Blog

  • The Next Battle- State versus Technology Giants

    Two unrelated events hogged the headlines in the last month. On 22nd February Amazon became the third most valuable company in the world, overtaking Microsoft. On 25th February the official news agency Xinhua announced that the ruling communist party is proposing to remove the constitutional provision of “no more than two consecutive terms” for the country’s President and Vice-president. This would pave the way for the incumbent president to continue in the helm of power indefinitely.

    The first event is a precursor of the future shape of the world economy while the second one is a forewarning of demise of liberal democracy as we understand today. These two events are also interrelated in the sense that their future trajectories will determine the denouement of the wrestling match that goes on between market power and state power.

    Let us first have a closer look of the import of the first event. The Fortune magazine publishes a list of top 500 companies in the world, ranked by their revenues. Financial Times publishes a list of 500 top world companies ranked by their market capitalization. The latest Fortune data pertains to the year 2016 while market capitalization data is up to date as of 31st December 2017. For understanding the trend the time gap between two datasets has no bearing.

    Top 10 Companies by Revenue and by Market capitalization:

    Top Ten by market capitalization (M-Cap) Industry Top Ten by revenues Industry
    Apple Technology Walmart Retail
    Alphabet Technology State Grid Electric utility
    Microsoft Technology Sinopeck Group Petro Chemical
    Amazon.com Technology Retailer China National Petroleum Oil & Gas
    Facebook Technology Toyota Motor Car
    Tencent Technology Volkswagen Car
    Berkshire Hathaway Conglomerate Royal Dutch Shell Energy & Petro-Chemical
    Alibaba Group Technology Retailer Berkshire Hathaway Conglomerate
    Johnson & Johnson Pharma Manufacturing Apple Technology
    J P Morgan Chase Banking and Financial services Exxon Mobil Oil & Gas

    The most interesting feature of the above two rankings is that while still infrastructure and manufacturing industries dominate the top rung of the current corporate behemoths, the future potential behemoths are  growing up in the technology sector. M-Cap is an indicator of market’s prediction of future growth potential of a company. Amazon’s price-to-earnings ratio, a measure of how expensive a stock is in comparison to its current period earning, is 323 as compared to average ratio of only 22 for S&P 500 companies.

    Ignoring Berkshire which is essentially a conglomerate, the only non-technology firm appearing in the top ten companies by M-Cap is JPMorgan, a financial service company.  So the market is predicting that the future of market economy lies with companies which are technology driven, technology enabled and most importantly innovation focused. On the contrary, the top companies ranked by currents revenues are enjoying benefits of their access to natural resources protected by concession arrangements with the state. So these companies have to work in close cooperation with the states giving concessions. Managing the states is critical to their existence and profitability. This is in sharp contrast of the business model followed by the emerging giants.  These companies using technology are creating an ecosystem of production of goods and services that are beyond the control of the geographically bounded nation states. In fact, these companies have much better understanding and access to actions and thoughts of the citizen of a state, particularly its younger ones than the any nation state has. Facebook was aware of any Russian meddling of US election, if any, than FBI could possibly have. Today, Google has much more information about its Indian users than the Indian Federal Government can ever have, Aadhaar notwithstanding.  In 2017, 46.8% of the global population accessed the internet and by 2020 this figure is projected to grow to 53.7%. It is obvious that this growth will benefit much more technology companies than utility, retail and infrastructure companies. We cannot expect exponential growth of companies which are organically linked with exploitation of natural resources.

    These technology companies are gradually increasing their footprints beyond their original areas of operations. One study forecasts that the combined market share of Apple, Samsung, and Google (via Android Pay) is expected to reach a user base exceeding 500 million for mobile contactless payments by 2021. Amazon has started its lending business by offering to fund its suppliers. China’s e-commerce giants including Alibaba, Tencent’s and others are now running a lending portfolio over $12 billion. Apple owned US Treasury bonds ($52.6 billion) by the end of July 2017 and ranked 23rd in the list of US Treasury bond holders ahead of Netherlands and Turkey. These technology companies may gradually cut out intermediaries like banks and insurance companies by using Artificial Intelligence and Blockchain technology. Since data is the fuel of 21st century, the owners of data will have more power than any nation state.

    How this development is related to the China’s decision to consolidate power of state in a monarchial coterie formed around the current incumbent?

    The Chinese communist party has been able to put the country on a sustained high growth trajectory in the last three decades. The country is expected to become the world’s largest economy by 2030. China has used foreign capital and technology liberally in creating its manufacturing base.  A World Bank report of 2010 mentioned that “China received about 20 percent of all FDI to developing countries over the last 10 years and over $100 billion in 2008.  In terms of share of GDP and investment, FDI accounted for some 2.5 percent of GDP on average over the last five years”.   While welcoming FDI, Chinese ruling dispensation did not allow domestic private capital to capture the “commanding height” of the economy. 9 out of top 10 Chinese companies appearing in The Forbes 2000 list of 2017 are all state owned. If China has to establish its position as the first among equals in the international distribution of power it cannot afford to destabilize its own internal economic system built under the watch of party and the state. Till now, USA has been benign bystander, if not an active facilitator, of China’s rise as a global economic power. It was expected that economic growth and prosperity along with greater integration with world economy would slowly but steadily chip away the ideological foundation of the present Chinese political system. But this expectation of US policy makers has been belied. After disintegration of Soviet Russia, the world is witnessing, not the rise of liberal democracy, but rise of two dictatorial regimes under two most focused men who want their nations to occupy the high table of international power structure.

    So we have on the one hand two authoritarian states (China and Russia) that carry the legacy of failed communism and other hand we have technology giants who are not fettered to any nation state nor bound by any geography.  David Ignatius, associate editor of Washington Post wrote in an op-ed piece that “China is racing to capture the commanding heights of technology and trade.”(here) The forces that will confront China are not the usual suspects- USA, UK or European Union states. This time the war will be fought in cyber space for capturing data about and of the people and the technology companies will have to fight for withering away of states as we know it now. We may recall that Marx desired withering away of states as the final goal of communism. In that sense these privately owned technology companies, rather ironically, would stand for one of the goal of communism as against the ex-communist regimes will stoutly defend the right of nation states. As some author wrote – the last battle will be between communists and ex-communists.

    See here    here    here   here   here   here   here

     

     

  • Trump Tariff- Keynes would have approved

    The US government’s recent tariff imposition of 25% on steel and 10% on aluminum imports from all countries except Canada and Mexico is a textbook example of economic policy making to serve narrow political interests. This article is not to examine the economic rationale of such a policy that its proponents have been offering. We are not interested to know what an optimal tariff policy should be for a country that has been the dominant trading partner for most the nations during the last 50 years.  My main objective in writing this piece is to demonstrate how a nation state, like a chameleon, changes its policy to serve its own interest, perceived or real.

    USA has a history of imposing high tariff when it suited interests of various pressure groups within the country. The two most important tariff acts enacted in the history of USA are the Fordney-McCumber tariff act of 1922 and the Smoot-Hawley tariff of 1930. The first one was a response to the drastic fall in farm income between 1919 and 1921- the period following the end of the First World War. The tariff act of 1922 increased the average tariff on dutiable import from 16.4 to 36.17%. The Democratic President Woodrow Wilson did not support imposition of such a steep hike in tariff and vetoed the legislation passed by the Congress on his last day in office. His successor, the Republican President, Warren Harding signed it into law within 3 months of assuming office. The Smoot-Haley act came into force on June 17, 1930. Initially the Republican President Herbert Hoover opposed increase of already high tariff regime. More than thousand economists signed a petition to the president opposing the new tariff proposal. Big corporations as well as large Wall Street firms opposed the bill.  The following quote from Wikipedia is revealing

    1. P. Morgan’s chief executive Thomas W. Lamont said he “almost went down on [his] knees to beg Herbert Hoover to veto the asinine Hawley-Smoot tariff.

    The main supporters of the bill were those industries and farmers who expected to benefit directly from enhanced tariff on goods that they were producing.

    There are two alternative explanations for preferences for higher or lower tariff regimes.  One identifies “pressure group” politics as the main driver of increased tariff regime.  The other one emphasizes the “party politics” as the main driver of enactment of these two tariff acts. A study on Effective Rate of Protection attributable to any tariff measure examined the impact of the above two tariff measures on various industries of USA. The study found enough evidence for the “pressure group” theory. It is interesting to note that one of the major looser was the auto industry and no wonder that Henry Ford vehemently opposed the Smoot-Hawley tariff act, calling it “an economic stupidity”.

    With the Democratic President F.D. Roosevelt in White House in 1933, USA started changing its trade and tariff policy. Reciprocal Tariff Act of 1934 authorized the president to enter into bilateral negotiation with foreign nations to reduce tariff on a reciprocal basis.  This Act is considered as the beginning of a liberal trade regime policy by USA.  In the post second world period, USA turned out to be one of the main driving forces behind multilateral trade agreements like General Agreement on Trade and Tariff (GATT) and formation of the World Trade Organization (WTO). The pursuit of liberal trade policy continued under both Republican and Democratic Presidents.  President Kennedy brought in the 1962 Trade Expansion Act and helped start the Kennedy Round of world trade talks. Republican President Reagan launched the Uruguay round in 1996 and Democratic President Clinton helped establishment of WTO.  We may note that this is the period during which US economy clocked highest average growth in GDP. From 1950 to 2010, the decadal growth rates of US real GDP were: 3.6(1950s), 4.3(1960s), 3.2(1970s), 3.3(1980s), 3.3(1990s), 3.4(2001 to 2010) and 2.1(2011 to 2017). We may also note that, US share in world export during the same periods were:  15.4(1950s), 14.2(1960s), 11.7(1970s), 11.2(1980s), 12.0(1990s), 9.0(2001 to 2010) and 8.5(2011 to 2016). Thus, a nation’s economic policy making is guided by national self-interest alone.

    Fault lines in the bipartisan support for a liberal trade policy started appearing with dwindling manufacturing jobs in core industries like metal and coal. With the advent of Internet, even white collar jobs in programming, back office maintenance, digital marketing etc. began to move offshore.  The standard economic theory says that a country should specialize in those industries in which it is relatively more efficient. If jobs are migrating from USA to foreign countries, USA should insist on liberalization of trade and services in which it has distinct comparative advantage.  In fact, the US supremacy on technology front is beyond doubt and the top 4 valuable companies in the world are technology companies of US.  Instead of capitalizing on the country’s strength in scientific and technological innovation and making outstanding products out of them, the present Republican President is bent on leading the country to a black hole.

    But should we blame the present President as an ignoramus of the complexities of   international trade theory and barking up the wrong tree by assuming high tariff per se would be a remedy for loss of competitiveness of some of the US industries? I believe not. He is, in fact, in good company of some of the doyens of economic theorists of 20th century.  Let us take the example of John Maynard Keynes, who after Adam Smith and David Ricardo can be considered as the most influential British economic thinker of the last century.

    Keynes was an ardent advocate of free trade as long as his own country was the dominant economic power of the world. But as the British economy started to falter with rising domestic unemployment Keynes reversed his stand. While analyzing Keynes’ views on protectionism, Barry Eichengreen has this to say: – “Keynes repeatedly reversed his public position on the advisability of protection, and it has been difficult to portray the sequence of seemingly contradictory recommendations as a logical progression of thoughts”. Of course, Eichengreen tried to salvage the reputation of Keynes as an economic theorist and policy adviser by saying that Keynes views about protection was “surprisingly consistent” if we consider them in the light of his view on what the paramount goal of economic policy should be. And that goal is maintenance of full employment of his nation.  Why an economist should only seek full employment in his or her country when the same policy might generate severe unemployment in other countries? Schumpeter has rightly described policy advices given by Keynes could be seen as “always English advice, born of English problems even when addressed to other nations”

    In 1933 Keynes gave the inaugural Finlay lecture titled “National Self-Sufficiency” at Dublin. The lecture was delivered in the backdrop of rising protectionism of the Irish Free State- then a British Dominion. To a large extent the rise of Irish protectionism was due to imposition of penal import duties on Irish agricultural imports in 1932. Thus the choice of lecture topic by Keynes was a deliberate one. He knew that he had to tread a fine line between the interests of his own country and that of another neighboring country- the country hosting his lecture. While not rejecting outright the rationales that he had espoused in defense of free trade, he came to justify some of the protectionism measures of the Irish Free State with the following words:

    It is my central contention that there is no prospect for the next generation of a uniformity of economic system throughout the world, such as existed, broadly speaking, during the nineteenth century; that we all need to be as free as possible of interference from economic changes elsewhere, in order to make our own favourite experiments towards the idle social Republic of the future; and that a deliberate movement towards a greater national self-sufficiency and economic isolation will make our task easier, in so far as it can be accomplished without excessive economic cost 

    Thus Keynes was apparently justified to change his earlier position on Free Trade because, in his opinion, the uniformity of economic system prevailing in 19th century had changed. But in reality what had changed was the loss of uniformity brought about by the suzerainty exercised by the British Empire on the world at large.  Today, USA is in the similar position. We are yet to know whether this repetition of history will end in tragedy or farce.

     

    References:

    Archibald Robert B et al (2000):  Effective rates of protection and the Fordney-McCumber and Smoot-Hawley Tariff Acts: comments and revised estimates: in Applied Economics No 9

    Eichengreen, Barry (1984): Keynes and protection in the Journal of Economic History No2

    Keynes John Maynard (1933): National Self-sufficiency in Studies: An Irish Quarterly Review  No 86

    Schumpeter, J . A (1946):  John Maynard Keynes in American Economic Review Issue No 4

     

  • India’s Biggest Operational Risk Event

    The PNB –Nirav Modi case is a text book case of an operational risk event. The fact of the case is now well known. The case revolves around letters of undertaking (LOU) issued by PNB (issuing bank) to overseas branches of many Indian banks.  An LOU is, in essence, an irrevocable bank guarantee issued by a bank (Issuing bank) on behalf of its customer to another bank (Recipient bank).  The recipient bank extends credit (buyers’ credit) to the issuing bank‘s customer by way of financing import of goods as a part of the latter’s legitimate business. In this case, the issuing bank is PNB and the customers are companies owned by billionaire diamond merchants Nirav Modi and Mehul Choksi. These two happen to be also close relatives. The fraud began in 2011 with a small amount of 800 crore and gradually ballooned to 11000 crore ($1.8 billion) when it was ultimately detected. This gradual increase in the size of the loss is identical to many earlier operational risk cases. For example, in the Baring bank case (1995), the fraudster Nick Lesson got deeper and deeper into the quagmire when he tried to cover up initial loss with a bigger bet, hoping that luck would turn and he would be able to get away with laurels and not a jail term of six and half years. In a similar way the rogue trader Jérôme Kerviel of Société Générale (SG) wanted to cover up trading losses to ultimately leading SG to stare at a total loss around $7 billion in 2008. Although these cases are now part of the standard literature on operational risk, it appears from the PNB event that there is complete lack of awareness or even basic understanding about the seriousness of operational risk events on the part of top management of banks and also the board of directors of Indian banks.  It is a known fact that Indian banks are more concerned about submitting risk compliance reports and meet capital adequacy norms set by RBI than establishing proper risk governance architecture within their respective organization. Most of them lack basic knowledge of risk management and do not care a hoot about it also.

    The full details of the PNB case are yet to be made public. But the main features of this operational risk event are now in public domain. Nirav Modi and his firms managed to procure LOU from PNB’s Brady house branch with the connivance of branch officials and using these LOU obtained short term credit from foreign branches of many Indian banks to finance import of diamonds. The LOUs were communicated with the financing branches thorough the SWIFT messaging platform. When the time of repayment arrived, Modi could get more credit through the LOU route to both  pay back the old loan as also obtain fresh loan.  Thus size of PNB’s contingent liabilities continued to increase without raising any alarm in the controlling offices of the LOU issuing branch. When the main fraudster within PNB retired and a new official took charge of his desk, this smoothly managed scheme, started unravelling. The new official asked for required 100% margin as collateral from Modi’s firms when they came for roll over of the outstanding LOU as before. This was a standard operating procedure as these firms were neither customers of the branch nor enjoying any credit facility from the bank.  Then the digging of old records started and the enormity of the fraud came to light.

    Let us now analyze the case from the risk management perspective. It is clear that this is neither a case of credit loss nor a trading loss. It is a case of both internal and external fraud.  We need to seek answers to the following questions.

    1. Could this fraud be avoided or at least the loss amount contained?
    2. Was the procedural failure only on the part of PNB or even lending overseas branches banks were equally culpable? Was the connivance systematic at both at the issuing bank side as well as on the side of lending banks?
    3. What lessons Indian banking system should learn from this incident?

    Avoiding or containing the fallout of such an incident would depend on the establishment of an effective and robust operational risk framework within the bank.  The first requirement is to have a Key Risk Indicator (KRI) for all processes and tasks that a bank undertakes. In the present case, the following KRIs would have surely prevented occurrence of this incident or at least contained its loss amount. These are:

    • The number of employees with tenure at a desk more than a given threshold. Depending on the potential severity of loss that can happen for a specific desk, threshold can be fixed.
    • Leave record of employees- list of employees who have been manning a desk for a long period without talking leave for desks handling customer engagements.
    • Reconciliations of transactions- on balance sheet as well as off balance sheet ones- as between various transactional systems, including those carried out on SWIFT platform. SWIFT itself provides a daily validation report, giving a global summary of the bank’s inbound and outbound counterparty payment /messages. If suspicious or fraudulent activity occurs, such a report provides the information y that could have helped the bank to cancel messages and recover funds.  This reconciliation should be treated as a mandatory control mechanism for avoidance of occurrence of incident like this.
    • Ideally, the bank should have integrated SWIFT messaging system with its Core Banking System. In the absence of this, the bank could have procured applications that generate report of all activities carried out on the bank’s SWIFT system. Many such systems are available in the market1  

    Apart from KRI tracking and monitoring, a bank needs to establish a Risk Control and Self-Assessment (RCSA) process across the banks’ all operational units.  It is obvious that PNB did not put in place such a system in the bank despite an warning bell was rang by RBI itself about the possibility of occurrence of exactly such an event  ( see speech of  S.S.Mundra  on   September 7, 2016)2.

    It is really sad state of affair in Indian banking sector that neither RBI nor the top managements of the public sector banks are seriously concerned about the risk governance architecture prevalent in these banks. For them the implementation of Basel framework starts and ends with computation of regulatory risk capital.

    As regards the liability of PNB to the lending banks, we may refer to a similar case where a fraud happened at the issuing bank end and, therefore, the issuing bank refused to honor the Stand By Letter of Credit (SLBC) when it devolved on it. The fact of matter is as follows3.

    Banco Ambrosiano Veneto S.P.A ( the defendant) ., an Italian bank was said to have been issued two SBLCs in  favor of Industrial & Commercial Bank Ltd of Singapore ( the plaintiff). On devolvement , the Italian bank refused to pay the Singaporean bank on the plea that it never intended to issue the two SBLCs in question which were issued by  one of its employee, , fraudulently, pursuant to a fraudulent scheme involving  this employee , a customer, a Plaintiff’s employee and others. The case was heard by the Singapore High Court in 2001 and was decided in favor of the plaintiff bank. While deciding the case the honorable judge said the following:

    It is my view therefore that SWIFT messages have the legal effect of binding the sender bank according to the contents. The fact that a recipient bank may still wish to protect itself by doing checks on credit standing or other aspects does not detract from this proposition. SWIFT communication is still subject to the general law of contract.

    However, this does not mean that the recipient banks can completely absolve themselves of establishing a proper risk managements system within their banks. A continuing roll over with larger and larger amount of LOU to a group of companies from the same promoter should have alerted the recipient banks. In fact, these banks should have found out whether a single branch had the authority to issue LOUs of such magnitude. It shows lack of rudimentary risk management practices within the recipient banks also.

    The only lesson that Indian banks should learn from this episode is that risk management is a serious business, not a practice for showcasing to the regulator.  For the most of Indian banks risk management means hiring a consultant to prepare a guideline and procurement of an application. That is the end of it. For example, PNB boasts of having an enterprise wide Data Warehouse (DW). One should ask the bank-why all swift messages are not stored in the bank’s central repository?

     

    Notes:

    1. see here
    2. see here
    3. see here
  • Trillion Dollar Economy – no magic required

    Reaching $ 5 trillion GDP benchmark is being projected as a landmark milestone for the Indian economy by many in the Government. The latest estimate puts the size of Indian economy, measured as GDP at current market prices, at $2.4 trillion. Does reaching $5 trillion mark reflect a significant achievement or is it really an implicit admission of incipient sluggishness in growth of Indian economy? Let the data speak.
    Indian economy registered an average annual growth of 12.8% in GDP (at current market prices) during 17 years – from 2000-01 to 2016-17. During the same period, only in 2 years, the growth rate fell below 8%, the minimum being 7.6%. The 25 percentile growth rate was above two digits at 10.4% and the median rate was 13%.
    Given this nominal growth scenario of recent past, dollar value 5 trillion appears to be too modest a goal to be set by the current government. Table 1 gives the projected value of Indian economy till 2035 under various growth rate scenarios. Even if Indian economy grows at the lowest rate achieved during last 17 years, the size of the economy would reach at least 4 trillion US dollar by 2025. If rupee depreciates in mean time the growth in dollar terms would be lower. At 70 rupees per dollar, the size would become only 3.9 trillion dollar by the end of 2025.
    A nominal yearly growth rate of 7.6 percent would imply, given 4 % target growth rate notified by the government of India (GOI), a real growth rate of only 3.6 percent. A 10.4 % growth rate would thus imply real growth rate of only 6.4%. Thus if projections of $5 trillion is in nominal terms, then no big achievement is being claimed.
    Suppose, all the projections are being made under the assumption of constant prices of 2016-17, then the target average growth for next eight years should be 9%. India has achieved a double digit real growth rate in the last 66 years only once. Even in the last 25 years India clocked a real GDP growth rate greater than 8% only 6 times. So the probability of clocking a real growth rate of more than 8% is as low as 25%. Achieving 9% uniform real growth rate till 2025 with stable rupee-dollar rate might be a chimera. If rupee depreciates to 70 rupees by 2025, we would need an average year over year real growth rate of 11%. It could be a dream worth pursuing but there is no evidence in terms of accelerated investment or growth in productivity that could make the dream a reality.
    In summary, reaching 5 trillion USD by 2025 in nominal terms is no big deal – a lower than achievement would be considered a highly disappointing performance. Achieving the same target in real terms could be an enormous challenge- heralding a real structural break in the Indian economy with productivity led growth and not merely by adding more capital and labour.

    Table 1: Projected USD Size of Indian Economy under various growth rate scenarios and with constant exchange rate of 63.5                      ($Trillion)

     Distribution Measures based on data from 2000-01 Compound Growth Rate of GDP at current market prices 2025 2030 2035
    Minimum 7.6 4.2 6.1 8.9
    1st quartile 10.4 5.2 8.6 14.1
    Average 12.8 6.2 11.4 20.9
    Median 13 6.3 11.7 21.5
    Note: Only first decimal value without rounding up has been reported. Projections are based on CSO’s preliminary estimate of GDP at current market prices for year 2016-17.

    Note: Only first decimal value without rounding up has been reported. Projections are based on CSO’s preliminary estimate of GDP at current market prices for year 2016-17.

  • Corporatization of Nations

    Reliance Jio Infocomm Ltd, the telecom arm of India’s largest company by market cap (NSE:RELIANCE), plans to create its own cryptocurrency called JioCoin. Supply chain management logistics and loyalty payment with JioCoin are amongst the envisaged uses of JioCoin. Worldwide, many large corporates have already started launching their own private cryptocurrency.  KFC, Burger King and Kodak are the few well-known names that have hitched onto the bandwagon of this currency of the Internet.

    Fast-food chain KFC has announced that it will accept  virtual currency for paying bills in its outlets in Canada with the launch of Bitcoin Bucket. A customer can buy this bucket with 0.0011564 BTC, equivalent of CAD $20, according to a company statement. Eastman Kodak has announced last week that it is going to launch its own cryptocurrency KodakCoin in partnership with WENN Digital. Burger King has launched its own cryptocurrency in Russia called ‘WhopperCoin. IBM recently partnered with Stellar and klickex to develop a blockchain-based cross-border payments solution. Stellar is a distributed hybrid Blockchain that facilitates cross-asset transfer of value including payments. Similar to Bitcoin, Lumen is the asset of value issued by Stellar.

    This rush by multinational companies to get on board of the cryptocurrency mania camouflages a much larger issue and a potential threat to the current international political order. This threat can be analyzed from various perspectives including political, economic and technological.

    Glenda Sluga, a Professor of International History, has written about  the possible unraveling of the current international order from a historical and political perspective: These days, the pulse of the world’s political health is running fast. The general prognosis is terminal, the end of the international world order, as we know it.(here)  Political headwinds which led to such prognosis are easily discernible- rise of “radical nationalism” in USA, “long the axis of modern international society” and, rise of “heteropolarity” in the international power structure.

    Beyond this haze of political chaos, a much bigger threat to the existing international world order lies in emergence of private cryptocurrency and its adoption by multinationals. There is no gainsaying the fact the comity of nations defines the current world order. A nation state without its own currency is like the staging of Hamlet without the prince of Denmark. The power of a nation state to tax its citizens would stand highly diminished if large corporates can issue their own currency. Let us see how it would play out in reality.

    Alice buys 1000 JioCoins (JC) by paying, say, 20000 Indian rupees. Alice pays 60 JC to Bob for as rent for the apartment she has leased from Bob. Bob buys monthly grocery from the supermarket run by Reliance. Bob uses 250 JC for this purpose.  Bob tops up his Jio mobile with 50 JC. Suppose, Bob works in Reliance Industries and receives 3000 JC every month. Bob pays 750 JC to Reliance Petroleum for purchase of gas for his car. He has purchased his car by taking loan from HSBC by paying EMI of 750 JC every month. This EMI payment is routed through a cryptocurrency exchange run by a Russian bank.  RIL pays IBM India monthly 100 million JC for maintaining its IT infrastructure. IBM may pay RIL is own cryptocurrency for using Jio mobile services in India. Gradually, a complete ecosystem of economic agents can emerge, who will use JC as their preferred currency for all their payment requirements.  It may be seen that the JC to Rupee exchange takes place only when Alice purchased JC. At a certain stage of development JC will acquire its own life, cutting its umbilical record with the fiat currency.

    The above description of evolution of JC to encompass a significant slice of economic transactions in its country of incorporation, i.e. India, does not necessarily imply that JC would pose a threat to the  existence, or at least severely restrict usefulness,  of the sovereign currency INR as a fiat money. Initially, INR can continue to be the unit of account within the boundary of India. But if JC emerges as the people’s preferred medium of transactions and store of value, only raw state power can prevent rupee’s passage to oblivion. Be that as it may, the moot question is whether JC would severely dent the Indian state’s capability to tax the economic activities mediated through JC. Given the ability of a cryptocurrency to mask the identity of transactors, imposition of indirect taxes, like goods and service tax, might be a serious challenge for tax administration. If an Indian resident tax payer earns and spends only in JC, fixation of its tax liability would not be an easy task.

    If all multinationals including RIL, IBM and others can agree on an exchange platform for conversion of their currencies then the nations of the world would find themselves divested of their defining power to tax and earn seigniorage.  The depth and reach of the large multinationals can be gauged from the fact that in 2016 the Fortune 500 companies had revenue of 27.7 trillion USD while the combined GDP of 198 countries was around 76 trillion USD. Using Output to GDP ratio for US economy, the share of Fortune 500 companies in the worlds’ GDP would work to around 21 percent.   So if these large corporates were to sign off from the current international order with their own currencies, their total GDP would be the second highest, next to USA only. They can usher into a new Bretton Wood regime for their private currencies and significantly reduce the cost of managing exchange rate risk.

    Technologically, these large corporates could not but continue to be part of one country or other, at least formally, the emergence of cryptocurrency can unshackle them from this tether of fiat currency and its in-built inflationary bias. If the world economic order get re- arranged on this line, what would happen to the multitude of people who would continue to remain outside the charmed circle of digital economy, can only be a matter of speculation and not an informed guess.

  • Central Bank Digital Currency -a Blueprint

    eRupiah: RBI’s Virtual Cash

    Key words: Central Bank Digital Currency, public key-private key cryptography, Digital currency wallet, Corruption,

    Introduction: No currency has ever been used in the human history which did not have the stamp of an authority. Bitcoin is a medium of payment but it is not money for the same reason. Nonetheless, the technology underlying Bitcoin is a significant one with great potential. A central bank, issuer of paper currency, can use some selected components of Bitcoin technology to replace paper currency with virtual currency, retaining all the important features of paper currency. The most important of them is that a central bank note is a freely negotiable bearer bond and a legal tender in the hand of its holder. It does not require any third party verification. Counterfeiting a central bank note is not impossible but difficult and costly. The central bank neither authenticates any transaction made with that particular note nor does it keep any record of that transaction. The note remains as a liability on the book of the central bank till it comes back to it, either for reissue or its destruction. The physical nature of the note ensures that no double spending is possible with the same note by its current holder. In case of digital cash, the main issue that a central bank has to resolve is the issue of double spending without depending on third party verification of the same. What follows hereunder is an outline of a system that any central bank can implement to issue its own currency retaining most, if not all, of the desired properties of a paper currency.

    I am presenting below a system based on digital currency on a mobile phone. There is no compelling reason to believe that the same system cannot be implemented on a specially designed smart card with embedded chip. The system outlined below is described within the currency management framework of the Reserve bank of India (RBI). With little tweaking the same can be customized by any central bank.

    RBI Currency Management Framework:

    RBI carries out its currency management function through its 19 Issue Offices located across the country. There is a network of 4281 currency chests and 4044 small coin depots in selected commercial bank branches. These chests store currency notes and rupee coins on behalf of RBI.  The note distribution mechanism is summarized in the following diagram.

    For issuance of digital currency, each currency chest would function as a data center for hosting the ledger book of notes issued from it.   Similarly each issue office of RBI would have a copy of the entire ledger book of notes. A folio would be opened in the note ledger book when the first time a specific note is issued.  Each data center will have complete inventory of wallets issued by RBI.

    Every bank branch would have a digital cash dispenser. Any wallet holder would be able to replenish her wallet with digital currency by pairing it with the dispenser via Bluetooth or NFC communication channel.  Similarly every ATM would have similar facility. At the time of cash dispensation from bank branch or ATM would require Aadhaar based biometric verification of wallet.  For cash transfer between wallets of two individuals this verification is not a necessary requirement.

    The protocol for issue of eRupiah

    1. RBI would maintain ledgers of each currency note in a distributed database.
    2. Currently RBI issues notes through its Issue offices. The distributed database will be created according to issue departments of RBI. Each Issue office of RBI will be able to issue new digital currency and destroy old digital currency. Destruction of old digital currency would help RBI to keep the number of entries in the ledger folio of a particular note within a limit. Every Issue offices would maintain record of all notes issued by it as well as copies of corresponding records of 3 neighboring Issue offices.
    3. Each currency chest will have a database of notes received by it from RBI’s Issue department.
    4. Each currency chest will also have replicated database of its three nearest neighbor
    5. The system will issue new digital currency when an account holder wants to withdraw cash from its account with RBI.
    6. The account holder would specify how much of its cash withdrawal would be in digital form. This facility would be provided for an interim period when both forms of currency would be in circulation.
    7. To incentivize issue of digital cash, RBI may reward with a fixed amount that could be related to the cost of producing physical cash.
    8. RBI is banker to the Central and State Governments. It also functions as banker to the banks and thus enables settling of inter-bank obligations. These account holders of RBI would get digital cash in their Jumbo Wallet which would be a server in the account holder’s custody. It would be like a till holding cash. An authorized person can withdraw e-Rupiah from the till as and when required.
    9. The RBI’s Note ledger would comprise ledger folios of each currency notes issued.
    10. Each record in the Note ledger would comprise the following attributes: (1) a sequential no, (2) unique identity / sr no of a note, (3) hashed value of the note serial no, (4) identity of the issue department, (5) denomination, , (6) time stamp of transaction, (7) hashed value of identity of paying wallet (first time payer would be RBI), (8) hashed value of identity of receiver wallet, (9) active flag,   (10) hashed value of first 9  attributes , (11) hash value of the first 9 attributes of earlier transaction record of the same note. The identity of a wallet is described below.
    11. RBI will also maintain database of each wallet downloaded from its website.
    12. The wallet database will have a header record with the following attributes (1) IMEI no of each phone, (2) Aadhaar No of the phone owner, (3) timestamp of successful downloading of the wallet, (4) the GPS location of the phone at the time of downloading of the wallet, (5) a unique private key generated for each wallet and (6) the corresponding unique public key generated for each wallet. This data would also be hashed and encrypted with RBI’s private key and will be part of the header record. RBI’s public key would also form a part of the header record. The private and public key of each wallet would be generated by RBI at the runtime. The hashed value of attributes 1 to 6 would be the identity of each wallet.
    13. Each wallet will have its own database of transactions. Each record in the transaction database will represent a note that has been loaded into the wallet. Each record will have the following attributes: (1) unique identity of the note, (2) note denomination, (3) digitally signed (with the private key of the paying wallet) hashed value of the concatenated string of serial no and denomination, (4) digitally signed ( with the private key of the paying wallet) hash value of concatenated string of attributes 1 and 2 of the header record with private key of payer wallet, (7) public key of the paying wallet, (8) timestamp of last transaction( i.e. timestamp of receipt of the note , (9) timestamp of the payment transaction, (10) payment status (paid or unpaid), (10) hashed value of the earlier transaction of the note(attributes 1,2,3,4,5).
    14. A transaction between two wallets would involve “note data” transfer from the paying wallet to receiving wallet. Every note that gets transferred from the payer’s wallet to the recipient’s wallet would essentially mean transfer of the entire record from the former to the latter. In the process of data transfer two insert / update activities take place in the receiver’s and payer’s wallet respectively. The receiver’s wallet inserts a new note record while the payer’s wallet updates the concerned note’s existing record.
    15. Once the receiving wallet gets a new e_Rupiah note, it checks the authenticity of the note by calculating hash value of the concatenated string of attribute 1 and 2 of step at 13. In the payer’s wallet the status flag would get changed to “paid” while in the receiver’s wallet it would continue to have the status flag as “unpaid”.
    16. Any wallet would have a limit in terms of number of records / notes. When the database has reached its limit then the wallet would have to be uploaded to RBI and a new wallet has to be downloaded.
    17. At any point of time a single wallet would be subject to 2 limits- holding limit of no of transactional records and total value of a single transaction. For a high value transaction two factor authentications would be required. (say above one lac). Both paying wallet as well as receiving wallet has to simultaneously establish connection with RBI and get their credential verified.
    18. As and when no of records in a wallet’s transactional database reaches its limit, the database has to be downloaded in an ATM or at a bank branch. The wallet would be purged of the all transaction records with status as “paid”. The wallet holder then can download more E_Rupiah from an ATM or from a bank brunch. RBI will update its ledger book of individual notes thus uploaded from each wallet.
    19. Any fraudulent transactions identified in the process of uploading would get notified and thorough automated forensic audit perpetrator of fraud would get identified.

    (more…)