The Second World War: Lessons to be Remembered
-

World War II ended eighty years ago, but we still hear its echo in ongoing major conflicts around the globe provoked by those who claim exceptionalism and superiority, not unlike Das Dritte Reich (the 3rd Reich)’s Berlin.

World War II ended eighty years ago, but we still hear its echo in ongoing major conflicts around the globe provoked by those who claim exceptionalism and superiority, not unlike Das Dritte Reich (the 3rd Reich)’s Berlin.

The Second World War: Lessons to be Remembered

This year marks the 80th anniversary of the Victory of the Soviet Union, the predecessor state of contemporary Russia, in the Great Patriotic War of 1941-1945. Victory Day, commemorated annually on 9 May, has a profound significance for the people of the Russian Federation. The memory of war rests in our minds and hearts as both a heroic and a tragic chapter of national history. The price of the defeat of Nazi Germany and its European satellites in World War II was over 26 million lives of Soviet soldiers and civilians who fought against the enemy that had become a threat to the entire humankind. No matter how many years have passed, 9 May will forever stand as the most important and precious day for the peoples of Russia – the day of victory, triumph of truth and fortitude.
The Soviet Union made a decisive and fundamental contribution to the ultimate destruction of the military might of Hitler’s regime and its European satellites. For the first three years of the Great Patriotic War, the country stood against Nazi Germany almost single-handedly while all of occupied Europe worked to support Wermacht’s war machine. After Germany’s surrender, the Soviet Union, true to its Allied commitments, fought a war against the militaristic Japan that had inflicted numerous sufferings on the peoples of China, Korea and Southeast Asian countries.
We give credit to and honour servicemen of the allied armies, Resistance fighters, soldiers and partisans in China, and all those who defeated Axis forces – Nazi Germany, Fascist Italy and Imperial Japan. The collective efforts paved the way to bringing World War II to an end on 2 September 1945. We will forever remember our joint struggle and the traditions of the alliance against the common adversary.
The Great Victory gave a tremendous boost to national independence movements and launched the process of decolonization. Military victories of the Soviet Army on the European battlefield, enfeebling the Axis, stimulated the formation of the Anti-Fascist People’s Freedom League in Myanmar (then Burma) in 1944 that unified all patriotic forces in the movement aimed at liberation from the Japanese occupation despite the false “independence” of Myanmar proclaimed by Toyo on 1 August 1943. The mass uprising led by the Burma National Army in March 1945 made inevitable the withdrawal of the Japanese forces from the country and set in motion new political realities resulting in the eventual proclamation of the country’s independence from British colonial rule on 4 January 1948.
One of the most important outcomes of World War II was the setting up of the new architecture of international relations with the United Nations as its core. As the victorious power, Russia has made an immense contribution to the establishment and fine-tuning of the international organization that is going to celebrate its 80th anniversary this year. Moscow has rightly taken the permanent seat on the UN Security Council.
Russia fully acknowledges its historical responsibility for the Organization, which was designed to safeguard the world from the scourge of new world wars. The concept of our country’s foreign policy gives priority to the restoration of the UN’s role in the emerging multipolar world order with emphasis on the comprehensive development of its potential as the central coordinating mechanism ensuring the members’ interests and collective decision-making. Towards this goal Russia has been working in close cooperation with the wide range of likeminded partners representing the Global Majority.
World War II ended eighty years ago, but we still hear its echo in ongoing major conflicts around the globe provoked by those who claim exceptionalism and superiority, not unlike Das Dritte Reich (the 3rd Reich)’s Berlin. We witness concerted efforts to falsify historical facts about the causes and outcomes of World War II by powerful Western elites who camouflage their neocolonial policy in duplicity and lies. They fuel regional conflicts, and inter-ethnic and inter-religious strife, especially in order to isolate sovereign and independent centres of global development from one another in accordance with the Roman Empire dictum “Divide et Impera.”
Attempts to glorify Nazism have become evident in many parts of Europe. In the Baltic States and Ukraine, the rehabilitation of local Nazi criminals and collaborators has become an integral part of the official policy with the European Union turning a blind eye to these vivid examples of political and moral degradation.
Even worse, tacit approval and backing by the Western leaders of the ultra-nationalistic pro-Nazi forces in Ukraine have given the Kyiv regime the green light to commit numerous atrocities against its political opponents and ordinary citizens in the regions with a predominantly Russian population. After the bloody coup d’etat in 2014, the Ukrainian regime unleashed a “punitive operation” in the Donbass region with barbaric shelling of cities claiming the lives of thousands of civilians.
The Ukraine leadership opted to become a “battering ram” of NATO posing a direct military threat to Russia, which made the conflict unavoidable. In his address to servicemen taking part in the Special military operation in Ukraine, Russian President Vladimir Putin said: “Today, as in the past, you are fighting for the security of our Motherland, its future, so that nobody forgets the lessons of World War II so that there is no place in the world for torturers, death squads and Nazis”.
In Asia and the Pacific the Japanese authorities who, to our chagrin, never repented from horrendous Imperial mistakes, have of late embarked on the path of re-militarization and alliance building under the pretext of the need to contain and confront China.
Despite all controversies in international relations, Russia has always advocated the establishment of an equal and indivisible security system, which is critically needed for the entire international community. Together with like-minded partners in the Shanghai Cooperation Organization and BRICS Russia has actively promoted the emergence of a new security architecture in Greater Eurasia and beyond. We are confident that the experience of solidarity and partnership in fighting the common threat during WWII provides a foothold for moving towards a fairer world based on principles of equal opportunities for the free and self-determined development of all nations.
We take pride in the unconquered generation of the victors. As their successors, we have the duty to remember the harsh lessons of World War II in order not to repeat them again and to preserve the memory of those who defeated Nazism. They entrusted us with being responsible and vigilant and doing everything to thwart the horror of another global hot war.

Source: The Global New Light of Myanmar

Iskander Azizov, Ambassador of the Russian Federation to the Republic of the Union of Myanmar

World War II ended eighty years ago, but we still hear its echo in ongoing major conflicts around the globe provoked by those who claim exceptionalism and superiority, not unlike Das Dritte Reich (the 3rd Reich)’s Berlin.

The Second World War: Lessons to be Remembered

This year marks the 80th anniversary of the Victory of the Soviet Union, the predecessor state of contemporary Russia, in the Great Patriotic War of 1941-1945. Victory Day, commemorated annually on 9 May, has a profound significance for the people of the Russian Federation. The memory of war rests in our minds and hearts as both a heroic and a tragic chapter of national history. The price of the defeat of Nazi Germany and its European satellites in World War II was over 26 million lives of Soviet soldiers and civilians who fought against the enemy that had become a threat to the entire humankind. No matter how many years have passed, 9 May will forever stand as the most important and precious day for the peoples of Russia – the day of victory, triumph of truth and fortitude.
The Soviet Union made a decisive and fundamental contribution to the ultimate destruction of the military might of Hitler’s regime and its European satellites. For the first three years of the Great Patriotic War, the country stood against Nazi Germany almost single-handedly while all of occupied Europe worked to support Wermacht’s war machine. After Germany’s surrender, the Soviet Union, true to its Allied commitments, fought a war against the militaristic Japan that had inflicted numerous sufferings on the peoples of China, Korea and Southeast Asian countries.
We give credit to and honour servicemen of the allied armies, Resistance fighters, soldiers and partisans in China, and all those who defeated Axis forces – Nazi Germany, Fascist Italy and Imperial Japan. The collective efforts paved the way to bringing World War II to an end on 2 September 1945. We will forever remember our joint struggle and the traditions of the alliance against the common adversary.
The Great Victory gave a tremendous boost to national independence movements and launched the process of decolonization. Military victories of the Soviet Army on the European battlefield, enfeebling the Axis, stimulated the formation of the Anti-Fascist People’s Freedom League in Myanmar (then Burma) in 1944 that unified all patriotic forces in the movement aimed at liberation from the Japanese occupation despite the false “independence” of Myanmar proclaimed by Toyo on 1 August 1943. The mass uprising led by the Burma National Army in March 1945 made inevitable the withdrawal of the Japanese forces from the country and set in motion new political realities resulting in the eventual proclamation of the country’s independence from British colonial rule on 4 January 1948.
One of the most important outcomes of World War II was the setting up of the new architecture of international relations with the United Nations as its core. As the victorious power, Russia has made an immense contribution to the establishment and fine-tuning of the international organization that is going to celebrate its 80th anniversary this year. Moscow has rightly taken the permanent seat on the UN Security Council.
Russia fully acknowledges its historical responsibility for the Organization, which was designed to safeguard the world from the scourge of new world wars. The concept of our country’s foreign policy gives priority to the restoration of the UN’s role in the emerging multipolar world order with emphasis on the comprehensive development of its potential as the central coordinating mechanism ensuring the members’ interests and collective decision-making. Towards this goal Russia has been working in close cooperation with the wide range of likeminded partners representing the Global Majority.
World War II ended eighty years ago, but we still hear its echo in ongoing major conflicts around the globe provoked by those who claim exceptionalism and superiority, not unlike Das Dritte Reich (the 3rd Reich)’s Berlin. We witness concerted efforts to falsify historical facts about the causes and outcomes of World War II by powerful Western elites who camouflage their neocolonial policy in duplicity and lies. They fuel regional conflicts, and inter-ethnic and inter-religious strife, especially in order to isolate sovereign and independent centres of global development from one another in accordance with the Roman Empire dictum “Divide et Impera.”
Attempts to glorify Nazism have become evident in many parts of Europe. In the Baltic States and Ukraine, the rehabilitation of local Nazi criminals and collaborators has become an integral part of the official policy with the European Union turning a blind eye to these vivid examples of political and moral degradation.
Even worse, tacit approval and backing by the Western leaders of the ultra-nationalistic pro-Nazi forces in Ukraine have given the Kyiv regime the green light to commit numerous atrocities against its political opponents and ordinary citizens in the regions with a predominantly Russian population. After the bloody coup d’etat in 2014, the Ukrainian regime unleashed a “punitive operation” in the Donbass region with barbaric shelling of cities claiming the lives of thousands of civilians.
The Ukraine leadership opted to become a “battering ram” of NATO posing a direct military threat to Russia, which made the conflict unavoidable. In his address to servicemen taking part in the Special military operation in Ukraine, Russian President Vladimir Putin said: “Today, as in the past, you are fighting for the security of our Motherland, its future, so that nobody forgets the lessons of World War II so that there is no place in the world for torturers, death squads and Nazis”.
In Asia and the Pacific the Japanese authorities who, to our chagrin, never repented from horrendous Imperial mistakes, have of late embarked on the path of re-militarization and alliance building under the pretext of the need to contain and confront China.
Despite all controversies in international relations, Russia has always advocated the establishment of an equal and indivisible security system, which is critically needed for the entire international community. Together with like-minded partners in the Shanghai Cooperation Organization and BRICS Russia has actively promoted the emergence of a new security architecture in Greater Eurasia and beyond. We are confident that the experience of solidarity and partnership in fighting the common threat during WWII provides a foothold for moving towards a fairer world based on principles of equal opportunities for the free and self-determined development of all nations.
We take pride in the unconquered generation of the victors. As their successors, we have the duty to remember the harsh lessons of World War II in order not to repeat them again and to preserve the memory of those who defeated Nazism. They entrusted us with being responsible and vigilant and doing everything to thwart the horror of another global hot war.

Source: The Global New Light of Myanmar

Turning Ordinary Words into Gold or Poison
-

WHEN we interact with others, the way we speak holds more power than we often realize. Words, of course, matter, but beyond the actual words we choose, our tone of voice shapes the way those words are received. A single sentence can carry completely different meanings depending on how it is spoken. A gentle, understanding tone can turn even the most difficult conversations into moments of connection, while a harsh or indifferent tone can create walls that may never come down.

WHEN we interact with others, the way we speak holds more power than we often realize. Words, of course, matter, but beyond the actual words we choose, our tone of voice shapes the way those words are received. A single sentence can carry completely different meanings depending on how it is spoken. A gentle, understanding tone can turn even the most difficult conversations into moments of connection, while a harsh or indifferent tone can create walls that may never come down.
Think of a time when someone spoke in a way that made us feel small, unimportant, or misunderstood. Maybe they didn’t mean to hurt us, but their tone carried impatience, frustration, or dismissiveness. That moment may have stayed with us longer than we expected. Even if the words themselves were harmless, the way they were said left an imprint, a bruise that took time to fade. On the other hand, think of a time when someone spoke with kindness, understanding, and warmth. That moment likely stood out too, giving us comfort and reassurance. Their words didn’t just communicate information; they made us feel seen, heard, and valued.
Human emotions are complex, and everyone carries an invisible weight within them. Some carry stress from work, others are struggling with personal hardships, and many are simply trying to get through the day without feeling overwhelmed. In the midst of all this, our tone of voice can either add to their burden or lighten it. It can be the difference between making someone’s day harder or giving them a moment of relief.
Imagine a simple conversation between two coworkers. One asks for help, and the other responds, “What do you need?” spoken in a soft, helpful tone. The same words spoken with impatience or irritation – “What do you need?” – can make the person hesitate, feel like a bother, or even regret asking in the first place. The difference is subtle yet profound. Tone has the ability to encourage or discourage, to make people feel safe or insecure, to build trust or to break it.
This is why being mindful of how we speak is so important. A conversation isn’t just about transferring information; it’s about human connection. Every interaction carries an emotional weight, whether we intend it to or not. We might forget the exact words someone said, but we rarely forget how they made us feel. That feeling lingers in our minds, shaping our thoughts about them and even about ourselves.
Parents often experience this with their children. A tired, frustrated parent might snap at their child, not meaning to be unkind but simply feeling overwhelmed in the moment. The child, however, doesn’t just hear the words – they hear the disappointment, the impatience, and the sharp edge in the voice of someone they look up to. That one moment might fade for the parent, but for the child, it may be remembered as a moment when they felt unloved or unimportant. On the other hand, when a parent speaks with patience and warmth, even in times of discipline, the child feels secure and loved. They understand that mistakes don’t define them and that their worth isn’t shaken by a bad moment.
The same applies to friendships and romantic relationships. Arguments and disagreements are a natural part of any close relationship, but how we express frustration can determine whether we deepen our bond or damage it. A simple “I’m upset” said in a calm, controlled tone invites discussion and understanding. “I’m upset!” yelled in anger shuts down communication and may leave the other person feeling defensive or hurt. Words spoken in anger can be forgiven, but their emotional impact often lingers far longer than we anticipate.
Workplaces, too, are filled with examples of how tone of voice affects interactions. A manager giving feedback can either inspire or discourage an employee, depending on how they deliver their message. “This needs improvement” can feel constructive when
spoken in a neutral, supportive tone. But with a sharp, dismissive tone, the same phrase can feel like criticism that stings, making the employee question their abilities. In professional settings, where morale and teamwork are crucial, tone plays a significant role in shaping a positive or toxic work environment.
Even in everyday encounters with strangers, our tone of voice can have an impact. A cashier at the grocery store, a barista at a coffee shop, or a fellow passenger on public transport – these brief interactions may seem insignificant, but they can leave lasting impressions. A warm “thank you” can make someone’s workday feel a little lighter. A rushed, indifferent response can make them feel invisible like they’re just another task to complete. Small moments add up, and though we may never know the full extent of how our tone affects others, it’s always worth choosing kindness.
It’s easy to forget about tone in the rush of daily life. Stress, fatigue, and frustration can make it harder to be mindful of how we sound. But awareness is the first step. Taking a moment to pause before speaking, adjusting our tone to match our intention, and making a conscious effort to communicate with kindness can transform the way we connect with others.
There’s an undeniable truth in the idea that people may not remember what we said, but they will remember how we made them feel. This is a reminder to approach conversations with empathy, to soften our words when needed, and to use our tone as a tool for connection rather than division. The world is filled with enough harshness, enough impatience. Choosing to speak with warmth and understanding is a small act, but its impact can be profound.
So the next time we speak, we must consider not just what we say, but how we say it. A thoughtful tone can turn a simple interaction into a moment of reassurance, a conversation into a connection, and a difficult moment into an opportunity for kindness. Our voices have power – let’s use them to uplift, comfort, and remind others that they matter.

Source: The Global New Light of Myanmar

Laura Htet (UDE)

WHEN we interact with others, the way we speak holds more power than we often realize. Words, of course, matter, but beyond the actual words we choose, our tone of voice shapes the way those words are received. A single sentence can carry completely different meanings depending on how it is spoken. A gentle, understanding tone can turn even the most difficult conversations into moments of connection, while a harsh or indifferent tone can create walls that may never come down.
Think of a time when someone spoke in a way that made us feel small, unimportant, or misunderstood. Maybe they didn’t mean to hurt us, but their tone carried impatience, frustration, or dismissiveness. That moment may have stayed with us longer than we expected. Even if the words themselves were harmless, the way they were said left an imprint, a bruise that took time to fade. On the other hand, think of a time when someone spoke with kindness, understanding, and warmth. That moment likely stood out too, giving us comfort and reassurance. Their words didn’t just communicate information; they made us feel seen, heard, and valued.
Human emotions are complex, and everyone carries an invisible weight within them. Some carry stress from work, others are struggling with personal hardships, and many are simply trying to get through the day without feeling overwhelmed. In the midst of all this, our tone of voice can either add to their burden or lighten it. It can be the difference between making someone’s day harder or giving them a moment of relief.
Imagine a simple conversation between two coworkers. One asks for help, and the other responds, “What do you need?” spoken in a soft, helpful tone. The same words spoken with impatience or irritation – “What do you need?” – can make the person hesitate, feel like a bother, or even regret asking in the first place. The difference is subtle yet profound. Tone has the ability to encourage or discourage, to make people feel safe or insecure, to build trust or to break it.
This is why being mindful of how we speak is so important. A conversation isn’t just about transferring information; it’s about human connection. Every interaction carries an emotional weight, whether we intend it to or not. We might forget the exact words someone said, but we rarely forget how they made us feel. That feeling lingers in our minds, shaping our thoughts about them and even about ourselves.
Parents often experience this with their children. A tired, frustrated parent might snap at their child, not meaning to be unkind but simply feeling overwhelmed in the moment. The child, however, doesn’t just hear the words – they hear the disappointment, the impatience, and the sharp edge in the voice of someone they look up to. That one moment might fade for the parent, but for the child, it may be remembered as a moment when they felt unloved or unimportant. On the other hand, when a parent speaks with patience and warmth, even in times of discipline, the child feels secure and loved. They understand that mistakes don’t define them and that their worth isn’t shaken by a bad moment.
The same applies to friendships and romantic relationships. Arguments and disagreements are a natural part of any close relationship, but how we express frustration can determine whether we deepen our bond or damage it. A simple “I’m upset” said in a calm, controlled tone invites discussion and understanding. “I’m upset!” yelled in anger shuts down communication and may leave the other person feeling defensive or hurt. Words spoken in anger can be forgiven, but their emotional impact often lingers far longer than we anticipate.
Workplaces, too, are filled with examples of how tone of voice affects interactions. A manager giving feedback can either inspire or discourage an employee, depending on how they deliver their message. “This needs improvement” can feel constructive when
spoken in a neutral, supportive tone. But with a sharp, dismissive tone, the same phrase can feel like criticism that stings, making the employee question their abilities. In professional settings, where morale and teamwork are crucial, tone plays a significant role in shaping a positive or toxic work environment.
Even in everyday encounters with strangers, our tone of voice can have an impact. A cashier at the grocery store, a barista at a coffee shop, or a fellow passenger on public transport – these brief interactions may seem insignificant, but they can leave lasting impressions. A warm “thank you” can make someone’s workday feel a little lighter. A rushed, indifferent response can make them feel invisible like they’re just another task to complete. Small moments add up, and though we may never know the full extent of how our tone affects others, it’s always worth choosing kindness.
It’s easy to forget about tone in the rush of daily life. Stress, fatigue, and frustration can make it harder to be mindful of how we sound. But awareness is the first step. Taking a moment to pause before speaking, adjusting our tone to match our intention, and making a conscious effort to communicate with kindness can transform the way we connect with others.
There’s an undeniable truth in the idea that people may not remember what we said, but they will remember how we made them feel. This is a reminder to approach conversations with empathy, to soften our words when needed, and to use our tone as a tool for connection rather than division. The world is filled with enough harshness, enough impatience. Choosing to speak with warmth and understanding is a small act, but its impact can be profound.
So the next time we speak, we must consider not just what we say, but how we say it. A thoughtful tone can turn a simple interaction into a moment of reassurance, a conversation into a connection, and a difficult moment into an opportunity for kindness. Our voices have power – let’s use them to uplift, comfort, and remind others that they matter.

Source: The Global New Light of Myanmar

Sawdust superpower: Wood waste battery retains 60% capacity after 10,000 cycles
-

Researchers at the University of the Basque Country (UPV/EHU) have developed a hybrid supercapacitor using carbon derived from Pinus radiata waste.

The lithium-ion capacitor features electrodes made from discarded wood particles, offering a sustainable and cost-effective energy storage solution.

Researchers at the University of the Basque Country (UPV/EHU) have developed a hybrid supercapacitor using carbon derived from Pinus radiata waste.

The lithium-ion capacitor features electrodes made from discarded wood particles, offering a sustainable and cost-effective energy storage solution.

With abundant biomass resources in the Basque Country in Spain, the team utilized environmentally friendly and inexpensive processes to create high-performance electrodes. Their findings highlight the potential of biomass-based materials in producing efficient, eco-friendly energy storage systems.

According to researchers, the innovation could pave the way for greener alternatives in high-power energy storage, reducing reliance on conventional materials and enhancing sustainability in the sector.

Biomass-powered capacitors

Modern society’s growing energy needs necessitate sustainable storage options that don’t fuel global warming. Energy storage is dominated by lithium-ion batteries (LIBs) and supercapacitors (SCs), but each has drawbacks: SCs have high power but rapidly self-discharge, while LIBs have high energy but deteriorate with time.

Combining the two technologies, lithium-ion capacitors (LICs) provide high energy, power, and long cycle life, which makes them perfect for uses such as electric vehicles and wind turbines.

The choice of electrode material has a significant impact on LIC performance. Despite its widespread use, graphite is a key raw element and is expensive for the environment. Although alternatives like hard carbons, soft carbons, and nanocarbons have potential, their high cost and complexity prevent their widespread use.

The UPV/EHU team developed a cost-effective LIC using carbon from Pinus radiata waste, an abundant and sustainable resource in Biscay, Spain. They produced high-performance electrodes using carbon sourced from biomass instead of costly chemicals or energy-intensive procedures.

“We develop new materials that can be used to store energy. In this case, to create electrodes we prepared carbon from the wood particles of the insignis pines that are all around us and are used in carpentry workshops,” said Idoia Ruiz de Larramendi, a lecturer at UPV/EHU and member of the research group, in a statement.

Eco-friendly batteries

Batteries and supercapacitors are essential for energy storage, each with distinct advantages. Supercapacitors produce great power output for brief periods of time, whereas batteries retain more energy. Supercapacitors are not suited for long-term energy supply, but they are perfect for applications that need quick energy release.

The research created a hybrid lithium-ion device that combines the advantages of both technologies. It retains the robustness and quick charge-discharge qualities of a supercapacitor while storing high-power energy like a battery. The device’s total performance is improved by combining electrodes of the battery and supercapacitor types.

Various forms of carbon, carefully chosen from biomass sources, were used to create electrodes. Not all biomass provides suitable carbon for energy storage applications, but results demonstrated the effectiveness of carbon derived from insignis pine.

Researchers found that one electrode was composed of hard carbon and the other of activated carbon. Sustainability and cost-effectiveness were given top priority during the production process, which used cost-effective additives and maintained synthesis temperatures below 700°C.

In the new configuration, the positive electrode, which is composed of the same carbon, has a big surface area, while the negative electrode stores a lot of energy without the need for expensive chemicals. The system provides 105 Wh/kg at 700 W/kg and retains 60 percent capacity after 10,000 charge cycles.

The study points to the potential of local biomass as a cost-effective, eco-friendly alternative for lithium-ion capacitors. The team highlights that biomass-derived materials offer promising opportunities for high-power energy storage, emphasizing the need for continued research to improve energy storage technologies with sustainable solutions.

The details of the team’s research were published in the Journal of Power Sources.

Source: https://interestingengineering.com/energy/sawdust-superpower-wood-waste-battery-breakthrough

Jijo Malayil

Researchers at the University of the Basque Country (UPV/EHU) have developed a hybrid supercapacitor using carbon derived from Pinus radiata waste.

The lithium-ion capacitor features electrodes made from discarded wood particles, offering a sustainable and cost-effective energy storage solution.

With abundant biomass resources in the Basque Country in Spain, the team utilized environmentally friendly and inexpensive processes to create high-performance electrodes. Their findings highlight the potential of biomass-based materials in producing efficient, eco-friendly energy storage systems.

According to researchers, the innovation could pave the way for greener alternatives in high-power energy storage, reducing reliance on conventional materials and enhancing sustainability in the sector.

Biomass-powered capacitors

Modern society’s growing energy needs necessitate sustainable storage options that don’t fuel global warming. Energy storage is dominated by lithium-ion batteries (LIBs) and supercapacitors (SCs), but each has drawbacks: SCs have high power but rapidly self-discharge, while LIBs have high energy but deteriorate with time.

Combining the two technologies, lithium-ion capacitors (LICs) provide high energy, power, and long cycle life, which makes them perfect for uses such as electric vehicles and wind turbines.

The choice of electrode material has a significant impact on LIC performance. Despite its widespread use, graphite is a key raw element and is expensive for the environment. Although alternatives like hard carbons, soft carbons, and nanocarbons have potential, their high cost and complexity prevent their widespread use.

The UPV/EHU team developed a cost-effective LIC using carbon from Pinus radiata waste, an abundant and sustainable resource in Biscay, Spain. They produced high-performance electrodes using carbon sourced from biomass instead of costly chemicals or energy-intensive procedures.

“We develop new materials that can be used to store energy. In this case, to create electrodes we prepared carbon from the wood particles of the insignis pines that are all around us and are used in carpentry workshops,” said Idoia Ruiz de Larramendi, a lecturer at UPV/EHU and member of the research group, in a statement.

Eco-friendly batteries

Batteries and supercapacitors are essential for energy storage, each with distinct advantages. Supercapacitors produce great power output for brief periods of time, whereas batteries retain more energy. Supercapacitors are not suited for long-term energy supply, but they are perfect for applications that need quick energy release.

The research created a hybrid lithium-ion device that combines the advantages of both technologies. It retains the robustness and quick charge-discharge qualities of a supercapacitor while storing high-power energy like a battery. The device’s total performance is improved by combining electrodes of the battery and supercapacitor types.

Various forms of carbon, carefully chosen from biomass sources, were used to create electrodes. Not all biomass provides suitable carbon for energy storage applications, but results demonstrated the effectiveness of carbon derived from insignis pine.

Researchers found that one electrode was composed of hard carbon and the other of activated carbon. Sustainability and cost-effectiveness were given top priority during the production process, which used cost-effective additives and maintained synthesis temperatures below 700°C.

In the new configuration, the positive electrode, which is composed of the same carbon, has a big surface area, while the negative electrode stores a lot of energy without the need for expensive chemicals. The system provides 105 Wh/kg at 700 W/kg and retains 60 percent capacity after 10,000 charge cycles.

The study points to the potential of local biomass as a cost-effective, eco-friendly alternative for lithium-ion capacitors. The team highlights that biomass-derived materials offer promising opportunities for high-power energy storage, emphasizing the need for continued research to improve energy storage technologies with sustainable solutions.

The details of the team’s research were published in the Journal of Power Sources.

Source: https://interestingengineering.com/energy/sawdust-superpower-wood-waste-battery-breakthrough

International Law in Everyday Life: More Relevant Than You Think
-

When you hear the term “international law,” what comes to mind? Perhaps you picture diplomats in suits, sitting in grand conference halls, signing treaties that seem distant from your daily life. Or maybe you imagine high-stakes cases at the International Court of Justice (ICJ), where nations argue over territorial disputes and human rights violations.

When you hear the term “international law,” what comes to mind? Perhaps you picture diplomats in suits, sitting in grand conference halls, signing treaties that seem distant from your daily life. Or maybe you imagine high-stakes cases at the International Court of Justice (ICJ), where nations argue over territorial disputes and human rights violations.

But what if I told you that international law isn’t just something that happens in faraway places, affecting only politicians and legal scholars? It’s actually woven into the fabric of your everyday life—in ways you might not even realize. From the coffee you sip in the morning to the social media platforms you browse before bed, international law is quietly shaping the modern world, ensuring that systems run smoothly and fairly. Let’s take a closer look at how international law shows up in your daily routine.

1. Morning Coffee and Global Trade

Picture this: you wake up, stumble to the kitchen, and make yourself a cup of coffee. That simple act is already tied to international law.

The coffee beans in your cup might have come from Brazil, Ethiopia, or Vietnam. How did they get to your local store? Through a complex network of trade agreements regulated by the World Trade Organization (WTO). The WTO sets the rules on tariffs, trade barriers, and import/export standards, making it possible for those coffee beans to travel across borders without excessive costs or political interference.

Even the logo on your coffee cup is protected by international law. Intellectual property agreements, such as the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), protect the brand identity and trademarks of coffee companies, ensuring that you know you're drinking the real thing and not a knock-off.

Next time you take a sip of your morning brew, you might want to thank international law for making it possible.

2. Traveling Abroad: Passports and Visas

Planning a trip abroad? Your passport and visa requirements are shaped by international agreements.

Why can you travel to some countries visa-free but need a visa for others? That’s because of bilateral and multilateral agreements between countries, which determine the terms of entry for foreign nationals. The design and security of your passport are also regulated by the International Civil Aviation Organization (ICAO), a specialized agency of the United Nations. The ICAO sets global standards to prevent fraud and ensure smooth border crossings.

The ease of booking a flight and checking in at the airport is also governed by international aviation laws. The Chicago Convention on International Civil Aviation (1944) established the legal framework for air travel, ensuring that planes from one country can safely land in another.

So, the next time you breeze through passport control, remember that international law helped pave the way.

3. Environmental Protection and Climate Change

Ever wondered why plastic straws have disappeared from your favorite café? Or why countries are switching to renewable energy sources? That’s international law in action.

The Paris Agreement (2015), signed by nearly every country in the world, sets targets for reducing carbon emissions and combating climate change. This agreement pushes governments to adopt sustainable practices—like banning single-use plastics or investing in green energy—which directly impacts your daily life.

International treaties also protect wildlife and natural resources. The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) regulates the global trade of endangered animals and plants, ensuring that species are not exploited to extinction.

Even the beauty industry is influenced by international environmental standards. Take Selena Gomez’s Rare Beauty lipstick, for example. A portion of the proceeds from certain shades goes toward coral reef restoration efforts. Coral reefs are essential for marine biodiversity, but they are threatened by ocean warming and pollution. International environmental laws and agreements, like the United Nations Convention on the Law of the Sea (UNCLOS), aim to protect marine ecosystems and promote sustainable use of ocean resources.

So next time you apply that perfect shade of coral lipstick, remember that you’re not just enhancing your look—you’re supporting global efforts to protect the planet’s ecosystems.

4. Online Shopping and Consumer Protection

Clicked "Buy Now" on Amazon or Temu recently? Your online purchase is more connected to international law than you think.

International trade agreements ensure that goods can be imported and exported across borders efficiently. The General Agreement on Tariffs and Trade (GATT) sets the framework for international commerce, ensuring fair trade practices and reducing trade barriers.

Consumer protection laws, including intellectual property agreements, also protect you from counterfeit products and fraud. Cybersecurity agreements between countries work behind the scenes to protect your personal data when you enter your credit card details online.

So next time your package arrives at your door, remember that international law helped make it possible—safely and legally.

5. Health and Global Pandemics

The COVID-19 pandemic showed us just how interconnected the world is—and how crucial international cooperation is in times of crisis.

The World Health Organization (WHO) plays a key role in coordinating global health responses. Its regulations on disease reporting and health emergencies ensure that outbreaks are tracked and managed quickly. The WHO also works with governments and pharmaceutical companies to ensure that vaccines and treatments are distributed fairly.

International law also governs medical research and the sharing of scientific data. Agreements like the Nagoya Protocol regulate the use of genetic resources, ensuring that the benefits of medical discoveries are shared globally.

From vaccine rollouts to international travel restrictions, global health law shapes how the world responds to public health emergencies—protecting you and your community.

6. Social Media and Digital Privacy

Scrolling through Facebook or TikTok? Even social media is shaped by international law.

Data privacy regulations like the General Data Protection Regulation (GDPR) in the European Union set standards for how social media companies collect, store, and use your personal information. Many platforms follow these guidelines globally, which means that your data is protected even if you're not in the EU.

International agreements on cybercrime also regulate how governments respond to hacking, misinformation, and online threats. Your ability to use social media freely and safely is, in part, the result of international legal frameworks that protect online expression and privacy.

Why It Matters

International law isn’t just about treaties and court cases—it’s about the invisible rules that make modern life possible. It ensures that you can trade, travel, shop, and communicate across borders with confidence and security.

The next time you enjoy a cup of coffee, buy something online, or book a flight, or put on a lipstick, remember that international law is working behind the scenes. It’s not just the domain of diplomats and lawyers—it’s part of the rhythm of everyday life.

Understanding international law helps you see the world differently. It shows you how interconnected and interdependent we all are—and why cooperation between nations matters more than ever.

So, the next time someone mentions international law, you’ll know it’s not just about politics and treaties—it’s about the small things that make your world go round.

Reference List:

1.      United Nations Framework Convention on Climate Change (UNFCCC). (2015). Paris  Agreement. [Link to document or website]

2.      World Wildlife Fund (WWF). (n.d.). Plastic pollution. Retrieved from [https://www.wwf.org]

3.      Environmental Protection Agency (EPA). (n.d.). The Role of Environmental Protection. Retrieved from [https://www.epa.gov]

4.      Gomez, S. (2021). Selena Gomez's Lipstick and the Environment. [Source or Article Name].

5.      International Criminal Court (ICC). (n.d.). International Law and Environmental Protection. Retrieved from [https://www.icc-cpi.int]

6.      Intergovernmental Panel on Climate Change (IPCC). (2021). Climate Change: The Physical Science Basis. Retrieved from [https://www.ipcc.ch]

7.      International Court of Justice (ICJ). (n.d.). International Law on Environmental Protection. Retrieved from [https://www.icj-cij.org]

8.      UN Environment Programme (UNEP). (2020). The State of the Environment Report. Retrieved from [https://www.unenvironment.org]

9.      The Guardian. (2021). Fashion and Sustainability: What Does the Industry Need to Do?

Hla Myet Chell (International Law)

When you hear the term “international law,” what comes to mind? Perhaps you picture diplomats in suits, sitting in grand conference halls, signing treaties that seem distant from your daily life. Or maybe you imagine high-stakes cases at the International Court of Justice (ICJ), where nations argue over territorial disputes and human rights violations.

But what if I told you that international law isn’t just something that happens in faraway places, affecting only politicians and legal scholars? It’s actually woven into the fabric of your everyday life—in ways you might not even realize. From the coffee you sip in the morning to the social media platforms you browse before bed, international law is quietly shaping the modern world, ensuring that systems run smoothly and fairly. Let’s take a closer look at how international law shows up in your daily routine.

1. Morning Coffee and Global Trade

Picture this: you wake up, stumble to the kitchen, and make yourself a cup of coffee. That simple act is already tied to international law.

The coffee beans in your cup might have come from Brazil, Ethiopia, or Vietnam. How did they get to your local store? Through a complex network of trade agreements regulated by the World Trade Organization (WTO). The WTO sets the rules on tariffs, trade barriers, and import/export standards, making it possible for those coffee beans to travel across borders without excessive costs or political interference.

Even the logo on your coffee cup is protected by international law. Intellectual property agreements, such as the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), protect the brand identity and trademarks of coffee companies, ensuring that you know you're drinking the real thing and not a knock-off.

Next time you take a sip of your morning brew, you might want to thank international law for making it possible.

2. Traveling Abroad: Passports and Visas

Planning a trip abroad? Your passport and visa requirements are shaped by international agreements.

Why can you travel to some countries visa-free but need a visa for others? That’s because of bilateral and multilateral agreements between countries, which determine the terms of entry for foreign nationals. The design and security of your passport are also regulated by the International Civil Aviation Organization (ICAO), a specialized agency of the United Nations. The ICAO sets global standards to prevent fraud and ensure smooth border crossings.

The ease of booking a flight and checking in at the airport is also governed by international aviation laws. The Chicago Convention on International Civil Aviation (1944) established the legal framework for air travel, ensuring that planes from one country can safely land in another.

So, the next time you breeze through passport control, remember that international law helped pave the way.

3. Environmental Protection and Climate Change

Ever wondered why plastic straws have disappeared from your favorite café? Or why countries are switching to renewable energy sources? That’s international law in action.

The Paris Agreement (2015), signed by nearly every country in the world, sets targets for reducing carbon emissions and combating climate change. This agreement pushes governments to adopt sustainable practices—like banning single-use plastics or investing in green energy—which directly impacts your daily life.

International treaties also protect wildlife and natural resources. The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) regulates the global trade of endangered animals and plants, ensuring that species are not exploited to extinction.

Even the beauty industry is influenced by international environmental standards. Take Selena Gomez’s Rare Beauty lipstick, for example. A portion of the proceeds from certain shades goes toward coral reef restoration efforts. Coral reefs are essential for marine biodiversity, but they are threatened by ocean warming and pollution. International environmental laws and agreements, like the United Nations Convention on the Law of the Sea (UNCLOS), aim to protect marine ecosystems and promote sustainable use of ocean resources.

So next time you apply that perfect shade of coral lipstick, remember that you’re not just enhancing your look—you’re supporting global efforts to protect the planet’s ecosystems.

4. Online Shopping and Consumer Protection

Clicked "Buy Now" on Amazon or Temu recently? Your online purchase is more connected to international law than you think.

International trade agreements ensure that goods can be imported and exported across borders efficiently. The General Agreement on Tariffs and Trade (GATT) sets the framework for international commerce, ensuring fair trade practices and reducing trade barriers.

Consumer protection laws, including intellectual property agreements, also protect you from counterfeit products and fraud. Cybersecurity agreements between countries work behind the scenes to protect your personal data when you enter your credit card details online.

So next time your package arrives at your door, remember that international law helped make it possible—safely and legally.

5. Health and Global Pandemics

The COVID-19 pandemic showed us just how interconnected the world is—and how crucial international cooperation is in times of crisis.

The World Health Organization (WHO) plays a key role in coordinating global health responses. Its regulations on disease reporting and health emergencies ensure that outbreaks are tracked and managed quickly. The WHO also works with governments and pharmaceutical companies to ensure that vaccines and treatments are distributed fairly.

International law also governs medical research and the sharing of scientific data. Agreements like the Nagoya Protocol regulate the use of genetic resources, ensuring that the benefits of medical discoveries are shared globally.

From vaccine rollouts to international travel restrictions, global health law shapes how the world responds to public health emergencies—protecting you and your community.

6. Social Media and Digital Privacy

Scrolling through Facebook or TikTok? Even social media is shaped by international law.

Data privacy regulations like the General Data Protection Regulation (GDPR) in the European Union set standards for how social media companies collect, store, and use your personal information. Many platforms follow these guidelines globally, which means that your data is protected even if you're not in the EU.

International agreements on cybercrime also regulate how governments respond to hacking, misinformation, and online threats. Your ability to use social media freely and safely is, in part, the result of international legal frameworks that protect online expression and privacy.

Why It Matters

International law isn’t just about treaties and court cases—it’s about the invisible rules that make modern life possible. It ensures that you can trade, travel, shop, and communicate across borders with confidence and security.

The next time you enjoy a cup of coffee, buy something online, or book a flight, or put on a lipstick, remember that international law is working behind the scenes. It’s not just the domain of diplomats and lawyers—it’s part of the rhythm of everyday life.

Understanding international law helps you see the world differently. It shows you how interconnected and interdependent we all are—and why cooperation between nations matters more than ever.

So, the next time someone mentions international law, you’ll know it’s not just about politics and treaties—it’s about the small things that make your world go round.

Reference List:

1.      United Nations Framework Convention on Climate Change (UNFCCC). (2015). Paris  Agreement. [Link to document or website]

2.      World Wildlife Fund (WWF). (n.d.). Plastic pollution. Retrieved from [https://www.wwf.org]

3.      Environmental Protection Agency (EPA). (n.d.). The Role of Environmental Protection. Retrieved from [https://www.epa.gov]

4.      Gomez, S. (2021). Selena Gomez's Lipstick and the Environment. [Source or Article Name].

5.      International Criminal Court (ICC). (n.d.). International Law and Environmental Protection. Retrieved from [https://www.icc-cpi.int]

6.      Intergovernmental Panel on Climate Change (IPCC). (2021). Climate Change: The Physical Science Basis. Retrieved from [https://www.ipcc.ch]

7.      International Court of Justice (ICJ). (n.d.). International Law on Environmental Protection. Retrieved from [https://www.icj-cij.org]

8.      UN Environment Programme (UNEP). (2020). The State of the Environment Report. Retrieved from [https://www.unenvironment.org]

9.      The Guardian. (2021). Fashion and Sustainability: What Does the Industry Need to Do?

Meltdown at the Top of the World
-

The Hindu Kush Himalayas – the largest store of ice after Antarctica and the Arctic – are warming three times faster than the global average. Development institutions must take urgent action to avert the disastrous effects of accelerating glacial melt, which would devastate local economies and fuel instability worldwide.       

The Hindu Kush Himalayas – the largest store of ice after Antarctica and the Arctic – are warming three times faster than the global average. Development institutions must take urgent action to avert the disastrous effects of accelerating glacial melt, which would devastate local economies and fuel instability worldwide.       

The United Nations has declared 2025 to be the International Year of Glaciers’ Preservation, making it a fitting moment to confront the stark reality that the world’s ice sheets are melting. Climate change is accelerating this trend, particularly in the Hindu Kush Himalayas – a region known as the Earth’s Third Pole because it contains the largest volume of ice outside of the Arctic and Antarctica.         

This mountain range, which stretches across 3,500 kilometers and spans eight countries, from Afghanistan to Myanmar, is warming roughly three times faster than the global average. If temperatures rise by 3° Celsius above pre-industrial levels by the end of this century, up to 75% of the region’s glaciers will melt, reducing water availability, undermining food and energy security, and exacerbating biodiversity loss.

Glacial melt thus threatens irreversible damage to nearby communities and local economies. But it would also fuel instability around the globe by increasing migration, disrupting trade, and causing food prices to rise.

The 2021 flood disaster in Nepal’s Melamchi River offers a glimpse of what is to come. Unusually heavy monsoon rains, coupled with excessive snowmelt, triggered a debris flow that wiped out thousands of hectares of agricultural land and destroyed critical infrastructure, leaving hundreds of thousands of people without access to water.

As the glaciers retreat, there will be too little water – a problem that is projected to afflict the Hindu Kush Himalayas by 2050. Dwindling river flows would make it more difficult to irrigate crops in an area that produces around one-third of the world’s rice and one-quarter of its wheat. Water-supply and sanitation systems will become difficult to maintain, adding to the one billion people who already lack access to basic sanitation in the region. Food insecurity will almost surely worsen as well, while communities and even entire industries will likely need to migrate in search of fresh water. Asia’s poorest and most vulnerable populations will be hit the hardest.

The world must take urgent action to avert the disastrous effects of accelerating glacial melt in this region. That means deepening our knowledge by investing in multi-hazard risk assessment, because the extent of the damage will largely depend on whether global temperatures rise by 1.5°, 1.8°, 2°, or 3°C. We must also strengthen integrated river-basin management by enhancing data collection, facilitating knowledge sharing, optimizing water management, and coordinating among people and communities living upstream and downstream.

Ensuring that new and existing infrastructure is climate-resilient is essential for maintaining access to safe drinking water and energy security, as well as sanitation, irrigation, and transport systems. It is equally important to protect ecosystems and promote nature-based solutions such as afforestation, reforestation, wetland preservation, and flood-plain restoration.

Every component of this strategy requires more financing. Development institutions must continue to scale up investment in the Hindu Kush Himalayas, and to work together to recast this glacial region and its river basins as a global public good, especially given their importance for agricultural and industrial activities.

Lastly, the international community must advance the equitable use of shared glacial resources through cooperation and diplomacy. This would help defuse potential tensions and promote sustainable development, ensuring that the region’s glaciers serve as a force for peace rather than conflict.

The Asian Development Bank (of which I am president) has taken steps to meet some of these goals. Together with the Green Climate Fund and country partners, ADB recently launched the Glaciers to Farms program, which will mobilize $3.5 billion to strengthen climate resilience in agriculture in Central and West Asia. Meanwhile, its Building Adaptation and Resilience in the Hindu Kush Himalayas-Bhutan and Nepal initiative is helping plan and design climate-resilient infrastructure and services. And ADB is also piloting new financing instruments, such as eco-compensation mechanisms, carbon markets and water trading, and sustainability-linked bonds.

When UNESCO and the World Meteorological Organization (WMO) launched the International Year of Glaciers’ Preservation last month, WMO Secretary-General Celeste Saulo said that it should serve as “a wake-up call to the world.” The global community must do everything in its power – from building climate resilience to accelerating the green transition and promoting regional cooperation – to ensure a sustainable future for the billions of people who depend on glaciers and their related ecosystems. Failure to act now would have catastrophic consequences for us all.

Masatsugu Asakawa is President of the Asian Development Bank.

Source: https://www.eco-business.com/opinion/meltdown-at-the-top-of-the-world/

Masatsugu Asakawa

The Hindu Kush Himalayas – the largest store of ice after Antarctica and the Arctic – are warming three times faster than the global average. Development institutions must take urgent action to avert the disastrous effects of accelerating glacial melt, which would devastate local economies and fuel instability worldwide.       

The United Nations has declared 2025 to be the International Year of Glaciers’ Preservation, making it a fitting moment to confront the stark reality that the world’s ice sheets are melting. Climate change is accelerating this trend, particularly in the Hindu Kush Himalayas – a region known as the Earth’s Third Pole because it contains the largest volume of ice outside of the Arctic and Antarctica.         

This mountain range, which stretches across 3,500 kilometers and spans eight countries, from Afghanistan to Myanmar, is warming roughly three times faster than the global average. If temperatures rise by 3° Celsius above pre-industrial levels by the end of this century, up to 75% of the region’s glaciers will melt, reducing water availability, undermining food and energy security, and exacerbating biodiversity loss.

Glacial melt thus threatens irreversible damage to nearby communities and local economies. But it would also fuel instability around the globe by increasing migration, disrupting trade, and causing food prices to rise.

The 2021 flood disaster in Nepal’s Melamchi River offers a glimpse of what is to come. Unusually heavy monsoon rains, coupled with excessive snowmelt, triggered a debris flow that wiped out thousands of hectares of agricultural land and destroyed critical infrastructure, leaving hundreds of thousands of people without access to water.

As the glaciers retreat, there will be too little water – a problem that is projected to afflict the Hindu Kush Himalayas by 2050. Dwindling river flows would make it more difficult to irrigate crops in an area that produces around one-third of the world’s rice and one-quarter of its wheat. Water-supply and sanitation systems will become difficult to maintain, adding to the one billion people who already lack access to basic sanitation in the region. Food insecurity will almost surely worsen as well, while communities and even entire industries will likely need to migrate in search of fresh water. Asia’s poorest and most vulnerable populations will be hit the hardest.

The world must take urgent action to avert the disastrous effects of accelerating glacial melt in this region. That means deepening our knowledge by investing in multi-hazard risk assessment, because the extent of the damage will largely depend on whether global temperatures rise by 1.5°, 1.8°, 2°, or 3°C. We must also strengthen integrated river-basin management by enhancing data collection, facilitating knowledge sharing, optimizing water management, and coordinating among people and communities living upstream and downstream.

Ensuring that new and existing infrastructure is climate-resilient is essential for maintaining access to safe drinking water and energy security, as well as sanitation, irrigation, and transport systems. It is equally important to protect ecosystems and promote nature-based solutions such as afforestation, reforestation, wetland preservation, and flood-plain restoration.

Every component of this strategy requires more financing. Development institutions must continue to scale up investment in the Hindu Kush Himalayas, and to work together to recast this glacial region and its river basins as a global public good, especially given their importance for agricultural and industrial activities.

Lastly, the international community must advance the equitable use of shared glacial resources through cooperation and diplomacy. This would help defuse potential tensions and promote sustainable development, ensuring that the region’s glaciers serve as a force for peace rather than conflict.

The Asian Development Bank (of which I am president) has taken steps to meet some of these goals. Together with the Green Climate Fund and country partners, ADB recently launched the Glaciers to Farms program, which will mobilize $3.5 billion to strengthen climate resilience in agriculture in Central and West Asia. Meanwhile, its Building Adaptation and Resilience in the Hindu Kush Himalayas-Bhutan and Nepal initiative is helping plan and design climate-resilient infrastructure and services. And ADB is also piloting new financing instruments, such as eco-compensation mechanisms, carbon markets and water trading, and sustainability-linked bonds.

When UNESCO and the World Meteorological Organization (WMO) launched the International Year of Glaciers’ Preservation last month, WMO Secretary-General Celeste Saulo said that it should serve as “a wake-up call to the world.” The global community must do everything in its power – from building climate resilience to accelerating the green transition and promoting regional cooperation – to ensure a sustainable future for the billions of people who depend on glaciers and their related ecosystems. Failure to act now would have catastrophic consequences for us all.

Masatsugu Asakawa is President of the Asian Development Bank.

Source: https://www.eco-business.com/opinion/meltdown-at-the-top-of-the-world/

Energy Storage: A grappling challenge for green energy revolution
-

Harnessing energy has been the prime motive of mankind since evolution. All the discoveries and inventions till date are the output of offshoots of the attempt to achieve this goal. One of the critical aspects of energy harnessing is its storage and timely utilization as per needs.

Harnessing energy has been the prime motive of mankind since evolution. All the discoveries and inventions till date are the output of offshoots of the attempt to achieve this goal. One of the critical aspects of energy harnessing is its storage and timely utilization as per needs.

There are several conventional methods by which energy is being stored such as flywheels, batteries, compressed air, & pumped hydroelectricity. The latest advancements that excite energy enthusiasts are superconducting magnets, supercapacitors, photonic energy conversions and hydrogen electrolysis.

The best energy storage device that we have been able to use so far is the chemical battery. As the global Green Energy Revolution is on fast track, it becomes imperative to develop versatile, frugal, convenient & sustainable energy storage solutions. 

The International Energy Agency (IEA) estimates that the renewable energy generation (RE) is expected to increase from 9006 TWh in 2024 to 17032 TWh in 2030. This variable RE generation calls for grid stability. Interestingly, one of the known drawbacks with renewable energy is the lack of storage for use in future when it's not available.

As per the Ministry of New and Renewable Energy, India aims to achieve 40% cumulative installed capacity from non-fossil fuel-based energy sources by 2030 & shall reduce the emission intensity of its GDP by 35% by 2030.

As this huge bulk of power through renewable resources merges into the grid, there will be several anticipated challenges: the generation through RE sources is variable and will impact the stability of the national electricity transmission grid. This variability is subject to the time, climate & geographical location of the chosen RE source. Apparently, the energy peak loads will shift and in turn affect the peak tariffs as well. An efficient energy storage system is the solution to all these problems.

Every energy storage system has its own limitations. Costly super magnets have a limited range of operations; likewise, supercapacitors are also costly, have low energy density, require voltage balancing circuit & power converter. Flywheels exhibit frictional losses whereas PHS are restricted to specific location and topology.

Batteries, however, have survived the race. Majority of the power plant generating, transmission & distribution units see lead acid batteries as their savior for DC back up. This has also led to monopoly of the Plante type LA battery in the Indian market. Despite being robust, these batteries have encountered problems of strap corrosion, pillar erosion, electrolyte contamination, and separator puncture. 

Additionally, the acidic electrolyte and lead used in the battery also pose an environmental threat. Disposal of scrap batteries is a challenge for all industries. The lithium-ion batteries are evolving as a competitor. They are good for Indian application given hot climatic conditions. But they still face the challenge of higher cost, limited technology, raw material outsourcing & the heavier size.

Lead acid batteries are designed for recycling. As per a report by American Chemical Society, 99% of the lead acid batteries are 100% recycled. Whereas only 5% of the lithium batteries are currently being recycled. Unofficial recycling and landfills are a serious threat to the environment & public health. In India, management of battery and disposal is governed by the MoEFCC.

Collaboration is required between government and organizations to develop facilities and educate people regarding the relevance of battery recycling. Awareness on the risks of improper battery disposal through education initiatives and health campaigns; motivation for proper disposal of batteries through media campaigns, school projects and community programs should be emphasised.

If properly backed up by strict guidelines and mass awareness, lead acid batteries can prove to be the most feasible answer to the question of energy storage despite their limitations.

We have options, resources as well as policies through which we look forward to facing this challenge in the future. Development is both imperative & relative, but with vigilant efforts we can ensure the environment walks hand in hand in our journey.

(This article is written by Gunjan Patel, Participant of Executive MBA in Energy Transition, Rajiv Gandhi Institute of Petroleum Technology, Jais and Deputy General Manager, AMNS India and Sanjay Kumar Kar, Professor, Marketing & Energy, Rajiv Gandhi Institute of Petroleum Technology, Jais)

ကိုးကား-  https://energy.economictimes.indiatimes.com/news/renewable/energy-storage-a-grappling-challenge-for-green-energy-revolution/118381478

Gunjan Patel

Harnessing energy has been the prime motive of mankind since evolution. All the discoveries and inventions till date are the output of offshoots of the attempt to achieve this goal. One of the critical aspects of energy harnessing is its storage and timely utilization as per needs.

There are several conventional methods by which energy is being stored such as flywheels, batteries, compressed air, & pumped hydroelectricity. The latest advancements that excite energy enthusiasts are superconducting magnets, supercapacitors, photonic energy conversions and hydrogen electrolysis.

The best energy storage device that we have been able to use so far is the chemical battery. As the global Green Energy Revolution is on fast track, it becomes imperative to develop versatile, frugal, convenient & sustainable energy storage solutions. 

The International Energy Agency (IEA) estimates that the renewable energy generation (RE) is expected to increase from 9006 TWh in 2024 to 17032 TWh in 2030. This variable RE generation calls for grid stability. Interestingly, one of the known drawbacks with renewable energy is the lack of storage for use in future when it's not available.

As per the Ministry of New and Renewable Energy, India aims to achieve 40% cumulative installed capacity from non-fossil fuel-based energy sources by 2030 & shall reduce the emission intensity of its GDP by 35% by 2030.

As this huge bulk of power through renewable resources merges into the grid, there will be several anticipated challenges: the generation through RE sources is variable and will impact the stability of the national electricity transmission grid. This variability is subject to the time, climate & geographical location of the chosen RE source. Apparently, the energy peak loads will shift and in turn affect the peak tariffs as well. An efficient energy storage system is the solution to all these problems.

Every energy storage system has its own limitations. Costly super magnets have a limited range of operations; likewise, supercapacitors are also costly, have low energy density, require voltage balancing circuit & power converter. Flywheels exhibit frictional losses whereas PHS are restricted to specific location and topology.

Batteries, however, have survived the race. Majority of the power plant generating, transmission & distribution units see lead acid batteries as their savior for DC back up. This has also led to monopoly of the Plante type LA battery in the Indian market. Despite being robust, these batteries have encountered problems of strap corrosion, pillar erosion, electrolyte contamination, and separator puncture. 

Additionally, the acidic electrolyte and lead used in the battery also pose an environmental threat. Disposal of scrap batteries is a challenge for all industries. The lithium-ion batteries are evolving as a competitor. They are good for Indian application given hot climatic conditions. But they still face the challenge of higher cost, limited technology, raw material outsourcing & the heavier size.

Lead acid batteries are designed for recycling. As per a report by American Chemical Society, 99% of the lead acid batteries are 100% recycled. Whereas only 5% of the lithium batteries are currently being recycled. Unofficial recycling and landfills are a serious threat to the environment & public health. In India, management of battery and disposal is governed by the MoEFCC.

Collaboration is required between government and organizations to develop facilities and educate people regarding the relevance of battery recycling. Awareness on the risks of improper battery disposal through education initiatives and health campaigns; motivation for proper disposal of batteries through media campaigns, school projects and community programs should be emphasised.

If properly backed up by strict guidelines and mass awareness, lead acid batteries can prove to be the most feasible answer to the question of energy storage despite their limitations.

We have options, resources as well as policies through which we look forward to facing this challenge in the future. Development is both imperative & relative, but with vigilant efforts we can ensure the environment walks hand in hand in our journey.

(This article is written by Gunjan Patel, Participant of Executive MBA in Energy Transition, Rajiv Gandhi Institute of Petroleum Technology, Jais and Deputy General Manager, AMNS India and Sanjay Kumar Kar, Professor, Marketing & Energy, Rajiv Gandhi Institute of Petroleum Technology, Jais)

ကိုးကား-  https://energy.economictimes.indiatimes.com/news/renewable/energy-storage-a-grappling-challenge-for-green-energy-revolution/118381478

What is the internet?
-

Your smart watch alerts you of a new social media post from a friend. She just shared a video of her dog jumping in mud. You probably don’t think at all about how that video got to you. Or consider how your emojis will get back to your friend.

Your smart watch alerts you of a new social media post from a friend. She just shared a video of her dog jumping in mud. You probably don’t think at all about how that video got to you. Or consider how your emojis will get back to your friend.
You and your friend could be on the same block, or on two different continents, yet the internet connects you. Almost like magic. But the internet is not magic. The simple explanation is that the internet “is a network of computers where people can share information,” says Anne Lee. She is an expert in telecommunications at Nokia Bell Labs in Naperville, Ill.
Telecommunications includes any exchange of information — also called data — over a distance. The global internet is more than just computers, though. It’s a massive structure, with components that crisscross the globe. Cables snake below your feet. Wireless signals fly over your head. Numerous devices hide within your community. Your devices tap into this structure whenever they exchange data.
When the internet first became commonplace, people called it the “information superhighway.” Thinking about roads can really help you understand how it all works.


Cables are the roads of the Cables are the roads of the internet
When your family goes on a road trip, you probably start out on smaller side streets. Then you merge onto a highway where you can travel quickly with lots of other drivers. The internet’s infrastructure is similar. Its vast network of roadlike cables direct data from far-flung places toward large central channels. Traveling data are even called “internet traffic.”
Fiber-optic cables are the roads of the internet. They contain glass filaments that carry data as bursts of light. Over 500 of these cables stretch beneath the oceans. Even more are buried underground or strung up on poles. If you could stretch out all the fiber-optic cable on Earth end-to-end, it would reach around 4 billion kilometers (2.5 billion miles).
All that cable would stretch from the sun past the orbit of Uranus! Just as roads have different numbers of lanes, these cables also come in different sizes.
Bigger cables with more filaments can carry more data at once. Bandwidth is the rate of data passing through every second. The thickest cables, about the size of a garden hose, are like an interstate highway. They have the highest bandwidth.


Routers and exchanges are like intersections
Traveling somewhere on roads requires making lots of turns. Devices called routers exist anywhere that internet cables come together, like an intersection where roads meet. These devices direct data toward a final destination.
If the ISPs that operate different networks of cables and routers kept their systems separate, that would be a problem. It would be like having entire road systems that people couldn’t reach. To connect the entire world, ISPs have to link up.


Data centers are like parking garages
It may seem like your friend’s silly dog video went directly from her device to yours. But that’s not usually what happens. When people share, or upload, a video or anything else to the internet, the content ends up in a building called a data center.
This is like a parking garage for data. A data center is filled with computers called servers. It also contains systems to supply electricity and keep everything cool. Videos and other content sit waiting on those servers until someone asks for them. But that’s not all servers do. They also store the programs required to run many of the apps and software that you use. Keeping content and pro-
grams in a data center means that these files and programs are available whenever anyone wants to use them. So your devices don’t need to keep a copy of every single program or piece of content you need. And your devices can be quite small in size.


Wireless goes off-road
For a car to get somewhere, there generally has to be a road to follow. Internet data, though, can easily go off-road. That’s because data can travel through the air in the form of radio signals. A home or business often has its own Wi-Fi network. In a simple home network, there’s just one router. It has an antenna that sends and receives radio signals from all the devices in the home.
If you are outside without any Wi-Fi, you can often still use the internet. You have to connect to a cellular network. This network uses tall structures called cell towers to send and receive radio signals. You can often see these towers when you’re out driving around. “They have what looks like plates at the top,” says Lee.
“Those are antennas.” Cellular networks also contain smaller antennas that aren’t as easy to notice. Wi-Fi routers and cellular antennas have cables that connect them to the rest of the network.
Each cellular antenna can only reach devices located within a certain radius. 5G antennas send signals at the fastest rates.This gives people the highest internet speeds. But these signals also reach the shortest distance. In many areas, wireless antennas are spaced around 1.6 to 5 kilometers (about 1 to 3 miles) apart.


A video’s internet road trip
Imagine that you just captured a pic of your cat yawning. You know your friends would love it. You tap to post it to a shared photo album. That single tap triggers a flurry of activity. First, says Lee, “the picture itself is broken up into small pieces.” These are called packets. Each packet gets bundled with a lot of extra information, such as what the picture is and how to put its packets back together. There’s also info on how to fix any errors that might happen during the journey.
And there may be a layer of encryption to keep the packet safe, so no one but the receiver can read its data. There are also two addresses, one for the sender (you) and another for the receiver. If you’re using an Apple device, the receiver would be a server inside a data center owned by Apple. That data center may be located quite far from you.
Your device sends these packets out into the air as radio signals. The router in your home picks up the signals. It sends them into the fiber-optic network. Now, they are traveling as bursts of light. The packets zip along through many routers and cables. They pass through internet exchange points. 

Source: Myawady Daily Newspaper

Science News Explores

Your smart watch alerts you of a new social media post from a friend. She just shared a video of her dog jumping in mud. You probably don’t think at all about how that video got to you. Or consider how your emojis will get back to your friend.
You and your friend could be on the same block, or on two different continents, yet the internet connects you. Almost like magic. But the internet is not magic. The simple explanation is that the internet “is a network of computers where people can share information,” says Anne Lee. She is an expert in telecommunications at Nokia Bell Labs in Naperville, Ill.
Telecommunications includes any exchange of information — also called data — over a distance. The global internet is more than just computers, though. It’s a massive structure, with components that crisscross the globe. Cables snake below your feet. Wireless signals fly over your head. Numerous devices hide within your community. Your devices tap into this structure whenever they exchange data.
When the internet first became commonplace, people called it the “information superhighway.” Thinking about roads can really help you understand how it all works.


Cables are the roads of the Cables are the roads of the internet
When your family goes on a road trip, you probably start out on smaller side streets. Then you merge onto a highway where you can travel quickly with lots of other drivers. The internet’s infrastructure is similar. Its vast network of roadlike cables direct data from far-flung places toward large central channels. Traveling data are even called “internet traffic.”
Fiber-optic cables are the roads of the internet. They contain glass filaments that carry data as bursts of light. Over 500 of these cables stretch beneath the oceans. Even more are buried underground or strung up on poles. If you could stretch out all the fiber-optic cable on Earth end-to-end, it would reach around 4 billion kilometers (2.5 billion miles).
All that cable would stretch from the sun past the orbit of Uranus! Just as roads have different numbers of lanes, these cables also come in different sizes.
Bigger cables with more filaments can carry more data at once. Bandwidth is the rate of data passing through every second. The thickest cables, about the size of a garden hose, are like an interstate highway. They have the highest bandwidth.


Routers and exchanges are like intersections
Traveling somewhere on roads requires making lots of turns. Devices called routers exist anywhere that internet cables come together, like an intersection where roads meet. These devices direct data toward a final destination.
If the ISPs that operate different networks of cables and routers kept their systems separate, that would be a problem. It would be like having entire road systems that people couldn’t reach. To connect the entire world, ISPs have to link up.


Data centers are like parking garages
It may seem like your friend’s silly dog video went directly from her device to yours. But that’s not usually what happens. When people share, or upload, a video or anything else to the internet, the content ends up in a building called a data center.
This is like a parking garage for data. A data center is filled with computers called servers. It also contains systems to supply electricity and keep everything cool. Videos and other content sit waiting on those servers until someone asks for them. But that’s not all servers do. They also store the programs required to run many of the apps and software that you use. Keeping content and pro-
grams in a data center means that these files and programs are available whenever anyone wants to use them. So your devices don’t need to keep a copy of every single program or piece of content you need. And your devices can be quite small in size.


Wireless goes off-road
For a car to get somewhere, there generally has to be a road to follow. Internet data, though, can easily go off-road. That’s because data can travel through the air in the form of radio signals. A home or business often has its own Wi-Fi network. In a simple home network, there’s just one router. It has an antenna that sends and receives radio signals from all the devices in the home.
If you are outside without any Wi-Fi, you can often still use the internet. You have to connect to a cellular network. This network uses tall structures called cell towers to send and receive radio signals. You can often see these towers when you’re out driving around. “They have what looks like plates at the top,” says Lee.
“Those are antennas.” Cellular networks also contain smaller antennas that aren’t as easy to notice. Wi-Fi routers and cellular antennas have cables that connect them to the rest of the network.
Each cellular antenna can only reach devices located within a certain radius. 5G antennas send signals at the fastest rates.This gives people the highest internet speeds. But these signals also reach the shortest distance. In many areas, wireless antennas are spaced around 1.6 to 5 kilometers (about 1 to 3 miles) apart.


A video’s internet road trip
Imagine that you just captured a pic of your cat yawning. You know your friends would love it. You tap to post it to a shared photo album. That single tap triggers a flurry of activity. First, says Lee, “the picture itself is broken up into small pieces.” These are called packets. Each packet gets bundled with a lot of extra information, such as what the picture is and how to put its packets back together. There’s also info on how to fix any errors that might happen during the journey.
And there may be a layer of encryption to keep the packet safe, so no one but the receiver can read its data. There are also two addresses, one for the sender (you) and another for the receiver. If you’re using an Apple device, the receiver would be a server inside a data center owned by Apple. That data center may be located quite far from you.
Your device sends these packets out into the air as radio signals. The router in your home picks up the signals. It sends them into the fiber-optic network. Now, they are traveling as bursts of light. The packets zip along through many routers and cables. They pass through internet exchange points. 

Source: Myawady Daily Newspaper

Snowden Not Enough, Spying Continued Cyber Version
-

Edward Snowden hoo-ha might have ended ten years ago, but illegal spying by the US carries on, both on its partners and anyone it wants to control, via warrantless surveillance rights to indiscriminately monitor communications of all internet users around the world.
Snowden popularized the term ‘metadata’ and started a heated debate about mass surveillance. He had succeeded beyond imagination. But who is there to defend our democracy and rights in this digital age?

Edward Snowden hoo-ha might have ended ten years ago, but illegal spying by the US carries on, both on its partners and anyone it wants to control, via warrantless surveillance rights to indiscriminately monitor communications of all internet users around the world.
Snowden popularized the term ‘metadata’ and started a heated debate about mass surveillance. He had succeeded beyond imagination. But who is there to defend our democracy and rights in this digital age?
The intelligence agencies (CIA, NSA, FBI – acronyms stated at end of article) dismissed such claims at that time, arguing that their programmes are constitutional, and subject to rigorous congressional and judicial oversight, yet critical to meet their overriding aim of protecting the public from terrorist attacks. As usual, they regurgitate the age-old slogan: if you have nothing to hide, you have nothing to be scared of!
The whole world was shaken at that time. Its allies were rightly upset, its so-called enemies were proven right about what they had suspected all along, people were livid due to lack of some social responsibility, US internet companies claimed they were forced into cooperation and NGOs warned that surveillance was going beyond the intention of lawmakers.
Cell phones, laptops, Facebook, Instagram, X, Skype, and chat rooms: all allow the NSA to build what it calls ‘a pattern of life’, a detailed profile of a target and anyone associated with them. And the number of people caught up in this dragnet can be huge. You have to recall the Bourne Identity, Supremacy and Ultimatum trilogy of movies, to visualize the level of spying and black ops going on.
Ten years ago, faced with this growing public and political concern over the quantities of data it is collecting, the NSA said it collected only a tiny proportion of the world’s internet traffic, equivalent to a “dime on a basketball court”. But in reality, that is still a huge amount of data. It says it needs all this data to help prevent another terrorist attack like 9/11. To find the needle in the haystack, they argue, they need access to the whole haystack. Yet, the US Congress did not find any substantial evidence of NSA actions stopping terrorist attacks. NSA claimed 54 terror attacks being stopped, but was fact-checked to be only 4.
That was ten years ago. The chances were you were already sharing a lot more personal information than you thought, even back then.

Spying Continued
Now Five Eyes countries jointly conduct cyber espionage operations eavesdropping, tapping and collecting metadata upon other countries from Russia to China to Germany and France. Instead of toning down its indiscriminate monitoring and illegal spying operations, the Five Eyes have up their ante by introducing programmes such as False Flag operations, misleading traceability attribution and implanted backdoors in the internet products US companies sold to other countries.
US longstanding strategy of ‘forward defence’ and carrying out ‘hunt forward’ operations requires that it continues to stealthily spy on other countries by hook or by crook. At the same time, since Snowden’s time, due to investigations by US lawmakers, the tactics have gone underground, trying to cover up its attacks, erasing fingerprints of cyber espionage and attempting to obscure various identifiable features of its assaults. The worst of all was inputting code ‘strings’ in other languages to mislead cybersecurity experts and frame other countries for cybersurveillance.
According to China’s CVERC, Volt Typhoon was one such programme, deployed by the Five Eyes recently. China’s Global Times also highlighted a stealth tool kit codenamed ‘Marble’ used in such operations. The report claimed Marble can use over 100 algorithms to replace readable content in source code files with unrecognizable content and has the ability to insert interfering strings.
False Flag operations are a major component of Influence Operations by the Five Eyes countries. Influence operations include two aspects: (dis) Information operations and Technical disruption operations. Its 4D principles of deny, disrupt, degrade, and deceive are in full observation in its cyber spying activities.
Five Eyes’ illicit spying activities are helped by the fact that much of the world’s communications traffic passes through the US or its close ally the UK – what the agencies refer to as “home-field advantage”, because of the fact that it can control the world’s most internet choke points such as Atlantic submarine fibre optic cable and Pacific submarine fibre optic cable. The UK is connected to 57 countries by fibre optic cables whereas the US is connected to 63. NSA works closely with the FBI and British NCSC to carry out protocol analysis and data theft of the full amount of data transmitted by fibre optic cables, to achieve wholesale monitoring of internet users around the world.
The NSA has its own cable-intercept programs tapping traffic flowing into and across the US. These are collectively known as the Upstream collection. NSA runs these surveillance programmes through “partnerships” with major US telecom and internet companies. The Upstream project function is to retain all the original communication data of submarine fibre optic cables intercepted by monitoring stations in a massive data ‘reservoir’. The second project of NSA is Prism, whose main function is to classify the original data from the Upstream collection accordingly and to analyze its content. It is also a “downstream” programme – which collects the data from Google, Facebook, Apple, Yahoo and other US internet giants.
The above snooping would be sufficient provided if the data that they wanted actually travelled through the above submarine pipelines. What if the data they wanted to spy on stayed just within Russia or China? To solve this problem NSA conducts CNE for specific targets located in such blind spots and the Office of TAO follows up with the dirty work. To be specific, using advanced US technology and products, in cooperation with US internet, software and equipment suppliers, TAO would intercept and disassemble US products purchased by the entities in these blind spot territories, implant backdoors and repackage them before shipping them to their destination. These products once in use, would transmit back the required top-secret content back to NSA headquarters.
The division inside the NSA that deals with collection programmes that focus on private companies is Special Source Operations, described by Snowden as the “crown jewels” of the NSA, under the heading of ‘Corporate Partner Access’. It has already set out its mission: “Leverage unique key corporate partnerships to gain access to high-capacity international fibre optic cables, switches and/or routes throughout the world.” The names of many of the NSA’s “corporate partners” are so sensitive that they are classified as “ECI” — Exceptionally Controlled Information.

The future
Public opinion is polarized over surveillance, but polls over recent years showed a consistent increase in concern over privacy. Meanwhile, the unlawful activities by the Five Eyes continued, invading the privacy of many, not under its sovereignty as well as stealing the confidential top-secret information of other countries.
With the new peace-advocating President in place this year, hopefully, these anti-peace activities will discontinue soon. Optimistically, the $400 million assistance via Burma Act to antigovernment forces could be halted too, thereby stopping $20,000+ a month funding to each of the illegal fake news agencies in Chiang Mai, that did more to bring the country down than help any fellow citizens prosper.

Acronyms:
NSA: National Security Agency
CIA: Central Intelligence Agency
FBI: Federal Bureau of Investigation
Metadata: Data providing information about other aspects of that data, e.g., information about the time and location of a phone call or email, as opposed to the contents of those conversations or messages.
Five Eyes countries: US, Canada, UK, Australia, and New Zealand,
False Flag operation: an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party.
Traceability attribution: tracing and attributing security-relevant actions (i.e., subject-object interactions) to the entity on whose behalf the action is being taken.
Implanted backdoor: a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment.
CVERC: China Virus Emergency Response Centre
String: a data type used in programming, that is used to represent text rather than numbers.
NCSC: National Cyber Security Centre
Protocol analysis: tools to identify and create categories of propositions and semantic organization of text segments.
CNE: Computer Network Exploitation
TAO: Tailed Access Operation

Source: The Global New Light of Myanmar

U AC

Edward Snowden hoo-ha might have ended ten years ago, but illegal spying by the US carries on, both on its partners and anyone it wants to control, via warrantless surveillance rights to indiscriminately monitor communications of all internet users around the world.
Snowden popularized the term ‘metadata’ and started a heated debate about mass surveillance. He had succeeded beyond imagination. But who is there to defend our democracy and rights in this digital age?
The intelligence agencies (CIA, NSA, FBI – acronyms stated at end of article) dismissed such claims at that time, arguing that their programmes are constitutional, and subject to rigorous congressional and judicial oversight, yet critical to meet their overriding aim of protecting the public from terrorist attacks. As usual, they regurgitate the age-old slogan: if you have nothing to hide, you have nothing to be scared of!
The whole world was shaken at that time. Its allies were rightly upset, its so-called enemies were proven right about what they had suspected all along, people were livid due to lack of some social responsibility, US internet companies claimed they were forced into cooperation and NGOs warned that surveillance was going beyond the intention of lawmakers.
Cell phones, laptops, Facebook, Instagram, X, Skype, and chat rooms: all allow the NSA to build what it calls ‘a pattern of life’, a detailed profile of a target and anyone associated with them. And the number of people caught up in this dragnet can be huge. You have to recall the Bourne Identity, Supremacy and Ultimatum trilogy of movies, to visualize the level of spying and black ops going on.
Ten years ago, faced with this growing public and political concern over the quantities of data it is collecting, the NSA said it collected only a tiny proportion of the world’s internet traffic, equivalent to a “dime on a basketball court”. But in reality, that is still a huge amount of data. It says it needs all this data to help prevent another terrorist attack like 9/11. To find the needle in the haystack, they argue, they need access to the whole haystack. Yet, the US Congress did not find any substantial evidence of NSA actions stopping terrorist attacks. NSA claimed 54 terror attacks being stopped, but was fact-checked to be only 4.
That was ten years ago. The chances were you were already sharing a lot more personal information than you thought, even back then.

Spying Continued
Now Five Eyes countries jointly conduct cyber espionage operations eavesdropping, tapping and collecting metadata upon other countries from Russia to China to Germany and France. Instead of toning down its indiscriminate monitoring and illegal spying operations, the Five Eyes have up their ante by introducing programmes such as False Flag operations, misleading traceability attribution and implanted backdoors in the internet products US companies sold to other countries.
US longstanding strategy of ‘forward defence’ and carrying out ‘hunt forward’ operations requires that it continues to stealthily spy on other countries by hook or by crook. At the same time, since Snowden’s time, due to investigations by US lawmakers, the tactics have gone underground, trying to cover up its attacks, erasing fingerprints of cyber espionage and attempting to obscure various identifiable features of its assaults. The worst of all was inputting code ‘strings’ in other languages to mislead cybersecurity experts and frame other countries for cybersurveillance.
According to China’s CVERC, Volt Typhoon was one such programme, deployed by the Five Eyes recently. China’s Global Times also highlighted a stealth tool kit codenamed ‘Marble’ used in such operations. The report claimed Marble can use over 100 algorithms to replace readable content in source code files with unrecognizable content and has the ability to insert interfering strings.
False Flag operations are a major component of Influence Operations by the Five Eyes countries. Influence operations include two aspects: (dis) Information operations and Technical disruption operations. Its 4D principles of deny, disrupt, degrade, and deceive are in full observation in its cyber spying activities.
Five Eyes’ illicit spying activities are helped by the fact that much of the world’s communications traffic passes through the US or its close ally the UK – what the agencies refer to as “home-field advantage”, because of the fact that it can control the world’s most internet choke points such as Atlantic submarine fibre optic cable and Pacific submarine fibre optic cable. The UK is connected to 57 countries by fibre optic cables whereas the US is connected to 63. NSA works closely with the FBI and British NCSC to carry out protocol analysis and data theft of the full amount of data transmitted by fibre optic cables, to achieve wholesale monitoring of internet users around the world.
The NSA has its own cable-intercept programs tapping traffic flowing into and across the US. These are collectively known as the Upstream collection. NSA runs these surveillance programmes through “partnerships” with major US telecom and internet companies. The Upstream project function is to retain all the original communication data of submarine fibre optic cables intercepted by monitoring stations in a massive data ‘reservoir’. The second project of NSA is Prism, whose main function is to classify the original data from the Upstream collection accordingly and to analyze its content. It is also a “downstream” programme – which collects the data from Google, Facebook, Apple, Yahoo and other US internet giants.
The above snooping would be sufficient provided if the data that they wanted actually travelled through the above submarine pipelines. What if the data they wanted to spy on stayed just within Russia or China? To solve this problem NSA conducts CNE for specific targets located in such blind spots and the Office of TAO follows up with the dirty work. To be specific, using advanced US technology and products, in cooperation with US internet, software and equipment suppliers, TAO would intercept and disassemble US products purchased by the entities in these blind spot territories, implant backdoors and repackage them before shipping them to their destination. These products once in use, would transmit back the required top-secret content back to NSA headquarters.
The division inside the NSA that deals with collection programmes that focus on private companies is Special Source Operations, described by Snowden as the “crown jewels” of the NSA, under the heading of ‘Corporate Partner Access’. It has already set out its mission: “Leverage unique key corporate partnerships to gain access to high-capacity international fibre optic cables, switches and/or routes throughout the world.” The names of many of the NSA’s “corporate partners” are so sensitive that they are classified as “ECI” — Exceptionally Controlled Information.

The future
Public opinion is polarized over surveillance, but polls over recent years showed a consistent increase in concern over privacy. Meanwhile, the unlawful activities by the Five Eyes continued, invading the privacy of many, not under its sovereignty as well as stealing the confidential top-secret information of other countries.
With the new peace-advocating President in place this year, hopefully, these anti-peace activities will discontinue soon. Optimistically, the $400 million assistance via Burma Act to antigovernment forces could be halted too, thereby stopping $20,000+ a month funding to each of the illegal fake news agencies in Chiang Mai, that did more to bring the country down than help any fellow citizens prosper.

Acronyms:
NSA: National Security Agency
CIA: Central Intelligence Agency
FBI: Federal Bureau of Investigation
Metadata: Data providing information about other aspects of that data, e.g., information about the time and location of a phone call or email, as opposed to the contents of those conversations or messages.
Five Eyes countries: US, Canada, UK, Australia, and New Zealand,
False Flag operation: an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party.
Traceability attribution: tracing and attributing security-relevant actions (i.e., subject-object interactions) to the entity on whose behalf the action is being taken.
Implanted backdoor: a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment.
CVERC: China Virus Emergency Response Centre
String: a data type used in programming, that is used to represent text rather than numbers.
NCSC: National Cyber Security Centre
Protocol analysis: tools to identify and create categories of propositions and semantic organization of text segments.
CNE: Computer Network Exploitation
TAO: Tailed Access Operation

Source: The Global New Light of Myanmar

Public-Private Partnership
-

What is Public- Private Partnership?

What is Public- Private Partnership?

          Public-Private Partnership is a contractual agreement between a public agency and a private sector entity. With Public-Private Partnership, the public agency and the private sector entity share assets, skills, risks and rewards and set up one project. Public- Private Partnerships combine the public sector capital and private sector capital to improve public services or the management of public sector assets. Public-Private Partnership contributes more advantages to the government than privatization form due to the fact that PPPs emphasizes the role of the government whereas in privatization form, the whole business needs to be transferred to the private sector. 

Why developing countries need Public-Private Partnership?

Developing countries usually have a budget deficit based upon low tax base, weak tax administration, and poor business environment. With budget deficit shown, adopting PPPs enables the government to be able to afford to deliver good public services. PPPs are being widely used among governments when it comes to procurement processes when public funding is inadequate. PPPs is also a reliable form of investment from the perspective of private investors as it guarantees the long-term delivery of public services. 

The origin of Public-Private Partnership in world countries

          The history of Public-Private Partnership dated back to the eighteenth and nineteenth centuries, when countries focused on developing public infrastructure in the form of joint financing and operation of infrastructure.  In Britain and the United States around eighteenth centuries, over 2500 companies were chartered and incorporated to develop private turnpikes. In France, around the seventeenth century, the government used concessions to finance its infrastructure development, which means its private enterprises and banks are granted to design, construct, finance and operate infrastructures such as railways, roads, electricity and tramways. In the later decades, PPPs are commonly used by most countries as it proves easy procurement and construction method and financing model.

Common types of PPPs

Basic PPPs contract types vary in terms of levels of responsibility and risk to be taken by the private operator so that different countries adopt a particular PPP contract type that meet the local requirements on a country-to country basis. According to Asian Development Bank (ADB), PPPs are commonly used in most countries as follows- 

  1. Service Contract

  2. Management Contract

  3. Lease Contract

  4. Concession

  5. Build- Operate- Transfer (BOT)

  6. Joint Venture

  7. Service Contract: This is a model which the government partners with a private entity to perform one or more services for 1 to 3 year limited period. In this model, the government funds capital investment and a private partner performs the service at the agreed cost and in line with the performance standards set by the public sector. The public authority takes operation and management responsibility and commercial risk whereas the risk taken by the private entity is minimal. 

  8. Management Contract: In management contract, daily operation and management responsibility is assumed by the private entity with its own working capital whereas the public authority finances capital investment with asset ownership. The contract generally lasts for 2 to 5 years. 

(3) Lease Contract:   In lease contract, the initial establishment of the system is financed by the public authority and contracted to a private company for operation and maintenance. The contract usually lasts for 10 to 15 years. The private sector has to take responsibility for service provision and financial risk for operation. 

(4) Concession: In concession model, the private sector needs to provide all capital investment (assets) and these assets belong to both the public authority and a private company. In this model, the public authority just needs to take the role of regulating the price and quality of service while the private partner takes full responsibility for funding, management, operation and maintenance. 

(5) Build Operate Transfer (BOT):  There may be various forms of BOT-type contracts such as Build-Operate Transfer, Build-Own-Operate, Design-Bid-Build, Design-Build and Design-Build-Finance-Operate.         

(6) Joint Venture: Joint Venture is a model in which the infrastructure is co-owned and operated by the public sector and private partner. In this model, both the public sector and private partner are shareholders so that both parties have to invest in the project and share risks. 

How did PPPs evolve in Myanmar?

          From 1962 to 1988, Myanmar practiced the "Burmese Way to Socialism" under the leadership of the Burma Socialist Programme Party (BSPP) as a one-party system and in economy, it practiced centrally planned economy. In 1988, after the Burmese Way to Socialism, in the aftermath of tremendous uprising due to the inflation and demonetization of Myanmar kyats, the State Law and Order Restoration Council took office for the period of 1988-1997. In 1997, the State Law and Order Restoration Council was reformed as State Peace and Development Council from the period of 1997 until 2011. In 1997, State Peace and Development Council announced the transition into a market-oriented economy. With this transition, the government started to pave the way for Public- Private Partnerships and privatization. In 1997, PPPs started in Myanmar to fulfill the infrastructure needs of the country. However, the projects during those days were based upon unsolicited proposal (a proposal made by a private party to undertake a PPP project, submitted at the initiative of the private party, rather than in response to a request from the relevant government agency) under Build-Operate-Transfer form. In 2011, President U Thein Sein government took the state of duties and some reforms were made significantly. In October 2011, 11 private banks were allowed to trade foreign currency. In November 2012, the new Foreign Investment Law (2012) was enacted and special economic zones started in Thilawa and Dhawei. In 2016 and 2017, Myanmar Investment Law (2016) and Myanmar Companies Law (2017) were enacted. In April 2015, to improve the reliability and stability of Myanmar’s power supply and to prevent the power shortage problem, Myingyan Natural Gas Power Project was initiated. This is the first PPP project that was adopted through solicited proposal (solicited bid received from private parties via a competitive tender process for PPP Projects under the purview of an Implementing Government Agency) between Singapore-based Sembcorp Utilities and Ministry of Electricity and Energy. This project is located in Myingyan Township of Mandalay Region and this project was governed by a 22-year Build-Operate-Transfer (BOT) agreement and a Power Purchase Agreement (PPA).

          When PPPs are widely used in Myanmar, the government has started using Swiss challenge (a public procurement process designed to encourage private sector initiatives to engage in PPP Projects. Under the Swiss Challenge tender process, if a relevant government agency wishes to proceed with a project that was received as an unsolicited proposal, the agency is required to publish a bid and invite third parties to exceed it) to welcome private sector involvement in the tender processes recently. With regard to Public Private Partnership implementation, the Project Bank Notification was one of the greatest achievements. It was issued on 30th November 2018 by Office of the President after Public Private Partnership Center was established through Notification No. (24 /2021) of Union Minister’s Office of the Ministry of Planning and Finance.  

Public-Private Partnership in Myanmar

          Myanmar government budget is shown as deficit as the country is one of the countries with the lowest tax-to- GDP ratio. As Myanmar's tax to GDP ratio is very low, the government cannot afford to make sufficient investment in infrastructure. Although Myanmar, being a recipient of  Official Development Assistance (ODA), a kind of aid given by developed countries to assist the development of developing countries, the fund from public capital and ODA is insufficient to meet the infrastructure gap. In Myanmar, PPPs has been practiced in the form of Build Operate and Transfer mostly in road, power sectors and some projects in hotels. Some forms of PPPs in Myanmar are categorized as Greenfield projects (any investment in a structure or an area where no previous facilities exist and without constraints imposed by prior works), Brownfield projects (any investment that uses previously constructed facilities that were once in use for other purposes), Production Sharing Contracts and Joint Venture Agreements between ministries/ government organizations and private companies. In Project Bank Directive issued by the government, common types of PPPs which have been practiced in Myanmar are  categorized as Build-Own-Operate (BOO), Build-Operate-Transfer (BOT), Build- Transfer-Lease (BTL), Build-Transfer-Operate (BTO), Operation and Management (O & M) and other forms of PPPs. 

  Legal framework governing Public Private Partnerships

           In Myanmar, Ministry of Planning and Finance, Myanmar Investment Commission and Directorate of Investment and Company Administration are government agencies that regulate PPPs projects. The laws governing Public Private Partnerships before and after the issuance of Project Bank Notification are mentioned as follows-

  • Myanmar Companies Law (2017) 

  • Myanmar Investment Law (2016) 

  • Permanent Residence of a Foreigner Rules (2014)

  • Myanmar Special Economic Zones Law (2014)

  • Securities and Exchange Law (2013)

  • Myanmar Citizens Investment Law (2013)

  • Central Bank Law (2013)

  • Foreign Investment Rules (2013)

  • Foreign Investment Law (2012)

  • Law Amending the Commercial Tax Law (2011)

  • Private Industrial Enterprises Law (1990)

  • Financial Institutions of Myanmar Law (1990)

  • State-Owned Economic Enterprises Law (1989)

  • Special Company Act (1950)

In Myanmar, apart from these laws, for the commonly used Build Operate Transfer project form, general tendering processes have been widely practiced under Directive No. 1/2017 (Tender Rules), which is widely used as PPP manual in Myanmar. In addition to that, State Administration Council issued the tender notifications (1/2022). In PPP, if the private party is involved in international connection, the project is liable to Myanmar Investment Law (2016) and some restricted business activities are outlined in the notification 15/2017 of the Myanmar Investment Commission.

Public-Private Partnerships in the form of Production Sharing Contract in Myanmar

          Production Sharing Contract is used in Myanmar’s Oil and Gas sector and it is a contract signed between a government entity and private companies. In Myanmar, under Production Sharing Contract, Myanmar Oil and Gas Enterprise acts a body for the state and invites oil companies as contractors to make financial and technical investment in the oil and gas extraction. According to MOGE data, over 150 oil companies were registered as local partners with MOGE. According to terms and conditions of model production sharing contract set up by MOGE, there are two periods listed as the exploration period (an initial term of up to three years) and development and production period (commenced on notice of commercial discovery and continues for at least twenty years from the date of completion of the development phase) in the oil and gas operation. 

State Administration Council highlighting the role of Public Private Partnership in Special Economic Zones 

Three currently established Special Economic Zones are Thilawa SEZ, Dawei SEZ and Kyauk Phyu SEZ, but this article wants to highlight on two of these. The incumbent government, State Administration Council is attempting to develop Kyauk Phyu Special Economic Zones (SEZs) in the form of PPPs for economic development. In Kyauk Phyu Special Economic Zone Project, the China International Trust and Investment Corporation Consortium contributes 70 % and Myanmar side contributes 30 % when implementing the Kyauk Phyu Deep Seaport project. It is a four-phase project building ten jetties where the ships can berth. After this project, the livelihood of people in Rakhine State particularly those in Kyauk Phyu district will become better and Myanmar can directly transport goods to countries in African, South Asian, and Europe. In responding media, Union Minister U Aung Naing Oo and Mr Liang Chuanxin told that “the deep-sea port is a four-phase project containing ten jetties and it can accommodate about seven million 20-foot containers per year once completed. The consortium of this project will be incorporated by both domestically owned private or public companies registered under the Myanmar Companies Law 2017.” What’s more beneficial about the project is that State Administration Council has already planned to prioritize the investment of ethnic businessmen in the consortium. 

Thilawa Special Economic Zone is another successful example of PPPs project in Myanmar which has been carrying out by Myanmar government and Japanese government. Myanmar Japan Thilawa Development Limited has acted as a developer. Myanmar Japan Thilawa Development Limited was formed in January 2014, as a joint venture between MMS Thilawa Development Company, Thilawa SEZ Management Committee, and Myanmar Thilawa SEZ Holdings Public Limited. In Thilawa SEZ, in Zone A, a Residential and Commercial Area was firstly established covering offices, residences, restaurants, hotels, international schools and hospitals and it has begun operation since September 2015 whereas in Zone B, 3 types of land are categorized as industrial land, logistical land, residential or commercial land. 

          To sum up, State Administration Council is currently putting an emphasis on Public –Private Partnership and Small and Medium Enterprises for boosting economy in the aftermath of the Covid-19 implications. The actions of State Administration Council such as developing Special Economic Zones, encouraging SMEs to produce value-added goods to penetrate into export market, providing tax exemptions and incentives in the existing tax laws prove that State Administration Council is making an earnest effort to keep the existing economic infrastructure and projects working. The implementation of Public Private Partnership can pave the way for infrastructure development in Myanmar and the opportunities can be seen under this initiative.                                                                            

References 

  • Asian Development Bank’s PPP Handbook
  • The establishment of PPP center
  • Project Bank Notification 
  • Myanmar Companies Law (2017)
  • Myanmar Investment Law (2016)
  • Ministry of Information’s press release
  • Special Economic Zone Law (2014)
Maythu Htay

What is Public- Private Partnership?

          Public-Private Partnership is a contractual agreement between a public agency and a private sector entity. With Public-Private Partnership, the public agency and the private sector entity share assets, skills, risks and rewards and set up one project. Public- Private Partnerships combine the public sector capital and private sector capital to improve public services or the management of public sector assets. Public-Private Partnership contributes more advantages to the government than privatization form due to the fact that PPPs emphasizes the role of the government whereas in privatization form, the whole business needs to be transferred to the private sector. 

Why developing countries need Public-Private Partnership?

Developing countries usually have a budget deficit based upon low tax base, weak tax administration, and poor business environment. With budget deficit shown, adopting PPPs enables the government to be able to afford to deliver good public services. PPPs are being widely used among governments when it comes to procurement processes when public funding is inadequate. PPPs is also a reliable form of investment from the perspective of private investors as it guarantees the long-term delivery of public services. 

The origin of Public-Private Partnership in world countries

          The history of Public-Private Partnership dated back to the eighteenth and nineteenth centuries, when countries focused on developing public infrastructure in the form of joint financing and operation of infrastructure.  In Britain and the United States around eighteenth centuries, over 2500 companies were chartered and incorporated to develop private turnpikes. In France, around the seventeenth century, the government used concessions to finance its infrastructure development, which means its private enterprises and banks are granted to design, construct, finance and operate infrastructures such as railways, roads, electricity and tramways. In the later decades, PPPs are commonly used by most countries as it proves easy procurement and construction method and financing model.

Common types of PPPs

Basic PPPs contract types vary in terms of levels of responsibility and risk to be taken by the private operator so that different countries adopt a particular PPP contract type that meet the local requirements on a country-to country basis. According to Asian Development Bank (ADB), PPPs are commonly used in most countries as follows- 

  1. Service Contract

  2. Management Contract

  3. Lease Contract

  4. Concession

  5. Build- Operate- Transfer (BOT)

  6. Joint Venture

  7. Service Contract: This is a model which the government partners with a private entity to perform one or more services for 1 to 3 year limited period. In this model, the government funds capital investment and a private partner performs the service at the agreed cost and in line with the performance standards set by the public sector. The public authority takes operation and management responsibility and commercial risk whereas the risk taken by the private entity is minimal. 

  8. Management Contract: In management contract, daily operation and management responsibility is assumed by the private entity with its own working capital whereas the public authority finances capital investment with asset ownership. The contract generally lasts for 2 to 5 years. 

(3) Lease Contract:   In lease contract, the initial establishment of the system is financed by the public authority and contracted to a private company for operation and maintenance. The contract usually lasts for 10 to 15 years. The private sector has to take responsibility for service provision and financial risk for operation. 

(4) Concession: In concession model, the private sector needs to provide all capital investment (assets) and these assets belong to both the public authority and a private company. In this model, the public authority just needs to take the role of regulating the price and quality of service while the private partner takes full responsibility for funding, management, operation and maintenance. 

(5) Build Operate Transfer (BOT):  There may be various forms of BOT-type contracts such as Build-Operate Transfer, Build-Own-Operate, Design-Bid-Build, Design-Build and Design-Build-Finance-Operate.         

(6) Joint Venture: Joint Venture is a model in which the infrastructure is co-owned and operated by the public sector and private partner. In this model, both the public sector and private partner are shareholders so that both parties have to invest in the project and share risks. 

How did PPPs evolve in Myanmar?

          From 1962 to 1988, Myanmar practiced the "Burmese Way to Socialism" under the leadership of the Burma Socialist Programme Party (BSPP) as a one-party system and in economy, it practiced centrally planned economy. In 1988, after the Burmese Way to Socialism, in the aftermath of tremendous uprising due to the inflation and demonetization of Myanmar kyats, the State Law and Order Restoration Council took office for the period of 1988-1997. In 1997, the State Law and Order Restoration Council was reformed as State Peace and Development Council from the period of 1997 until 2011. In 1997, State Peace and Development Council announced the transition into a market-oriented economy. With this transition, the government started to pave the way for Public- Private Partnerships and privatization. In 1997, PPPs started in Myanmar to fulfill the infrastructure needs of the country. However, the projects during those days were based upon unsolicited proposal (a proposal made by a private party to undertake a PPP project, submitted at the initiative of the private party, rather than in response to a request from the relevant government agency) under Build-Operate-Transfer form. In 2011, President U Thein Sein government took the state of duties and some reforms were made significantly. In October 2011, 11 private banks were allowed to trade foreign currency. In November 2012, the new Foreign Investment Law (2012) was enacted and special economic zones started in Thilawa and Dhawei. In 2016 and 2017, Myanmar Investment Law (2016) and Myanmar Companies Law (2017) were enacted. In April 2015, to improve the reliability and stability of Myanmar’s power supply and to prevent the power shortage problem, Myingyan Natural Gas Power Project was initiated. This is the first PPP project that was adopted through solicited proposal (solicited bid received from private parties via a competitive tender process for PPP Projects under the purview of an Implementing Government Agency) between Singapore-based Sembcorp Utilities and Ministry of Electricity and Energy. This project is located in Myingyan Township of Mandalay Region and this project was governed by a 22-year Build-Operate-Transfer (BOT) agreement and a Power Purchase Agreement (PPA).

          When PPPs are widely used in Myanmar, the government has started using Swiss challenge (a public procurement process designed to encourage private sector initiatives to engage in PPP Projects. Under the Swiss Challenge tender process, if a relevant government agency wishes to proceed with a project that was received as an unsolicited proposal, the agency is required to publish a bid and invite third parties to exceed it) to welcome private sector involvement in the tender processes recently. With regard to Public Private Partnership implementation, the Project Bank Notification was one of the greatest achievements. It was issued on 30th November 2018 by Office of the President after Public Private Partnership Center was established through Notification No. (24 /2021) of Union Minister’s Office of the Ministry of Planning and Finance.  

Public-Private Partnership in Myanmar

          Myanmar government budget is shown as deficit as the country is one of the countries with the lowest tax-to- GDP ratio. As Myanmar's tax to GDP ratio is very low, the government cannot afford to make sufficient investment in infrastructure. Although Myanmar, being a recipient of  Official Development Assistance (ODA), a kind of aid given by developed countries to assist the development of developing countries, the fund from public capital and ODA is insufficient to meet the infrastructure gap. In Myanmar, PPPs has been practiced in the form of Build Operate and Transfer mostly in road, power sectors and some projects in hotels. Some forms of PPPs in Myanmar are categorized as Greenfield projects (any investment in a structure or an area where no previous facilities exist and without constraints imposed by prior works), Brownfield projects (any investment that uses previously constructed facilities that were once in use for other purposes), Production Sharing Contracts and Joint Venture Agreements between ministries/ government organizations and private companies. In Project Bank Directive issued by the government, common types of PPPs which have been practiced in Myanmar are  categorized as Build-Own-Operate (BOO), Build-Operate-Transfer (BOT), Build- Transfer-Lease (BTL), Build-Transfer-Operate (BTO), Operation and Management (O & M) and other forms of PPPs. 

  Legal framework governing Public Private Partnerships

           In Myanmar, Ministry of Planning and Finance, Myanmar Investment Commission and Directorate of Investment and Company Administration are government agencies that regulate PPPs projects. The laws governing Public Private Partnerships before and after the issuance of Project Bank Notification are mentioned as follows-

  • Myanmar Companies Law (2017) 

  • Myanmar Investment Law (2016) 

  • Permanent Residence of a Foreigner Rules (2014)

  • Myanmar Special Economic Zones Law (2014)

  • Securities and Exchange Law (2013)

  • Myanmar Citizens Investment Law (2013)

  • Central Bank Law (2013)

  • Foreign Investment Rules (2013)

  • Foreign Investment Law (2012)

  • Law Amending the Commercial Tax Law (2011)

  • Private Industrial Enterprises Law (1990)

  • Financial Institutions of Myanmar Law (1990)

  • State-Owned Economic Enterprises Law (1989)

  • Special Company Act (1950)

In Myanmar, apart from these laws, for the commonly used Build Operate Transfer project form, general tendering processes have been widely practiced under Directive No. 1/2017 (Tender Rules), which is widely used as PPP manual in Myanmar. In addition to that, State Administration Council issued the tender notifications (1/2022). In PPP, if the private party is involved in international connection, the project is liable to Myanmar Investment Law (2016) and some restricted business activities are outlined in the notification 15/2017 of the Myanmar Investment Commission.

Public-Private Partnerships in the form of Production Sharing Contract in Myanmar

          Production Sharing Contract is used in Myanmar’s Oil and Gas sector and it is a contract signed between a government entity and private companies. In Myanmar, under Production Sharing Contract, Myanmar Oil and Gas Enterprise acts a body for the state and invites oil companies as contractors to make financial and technical investment in the oil and gas extraction. According to MOGE data, over 150 oil companies were registered as local partners with MOGE. According to terms and conditions of model production sharing contract set up by MOGE, there are two periods listed as the exploration period (an initial term of up to three years) and development and production period (commenced on notice of commercial discovery and continues for at least twenty years from the date of completion of the development phase) in the oil and gas operation. 

State Administration Council highlighting the role of Public Private Partnership in Special Economic Zones 

Three currently established Special Economic Zones are Thilawa SEZ, Dawei SEZ and Kyauk Phyu SEZ, but this article wants to highlight on two of these. The incumbent government, State Administration Council is attempting to develop Kyauk Phyu Special Economic Zones (SEZs) in the form of PPPs for economic development. In Kyauk Phyu Special Economic Zone Project, the China International Trust and Investment Corporation Consortium contributes 70 % and Myanmar side contributes 30 % when implementing the Kyauk Phyu Deep Seaport project. It is a four-phase project building ten jetties where the ships can berth. After this project, the livelihood of people in Rakhine State particularly those in Kyauk Phyu district will become better and Myanmar can directly transport goods to countries in African, South Asian, and Europe. In responding media, Union Minister U Aung Naing Oo and Mr Liang Chuanxin told that “the deep-sea port is a four-phase project containing ten jetties and it can accommodate about seven million 20-foot containers per year once completed. The consortium of this project will be incorporated by both domestically owned private or public companies registered under the Myanmar Companies Law 2017.” What’s more beneficial about the project is that State Administration Council has already planned to prioritize the investment of ethnic businessmen in the consortium. 

Thilawa Special Economic Zone is another successful example of PPPs project in Myanmar which has been carrying out by Myanmar government and Japanese government. Myanmar Japan Thilawa Development Limited has acted as a developer. Myanmar Japan Thilawa Development Limited was formed in January 2014, as a joint venture between MMS Thilawa Development Company, Thilawa SEZ Management Committee, and Myanmar Thilawa SEZ Holdings Public Limited. In Thilawa SEZ, in Zone A, a Residential and Commercial Area was firstly established covering offices, residences, restaurants, hotels, international schools and hospitals and it has begun operation since September 2015 whereas in Zone B, 3 types of land are categorized as industrial land, logistical land, residential or commercial land. 

          To sum up, State Administration Council is currently putting an emphasis on Public –Private Partnership and Small and Medium Enterprises for boosting economy in the aftermath of the Covid-19 implications. The actions of State Administration Council such as developing Special Economic Zones, encouraging SMEs to produce value-added goods to penetrate into export market, providing tax exemptions and incentives in the existing tax laws prove that State Administration Council is making an earnest effort to keep the existing economic infrastructure and projects working. The implementation of Public Private Partnership can pave the way for infrastructure development in Myanmar and the opportunities can be seen under this initiative.                                                                            

References 

  • Asian Development Bank’s PPP Handbook
  • The establishment of PPP center
  • Project Bank Notification 
  • Myanmar Companies Law (2017)
  • Myanmar Investment Law (2016)
  • Ministry of Information’s press release
  • Special Economic Zone Law (2014)
From Code to Combat: AI Warfare and Legal Dilemmas
-

The integration of Artificial Intelligence (AI) into modern warfare has revolutionized military strategies, introducing unprecedented capabilities while presenting profound legal and ethical challenges. From autonomous drones to AI-driven cyber defense systems, these advancements have outpaced existing international legal frameworks, creating a pressing need to address gaps and ambiguities in laws governing AI in conflict.

The integration of Artificial Intelligence (AI) into modern warfare has revolutionized military strategies, introducing unprecedented capabilities while presenting profound legal and ethical challenges. From autonomous drones to AI-driven cyber defense systems, these advancements have outpaced existing international legal frameworks, creating a pressing need to address gaps and ambiguities in laws governing AI in conflict. This article explores the use of AI in military operations, focusing on its application in the Middle East and Ukraine, and examines the challenges it presents under international law.

Evolving Legal Frameworks: Old Principles Meet New Technologies

The rules governing warfare, such as the Geneva Conventions and the Hague Conventions, are grounded in principles like proportionality, distinction, and necessity. However, these frameworks were crafted in an era when AI was not a consideration, leaving significant gaps in addressing its unique challenges.

The emergence of autonomous weapons systems (AWS) poses one of the most significant tests for international law. These systems operate with minimal human intervention, blurring lines of accountability and complicating enforcement of principles like distinction and proportionality. AI’s ability to independently analyze vast data sets and execute operations challenges the traditional understanding of state and individual accountability under international humanitarian law (IHL).

Innovations and Implications

AI's military applications are prominently displayed in the Middle East and Ukraine, regions marked by complex and dynamic conflicts.

In the Middle East, autonomous drones and AI-powered targeting systems are central to military operations. For instance, Israel employs cutting-edge AI programs such as "Daddy’s Home," "Gospel," and "Lavender." These systems integrate machine learning to enhance target identification, surveillance, and missile defense, with "Lavender" playing a crucial role in the Iron Dome’s precision defense capabilities. 

"Daddy’s Home"

"Daddy’s Home" is a high-precision targeting system that utilizes advanced machine learning algorithms to assist in identifying and prioritizing military targets. By analyzing vast datasets from multiple intelligence sources, including satellite imagery, drone feeds, and human intelligence, "Daddy’s Home" offers real-time insights to decision-makers. It is designed to minimize civilian casualties and ensure compliance with international humanitarian law (IHL). The system is particularly effective in urban warfare settings, where distinguishing between combatants and civilians is critical. However, critics have raised concerns about the system's reliance on data accuracy, as errors in input data could lead to unintended consequences.

"Gospel"

The "Gospel" program focuses on real-time surveillance and intelligence gathering. Using sophisticated AI algorithms, it processes video and sensor data from drones, satellites, and ground-based sensors. "Gospel" excels in pattern recognition, enabling it to detect unusual movements, potential threats, or hidden combatants that may escape human observation. This capability allows military commanders to act on intelligence with speed and precision. However, the autonomy of such systems raises ethical and legal questions, particularly regarding their use in environments where accurate differentiation between civilian and military targets is essential.

"Lavender"

The "Lavender" project integrates AI with Israel's renowned Iron Dome missile defense system, adding an extra layer of predictive analytics to existing capabilities. "Lavender" enhances the system’s ability to evaluate threats by considering multiple factors such as the trajectory, size, and payload of incoming projectiles. This rapid analysis enables the Iron Dome to prioritize which missiles to intercept, ensuring optimal resource use. In addition to missile defense, "Lavender" is applied in offensive operations, leveraging AI to determine the most effective strike points. The speed and accuracy of this system are unparalleled, but it also faces scrutiny for the potential lack of human oversight in critical decisions.

These programs showcase Israel's commitment to leveraging AI for military advantage while adhering to the principles of precision and proportionality as mandated by international law. Nevertheless, they raise broader concerns about transparency, accountability, and the ethical implications of AI-driven warfare.

While these technologies aim to minimize civilian casualties, their autonomous nature raises questions about compliance with IHL principles, especially in distinguishing between combatants and civilians.

Similarly, in Ukraine, AI systems are employed to counter cyber threats, improve surveillance, and enhance missile defense capabilities. Ukraine's innovative use of AI to predict and respond to Russian military strategies showcases its potential for real-time decision-making. However, such systems, if not properly regulated, risk violating IHL’s prohibition of indiscriminate force, particularly when algorithms lack contextual judgment.

Who is Liable?

Determining responsibility for AI-driven military actions is a critical legal and ethical challenge. Under current IHL, states are accountable for their armed forces' conduct. However, when lethal decision-making is delegated to machines, it becomes difficult to attribute blame for unlawful acts, such as targeting errors or civilian casualties.

 The lack of clear accountability mechanisms undermines the very foundation of IHL, necessitating urgent legal reforms. Proposals such as the concept of "meaningful human control" over AWS emphasize the need for human oversight in all AI-driven military actions to ensure ethical and legal compliance.

Bridging the Gap: Proposals for Regulation

To address the challenges posed by AI in warfare, international law must evolve to balance technological innovation with ethical accountability. Possible approaches include:

  • Updating Existing Treaties: Expanding the scope of treaties like the Convention on Certain Conventional Weapons (CCW) to include specific provisions on AI technologies.

  • New Legal Instruments: Crafting treaties that regulate autonomous decision-making, mandate human oversight, and limit the deployment of AWS in sensitive conflict zones.

  • Regulation of Private Sector Involvement: Establishing guidelines for private companies developing military AI technologies to ensure compliance with IHL principles.

Efforts by organizations like the United Nations and the International Committee of the Red Cross to address these issues demonstrate global recognition of the urgency of regulating AI in warfare.

A Call for Action

AI’s integration into military operations offers both unparalleled advantages and complex challenges. While its potential to enhance precision and reduce human casualties is undeniable, its autonomous nature raises ethical and legal concerns that current frameworks are ill-equipped to address.

For AI to be used responsibly in warfare, the international community must urgently establish comprehensive legal standards that uphold the principles of accountability, proportionality, and distinction. Only through proactive regulation can the global community ensure that AI serves as a tool for enhancing security rather than exacerbating the horrors of war.

References

  1. United Nations. (2018). International Law and the Use of Force. Retrieved from https://www.un.org

  2. Schmitt, M. N. (2013). The Regulation of Autonomous Weapons in Armed Conflict. International Law Studies, 89(1), 87-108.

  3. Sharkey, N. (2018). The Ethics of Autonomous Weapons Systems. International Review of the Red Cross, 100(909), 387-406. https://doi.org/10.1017/S1816383119000325

  4. Scharre, P. (2018). Army of None: Autonomous Weapons and the Future of War. W.W. Norton & Company.

  5. Cummings, M. L. (2017). Artificial Intelligence and the Future of Warfare. Chatham House Report. Retrieved from https://www.chathamhouse.org

  6. International Committee of the Red Cross (ICRC). (2019). Autonomous Weapon Systems and International Humanitarian Law: A View from the ICRC. Retrieved from https://www.icrc.org

  7. Binns, L. (2019). AI in Warfare: The Global Arms Race and Ethical Dilemmas. Journal of Strategic Studies, 42(5), 640-658.

  8. Elbit Systems. (2022). Iron Dome and AI-Powered Targeting Systems. Retrieved from https://www.elbitsystems.com

  9. Israel Defense Forces (IDF). (2022). Use of AI in Israel's Military Operations. Retrieved from https://www.idf.il

  10. United States Department of Defense. (2020). Artificial Intelligence Strategy. Retrieved from https://www.defense.gov

Daw Hla Myet Chell (International Law)

The integration of Artificial Intelligence (AI) into modern warfare has revolutionized military strategies, introducing unprecedented capabilities while presenting profound legal and ethical challenges. From autonomous drones to AI-driven cyber defense systems, these advancements have outpaced existing international legal frameworks, creating a pressing need to address gaps and ambiguities in laws governing AI in conflict. This article explores the use of AI in military operations, focusing on its application in the Middle East and Ukraine, and examines the challenges it presents under international law.

Evolving Legal Frameworks: Old Principles Meet New Technologies

The rules governing warfare, such as the Geneva Conventions and the Hague Conventions, are grounded in principles like proportionality, distinction, and necessity. However, these frameworks were crafted in an era when AI was not a consideration, leaving significant gaps in addressing its unique challenges.

The emergence of autonomous weapons systems (AWS) poses one of the most significant tests for international law. These systems operate with minimal human intervention, blurring lines of accountability and complicating enforcement of principles like distinction and proportionality. AI’s ability to independently analyze vast data sets and execute operations challenges the traditional understanding of state and individual accountability under international humanitarian law (IHL).

Innovations and Implications

AI's military applications are prominently displayed in the Middle East and Ukraine, regions marked by complex and dynamic conflicts.

In the Middle East, autonomous drones and AI-powered targeting systems are central to military operations. For instance, Israel employs cutting-edge AI programs such as "Daddy’s Home," "Gospel," and "Lavender." These systems integrate machine learning to enhance target identification, surveillance, and missile defense, with "Lavender" playing a crucial role in the Iron Dome’s precision defense capabilities. 

"Daddy’s Home"

"Daddy’s Home" is a high-precision targeting system that utilizes advanced machine learning algorithms to assist in identifying and prioritizing military targets. By analyzing vast datasets from multiple intelligence sources, including satellite imagery, drone feeds, and human intelligence, "Daddy’s Home" offers real-time insights to decision-makers. It is designed to minimize civilian casualties and ensure compliance with international humanitarian law (IHL). The system is particularly effective in urban warfare settings, where distinguishing between combatants and civilians is critical. However, critics have raised concerns about the system's reliance on data accuracy, as errors in input data could lead to unintended consequences.

"Gospel"

The "Gospel" program focuses on real-time surveillance and intelligence gathering. Using sophisticated AI algorithms, it processes video and sensor data from drones, satellites, and ground-based sensors. "Gospel" excels in pattern recognition, enabling it to detect unusual movements, potential threats, or hidden combatants that may escape human observation. This capability allows military commanders to act on intelligence with speed and precision. However, the autonomy of such systems raises ethical and legal questions, particularly regarding their use in environments where accurate differentiation between civilian and military targets is essential.

"Lavender"

The "Lavender" project integrates AI with Israel's renowned Iron Dome missile defense system, adding an extra layer of predictive analytics to existing capabilities. "Lavender" enhances the system’s ability to evaluate threats by considering multiple factors such as the trajectory, size, and payload of incoming projectiles. This rapid analysis enables the Iron Dome to prioritize which missiles to intercept, ensuring optimal resource use. In addition to missile defense, "Lavender" is applied in offensive operations, leveraging AI to determine the most effective strike points. The speed and accuracy of this system are unparalleled, but it also faces scrutiny for the potential lack of human oversight in critical decisions.

These programs showcase Israel's commitment to leveraging AI for military advantage while adhering to the principles of precision and proportionality as mandated by international law. Nevertheless, they raise broader concerns about transparency, accountability, and the ethical implications of AI-driven warfare.

While these technologies aim to minimize civilian casualties, their autonomous nature raises questions about compliance with IHL principles, especially in distinguishing between combatants and civilians.

Similarly, in Ukraine, AI systems are employed to counter cyber threats, improve surveillance, and enhance missile defense capabilities. Ukraine's innovative use of AI to predict and respond to Russian military strategies showcases its potential for real-time decision-making. However, such systems, if not properly regulated, risk violating IHL’s prohibition of indiscriminate force, particularly when algorithms lack contextual judgment.

Who is Liable?

Determining responsibility for AI-driven military actions is a critical legal and ethical challenge. Under current IHL, states are accountable for their armed forces' conduct. However, when lethal decision-making is delegated to machines, it becomes difficult to attribute blame for unlawful acts, such as targeting errors or civilian casualties.

 The lack of clear accountability mechanisms undermines the very foundation of IHL, necessitating urgent legal reforms. Proposals such as the concept of "meaningful human control" over AWS emphasize the need for human oversight in all AI-driven military actions to ensure ethical and legal compliance.

Bridging the Gap: Proposals for Regulation

To address the challenges posed by AI in warfare, international law must evolve to balance technological innovation with ethical accountability. Possible approaches include:

  • Updating Existing Treaties: Expanding the scope of treaties like the Convention on Certain Conventional Weapons (CCW) to include specific provisions on AI technologies.

  • New Legal Instruments: Crafting treaties that regulate autonomous decision-making, mandate human oversight, and limit the deployment of AWS in sensitive conflict zones.

  • Regulation of Private Sector Involvement: Establishing guidelines for private companies developing military AI technologies to ensure compliance with IHL principles.

Efforts by organizations like the United Nations and the International Committee of the Red Cross to address these issues demonstrate global recognition of the urgency of regulating AI in warfare.

A Call for Action

AI’s integration into military operations offers both unparalleled advantages and complex challenges. While its potential to enhance precision and reduce human casualties is undeniable, its autonomous nature raises ethical and legal concerns that current frameworks are ill-equipped to address.

For AI to be used responsibly in warfare, the international community must urgently establish comprehensive legal standards that uphold the principles of accountability, proportionality, and distinction. Only through proactive regulation can the global community ensure that AI serves as a tool for enhancing security rather than exacerbating the horrors of war.

References

  1. United Nations. (2018). International Law and the Use of Force. Retrieved from https://www.un.org

  2. Schmitt, M. N. (2013). The Regulation of Autonomous Weapons in Armed Conflict. International Law Studies, 89(1), 87-108.

  3. Sharkey, N. (2018). The Ethics of Autonomous Weapons Systems. International Review of the Red Cross, 100(909), 387-406. https://doi.org/10.1017/S1816383119000325

  4. Scharre, P. (2018). Army of None: Autonomous Weapons and the Future of War. W.W. Norton & Company.

  5. Cummings, M. L. (2017). Artificial Intelligence and the Future of Warfare. Chatham House Report. Retrieved from https://www.chathamhouse.org

  6. International Committee of the Red Cross (ICRC). (2019). Autonomous Weapon Systems and International Humanitarian Law: A View from the ICRC. Retrieved from https://www.icrc.org

  7. Binns, L. (2019). AI in Warfare: The Global Arms Race and Ethical Dilemmas. Journal of Strategic Studies, 42(5), 640-658.

  8. Elbit Systems. (2022). Iron Dome and AI-Powered Targeting Systems. Retrieved from https://www.elbitsystems.com

  9. Israel Defense Forces (IDF). (2022). Use of AI in Israel's Military Operations. Retrieved from https://www.idf.il

  10. United States Department of Defense. (2020). Artificial Intelligence Strategy. Retrieved from https://www.defense.gov