Saturday, December 28, 2013

Cyber Deterrence Theory









Modern Cyber Deterrence Theory: 
Norms, Assumptions and Implications

  




Table of Contents
I.                    Introduction
II.                  Definition
III.                Stakeholders
IV.                Origins
V.                  Norms and Assumptions
VI.                Public Goods
VII.              Institutional Structure
VIII.            Legality
IX.                Military Operations
X.                  Policy Implications
XI.                Conclusion



I.                    Introduction
The theoretical view that information implies power and should be made widely available, without barriers to access, is a fundamental construct that was outlined in the Guerilla Open Access Manifesto by Aaron Swartz.[1]  The technological capabilities, philosophical values and role of cyber warriors will have a prevailing effect on cyber deterrence.[2]  The technologies can be used by good (white hat) and bad (black hat) hackers to express philosophical values and beliefs in cyberspace.[3]  The norms in cyberspace are not always established by traditional institutions, but by freelance and organized hackers, who have the ability to retaliate for perceived grievances and injustices committed by institutions.  In the aftermath of Swartz’s suicide, Anonymous hacked the MIT and Department of Justice websites as an indictment of their integrity.[4] The ability of freelance and organized hackers to indict institutions for philosophical grievances has wide-ranging implications for cyber deterrence theory and U.S. national security policy in the 21st century. 
Although the hacking of the MIT and DOJ websites were benign in nature, it can be extrapolated that the objections of individuals or groups, state or non-state actors can turn malicious.  The malicious intent or violent outcome of a cyber-attack can have implications for US national security interests.  An example of this would be if cyber warriors brought down US satellite communications and then sent a bombardment of surface to air missiles at strategic targets, resulting in massive losses from air defense being disabled.  Additionally, the effect of satellite communications being brought down would have far reaching ramifications for transportation, navigation, military troops on the ground and commercial activity, among others.
Mokarram (2013) stated that the future of cyberspace will be occupied with cyber wars – these wars impose effects on society at large and are waged at a low cost, increasing the incentive to conduct cyber warfare operations.    The purpose of this research is to analyze cyber deterrence theory and discuss implications of the economic outcomes and behaviors of stakeholders in relation to US national security policy.  This research seeks to consider important constructs from the prevailing literature along with norms and assumptions that influence behavior among stakeholders involved.  Cyber warfare will be discussed in a general sense, but this is meant to encompass a wide-range of operations that can be conducted in the cyber sphere, particularly those that result in negative externalities or consequences for society; including cyber terrorism, cyber-crime, cyber espionage, state and non-state sponsored cyber-attacks.
II.                  Definition
 Deterrence theory suggests some form of retaliation or motive for prevention.  Cyber deterrence can be defined as the ability of institutions and organizations to deny, protect and retaliate against cyber-attacks.  In relation to nuclear arms, Gerson (2009) defined deterrence as “the threat of force intended to convince a potential aggressor not to undertake a particular action because the costs will be unacceptable or the probability of success extremely low.” The success of cyber deterrence is instrumental to US national security policy objectives.  The unfortunate aspect of success in deterrence theory is that good deterrence cannot be seen or rewarded – much like preventing a terrorist attack.  Adversaries who engage in cyber warfare often have psychological or political motives. These motives are subject to interpretation of ethics, morality and values. The ramifications and proportionality of retaliation that ensues is a decision that can be influenced or mitigated with applicable deterrence.[5]
III.                Stakeholders
The key stakeholders in cyber deterrence encompass much, if not all of the developed world.  Nation-states across the globe, represented by their government structures and institutions play a vital role in cyber deterrence – they are often targets of attacks with significant risk in deterrence if national interests are compromised.  Non-state organizations are a key stakeholder in cyberspace with access to resources, fewer parameters and ethical boundaries when it comes to cyber operations.  Economic stakeholders include the individuals and organizations that benefit from cyber operations – through spending on networks, security, information technology and services. 
Specific to US National Security, institutional stakeholders include, but are not limited to: Strategic Command; Cyber Command; the National Security Agency; the Central Intelligence Agency; the Defense Intelligence Agency; the Defense Information Systems Agency;  the National Security Council; the Joint Chiefs of Staff; the National Reconnaissance Office; the National Geospatial-Intelligence Agency;  Homeland Security; the Federal Bureau of Investigation; US Treasury; The Federal Reserve;  Key players in cyberspace: policymakers; militaries; professionals and service providers; hackers; hacktivists; institutions; corporations; nation-states; and non-state organizations. 
IV.                Origins
Historically, modern deterrence theory began during the nuclear arms race of the Cold War.  According to Schelling (1966), the most successful threats are the ones that do not need to be acted on.  Additionally, the use of violence to influence behavior of the population is strategic and coercive. This is most influential when it is served in close proximity or highly visible – where the annihilation, pain and violence are most apparent.  After Hiroshima and Nagasaki, the capabilities and destruction of nuclear war were assumed – deterrence was embedded in the annihilation and use of maximum proportionality of violence.  One of the strategic goals of nuclear deterrence was to deny the enemy access and resources.
Schelling (1966) wrote that negotiation is merely optional with enough military force. The application of this theory to cyberspace and cyber deterrence is problematic.  Cyberspace does not contain a Geneva, Switzerland or Camp David to negotiate treaties. Negotiation is performed through proliferation of data, networks and information. Schelling used the example of Genghis Khan, who exploited men, women, and children as hostages to achieve a diplomatic solution. 
Morgan (2012) believed that conventional deterrence was something that did not always work.  It may have prevented nuclear wars, but frequently resulted in rivalry, bitterness and military conflict between nation-states abroad.  In this case, it was the US and Russia that were indirectly confrontational in areas such as Afghanistan, Vietnam and Korea.  Morgan argues that full-scale conflict between super powers was avoided at the expense of smaller conflicts and provocations that became more common.
V.                  Norms and Assumptions
Stevens (2012) argued that traditional nuclear deterrence is not always applicable in cyberspace.  The fundamental rule of deterrence is that the risk (cost) is offset by the reward (benefit).   Rules of engagement, norms and retaliation have yet to be defined.  Stevens advanced six notions of why cyber deterrence does not conform to conventional deterrence strategies: (1) significant military based-conflict is absent; (2) non-state actors in cyberspace alter the playing field in terms of rationality; (3) the ability to retaliate in cyberspace is compounded due to the lack of geographical presence(e.g. problem of identification); (4) acquiring enemy assets (e.g. hostage taking) to facilitate negotiation is complicated; (5) rules of engagement are not commonly understood; (6) the cost of escalating a cyber-attack is cheap, increasing the likelihood of unstable conflicts with potential for physical confrontations. 
Identification of the adversary in cyberspace is difficult.  Mokarram (2013) stated that credible deterrence is based on efficient execution and alleged ability to respond among the parties involved.   In conventional deterrence theory, Gerson (2009) wrote that in order for deterrence to be credible, the adversary must perceive the political willpower and military capabilities to be comprehensive.   It can be challenging for institutions to identify the culprit of a cyber-attack while the entire network and communication system is down.  From this example, the deterrence calculation is influenced based on the strategy chosen by the adversary – the network being brought down minimizes the ability to identify and retaliate against those who committed the attacks.  Indirectly, this influences the cost-benefit (risk-reward) calculation of the parties involved.
The assumed retaliation by the US military is a key component of war and deterrence theory. If the aggrieved party reacts with great enough pain and violence, the action serves as a deterrent to future acts of violence.  Gerson (2009) wrote that credibility in conventional deterrence is based on perception of political capital and military capabilities.  The parameters that define cyber deterrence are questionable because they could involve any number of state or non-state actors. These actors can use cyber espionage, cyber-crime or cyber terrorism to violate normative values in cyberspace (Stevens 2012).  The security aspect of cyberspace is engaged with a growing field of professionals that maintain networks, information systems and security protocols for government and corporate clients. 
In the early 1980s, the massacre of Hama, Syria by Hafez al-Assad and interplay between political factions gave way to Hama rules – meaning that the absence of rules was prevalent in multifaceted civil war – revenge can be atrocious, unpredictable and painful.[6]   This absence of rules is quintessential to understanding the development of norms in cyberspace.  The freedom of thought, movement and exchange of ideas in cyberspace is the fundamental value and assumption where black and white hackers can find common ground.
This is a mutual understanding between black and white hackers, that the principle of free exchange and movement of ideas have implications for cyberspace and the political economy at-large.  First, with public information, the internet allows for both parties in cyberspace to be privy of complete information. This is the opposite of what happens in the presence of asymmetric information where many market transactions take place.  Second, the extent which the bureaucracy, political systems and government hinders this movement is an inherent violation of turf and grounds for conflict among hackers, leading to the rise and formation of non-state hackers such as Anonymous and information sharing networks like Wikileaks.
VI.                Public Goods
Cyberspace is essentially a public good. The existence and security of cyberspace is vital to nearly all aspects of developed and modern society. The premise for a public good is that everyone benefits and it cannot be apportioned, divisible or denied.  The cost of providing a public good is prohibitively expensive such that the benefit is not large enough to justify the provision by the market.  Thus, the security and provision of cyberspace is in unchartered territory (with a valid internet connection) when it comes to government’s ability to distribute the benefits of cyber security to everyone.  The public good is provisioned through the US military support for Cyber Command (USCYBERCOM) and the role is shaped by the institutional structure and norms within the cyber community.
            Morgan (2012) used the example of the UN Security Council as a key component of “collective actor deterrence.” From collective action, the ability of nation-states to pool resources to protect the public good creates positive externalities.  First, the collective action is a form of implicit deterrence. This raises the cost of cyber warfare and risk of retaliation.  Second, the use of collective action to protect the public good reduces the risk of independence.  In the event of an attack, collective action to protect the public space could limit the scale and allow for retaliation, while promoting deterrence for members of the group.
VII.              Institutional Structure
According to an International Law Studies U.S. Naval War College article by Paul Walker (2013), the role of Cyber Command (USCYBERCOM) in national security policy was proposed based on three objectives, (1) to respond to a major breach on Department of Defense information networks, (2) to increase capabilities and proficiencies for global operations networks, and (3) to reorganize the Joint Task Force –Global Network Operations (JTF-GNO) and Joint Functional Command Component – Network Warfare (JFCC-NW) into a single unified command, enhancing the ability of DoD to defend its networks and conduct offensive operations.  Walker (2013) stated that the formation of US Cyber Command was driven by the DoD response to “the most significant breach of U.S. military computers ever” (2008), with creation of Operation Buckshot Yankee.[7] The combination of these objectives was created in June 2009 and operationalized in October 2010. Following the U.S. lead, Cyber Command was announced across other countries in strategic initiatives, including China, India and Russia. 
The framework and role of cyber deterrence in national security policy is shaped by USCYBERCOM and the institutional structure of US Strategic Command. In a September 2010 testimony by General Keith Alexander, he envisioned a wide-ranging role that was not limited to simply managing DoD networks and security.  This implies an offensive cyber threat under the US national security apparatus.  General Alexander was keenly aware of the unique challenges posed by cyberspace, stating, “the distinctions between public and private, government and commercial, military and non-military are blurred.”
US Strategic Command (USSTRATCOM) recently transitioned power from General Robert Kuehler to Admiral Cecil Haney as of November 2013.  This transition took place during a publicized internal organizational battle between USCYBERCOM and the NSA, key components of the USSTRATCOM umbrella.  The resource allocation to USCYBERCOM and NSA under the leadership of Strategic Command centralizes a significant power base in a single command post, and thus may warrant separate leadership.  The implication was that the NSA head would be better served with a civilian leader.  This was manifested in a recent Washington Post article proposing a splitting of the duties such that NSA and USCYBERCOM are under independent budgetary authority.[8]  The argument for splitting the leadership was that the country was better served with a separate governance structure and less competition within USSTRATCOM. 
The DoD focus on cyber deterrence and the emerging threat has led to the formation of various entities within USCYBERCOM – US Army Cyber Command, US Fleet Cyber Command, Air Forces CYBER/24th Air Force.[9] Primarily, the focus is on deterring threats and intrusions by outside actors or nations.  The US Army Cyber Command’s stated mission is to “coordinate, integrate, synchronize, direct and conduct network operations and defense of all Army networks in support of full spectrum of operations to ensure US/Allied freedom of action in cyberspace, and to deny the same to our adversaries.”[10]  The mission statement implies deterrence by denial in cyberspace – a concept developed during the Cold War. However, the application of deterrence theory in cyberspace is fundamentally different than past experience.
The strategic deterrence and the role of USCYBERCOM cannot be understated.  The Washington Post’s Black Budget Report (2013) reported spending of $4.3 billion for cyber operations.  The increasing dependence on data, surveillance, information, networks and security has driven the demand for cyber deterrence in practice. 
VIII.            Legality
The legality of cyber warfare has much room for debate.  Does a planned cyber-attack constitute an armed attack? To what extent does the UN Security Council regulate conflict in cyberspace?  How does the Geneva Convention apply to cyberspace? What are the rules of engagement? Once general norms are understood, there is likely to be a deviation or backlash against institutions before legal experts can agree on what constitutes legality.  The reason is that it is impossible to include everyone when setting the basic principles of internet freedom. Jus ad bellum implies the right to self-defend and retaliate against an “armed attack.” The violation of the free movement of information and ideas is likely to provoke organizations or hacktivists to retaliate, much like an insurgency, for perceived injustices committed by the institutions.  The Swartz case, as stated earlier, exemplified this concept on a small scale.
In a research paper by Eric Posner, he stated that reciprocity has the tendency to create reinforcing engagements, breeding collective action.[11]  From the international perspective, laws are commonly obeyed if the repercussion is unwavering and prompt.  If the laws are not applied uniformly in cyberspace then the ability to take legal action is weak.  Legality in the case of cyberspace is jus ad bellum- based on norms developed by states and institutions, widely accepted by the international community.  Jus ad bellum in cyberspace derives legitimacy through collective action by the international community. Collective action from the international community is not likely to advance without a crisis that creates urgency among the European Union or United States.
IX.                Military Operations:  Georgia (2008)
Goodman (2010) cited the example of Georgia (2008) to illustrate how a state (Russia) can use cyber operations to facilitate or pre-empt conventional military operations.  Using Twitter and Facebook networks, the Russian hackers were successful at disrupting critical network systems- so successful that communications, electrical and internet blackouts occurred.  The cyber-attack in this case was followed-up with boots on the ground.  Government, businesses and commercial services were severely impacted by the outages, as the Georgian government was forced to rely on allies like Poland and corporations such as Google to get their systems back on-line.  Despite the deterrence failures that occurred, Georgia is a recent example of how cyber-attacks can be used as political and economic leverage in anticipation of military conflict.
X.                  Policy Implications
In order to deter an insurgency, the counterinsurgent must find a way to address the underlying cause and grievance of the population.  In cyberspace, the bureaucratic nature of government institutions, particularly in the U.S. and Western Europe, are at an obvious disadvantage to adversaries that operate under a different set of assumptions and rules.  Compounding this vulnerability, the rules and bureaucracy that hinder a response to a cyber-attack can also be the very reason for the attack in the first place.   For example, the secret nature of the NSA and CIA mitigates the bureaucracy at some level, but also impose their own structure and ethical boundaries- of which, the structures and integrity of the institutions themselves can be the motive for the attack in the first place.  Thus, state and non-state hackers can choose the time and place for attacks, as well as the proportionality of the attacks, much like an insurgent that utilizes guerilla warfare.  Like counterinsurgent strategies, modern cyber deterrence theory ought to recognize the motive of the insurgent (hacker).  
The costs and benefits of waging cyber warfare are significantly less expensive than what is waged with conventional warfare or modern insurgencies.  Conversely, the cost of security and defense of these networks is astronomical.  Dr. David Kilcullen stated that Al-Qaeda attacked the US for $400,000 to $500,000, while the US spent trillions of dollars creating a complex national security apparatus, military operations and resources for Iraq and Afghanistan, in addition to the loss of human capital and opportunity costs. The opportunity cost created by 9-11 was huge. This resulted in a fundamental shift in behavior, and economic assumptions underlying this behavior.  Furthermore, the economic event of 9-11 resulted in symbolic attack on physical infrastructure on some of the most expensive commercial real estate in the world. 
It is not far-fetched that a 9-11 of cyberspace would be economically cheaper and more expensive in terms of economic costs – with wide ranging implications.  Information networks and cables could be targeted, while physical infrastructure such as the power grid and institutions such as governments, corporations, populations in global megacities could be the objective. The nuclear event in cyberspace is the halt or stoppage of the global economy - the extent which (financial) transactions are stored online has a substantial risk. Moreover, if events like a flash crash cut off access to money or financing, the US government and national security interests would be severely compromised.   
As stated by Stevens (2012), the responsibility to protect cyberspace is no longer limited to network and information security professionals- it extends beyond borders to political, military and diplomatic stakeholders. Technological advantages by the US and its allies proxy as de facto deterrence – much like the Cold War.  However, institutional framework and the bureaucratic nature of corporate and government resources may stifle innovation as rational actors seek to protect turf.  In my opinion, it is possible that the nature of hacktivist organizations - to leverage open ended information sharing networks- may gather knowledge and technological capabilities at a rate that exceeds the government or private sector.  The black market nature of hacking, lack of ethical boundaries and gap between institutional and individual norms may facilitate cyber conflict in the future.  It is equally plausible that false accusations in cyberspace, due to the identification problem, may result in negative externalities and physical violence.
The practical role of cyber deterrence is inherently asymmetric.  The one-sided nature implies that the burden is always on the institution – to protect, prevent and deny access to secure information sharing networks.  The one-sided nature to deterrence is evident in the hacker v. institution conflict – the hacker does not have critical infrastructure to secure and therefore behaves asymmetrically. When game theory exists between institution v. institution conflict, the game is more logical- reputational risks, asset risks, legal risks, corporate risks and external actors are at play.   An example of this is the Google v. China cyber espionage event in 2009-2010 (Stevens 2010). Both institutions are sufficiently large and have overarching ambitions, albeit different goals.  Estonia v. Russia (2007) is more asymmetric because of size differential between the institutions.
Unlike nuclear deterrence, the domain and parameters surrounding warfare and deterrence in cyberspace are ambiguous.  However, the intersection of nuclear and cyber deterrence was seen recently in use of the Stuxnet virus. Stuxnet is the virus that was used to infect Natanz Iranian nuclear centrifuges. The virus was widely believed to have been developed by Israeli and US agents.[12] The result of Stuxnet led to the institutional formation of Iran’s Cyber Command equivalent.
Large-scale hacks and cyber events will only increase in the future as the cost of obtaining internet access trends lower over time.  Cyber-bullying may become more commonplace and political motivation may be the norm, as noted in Nazario’s Politically Motivated Cyber Attacks.[13]  In cyberspace, the lines between states and non-states become opaque over time – political and collective action can travel exponentially faster in the era of social networking and free flow of information. It is vital that deterrence capabilities adapt proportionately and keep up with technological advancement in the black market.  The cyberspace version of North Korea testing and conducting nuclear launches is not something that can be risked in a developed world- one that relies increasingly on global financial and payment networks. 
XI.                Conclusion
As it relates to US national security policy, the role of deterrence in cyberspace is fundamentally different than past experience.  Gen. Alexander was keenly aware of the unique challenges posed by cyberspace, stating, “The distinctions between public and private, government and commercial, military and non-military are blurred.”  It is not practical to deny an individual access to the internet.   As opposed to denial of access, cyber deterrence ought to focus on offensive, defensive and theoretical capabilities.  The formation of USCYBERCOM is one step in the right direction. A separate budgetary control and authority for USCYBERCOM will promote competition for assets and resources, leading to greater capabilities and technology. Increased information sharing with regards to cyber-security and cyberspace identification is another step that can lead to increased knowledge among the good hackers. 
The extent which information is protected and secured, without regards to its utility is an economic risk as it relates to developing technological capabilities.  As organizations like the FBI and CIA are walled off from each other in terms of communication, there lies a significant institutional hurdle for the US to overcome (Spears 2010).  The knowledge sharing among ‘the good’ institutions promotes implicit deterrence – through more access to resources and ability to retaliate.  Moreover, the ability to promote ethical knowledge sharing and utility in cyberspace can be facilitated through an international organization or NGO. The military and kinetic use of cyber capabilities are typically reserved for nation-state actors.  Nation-states also set laws and legal recourse for actions taken in cyberspace.  The use of traditional military operations in Georgia, combined with cyber warfare, has an extensive impact on US national security and 21st century warfare.
Hackers can be transformed into ‘accidental guerillas’ when institutions violate philosophical values such as the free flow of information in cyberspace, raising the bar for cyber deterrence.  Hacktivists reserve the right to express philosophical values while influencing norms secondarily.  Furthermore, the dynamic nature of cyberspace creates historic challenges for cyber deterrence and US national security policy in the 21st century.  In the absence of cohesive norms and commonly shared principles, the only rules in cyberspace become Hama Rules.

Works Cited

Alexander, General Keith, interview by House Armed Services Subcommittee. Cyberspace Operations Testimony (September 23, 2010).
Censer, Marjorie. "From blue-collar Army base to white-hot cyber city." Washington Post Cybersecurity Special Report, Oct 2013.
Friedman, Thomas. From Beirut to Jerusalem. Picador, 1989.
Gerson, Michael S. "Conventional Deterrence in the Second Nuclear Age." Parameters, 2009: 32-48.
Goodman, Will. "Cyber Deterrence: Tougher in Theory than in Practices." Strategic Studies Quarterly, Fall 2010: 102-135.
Haley, Christopher. "A Theory of Cyber Deterrence." Georgetown University, 2013.
Kilcullen, David. The Accidental Guerrilla. Oxford University Press, 2009.
Lan, Tang, et al. "Global Cyber Deterrence: Views from China, the US, Russia, India, and Norway." East West Institute, 2010.
Lewis, James Andrew. "The arms race in cyberspace." Washington Post Cybersecurity Special Report, Oct 2013.
Mokarram, Ali. "European cyber security: a cyber deterrence approach." 2013.
Morgan, Patrick M. "The State of Deterrence in International Politics Today." Contemporary Security Policy, 2012.
Nazario, Jose. "Politically Motivated Denial of Service Attacks." NATO Cooperative Cyber Defence Center of Excellence, n.d.
Posner, Eric A. "Human Rights, the Laws of War, and Reciprocity." John M. Olin Law & Economics Working Paper No. 537, September 2010.
Spears, Austin. "United States Cyber Security in the 21st Century." Public Review, 2012.
Stevens, Tim. "A Cyberwar of Ideas? Deterrence and Norms in Cyberspace." Contemporary Security Policy, 2012.
Stone, John. "Conventional Deterrence and the Challenge of Credibility." Contemporary Security Policy, 2012.
Walker, Paul. "Organizing for Cyberspace Operations: Selected Issues." International Law Studies, Naval War College, 2013.




[1] Aaron Swartz was arrested by MIT police and indicted in September 2012 in federal court for downloading and proliferating academic journals for viewing by the public domain. His view, shared by members of the hacking group Anonymous, believed that academic research was funded using taxpayer dollars and resources, and therefore should be made freely available. Facing the possibility of multiple decades of imprisonment, Mr. Swartz committed suicide in January 2013. Charges were later dropped.
[2] This includes state and non-state actors that play a role in setting the norms in cyberspace.
[3] Hackers that operate under a set of values or code are widely known as ‘hacktivists.’ This is often specific to the organization known as Anonymous, but is generalized for the context of this research.
[4] Swartz’s suicide was followed by hacking tributes displayed on the DOJ and MIT website, implicating US Attorneys Carmen Ortiz and Stephen Heymann as partially responsible. See <http://www.telegraph.co.uk/technology/news/9800257/Anonymous-hacktivists-target-MIT-websites-over-Aaron-Swartz-suicide.html>. See USA v. Swartz timeline <http://tech.mit.edu/V132/N62/swartztimeline.html>.   
[5] Retaliation is sensitive to a negative feedback loop based on interpretation of events.
[6] In the absence of rules, the only rule becomes “Hama rules”, or “there are no rules.” This was used by Thomas Friedman in reference to the ability of retaliation to be unpredictable, violent and atrocious acts committed by aggressors against their adversaries. 
[7] This claim is attributed to former Deputy Secretary of Defense William Lynn.  Operation Buckshot Yankee was the codename used to combat the virus that infected the U.S. military networks.  See Walker (2013) and: <http://www.nytimes.com/2010/08/26/technology/26cyber.html?_r=2&ref=technology&>.

Friday, December 27, 2013

TBA Market, QE and Information Theory

The purpose of the TBA market in real estate finance is to allow the information from the underlying security "to-be-assigned" at settlement for the transaction. It is prohibitively difficult for small banks and institutions to participate in this market without perfect information - the only way to allow for the market to be purely competitive is for the standard uniform pricing index to exist, such that transactions between large and small banks to occur.  Otherwise, the availability and absence of free information has momentous effects in the long-run.  Cherry-picking and cream-skimming are models for institutions to profit from and manipulate the market system in the presence of asymmetric information.

The effect of this market system and the way transactions occur has implications for a variety of public policy related areas - consumers and mortgage finance reform in particular, along with the role of large banking institutions; small banks; the Federal Housing Finance Agency (FHFA); the Consumer Financial Protection Bureau (CFPB); the Fed (FRB); the Treasury;

Technology has increased the rate of change of transactions at an exponential rate, therefore the velocity of money in the market is an important factor in potential GDP. Regulatory capital requirements withhold money from the banking system - more capital is needed to shield against the effects of downturns, requiring the additional QE to overcome the shortfall in cash flows - once bank recoup capital on the balance sheet, only then can they facilitate lending and the money multiplier (demand).  The potential demand is maximized in the market with leverage, albeit too much leverage has the recent potential to bring down the system.  The stimulus was required to save thousands (or millions) of jobs because under this scenario the line insolvency and liquidity becomes blurred.

The use of the financing of home loans and housing related interventions as a valid form of economic is controversial to say the least. From the left - a free market requires perfect information for competition to legitimate and government regulation can facilitate this process.  On the right - markets are never perfect and government intervention accomplishes little in achieving this goal.  Housing finance reform ought to address the gray area in the TBA market - how can transactions occur, such that large institutions do not hold significant informational advantages over small banks?



Tuesday, November 5, 2013

Virginia Election Demographics 2013

The demographic trends are the primary driver for election results in Virginia. This time around, those demographic trends were manifested in voter turnout.  Historically speaking, off-year elections will depress voter turn-out which favors the Republican Party. The increasing share of Northern Virginia voters was more than enough to offset low turnout among Black voters in the South.  The increasing proportion of Northern Virginia electorate base will prove to be a strong obstacle for the Republican Party in the years to come. 

Geographically, Northern Virginia voters will compose an increasing share of the electorate, creating a diversified, educated and income driven-base.  This happens to be the first time that Northern Virginia was able to dominate the electorate in an off year-election.  Economic growth and population migration to the surrounding counties of Loudon (pop 340k), Prince William (pop 430k), Fairfax (pop 1.1 million), Alexandria (pop 145k) and Arlington (pop 220k) will surpass the rest of Virginia.   Fairfax, Loudon and Prince William are generally contested areas.  Arlandria makes up a strong Democratic base of urban development.

Cuccinelli did himself few favors in the areas of transportation, essentially shooting half of the state in the foot (the other foot was shot with social conservative hawkishness).  It is widely assumed that the McDonnell administration did an excellent job in organizing the base - focusing on transportation issues in Northern Virginia, notably the Silver Line extension and the development of High Occupancy Toll lanes on the Beltway. 

It is important that Republicans not use this (Losing result) to validate the existence of the extreme factions.  In presidential elections, increased share of the population voting will strongly favor Democratic candidates.  If you include the economic growth and demographic trends in Northern Virginia, then it becomes apparent that the sweet tea line exists south of the District -- along I-95 in the vicinity of Fredericksburg.

Previous Post from Sunday, July 29, 2012

Virginia politics, demographics and election trends

In this election cycle, Virginia has become an intense presidential battleground state, as candidates blitzed the airwaves and crossed the state in search of undecided voters. Historically, presidential elections favored the Republican candidate, with President Obama's victory over Mr. McCain in 2008 being the recent exception.  The southern suburbs of Richmond and Hampton Roads provide a diverse base of white and African-American voters. 


Income and race play a large role in the prospects for Mr. Romney and Mr. Obama.  Henrico County, encircling Richmond is 57% white. To the south, Chesterfield County is 65% white, according to the 2010 Census. Blacks are the largest minority group in the Richmond metropolitan area. Whites are generally more educated and have higher incomes in Richmond's west end of Henrico, leading along the I-64 corridor toward Glen Allen and Short Pump. This is the district of Rep. Eric Cantor.  The same is true of the western suburbs on the south side of the James River.  To the north and east of the city, lies a demographic of predominantly African Americans, voting heavily in the favor of Obama during the 2008 election.  Henrico County went 56-44 to Obama while Chesterfield County voted 54-46 in favor of Mr. McCain.    

Driving directly east of Richmond to the peninsula, showed high density suburbs of Hampton Roads voting overwhelmingly in Obama's favor. Surprisingly, the Virginia Beach suburb of Chesapeake went to President Obama's favor 51-49.  Virginia Beach by itself was a 50-49 split to Mr. McCain.   Virginia Beach and Chesapeake are 64% and 60% white, respectively.

The affluent suburbs of Washington DC tell an interesting story regarding demographics and voting patterns. Outer suburbs of Loudon County are 54% in favor of Obama and 62% white. Prince William was 58% in favor of Obama and 49% white. Obama mopped the floor in closer in suburbs of Fairfax, Alexandria and Arlington, reaching 60%, 72% and 72% of voters, respectively. These areas are highly educated, diverse and high income. Loudon has the highest income and largest share of white voters among Northern Virginia localities. 

As education increases among white voters, the probability of voting for President Obama increases.  If you are Black, you will likely vote for the President regardless of education. The farther south you go, the less educated white voters go heavily in favor of Republicans.  If the President is to win Virginia, it is vital for him to hold onto his margin of victory in Fairfax, Henrico, and Cheseapeake, while holding his own in Virginia Beach and Chesterfield County. If voters perceive the local economy to be on the upswing, the election will lean to Obama. However, if Romney approaches 60% of voters in Chesterfield County, it may indicate the state is ripe for a republican takeover. If the President loses ground in both Chesterfield and Henrico, then look for Chesapeake and Virginia Beach to follow suit.  If the southern local economies falter (or perceive to be faltering), residents may favor traditional republican ties.

http://www.cnn.com/ELECTION/2008/results/county/#VAP00map 

http://projects.nytimes.com/census/2010/map 

Tuesday, September 24, 2013

Obama's implied policy on Syria - do nothing

A practical view, based on the Washington Post op-ed written by Retired General Barno and Ret. Gen. Scales.
  • Dempsey disagrees completely with Kerry, based on his body language - and he is winning the argument (as stated in the op-ed). Dempsey does not need to say anything to Congress if he has the President's ear - the two of them have enough power to circumvent Congress on the policy. 
  • Obama is clearly playing by the Cameron playbook. Cameron took the vote to Parliament knowing exactly the answer he was going to get --  and it was voted down. If Obama wanted to strike Syria, he would have already done it without consulting Congress - the US does use drones (ah)
  • Kerry is playing his humanitarian self. He appears to truly want action against Assad. Assuming Obama is using the Cameron playbook, then Kerry and the President are opposing sides of action - Obama against foreign action, Kerry is for it.  
  • The speech was on national television was cover, allowing the President to take any direction on foreign policy, maximizing his source of power by laying out his line of thought. 
  • The public does not have the stomach for a long drawn-out multifaceted civil war.  The strikes would accomplish little in the form of substance - even with precision guided missile strikes.  However, this would prevent the stolen donkey from becoming the stolen Porsche, adding symbolic value to other nations.  
Link to article:

Sunday, June 2, 2013

Why Rich Kids Can Afford to Take Low Paying Jobs

There are distinct differnces in socioeconomic upbringing, that inevitably influence the choices that we make. Take for example, one child brought up whose family income is $350,000 per year. The choices in this example, are not dictated by money as much as consumption and values.  If your family income is $30,000 per year and you have two siblings and a single parent, life's choices are much different along with the child's perspective of consumption.  The privileged child, would often have parents who are philanthropic and teach the child the  value in giving back to the community through charitable donations and community service. The lesser privileged family typically will focus on what can be leveraged, to maximize opportunity for their children, in effort to give the appearance of being 'middle-class.' The class structure brings a mindset or psychological value to their children in the form of socioeconomic status.  The children who move up the socioeconomic ladder from middle to upper class (or lower to middle) will generally have drive to do whats best for them financially in order to not fall into the same trap that plagued their parents.  This may involve minimizing opportunities in areas such as teaching and public service, both of which are admirable professions. The marginal value of each dollar earned is inherently more expensive to those on the lower end of the socioeconomic spectrum. This leads to less charity as they move up the ladder. For children with more privilege, the marginal value of every dollar may be worth less (to themselves), given there status in society is more secure. The financial security provided by family is embedded in their psychological decisions, with few concerns of dropping out of the top 10%. With the former, an insecure social safety net will tend to favor less charity -- they do not have wealthy families to fall back on.  The case for contributing to charity is obvious -- those who have more ought to contribute more for the greater good of society. Moreover, the socioeconomic status of one's family will generally have a profound effect on charitable contributions-- those who feel their status in society is secure will donate more. 

Sunday, May 19, 2013

The interaction of interest rates and house prices


The rise in interest rates will have a substantial impact on the affordability and price of homes in the future.  With Mr. Bernanke's Quantitative Easing, the pass through of security purchases goes directly into mortgage rates by using Agency Securities.  The ability of the Fed purchases to effect the housing recovery will be diminished psychologically over an extended period. However, the Fed can raise interest rates on the back end to influence investor activity.  As areas such as Washington, DC metro heat up, investment activity in construction improves, affecting the jobs picture positively.  The subsequent rise in house prices following a bust are much more sensitive to rising rates, as the minimum level of interest is met to spur investment activity and business decisions.  At this point, any change in rates may sway decisions, if investors are concerned with a fixed level of return associated with the corresponding interest rate.  However, over time, more consumption breeds more consumption, and the money multiplier spurs investment activity.  The psychological effect of borrowed money through low rates improves over an extended period of years.  The housing starts create construction jobs, the home purchases create retail and service jobs. The psychological effect of housing has a significant lag, like the multiplicative effect of money borrowed.  House prices do not increase until demand exceeds supply.  Builders and investors need a clear sign that the recovery is real before considering new investment. Thus, by the time higher level activity improves, the effect of the interest rates have already passed through to the micro-economy.  The psychological impact on housing is a large contributor to GDP in the form of jobs and consumer activity.  These jobs areas are significant contributor of income to many non-college graduates. The commercial and urban-suburban development phase has even longer lag, as the population migration and new income is needed to support increased commercial services - like food, retail, grocery and banking.  The divergence between cities like D.C. has a significant impact on inequality.  The urban development phase goes at a much higher and robust rate, spurring more jobs and services.  Areas with declining population often receive minimal commercial development (if any at all).  Therefore the gap in geographic and income inequality increase with population migration.






Wednesday, April 24, 2013

Chi-town (fiction)

One time, in September, I went to a bachelor party in Chicago. On Saturday we went to the Wrigley rooftops, and they had like 7 or 8 different Goose Islands on tap. My favorite was the Cubby Bear Blue. Second favorite was the 3-1-2, or as I say, the 'three-one-deuce', which is a Wheat Beer and is really good too. They also have a Green line beer and a Honkers ale and that is all I could remember. It was all you can drink and eat, so needless to say I drank all of them. Then me and my boy Scripps, whom I shared a bed with at hotel (it was Kosher, don't worry) made friends with a group of Puerto Ricans on the rooftop. After the game we went with our Puerto Rican friends to the Cubby Bear Bar across the street, who just happened to have the sweetest DJ in the world bumping the Bone-Thugs and Biggie at like 4:30 in the afternoon....so we took the RedLine back downtown to hotel to meet up with the group we were with that we lost at some point in afternoon. Later that evening we went to a late dinner at this place called the Admiral's Theater, which doesn't serve alcohol (you just go to bar beside place which is annoying, but effective).They put on this show at about 11:30pm and 1am where they get these two girls on stage, and there is a glass shower, and they have water that some how gets in the shower and then girls....use your imagination. I am still having trouble figuring out how on earth they get the water into the shower on stage...perhaps it was the all day drinking, but I wouldnt be so sure... I take that back, the 11:30 scene was two girls in the shower. The 1am was two girls dressed like Egyptians (post-Mubarak era) that were in a tomb that looked like King Tut and really liked each other. A lot. Kinda like what you see online but much better in person. Then the cab driver we got back that night at like 3am was either drunk or asleep or lit up or all of the above. I was shitfaced (obvi) by this point, but this mother F*kr couldnt drive a straight line to save his life and he was driving like 40mph on the interstate or like 80...no middle ground whatsoever. First I asked if he was ok then I just started talking shit to him. I wasnt as confident in his abilities as the actresses at the theater......

Monday, April 22, 2013

The Decline of the Dollar (1977-78)


Case Analysis: The Decline of the Dollar
            The central issue facing the Carter administration in 1977-78 was how to stop the rapidly depreciating U.S. dollar, without hurting domestic employment.  The run on the dollar was primarily a function of high (relative) inflation, increased deficits in the current account, and a lack of confidence in the administration. The theory behind floating exchange rates was that the currencies would self-regulate and provide market based corrections to eliminate deficits and surpluses in the balance of payments.  However, this adjustment often took place gradually, as it took time for policy makers to develop a suitable plan to increase confidence in the currency.  Additionally, the support for the dollar creates a paradox as policymakers must choose between a stronger currency (implying high interest rate strategy) and easy monetary policy to promote the domestic economy.
The era of the mid to early 1970s was characterized by increased deficits in the balance of payments, high inflation and obstructionist policies regarding free trade.  The Bretton Woods system of fixed exchange rates was implemented shortly after WWII and allowed countries to adjust the exchange rate to reflect structural defects in the balance of payments.  In 1971, the Nixon administration reached a deficit in the BOP of $30 billion and dollar liabilities of greater than $50 billion.  In anticipation of large quantities of dollar exchanges (fixed at $35 per ounce of gold), Nixon devalued the dollar by 10% and removed the U.S. from the gold standard.  The Smithsonian accords led to a temporary bounded exchange rate, with a range of 2.25%. The quasi-floating exchange rate was pressured as Nixon relaxed wage and price controls and speculators anticipated inflation.  By March of 1973, the industrialized countries of the West held floating exchange rate systems.
The policy of a fixed exchange rate was difficult to maintain and relied on a proactive government to constantly buy and sell currency to maintain a fixed market price.  In the event that a country such as France or Britain would run a large deficit, speculators would sell that country’s currency and buy stronger ones.  Speculators played an active role in promoting market based pricing, constraining the government’s ability to maintain a fixed rate.  Speculators often had more access to capital than governments, forcing devaluations by buying and selling large quantities of currency. Other constraints included inflation and U.S. demand for foreign goods (oil).  The result was reflected in the large deficit in the U.S. current account.   The current account balance went from a surplus of $4.3 billion in 1976 to a deficit of $15.3 billion in 1977, followed by consecutive negative balances in each quarter of 1978.  Meanwhile, Germany and Japan managed current account surpluses, while the United Kingdom broke even.  The theory behind the floating exchange rate system was currencies would self-regulate.  
President Carter’s first policy move was to obtain swap lines of credit with various central banks. According to the supplement, aggregated swap lines were approximately $30 billion.  The purpose of this policy was to use borrowed money to buy dollars (and sell foreign currency), stabilizing the value of the dollar.  This policy provided direct access for intervention in capital markets, much like a fixed exchange rate system.  This policy did not address underlying causes of the declining value of the dollar – appetite for foreign products (oil), current account deficits and inflation. The effect of this policy is shown in Exhibit 9, as net dollar support approached $2 billion.
President Carter’s administration also announced they would sell gold and reduce the size of the federal deficit.  Selling gold would imply devaluation relative to gold – using proceeds from gold sales to prop up demand for the dollar.  The effects from BOP deficits and inflation outweighed the ability of the administration to intervene in gold markets.  The attempt at reducing the federal deficit did little to quell market expectations for the future of dollar because neither addressed the root cause.  Current account surpluses from Germany and Japan also hindered Carter’s strategy.  The strong currency of Germany and Japan did not adjust ‘automatically’ as the theory suggested.  The countries with the strongest currency maintained surpluses in 1977-78 as the dollar declined dramatically.  U.S. consumers had a strong demand for foreign products.  The ability of Japanese and German to exporters to produce quality goods supported the value of their currency, even with higher prices for their exports.
            The Federal Reserve conducted monetary policy by raising interest rates (discount and fed funds rate) and increasing reserve requirements for banks, therefore increasing the amount of leakage in the system.  The policy was a direct response to inflation—higher leakage in the system would imply a tighter supply of money and reduce the multiplier effect of money.  Inevitably, the interest rate policy would provide confidence and support for the dollar by attracting foreign capital.  Inflation in the U.S. was running about 8-10% annual growth in the CPI in 1978.  The discount rate was increased to 9.5%. Fed Chairman Paul Volker was largely credited with breaking inflationary cycle and restoring faith in the dollar. 
            The policy of high interest rates and an independent Federal Reserve System allowed the U.S. to implement a strategy for contesting the market devaluation of the dollar.  The unique independence of the Fed was vital to restoring confidence.  Inevitably, devaluation of currency implies that imports become more expensive and exports will increase due to the relative affordability.  As interest rates rise, foreign capital flows into the domestic economy and increases the demand for dollars.  Currency speculators played a large role in the decline of the dollar, as did the strength of Japanese and German exports.  The market often takes time to adjust to new policies and can act rationally or irrationally in the short run. The long run effect of supporting the dollar was shown through a stronger currency and stronger domestic economy.  Ultimately, the Carter administration was troubled by the paradox of choosing between a strong dollar and a strong domestic economy.