has been a proliferation of these informal mutual supply

chains throughout the Arab-Muslim world today-small networks of people who move money

through hawalas (hand-to-hand financing networks), who recruit through alternative

education systems like the madrassas, and who communicate through the Internet and

other tools of the global information revolution. Think about it: A century ago,

anarchists were limited in their ability to communicate and collaborate with one

another, to find sympathizers, and to band together for an

431

operation. Today, with the Internet, that is not a problem. Today even the Unabomber

could find friends to join a consortium where his “strengths” could be magnified and

reinforced by others who had just as warped a worldview as he did.

What we have witnessed in Iraq is an even more perverse mutation of this mutant supply

chain-the suicide supply chain. Since the start of the U.S. invasion in March 2002,

more than two hundred suicide bombers have been recruited from within Iraq and from

across the Muslim world, brought to the Iraqi front by some underground railroad,

connected with the bomb makers there, and then dispatched against U.S. and Iraqi

targets according to whatever suits the daily tactical needs of the insurgent Islamist

432

forces in Iraq. I can understand, but not accept, the notion that more than

thirty-seven years of Israeli occupation of the West Bank might have driven some

Palestinians into a suicidal rage. But the American occupation of Iraq was only a

few months old before it started to get hit by this suicide supply chain. How do you

recruit so many young men “off the shelf” who are ready to commit suicide in the cause

of jihad, many of them apparently not even Iraqis? And they don’t even identify

themselves by name or want to get credit-at least in this world. The fact is that

Western intelligence agencies have no clue how this underground suicide supply chain,

which seems to have an infinite pool of recruits to draw on, works, and yet it has

basically stymied the U.S. armed forces in Iraq. From what we do know, though, this

Virtual Caliphate works just like the supply chains I described earlier. Just as you

take an item off the shelf in a discount store in Birmingham and another one is

immediately made in Beijing, so the retailers of suicide deploy a human bomber in

Baghdad and another one is immediately recruited and indoctrinated in Beirut. To the

extent that this tactic spreads, it will require a major rethinking of U.S. military

doctrine.

The flat world has also been such a huge boon for al-Qaeda and its ilk because of

the way it enables the small to act big, and the way it enables small acts-the killing

of just a few people-to have big effects. The horrific video of the beheading of Wall

Street Journal reporter Danny Pearl by Islamist militants in Pakistan was transmitted

by the Internet all over the world. There is not a journalist anywhere who saw or

even just read

about that who was not terrified. But those same beheading videos are also used as

tools of recruitment. The flat world makes it much easier for terrorists to transmit

their terror. With the Internet they don’t even have to go through Western or Arab

news organizations but can broadcast right into your computer. It takes much less

dynamite to transmit so much more anxiety. Just as the U.S. Army had embedded

journalists, so the suicide supply chain has embedded terrorists, in their own way,

to tell us their side of the story. How many times have I gotten up in the morning,

fired up the Internet, and been confronted by the video image of some masked gunman

threatening to behead an American-all brought to me courtesy of AOL’s home page? The

Internet is an enormously useful tool for the dissemination of propaganda, conspiracy

theories, and plain old untruths, because it combines a huge reach with a patina of

technology that makes anything on the Internet somehow more believable. How many times

have you heard someone say, “But I read it on the Internet,” as if that should end

the argument? In fact, the Internet can make things worse. It often leads to more

people being exposed to crazy conspiracy theories.

“The new system of diffusion-the Internet-is more likely to transmit irrationality

than rationality,” said political theorist Yaron Ezrahi, who specializes in the

interaction between media and politics. “Because irrationality is more emotionally

loaded, it requires less knowledge, it explains more to more people, it goes down

easier.” That is why conspiracy theories are so rife in the Arab-Muslim world

today-and unfortunately are becoming so in many quarters of the Western world, for

that matter. Conspiracy theories are like a drug that goes right into your bloodstream,

enabling you to see “the Light.” And the Internet is the needle. Young people used

to have to take LSD to escape. Now they just go online. Now you don’t shoot up, you

download. You download the precise point of view that speaks to all your own biases.

And the flat world makes it all so much easier.

Gabriel Weimann, a professor of communication at Haifa University, Israel, did an

incisive study of terrorists’ use of the Internet and of what I call the flat world,

which was published in March 2004 by the United States Institute of Peace and excerpted

on YaleGlobal Online on April 26, 2004. He made the following points:

433

While the danger that cyber-terrorism poses to the Internet is frequently debated,

surprisingly little is known about the threat posed by terrorists’ use of the Internet.

A recent six-year-long study shows that terrorist organizations and their supporters

have been using all of the tools that the Internet offers to recruit supporters, raise

funds, and launch a worldwide campaign of fear. It is also clear that to combat

terrorism effectively, mere suppression of their Internet tools is not enough. Our

scan of the Internet in 2003-04 revealed the existence of hundreds of websites serving

terrorists in different, albeit sometimes overlapping, ways. . . There are countless

examples of how [terrorists] use this uncensored medium to spread disinformation,

to deliver threats intended to instill fear and helplessness, and to disseminate

horrific images of recent actions. Since September 11, 2001, al-Qaeda has festooned

its websites with a string of announcements of an impending “large attack” on US

targets. These warnings have received considerable media coverage, which has helped

to generate a widespread sense of dread and insecurity among audiences throughout

the world and especially within the United States . . .

The Internet has significantly expanded the opportunities for terrorists to secure

publicity. Until the advent of the Internet, terrorists’ hopes of winning publicity

for their causes and activities depended on attracting the attention of television,

radio, or the print media. The fact that terrorists themselves have direct control

over the content of their websites offers further opportunities to shape how they

are perceived by different target audiences and to manipulate their image and the

images of their enemies. Most terrorist sites do not celebrate their violent

activities. Instead- regardless of their nature, motives, or location-most terrorist

sites emphasize two issues: the restrictions placed on freedom of expression; and

the plight of their comrades who are now political prisoners. These issues resonate

powerfully with their own supporters and are also calculated to elicit sympathy from

Western audiences that cherish freedom of expression and frown on measures to silence

political opposition . . .

434

Terrorists have proven not only skillful at online marketing but also adept at mining

the data offered by the billion-some pages of the World Wide Web. They can learn from

the Internet about the schedules and locations of targets such as transportation

facilities, nuclear power plants, public buildings, airports and ports, and even

counterterrorism measures. According to Secretary of Defense Donald Rumsfeld, an

435

al-Qaeda training manual recovered in Afghanistan tells its readers, “Using public

sources openly and without resorting to illegal means, it is possible to gather at

least 80 percent of all information required about the enemy.” One captured al-Qaeda

computer contained engineering and structural architecture features of a dam, which

had been downloaded from the Internet and which would enable al-Qaeda engineers and

planners to simulate catastrophic failures. In other captured computers, U.S.

investigators found evidence that al-Qaeda operators spent time on sites that offer

software and programming instructions for the digital switches that run power, water,

transportation, and communications grids.

Like many other political organizations, terrorist groups use the Internet to raise

funds. Al-Qaeda, for instance, has always depended heavily on donations, and its

global fundraising network is built upon a foundation of charities, nongovernmental

organizations, and other financial institutions that use websites and Internet-based

chat rooms and forums. The fighters in the Russian breakaway republic of Chechnya

have likewise used the Internet to publicize the numbers of bank accounts to which

sympathizers can contribute. And in December 2001, the U.S. government seized the

assets of a Texas-based charity because of its ties to Hamas.

In addition to soliciting financial aid online, terrorists recruit converts by using

the full panoply of website technologies (audio, digital video, etc.) to enhance the

presentation of their message. And like commercial sites that track visitors to

develop consumer profiles, terrorist organizations capture information about the

users who browse their websites. Visitors who seem most inter-

ested in the organization’s cause or well suited to carrying out its work are then

contacted. Recruiters may also use more interactive Internet technology to roam

online chat rooms and cyber cafes, looking for receptive members of the public,

particularly young people. The SITE Institute, a Washington, D.C.-based terrorism

research group that monitors al-Qaeda’s Internet communications, has provided

chilling details of a high-tech recruitment drive launched in 2003 to recruit fighters

to travel to Iraq and attack U.S. and coalition forces there. The Internet also grants

terrorists a cheap and efficient means of networking. Many terrorist groups, among

them Hamas and al-Qaeda, have undergone a transformation from strictly hierarchical

organizations with designated leaders to affiliations of semi-independent cells that

have no single commanding hierarchy. Through the Internet, these loosely

interconnected groups are able to maintain contact with one another-and with members

of other terrorist groups. The Internet connects not only members of the same

terrorist organizations but also members of different groups. For instance, dozens

of sites supporting terrorism in the name of jihad permit terrorists in places as

far-removed from one another as Chechnya and Malaysia to exchange ideas and practical

information about how to build bombs, establish terror cells, and carry out

attacks . . . Al-Qaeda operatives relied heavily on the Internet in planning and

coordinating the September 11 attacks.

For all of these reasons we are just at the beginning of understanding the geopolitical

impact of the flattening of the world. On the one hand, failed states and failed

regions are places we have every incentive to avoid today. They offer no economic

opportunity and there is no Soviet Union out there competing with us for influence

over such countries. On the other hand, there may be nothing more dangerous today

than a failed state with broadband capability. That is, even failed states tend to

have telecommunications systems and satellite links, and therefore if a terrorist

group infiltrates a failed state, as al-Qaeda did with Afghanistan, it can amplify

its power enormously. As much as big powers want to stay away

456

from such states, they may feel compelled to get even more deeply embroiled in them.

Think of America in Afghanistan and Iraq, Russia in Chechnya, Australia in East Timor.

In the flat world it is much more difficult to hide, but much easier to get connected.

“Think of Mao at the beginning of the Chinese communist revolution,” remarked Michael

Mandelbaum, the Johns Hopkins foreign policy specialist. “The Chinese Communists had

to hide in caves in northwest China, but they could move around in whatever territory

they were able to control. Bin Laden, by contrast, can’t show his face, but he can

reach every household in the world, thanks to the Internet.” Bin Laden cannot capture

any territory but he can capture the imagination of millions of people. And he has,

broadcasting right into American living rooms on the eve of the 2004 presidential

election.

Hell hath no fury like a terrorist with a satellite dish and an interactive Web site.

Too Personally Insecure

In the fall of 2004,1 was invited to speak at a synagogue in Woodstock, New York,

home of the famous Woodstock music festival. I asked my hosts how was it that they

were able to get a synagogue in Woodstock, of all places, big enough to support a

lecture series. Very simple, they said. Since 9/11, Jews, and others, have been moving

from New York City to places like Woodstock, to get away from what they fear will

be the next ground zero. Right now this trend is a trickle, but it would become a

torrent if a nuclear device were detonated in any European or American city.

Since this threat is the mother of all unflatteners, this book would not be complete

without a discussion of it. We can live with a lot. We lived through 9/11. But we

cannot live with nuclear terrorism. That would un-flatten the world permanently.

The only reason that Osama bin Laden did not use a nuclear device on 9/11 was not

that he did not have the intention but that he did not

437

have the capability. And since the Dell Theory offers no hope of restraining the

suicide supply chains, the only strategy we have is to limit their worst capabilities.

That means a much more serious global effort to stanch nuclear proliferation by

limiting the supply-to buy up the fissile material that is already out there,

particularly in the former Soviet Union, and prevent more states from going nuclear.

Harvard University international affairs expert Graham Allison, in his book Nuclear

Terrorism: The Ultimate Preventable Catastrophe, outlines just such a strategy for

denying terrorists access to nuclear weapons and nuclear materials. It can be done,

he insists. It is a challenge to our will and convictions, but not to our capabilities.

Allison proposes a new American-led international security order to deal with this

438

problem based on what he calls “a doctrine of the Three No’s: No loose nukes, No new

nascent nukes, and No new nuclear states.” No loose nukes, says Allison, means locking

down all nuclear weapons and all nuclear material from which bombs could be made-in

a much more serious way than we have done up till now. “We don’t lose gold from Fort

Knox,” says Allison. “Russia doesn’t lose treasures from the Kremlin armory. So we

both know how to prevent theft of those things that are super valuable to us if we

are determined to do it.” No new nascent nukes means recognizing that there is a group

of actors out there who can and do produce highly enriched uranium or plutonium, which

is nothing more than nuclear bombs just about to hatch. We need a much more credible,

multilateral nonprolif-eration regime that soaks up this fissile material. Finally,

no new nuclear states means “drawing a line under the current eight nuclear powers

and determining that, however unfair and unreasonable it may be, that club will have

no more members than those eight,” says Allison, adding that these three steps might

then buy us time to develop a more formal, sustainable, internationally approved

regime.

It would be nice also to be able to deny the Internet to al-Qaeda and its ilk, but

that, alas, is impossible-without undermining ourselves. That is why limiting their

capabilities is necessary but not sufficient. We also have to find a way to get at

their worst intentions. If we are not going to shut down the Internet and all the

other creative and collaborative tools that have flattened the world, and if we can’t

restrict access to them,

the only thing we can do is try to influence the imagination and intentions that people

bring to them and draw from them. When I raised this issue, and the broad themes of

this book, with my religious teacher, Rabbi Tzvi Marx from Holland, he surprised me

by saying that the flat world I was describing reminded him of the story of the Tower

of Babel.

How so? I asked. “The reason God banished all the people from the Tower of Babel and

made them all speak different languages was not because he did not want them to

collaborate per se,” answered Rabbi Marx. “It was because he was enraged at what they

were collaborating on-an effort to build a tower to the heavens so they could become

God.” This was a distortion of the human capacity, so God broke their union and their

ability to communicate with one another. Now, all these years later, humankind has

again created a new platform for more people from more places to communicate and

collaborate with less friction and more ease than ever: the Internet. Would God see

the Internet as heresy?

“Absolutely not,” said Marx. “The heresy is not that mankind works together-it is

to what ends. It is essential that we use this new ability to communicate and

collaborate for the right ends-for constructive human aims and not megalomaniacal

ends. Building a tower was megalo-maniacal. Bin Laden’s insistence that he has the

truth and can flatten anyone else’s tower who doesn’t heed him is megalomaniacal.

Collaborating so mankind can achieve its full potential is God’s hope.”

How we promote more of that kind of collaboration is what the final chapter is all

about.

::::: Conclusion: Imagination

::::: THIRTEEN

11/9 Versus 9/11

Imagination is more important than knowledge.

-Albert Einstein

On the Internet, nobody knows you’re a dog.

-Two dogs talking to each other, in a New Yorker cartoon by Peter Steiner, July 5,

1993

Reflecting on this past decade and a half, during which the world went flat, it strikes

me that our lives have been powerfully shaped by two dates: 11/9 and 9/11. These two

dates represent the two competing forms of imagination at work in the world today:

the creative imagination of 11/9 and the destructive imagination of 9/11. One brought

down a wall and opened the windows of the world-both the operating system and the

kind we look through. It unlocked half the planet and made the citizens there our

potential partners and competitors. Another brought down the World Trade Center,

closing its Windows on the World restaurant forever and putting up new invisible and

concrete walls among people at a time when we thought 11 The dismantling of the Berlin

Wall on 11/9 was brought about by people who dared to imagine a different, more open

world-one where every human being would be free to realize his or her full potential

– and who then summoned the courage to act on that imagination. Do

442

you remember how it happened? It was so simple, really: In July 1989, hundreds of

East Germans sought refuge at the West German embassy in Hungary. In September 1989,

Hungary decided to remove its border restrictions with Austria. That meant that any

East German who got into Hungary could pass through to Austria and the free world.

Sure enough, more than thirteen thousand East Germans escaped through Hungary’s back

door. Pressure built up on the East German government. When in November it announced

plans to ease travel restrictions, tens of thousands of East Germans converged on

the Berlin Wall, where, on 11/9/89, border guards just opened the gates.

Someone there in Hungary, maybe it was the prime minister, maybe it was just a

bureaucrat, must have said to himself or herself, “Imagine- imagine what might happen

if we opened the border with Austria.” Imagine if the Soviet Union were frozen in

place. Imagine-imagine if East German citizens, young and old, men and women, were

so emboldened by seeing their neighbors flee to the West that one day they just swarmed

that Berlin Wall and started to tear it down? Some people must have had a conversation

just like that, and because they did, millions of Eastern Europeans were able to walk

out from behind the Iron Curtain and engage with a flattening world. It was a great

era in which to be an American. We were the only superpower, and the world was our

oyster. There were no walls. Young Americans could think about traveling, for a

semester or a summer, to more countries than any American generation before them.

Indeed, they could travel as far as their imagination and wallets could take them.

They could also look around at their classmates and see people from more different

countries and cultures than any other class before them.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order