Search

You searched for: Content Type Journal Article Remove constraint Content Type: Journal Article Topic Security Remove constraint Topic: Security
Number of results to display per page

Search Results

  • Author: Eunsun Cho
  • Publication Date: 05-2020
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: As the unparalleled ability of big data to capture and process real-time information signals a revolution in public administration, countries around the world have begun to explore the application of the technology to government functions. At the forefront of these efforts is China, which is planning to launch the social credit system (SCS), a data-powered project to monitor, assess, and shape the behavior of all citizens and enterprises. This new frontier of digital surveillance raises questions about how the United States will incorporate data technology into its own politics and economy. This article argues that the U.S. needs a comprehensive nationwide data protection framework that places limits on surveillance by both private business and the government. Without drawing its own baseline for personal data protection, the United States risks missing the already narrowing opportunity to define its balance between democracy, security, and growth.
  • Topic: Security, Science and Technology, Democracy, Surveillance
  • Political Geography: China, Asia-Pacific, United States of America
  • Author: Flavia Eichmann
  • Publication Date: 05-2020
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: This article explores what impact terrorist blacklists have on negotiated solutions to armed conflicts involving listed non-state armed groups. Even though conflicts that involve non-state armed groups do not usually end through these groups’ military defeat, governments around the globe tend to adopt hard-security approaches with regard to inner-state conflicts. Especially when groups resort to terrorist tactics, governments tend to be reluctant to engage peacefully with these actors and instead commonly rely on terrorist blacklists in order to delegitimize and restrict groups’ activities. While these blacklists are effective in criminalizing the operations of these groups, they can also severely impede peaceful dialogue and thus negatively impact the resolution of conflicts. Especially the work of NGOs and third-party peace practitioners is greatly constrained by criminalizing any form of interaction with listed groups. Additionally, in the absence of a universal definition of what constitutes a terrorist group, lists vary from country to country and the criteria for groups and individuals to get listed are often extremely vague. Furthermore, most lists fail to re-evaluate the proscribed groups on a regular basis and delisting procedures lack transparency. This article finds that blacklists severely disincentivize peaceful engagement with non-state armed groups and thus calls for a revision of contemporary proscription regimes in order to shift the focus of counterterrorism approaches towards viewing peaceful dialogue as a first option and not a last resort.
  • Topic: Conflict Resolution, Security, Terrorism, Non State Actors, Violent Extremism, Negotiation, Peace
  • Political Geography: Global Focus, United States of America
  • Author: Jeannette Greven
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: The U.S. Security Coordinator (USSC) mission in Jerusalem was created in 2005 to help implement security sector reform within the Palestinian Authority (PA). With a single-minded focus on “counterterrorism,” Washington considered the USSC an ancillary mechanism to support U.S. diplomatic and political efforts to resolve the Israeli-Palestinian conflict. Despite upending long-standing U.S. policy and cutting all other forms of aid to the Palestinians, the Trump administration has maintained the USSC in the run-up to the “Deal of the Century.” This article draws on original interviews with security personnel responsible for enacting USSC interventions. It uses their insights to highlight how the mission tethered Israeli political aims to its remit, and the distorting ramifications that have ensued for Palestine and the Palestinians. In uncovering the full parameters of Washington’s securitization policy, this history also points to the ways in which the PA has consequently been woven into the U.S.-led “global War on Terror.”
  • Topic: Security, Sovereignty, International Security, Military Affairs, Negotiation, Settler Colonialism
  • Political Geography: United States, Israel, Palestine, Jerusalem
  • Author: Seth Anziska
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: A 2019 investigation by the Israeli NGO Akevot and Haaretz newspaper has uncovered official suppression of crucial documents about the Nakba in Israeli archives. The Journal of Palestine Studies is publishing print excerpts and a full online version of the buried “migration report,” which details Israel’s depopulation of Palestinian villages in the first six months of the 1948 war, a document that clearly undermines official Israeli state narratives about the course of events. In methodical fashion, this report provides contemporaneous documentation of Israeli culpability in the expulsion of Palestinians from their homes and the systematic depopulation of so-called Arab villages in the first six months of the war. Alongside a discussion of key revelations in the newly available document, this introduction situates the broader pattern of erasure within historiographical debates over 1948 and questions of archival access. It examines how accounts of Israel’s birth and Palestinian statelessness have been crafted in relation to the underlying question: who has permission to narrate the past?
  • Topic: Security, Migration, Population, Ethnic Cleansing, Settler Colonialism, State Building
  • Political Geography: United States, Israel, Palestine
  • Author: Munir Fakher Eldin
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: In 1967, Israel occupied the western section of Syria’s Golan Heights, expelling some 130,000 of its inhabitants and leaving a few thousand people scattered across five villages. Severed from Syria, this residual and mostly Druze community, known as the Jawlanis, has been subjected to systematic policies of ethno-religious identity reformulation and bureaucratic and economic control by the Israeli regime for half a century. This essay offers an account of the transformation of authority, class, and the politics of representation among what is now the near 25,000-strong Jawlani community, detailing the impact of Israeli occupation both politically and economically. During an initial decade and a half of direct military rule, Israel secured the community’s political docility by restoring traditional leaders to power; but following full-on annexation in 1981, new forces emerged from the popular resistance movement that developed in response. Those forces continue to compete for social influence and representation today.
  • Topic: Security, Defense Policy, National Security, Population, Occupation, Ethnic Cleansing, Settler Colonialism
  • Political Geography: United States, Israel, Palestine
  • Author: Elizabeth N. Saunders
  • Publication Date: 10-2019
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: When and how do domestic politics influence a state's nuclear choices? Recent scholarship on nuclear security develops many domestic-political explanations for different nuclear decisions. These explanations are partly the result of two welcome trends: first, scholars have expanded the nuclear timeline, examining state behavior before and after nuclear proliferation; and second, scholars have moved beyond blunt distinctions between democracies and autocracies to more fine-grained understandings of domestic constraints. But without linkages between them, new domestic-political findings could be dismissed as a laundry list of factors that do not explain significant variation in nuclear decisions. This review essay assesses recent research on domestic politics and nuclear security, and develops a framework that illuminates when and how domestic-political mechanisms are likely to affect nuclear choices. In contrast to most previous domestic arguments, many of the newer domestic-political mechanisms posited in the literature are in some way top-down; that is, they show leaders deliberately maintaining or loosening control over nuclear choices. Two dimensions govern the extent and nature of domestic-political influence on nuclear choices: the degree of threat uncertainty and the costs and benefits to leaders of expanding the circle of domestic actors involved in a nuclear decision. The framework developed in this review essay helps make sense of several cases explored in the recent nuclear security literature. It also has implications for understanding when and how domestic-political arguments might diverge from the predictions of security-based analyses.
  • Topic: Security, Arms Control and Proliferation, Nuclear Weapons, Treaties and Agreements, International Security, Domestic politics, Nonproliferation
  • Political Geography: Russia, United States, China, Iran, North Korea
  • Author: Marina Henke
  • Publication Date: 04-2019
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Many countries serving in multilateral military coalitions are “paid” to do so, either in cash or in concessions relating to other international issues. An examination of hundreds of declassified archival sources as well as elite interviews relating to the Korean War, the Vietnam War, the Gulf War, the Iraq War, the North Atlantic Treaty Organization operation in Afghanistan, the United Nations–African Union operation in Darfur, and the African Union operation in Somalia reveals that these payment practices follow a systematic pattern: pivotal states provide the means to cover such payments. These states reason that rewarding third parties to serve in multilateral coalitions holds important political benefits. Moreover, two distinct types of payment schemes exist: deployment subsidies and political side deals. Three types of states are most likely to receive such payments: (1) states that are inadequately resourced to deploy; (2) states that are perceived by the pivotal states as critical contributors to the coalition endeavor; and (3) opportunistic states that perceive a coalition deployment as an opportunity to negotiate a quid pro quo. These findings provide a novel perspective on what international burden sharing looks like in practice. Moreover, they raise important questions about the efficiency and effectiveness of such payment practices in multilateral military deployments.
  • Topic: Security, National Security, Regional Cooperation, International Security, Military Strategy, Military Affairs, Alliance
  • Political Geography: United States, Iraq, Kuwait, Vietnam, Korea, Somalia
  • Author: Linus Hagström, Magnus Hagström
  • Publication Date: 12-2019
  • Content Type: Journal Article
  • Journal: The International Spectator
  • Institution: Istituto Affari Internazionali
  • Abstract: Periods of mutual enmity in US-North Korean relations are typically interrupted by more conciliatory gestures. How can the many twists and turns in this relationship be explained and hopefully overcome so that more long-lasting détente is accomplished? Drawing eclectically on realism and constructivism, we conclude that a nuclear deal should address not only North Korea’s interests in security and regime survival, but also its status concerns. Applying the same theories to the other part of the dyad – the US – we conclude that it may now have material interests in ameliorating the relationship, but that such a development requires US foreign policy discourse to cease depicting North Korea as “irrational” and “evil”.
  • Topic: Security, Nuclear Weapons, Realism, Constructivism
  • Political Geography: Asia, North Korea, North America, United States of America
  • Author: Assem Dandashly, Gergana Noutcheva
  • Publication Date: 03-2019
  • Content Type: Journal Article
  • Journal: The International Spectator
  • Institution: Istituto Affari Internazionali
  • Abstract: The European Union’s (EU) impact on the political governance of the European neighbourhood is varied and sometimes opposite to the declared objectives of its democracy support policies. The democracy promotion literature has to a large extent neglected the unintended consequences of EU democracy support in Eastern Europe and the Middle East and North Africa. The EU has left multiple imprints on the political trajectories of the countries in the neighbourhood and yet the dominant explanation, highlighting the EU’s security and economic interests in the two regions,cannot fully account for the unintended consequences of its policies. The literature on the ‘pathologies’ of international organisations offers an explanation, emphasizing the failures of the EU bureaucracy to anticipate, prevent or reverse the undesired effects of its democracy support in the neighbourhood.
  • Topic: Security, Foreign Policy, Democracy, Economy, Bureaucracy
  • Political Geography: Europe, Middle East, Eastern Europe, North Africa, European Union
  • Author: Samuel Bendett
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Following the end of the Cold War, the Russian Federation lagged behind the United States in terms of advanced technology in warfighting. However, after substantial spending on modernization starting in 2008, the Russian military and the nation’s defense sector have been making great strides at developing remotely operated and autonomous technologies and integrating them in their tactics and combat operations. Russia is also starting to invest in Artificial Intelligence (AI) development with specific military applications. These developments affect the ability of the United States to meet the goals in its new National Security Strategy; in order to meet its stated December 2017 objective of renewing American competitive advantage in key military areas, the United States should be aware of key adversarial developments such as Russia’s emerging unmanned, autonomous, and AI capabilities, and prepare itself in terms of appropriate capabilities, tactics, and plans...
  • Topic: Security, Science and Technology, Military Affairs, Military Spending, Artificial Intelligence
  • Political Geography: Russia, Eurasia, United States of America
  • Author: Heather Williams
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Dr. Heather Williams is a lecturer in the Defence Studies Department and Centre for Science and Security Studies at King’s College London. She also does research for the Institute for Defense Analyses on Strategy, Forces, and Resources, and previously was a Research Fellow at Chatham House. Williams received her doctorate from King’s College London for her dissertation on U.S.-Russia arms control from 1968-2010.
  • Topic: Security, Arms Control and Proliferation, Science and Technology, Weapons , Interview
  • Political Geography: Russia, Eurasia, North America, United States of America
  • Author: Christine Sixta Rinehart
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: The United States has been using Remotely Piloted Aircraft (RPA) to assassinate terrorist targets since its first RPA strike on November 3, 2002, when a U.S. Predator fired a hellfire missile at a car traveling through the Mar’ib province of Yemen. The intelligence cycle of this targeted killing process is murky at best, and the policy has changed throughout the successive administrations of U.S. presidents. Details exist but there is no defined tangible chain of analysis concerning the selection of the target, the monitoring of the target, and finally, the assassination of the target. This paper attempts to elucidate the intelligence chain of analysis concerning American targeted killing and examine how the intelligence cycle of targeted killing varies through successive presidential administrations. ​ This paper will begin with a short analysis of relevant literature, although sources concerning this topic are scarce. The occurrence of targeted killings of U.S. citizens will also be explained in the literature section. The paper will continue with an elaboration of a generic intelligence cycle model, which will be used to illustrate the intelligence cycle of U.S. targeted killings using both the Reaper and the Predator RPA.[1] The paper will then address differences in the intelligence cycles and processes that have occurred between successive presidents since targeted killing first began in 2002 with President George W. Bush. Lastly, the paper will provide policy prescriptions in reference to improving targeted killing in the Middle East and Africa...
  • Topic: Security, Intelligence, Drones, Targeted Killing
  • Political Geography: Africa, Middle East, North America, United States of America
  • Author: Prakash Menon
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Technology often seduces potential adversaries through a promise of relief from security threats only to deceive through the inevitable action-reaction cycle. In the universe of security, technology is contestable both by technology itself and by doctrinal prescriptions and operational countermeasures. The advantage provided by new technology is mostly ephemeral in that provides the momentum for an endless cycle that is best described as chasing one’s own tail. Only political intervention through mutual understanding, doctrinal prudence, and regulating the search for operational supremacy holds potential to escape the stranglehold of the action-reaction cycle. The elusive search for Ballistic Missile Defense (BMD) is a prime example. This paper seeks to interrogate the role of the technology-security dynamics in the context of the Sino-Indian nuclear weapon relationship. ​ The context of the Sino-Indian nuclear weapon relationship is clouded by the enhancing reach of India’s missiles[1], the evolving Chinese reaction to U.S. nuclear modernization accompanied by a shift in nuclear posture, and a shared belief in the role of nuclear weapons that is signified by No First Use (NFU) doctrine. The latter point represents political intervention while the two former signify the action-reaction cycle which is primarily a product of technology. However, both China and India must contend with nuclear powers that espouse First Use. China in dealing with the United States and Russia who are quantitatively superior nuclear powers, while India deals with Pakistan whose claims of quantitative superiority are contested. ​ In technological terms, the rise of China and the U.S. reaction resulting in contemporary geopolitical flux at the global level has impacted the evolution of China’s nuclear arsenal. The most prominent illustration of this is China’s reaction to the United States’ withdrawal from the Ballistic Missile Defense Treaty. Earlier China had eschewed development of BMD, but the United States’ quest to create BMD has caused China to attempt to develop its own BMD system as well as systems that can overcome BMD like multiple independently targetable reentry vehicles (MIRVs) and Hyper Glide Vehicles (HGVs). Similarly, India has reacted to developments in China and Pakistan by launching an indigenous BMD development program...
  • Topic: Security, Nuclear Weapons, Bilateral Relations, Weapons
  • Political Geography: Pakistan, China, South Asia, India, Asia
  • Author: Filippa Lentzos
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: International treaties prohibit the development and use of biological weapons. Yet concerns about these weapons have endured and are now escalating. It is high time to take a hard look at technical and political developments and consider how the international security policy community should respond. ​ A major source of the growing concern about future bioweapons threats stem from scientific and technical advances. Innovations in biotechnology are expanding the toolbox to modify genes and organisms at a staggering pace, making it easier to produce increasingly dangerous pathogens. Disease-causing organisms can now be modified to increase their virulence, expand their host range, increase their transmissibility, or enhance their resistance to therapeutic interventions.[1] Scientific advances are also making it theoretically possible to create entirely novel biological weapons,[2] by synthetically creating known or extinct pathogens or entirely new pathogens.[3] Scientists could potentially enlarge the target of bioweapons from the immune system to the nervous system,[4] genome, or microbiome,[5] or they could weaponize ‘gene drives’ that would rapidly and cheaply spread harmful genes through animal and plant populations.[6] ​ Concurrent developments in other emerging technologies are also impacting potential future biological weapons threats. Developments in artificial intelligence and machine learning could speed up identification of harmful genes or DNA sequences. Artificial intelligence and machine learning could also potentially enable much more targeted biological weapons that would harm specific individuals or groups of individuals based on their genes, prior exposure to vaccines, or known vulnerabilities in their immune system.[7] Big Data and ‘cloud labs’ (completely robotized laboratories for hire) facilitate this process by enabling massively scaled-up experimentation and testing, significantly shortening ‘design-test-build’ timeframes and improving the likelihood of obtaining specificity or producing desired biological functionality.[8] Other developments provide new or easier ways to deliver pathogens or biological systems. Nanotechnology could potentially create aerosolized nanobots dispersing lethal synthetic microbes or chem-bio hybrids through the air,[9] or in vivo nanobots releasing damaging payloads inside human bodies.[10] Aerosol or spraying devices attached to swarms of small unmanned aerial vehicles, or drones, could be another potential means to disperse biological agents. Additive manufacturing, or 3D printing, could circumvent barriers imposed by national export control systems on controlled laboratory equipment or dispersal devices. ​
  • Topic: Security, Health, Science and Technology, Treaties and Agreements, Biosecurity, Weapons
  • Political Geography: Global Focus
  • Author: Kristi Govella
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: For most of history, the domains of the global commons were unclaimed, largely because the technology to access and utilize them did not exist.[1] In areas such as the high seas and outer space, it was impossible for states to establish and maintain sovereign control. Even as the relevant technologies developed, costliness and controls kept them initially concentrated largely in the hands of just a few major powers such as the Unit- ed States and the Soviet Union. For the United States, “command of the commons” became the military foundation of its hegemony, granting it the ability to access much of the planet and to credibly threaten to deny the use of such spaces to others.[2] Bipolar competition between the United States and the Soviet Union strongly influenced developments in the maritime and outer space domains. In the case of cyberspace, a more recent addition to the traditional global commons, the United States was also initially dominant due to its role in pioneering associated technologies. However, over time and particularly since the end of the Cold War, continuing technological innovation and diffusion have made these domains accessible to a growing number of countries. ​ This technological progress was born of both cooperation and competition between states. While some states chose to develop certain technologies indigenously, many acquired knowledge and equipment from abroad. Globalization of industry has made it easier for states to obtain a variety of foreign technologies, even lowering the threshold for them to procure disruptive military capabilities. In addition, over the last two decades, American primacy has been increasingly challenged by the rise of China, which has impacted the dynamics of technological development and diffusion across multiple domains. As China has acquired the technology to become more active in the commons, it has prompted major regional powers, such as Japan and India, to accelerate their own technological advancement, and other mid-sized and smaller countries have also become increasingly engaged.[3] ​ The consequence of this multiplication of technologically sophisticated actors has been the erosion of American primacy in the global commons. Although the United States still remains the most dominant player, it is faced with a more densely populated field, and management of these spaces has become more difficult. This article examines this trend in the high seas, outer space, and cyberspace since the end of the Cold War, with attention to the ways in which the rise of China and the relative decline of the United States have catalyzed greater engagement with the commons, particularly among the countries in Asia that find themselves most affected by this power transition. I argue that advances in and diffusion of technology have transformed the global commons into increasingly crowded domains characterized by interstate competition and heightened tensions. Whether these tensions prevail depends on the creation and strengthening of regimes to manage interactions and promote shared rules and norms...
  • Topic: International Relations, Security, Globalization, Science and Technology
  • Political Geography: China, Global Focus, United States of America
  • Author: Sharon Bradford Franklin
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In 2017, leaders of the U.S. Intelligence Community warned that “more than 30 nations are developing offensive cyberattack capabilities.”1 This means that more than 30 countries may be conducting hacking operations as a method for surveillance, disruption, or destruction. Unregulated cyber surveillance and cyberattacks by government actors can pose risks not only to a government’s foreign adversaries, but also to its own citizens. Thus, as the United States and other nations work to enhance their own offensive cyber capabilities, as well as to develop strategies to defend against potential attacks, it is critical that these countries establish legal regimes to govern such conduct in cyberspace. Although Germany has established a legal framework to regulate government hacking activities,[2] few countries have done so.[3] ​ To bring government hacking operations within the rule of law, a crucial step is to design rules regarding the management of vulnerabilities that governments discover or acquire. As with other cyber actors, when governments conduct hacking operations, this frequently involves exploiting vulnerabilities in computer hardware and software systems. But these same flaws can also be manipulated by a government’s foreign adversaries or other malicious actors. Therefore, when countries consider their abilities to rely on hacking as an investigative tool, as well as their interests in exploiting vulnerabilities for military and intelligence operations, they must also evaluate the capacity of information and communications technology providers to repair bugs and protect the cybersecurity of all users. Determining whether to exploit a vulnerability or disclose it to a vendor for patching involves balancing a variety of different security concerns against each other. ​ Some countries have made progress in formalizing the rules for making these decisions and in publicizing these rules to promote public accountability. In November 2017, the United States released a charter governing its Vulnerabilities Equities Process (VEP), which outlines how the U.S. government weighs the various competing equities.[4] The charter delineates which components of the government will participate in determinations regarding whether to disclose or retain each newly discovered vulnerability, and it sets forth the criteria to be used and the process to be followed in making such assessments. One year later, the United Kingdom (UK) announced its Equities Process, which follows a similar approach.5 Most recently, in March 2019, Australia released its “Responsible Release Principles for Cyber Security Vulnerabilities,”[6] and Germany is currently working to develop a VEP and is expected to make information about its process public in early 2019.[7] However, as described below, the VEP procedures revealed to date need further improvement,[8] and most of the nations with offensive cyber capabilities have not developed—or at least have not announced—any such framework...
  • Topic: Security, Intelligence, Science and Technology, Cybersecurity
  • Political Geography: North America, United States of America
  • Author: Paul Rosenzweig
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Benjamin Franklin is famous, in part, for having said, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” Though historical evidence suggests Franklin’s quote has been misinterpreted,[1] the aphorism has come to stand for the proposition that privacy and security stand in opposition to each other, where every increase in security likely results in a commensurate decrease in privacy, and vice versa. ​ Couched in those terms, the privacy/security trade-off is a grim prospect. We naturally want both privacy and security to the greatest extent possible. But Franklin tells us this is impossible — that privacy and security are locked in a zero-sum game where the gain of one comes only at the loss of the other. ​ Of course, this characterization is assuredly flawed; it is certainly possible to adopt systems that maximize both privacy and security in a Pareto optimal way. That is one of the reasons why so many privacy and security experts simply revile the “balancing” metaphor — it obscures more than it illuminates... ​
  • Topic: Security, Science and Technology, Cybersecurity, Privacy
  • Political Geography: Global Focus, United States of America
  • Author: Nina Jankowicz
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Nina Jankowicz is writing a book on the evolution of Russian influence campaigns in Eastern Europe. She has previously worked advising the Ukranian government on communication and managed democracy assistance programs for Russia and Belarus. She is currently a Global Fellow at the Woodrow Wilson International Center for Scholars’ Kennan Institute and has previously served as a Fulbright-Clinton Public Policy Fellow.
  • Topic: Security, Territorial Disputes, Geopolitics
  • Political Geography: Russia, Ukraine, Eastern Europe
  • Author: David Sanger, Travis Frederick
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In The Perfect Weapon, David Sanger argues that the nature of global power itself is undergoing dramatic changes, brought about by the proliferation of highly advanced cyber capabilities. Today, internet access is nearly ubiquitous, the cost of entry is low, and, particularly in the domain of cyberwarfare, there is one fundamental fact: offensive capabilities have critically outpaced cyber defenses. A weak and impoverished nation like North Korea can hold large swaths of public and private infrastructure in America at risk, steal military OpPlans, and pilfer millions of dollars from foreign banks. A Kremlin reeling from sanctions, low oil prices, and historically low public trust is able to threaten the very foundations of American democracy through targeted social media campaigns and hacking and leaking the emails of a major political party. But while the offensive advantage has given weaker powers greater capacity to pursue their geopolitical objectives, U.S. leadership has found that their response options have not similarly benefitted. America’s offensive cyber prowess so exceeds its own defensive capabilities that officials often hesitate to strike back for fear of establishing norms of retaliation against vulnerable infrastructure or inciting unintended escalation. Sanger argues that without an open public debate among government policy makers, military planners, and academics to coordinate a grand strategy, the United States will be forced to accept a world of constant cyberattacks, limited response options, and the greater risk of capitulating to foreign coercion...
  • Topic: Security, Intelligence, Science and Technology, Cybersecurity, Book Review
  • Political Geography: North America, United States of America
  • Author: Douglas Yeung
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Digital data captured from social media, cell phones, and other online activity has become an invaluable asset for security purposes. Online mapping or cell-phone location information can be used to collect intelligence on population movement, or to provide situational awareness in disasters or violent incidents. Social-media postings may be used to vet potential immigrants and job applicants, or to identify potential recruits who may be likely to join the military. ​ However, breakdowns in relationships between the tech industry and would-be consumers of technology’s handiwork could imperil the ability of security stakeholders to use this data. Ongoing issues have already begun to shape some technologists’ views on the ethical use of artificial intelligence and other technologies in war and conflict and their impact on human rights and civil liberties. It isn’t difficult to imagine a series of future incidents further souring collaboration between technologists and security stakeholders. ​ In contrast to its reluctance over security matters, the tech industry has been a willing partner for government agencies and communities that promote health and wellbeing—topics that present less of an ethical challenge. Although it may not be immediately apparent, wellbeing and security have much in common. Could the security community take a page from wellbeing efforts to improve their collaboration with the tech industry?...
  • Topic: Security, Science and Technology, Business , Surveillance, Private Sector
  • Political Geography: Global Focus, United States of America
  • Author: John Borrie
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: John Borrie is the research coordinate and program lead at the United Nations Institute for Disarmament Research. He’s currently working on continuing and expanding dialogues about disarmament and the impact of nuclear weapons on humanitarian affairs. He previously worked on weapons control for both the International Committee of the Red Cross and as a New Zealand diplomat. Borrie holds a doctorate in philosophy from the University of Bradford.
  • Topic: Security, Nuclear Weapons, Science and Technology, Interview
  • Political Geography: United Nations, Global Focus
  • Author: Lewis Milford, Samantha Donalds
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In the last few years, Washington has been preoccupied with a debate about the security of the nation’s electric grid. The debate is as old as the grid itself: as electrification has come to drive all commerce and government, making it a key element of the country’s national security, what is the best way to protect the grid from terrorist, weather, or cyber-related threats or attacks? ​ As with most things of a political nature, where you stand depends on where you sit. ​ Proponents of coal, oil, and nuclear make the argument that traditional large-scale power plants are not only vital to grid stability, but also that this centralized generation model is the only economically or techno- logically feasible option.[1] It’s an old argument wrapped in new national security rhetoric, and it’s increasingly straining against the facts. More and more analysis and real-life examples show that distributed renewable energy, combined with energy storage technologies, can provide reliable power more affordably and reliably than the centralized generation alternatives...
  • Topic: Security, Energy Policy, Infrastructure, Electricity
  • Political Geography: North America, United States of America
  • Author: Leo Lin
  • Publication Date: 11-2019
  • Content Type: Journal Article
  • Journal: China Brief
  • Institution: The Jamestown Foundation
  • Abstract: Kazakhstan President Kassym-Jomart Tokayev’s recent visit to the People’s Republic of China (PRC) on September 10-12 was not merely a state visit, but also signaled a new era in bilateral relations between Kazakhstan and China. During his visit, Tokayev met top officials of the Chinese Communist Party (CCP), including CCP General Secretary Xi Jinping, Premier Li Keqiang, and Li Zhanshu, the Chairman of the Standing Committee of the National People’s Congress. Tokayev also stopped in Hangzhou, where he visited the headquarters of the Alibaba Group and spoke with founder Jack Ma, as well as the new chairman and CEO Daniel Zhang (Sina Tech, September 12). The September visit has symbolic meaning for both Xi and Tokayev as they prepare for a new stage of their partnership—in the same year as the 70th anniversary of the founding of the PRC, and the 30th anniversary of Kazakhstan’s independence.
  • Topic: Security, International Trade and Finance, Science and Technology, Treaties and Agreements, Bilateral Relations
  • Political Geography: Russia, China, Central Asia, Kazakhstan
  • Author: John Foulkes, Howard Wang
  • Publication Date: 08-2019
  • Content Type: Journal Article
  • Journal: China Brief
  • Institution: The Jamestown Foundation
  • Abstract: Recent media reports have indicated that Cambodia signed a “secret agreement” giving the PRC use of Ream, where it may station military servicemen and warships, for 30 years (WSJ, July 22). Although Cambodian and Chinese officials vehemently deny the existence of this agreement, gaining access to Ream is broadly consistent with Chinese foreign policy. The PRC appears to be employing Belt and Road Initiative (BRI) funding to further strategic cooperation with Cambodia through the construction of potential dual-use infrastructure. Ream naval base is the latest in a network of regional security projects—including Cambodia’s Dara Sakor investment zone and Thailand’s Kra Canal—which, taken together, significantly improve Chinese power projection into the Indian Ocean Region (IOR). News of the Ream agreement raises the specter of increasing Chinese maritime militarization at a time of intense unease in Southeast Asia. Conspicuously silent in this latest controversy is India, which has significant economic and military interests in Southeast Asia. This article will discuss the security infrastructure China is building in Cambodia and its implications for Indian interests in the region.
  • Topic: Security, Military Strategy, Military Affairs, Navy
  • Political Geography: China, Indonesia, India, Asia, Cambodia, Southeast Asia
  • Author: Sudha Ramachandran
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: China Brief
  • Institution: The Jamestown Foundation
  • Abstract: On May 30, Narendra Modi was sworn in for a second term as India’s Prime Minister. Conspicuous by their absence at the inauguration ceremony were Imran Khan, the Prime Minister of Pakistan; Lobsang Sangay, President of the Central Tibetan Authority (CTA), more commonly known as the Tibetan government-in-exile; and Tien Chung-Kwang, Taiwan’s trade representative to India. While Khan was not invited on account of the serious deterioration in India-Pakistan relations since early this year, the absence of Sangay and Tien can be attributed to the Modi government adopting a more cautious approach to China in its second term. Modi’s administration seems keen to avoid needling the People’s Republic of China (PRC), especially at a time when Sino-Indian relations are improving (Deccan Herald, May 29). This caution on the part of India notwithstanding, Sino-Indian relations during Modi’s second term (scheduled to run through May 2024) are unlikely to be tension-free.
  • Topic: Security, Regional Cooperation, Bilateral Relations, Territorial Disputes
  • Political Geography: China, India, Asia, Tibet
  • Author: P. Whitney Lackenbauer
  • Publication Date: 02-2019
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: This article critically interrogates the assumptions and critiques levelled at the Canadian Rangers by two ardent media critics: Robert Smol and Scott Gilmore. Situating the Canadian Rangers in the Canadian Armed Forces’ Arctic Operational Picture, it argues that the Rangers are an appropriate and operationally valued component of a Canadian military posture designed to address Northern risks across the defence-security-safety mission spectrum. Rather than seeing the Rangers as a sideline to the “serious” military show that Smol and Gilmore would like to see play out in the North, their proven ability to operate in difficult and austere environmental conditions – often reflecting applied Indigenous knowledge of their homelands – and to maintain interoperability with mission partners to address practical security challenges is highly valuable. By serving as the “Eyes, Ears, and Voice” of the CAF in their communities, the Rangers embody federal approaches to collaboration and partnership predicated on ideas that Northerners are best placed to make decisions in areas that impact them.
  • Topic: Security, Defense Policy, Military Affairs, Indigenous
  • Political Geography: Canada, North America, Arctic
  • Author: Rizwan Naseer, Musarat Amin
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: The danger of nuclear terrorism has heightened significantly in the recent years largely because of the transnational terrorist networks and their unrelenting efforts to acquire nuclear technology. The menace of nuclear terrorism is alarming and should be calculated as credible source of emerging trends in terrorism. No incident of nuclear terrorism happened yet but terrorist groups are struggling to steal fissile materials, nuclear technology or insiders‟ support to either procure a crude weapon or steal one. International community is concerned with such foreseeable scenario. This research attempts to make a realistic calculation of the hazards of nuclear terrorism. First part of the paper underlines hype of nuclear terrorism and the risks it poses. It also signifies magnitude of reality involving nuclear terrorism. Second part of the paper underscores the response to international media that is frenzy about risk of nuclear terrorism in Pakistan. It also highlights the safety and security measures that Pakistan has adopted under the guidelines of IAEA and Nuclear Security Summits. This paper concludes with the argument that over the years Pakistan has remained relatively open about sharing information regarding how it is making advancements in its command and control system to ward off any risks of nuclear terrorism and has been successful in achieving better levels of security.
  • Topic: Security, Nuclear Weapons, Terrorism, Military Affairs, Nuclear Power
  • Political Geography: Pakistan, South Asia
  • Author: Marium Kamal
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: This era is witnessing rising India as a major power in the regional and global affairs. Since 9/11 India is strategically involved in Afghanistan in order to attain her broader agenda and realists‟ ends. India is pursuing her security, political, economic and social objectives in Afghanistan to strengthen her regional hegemonic influence under her smart power. This paper is exploring Indian hegemonic design and the level of Indian concentration and influence in Afghanistan via social means; it also gives comprehensive details about Indian objectives and activities, and what implications are drawn for Pakistan.
  • Topic: Security, International Trade and Finance, Power Politics, Hegemony, Strategic Encirclement
  • Political Geography: Pakistan, Afghanistan, South Asia, India, Punjab
  • Author: Maryam Azam
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: The rise of sectarian groups in Pakistan has sprouted many internal challenges for the state as well as for the society. The issue of sectarianism is directly linked with the security and harmony of Pakistani society as it has culminated into a grave internal security challenge causing violence and loss of human life. The institutionalization of these groups and their role in the political landscape of Pakistan reflects their complicated nature, objectives and the overall discourse on which these groups are built. Despite the fact that government in various time periods have banned these sectarian militant groups but they were able to operate in shadows or under the banner of different names and roles. This piece of research aims to explicate their multidimensional roles and their capacity to operate and affect the security paradox as well as society as a whole
  • Topic: Security, Islam, Religion, Sectarianism, Sectarian violence, Violent Extremism
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Nazir Hussain, Amna Javed
  • Publication Date: 01-2019
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: South Asia is an important but complex region. Its manifold complexity is largely ascribed through historical, economic, political and strategic manifestations. The region has witnessed instability in all the given premises and interactions. The entirety happens to be the fact that the structure of alignments is motivated by security complexes which involve cohesion of foreign powers and regional states. The US, Russia, Iran and China now make out to be contemporary stakeholders in South Asian security equation. Their involvement has been seen as a major reorientation in the regional dynamics in terms of political, economic and security characteristics. The manifold possibilities of re-alignments are what the future of the region will look like. The chance of full-fledged strategic alliance in the face of US-India on the basis of similar political, economic and security interests is on the horizon. As a corollary to this alliance pattern, there is China-Russia-Pakistan alliance which is similar in force but opposite in direction. These two systems are one set of opposition forces to each other, which are also natural in form. Another structure which occurs out of the regional dynamics happens to be of India-Iran-Afghanistan which is a trifecta aiming at Pakistan. On the other hand, Russia-China-Pakistan which could turn into a politically motivated and economically driven alliance and can also cover certain aspects of security. Therefore, due to various changes in order there will stem out various patterns of relationships, which could set the order of the region as one marked by various fluctuating alignment patterns.
  • Topic: Security, Economics, Power Politics, Geopolitics, Realignment
  • Political Geography: Pakistan, Afghanistan, Russia, China, South Asia, North America, Punjab, United States of America
  • Author: Ahmad Ejaz
  • Publication Date: 01-2019
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: South Asia has always been regarded as a significant area for the security interests of the United States. In view of the U.S. threat perceptions in Asia, the American policy makers were constantly motivated to construct a stable security system in the region. The U.S. security programme in South Asia actually is predominantly exerted on United States-Pakistan –India triangular relationship. Given its strategic perspective in the area, the U.S. policy is found transferred. During the Cold War days, the U.S. interests were attached with Pakistan. Thus Pakistan was regarded as the „America‟s most allied ally in Asia.‟ With the end of Cold War, the U.S. policy underwent a tremendous change that subsequently picked India as a potential counterweight to China and called it a „natural partner.‟ Eventually, the U.S.-Pakistan relations had been in a depressing setting. However, in the post 9/11 period, the two countries came closer and collaborated in war against terrorism. But this single-issue alliance could not engulf the differences between the partners. This paper attempts to trace the US security policy and its maneuvering in South Asia during and after the Cold War periods.
  • Topic: Security, Defense Policy, Cold War, International Cooperation, International Security, History, Military Strategy, Bilateral Relations
  • Political Geography: Pakistan, Afghanistan, China, South Asia, North America, Punjab, United States of America
  • Author: Robert E. Gribbin
  • Publication Date: 05-2019
  • Content Type: Journal Article
  • Journal: American Diplomacy
  • Institution: American Diplomacy
  • Abstract: Twenty-five years ago, in April 1994, the havoc of genocide visited Rwanda. In a three-month-long paroxysm of violence, almost a million souls died. The country was devastated, the remaining population cowed, government non-existent, and the economy in shambles. Twenty-five years ago, in April 1994, the havoc of genocide visited Rwanda. In a three-month-long paroxysm of violence, almost a million souls died. The country was devastated, the remaining population cowed, government non-existent, and the economy in shambles.
  • Topic: Security, Diplomacy, Ethnic Conflict, Genocide, Politics, History, Peacekeeping, Refugees, Memory
  • Political Geography: Uganda, Africa, Tanzania, North America, Rwanda, Burundi, Central African Republic, United States of America, Zaire
  • Author: Deniz Çıtak
  • Publication Date: 01-2018
  • Content Type: Journal Article
  • Journal: Harvard Journal of Middle Eastern Politics and Policy
  • Institution: The John F. Kennedy School of Government at Harvard University
  • Abstract: On January 20, 2018 at 17:00 local time, the Turkish Armed Forces (TSK) entered Afrin, a city in northern Syria. Turkish President Recep Tayyip Erdoğan named the military operation “Operation Olive Branch” (Zeytin Dalı Harekâtı) for the region’s many olive trees. According to Turkey, the operation does not violate international law because the operation was against the PYD and YPG as an act of self-defense, aiming to guarantee the security of Turkey’s borders. For Turkey, the links between the PKK and Syrian Kurdish groups classify Kurdish activity in northern Syria as a threat to Turkey’s domestic security.
  • Topic: Security, Foreign Policy, Military Intervention, Conflict, Syrian War, Kurds
  • Political Geography: Turkey, Middle East, Syria
  • Author: Sherri Goodman, Eli Stiefel
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Sherri Goodman is an experienced leader and senior executive, lawyer and director in the fields of national security, energy, science, oceans and environment. She is a Senior Fellow at the Woodrow Wilson International Center and CNA (Center for Naval Analyses), and a Senior Advisor for International Security at the Center for Climate and Security. At CNA, Goodman also served as Senior Vice President and General Counsel and was the founder and Executive Director of the CNA Military Advisory Board, whose landmark reports include National Security and the Threat of Climate Change (2007), and National Security and the Accelerating Risks of Climate Change (2014), Advanced Energy and US National Security (2017), and The Role of Water Stress in Instability and Conflict (2017), among others. Previously, she served as the President and CEO of the Consortium for Ocean Leadership. From 1993-2001, Goodman served as the first Deputy Undersecretary of Defense (Environmental Security).
  • Topic: Security, Climate Change, Energy Policy, Environment, Geopolitics
  • Political Geography: Global Focus, United States of America
  • Author: Ellen Scholl
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: The European Union (EU) has increasingly interconnected energy and climate policy, with the formulation of the Energy Union as one notable — if yet incomplete — step in this direction. In addition to the linkages between energy policy and efforts to reduce greenhouse gas emissions to meet climate goals under the Paris Agreement, the EU has been increasingly vocal about the link between climate and security, and under- taken (at least rhetorical) efforts to incorporate climate security concerns into broader externally focused policy areas. ​ This shift toward a focus on climate security, however, raises questions of how energy security and climate security relate, the impact of the former on the latter, and how the Energy Union fits into this shift, as well as how the EU characterizes climate risk and how this relates to geopolitical risks in its broader neighborhood. It also begs the question of how to go beyond identifying and conceptualizing the security risks posed by climate change to addressing them. ​ This paper charts changes in the EU’s energy and climate security discourse, focusing on their intersection in the Energy Union and the EU’s promotion of the energy transition to lower carbon forms of energy, and the relevant risks in the European neighborhood. The paper concludes that while the EU has evolved to include climate priorities and climate risks into foreign and security policy thinking, the complicated relation- ship between climate change and security complicates efforts to operationalize this in the EU, in relations with the broader European neighborhood, and beyond...
  • Topic: Security, Climate Change, Energy Policy, Regional Cooperation
  • Political Geography: Europe, Global Focus, European Union
  • Author: Igor Istomin, Akshobh Giridharadas
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Igor A. Istomin is a Senior Lecturer at the Department of Applied Analysis of International Issues at MGIMO University. He holds Ph.D. and M.A. degrees from MGIMO University as well as an undergraduate degree from Saint Petersburg State University. Istomin teaches undergraduate and graduate classes in methods of applied analysis of international affairs. He is an executive editor at International Trends, a leading Russian academic journal. He is also a visiting fellow at the School of International and Public Affairs at Jilin University in China. Istomin is the author of more than 50 publications on U.S. foreign policy, relations in the Euro-Atlantic space, and international security. His most recent book is The Logic of State Behavior in International Politics (2017). He has also prepared policy reports and papers for the Russian International Affairs Council, the Valdai Discussion Club, the Center for Strategic Research in Moscow, and the European Leadership Network.
  • Topic: Security, Foreign Policy, Cold War, Bilateral Relations
  • Political Geography: Russia, Eurasia, North America, United States of America
  • Author: Thomas Greminger, Ryan Rogers
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Ambassador Thomas Greminger was appointed Secretary General of the OSCE on 18 July 2017 for a three- year term. Ambassador Greminger joined the diplomatic service of the Federal Department of Foreign Affairs (FDFA) in 1990 and has held numerous senior management positions during his career. Prior to his appoint- ment as OSCE Secretary General, he was Deputy Director General of the Swiss Agency for Development and Cooperation, overseeing an annual budget of USD 730 million and 900 staff in Bern and abroad. From 2010 to 2015, Greminger was the Permanent Representative of Switzerland to the OSCE, serving as Chair of the Permanent Council during Switzerland’s 2014 OSCE Chairmanship. Prior to his assignment at the Per- manent Delegation of Switzerland to the OSCE, Greminger was Head of the Federal Department of Foreign Affair’s Human Security Division, Switzerland’s competence centre for peace, human rights, and humanitarian and migration policy. Thomas Greminger holds a PhD in history from the University of Zurich and the rank of Lieutenant Colonel (General Staff) in the Swiss Armed Forces. He has authored a number of publications on military history, conflict management, peacekeeping, development and human rights. His mother tongue is German; he speaks fluent English and French, and has a working knowledge of Portuguese. In 2012, he was awarded the OSCE white ribbon for his long-standing support for gender equality.
  • Topic: International Relations, Security, Regional Cooperation, Territorial Disputes
  • Political Geography: Europe, Ukraine, European Union
  • Author: Robert Hutchings
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: We begin with a puzzle: the need for strategic analysis is more important than ever in this period of great flux and uncertainty, but the disdain for analysis of any kind has never been greater than under the administration of President Donald J. Trump. The very premise that leaders need reasonably objective intelligence analysis to inform their policy decisions – a premise that has guided every U.S. administration since World War II – is under assault. If we are to rebuild our capacity for strategic thinking, we need to go back to the beginning. When President Harry Truman created the strategic intelligence function at the end of World War II, he understood that the United States had been thrust into a global role for which it was not prepared. The world was simply too complex, and American interests too extensive, to operate on the basis of impulse or ad hoc decision making. Moreover, when Truman issued National Intelligence Authority No. 5 on July 8, 1946, instructing the Director of Central Intelligence to “accomplish the evaluation and dissemination of strategic intelligence,” he deliberately set up this function outside of the White House, the Department of State, and the military, so that strategic analysis would be kept at a critical distance from policy making. Yet Truman, like every president since, was ambivalent about the role of strategic intelligence and the degree of autonomy it ought to have. ​ The story actually begins earlier, when President Franklin Roosevelt, in a military order of June 13, 1942, formally established the Office of Strategic Services with William J. “Wild Bill” Donovan at its head, and directed it to “collect and analyze... strategic information” and to “plan and operate special services.” The cloak- and-dagger wartime operations of the OSS are the stuff of legend, as are the notable figures recruited to serve, including the poets Archibald MacLeish and Stephen Vincent Benét, the banker Paul Mellon, the psychologist Carl Jung, the philosopher Herbert Marcuse, the anthropologist Margaret Mead, and the movie director John Ford. Less well known is its role in strategic intelligence analysis through its Research and Analysis (R&A) Branch, led initially by James Phinney Baxter III, president of Williams College, and after 1943 by Harvard historian William Langer, identified in war correspondence as “OSS 117.”
  • Topic: Security, Intelligence, History, Military Strategy
  • Political Geography: North America, United States of America
  • Author: Tatiana Shakleina, Ryan Rogers
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Professor Tatiana Shakleina sat down with the Fletcher Security Review in November 2017 in conjunction with the Conference on U.S.-Russia Relations between The Fletcher School and Moscow State Institute of International Relations (MGIMO). In a detailed and engaging conversation that spanned over 25 years of history, Professor Shakleina traced the post-Cold War origins of the current tension between the United States and Russia. While personnel within the Trump Administration have moved on to new positions or left government altogether since the interview, Professor Shakleina’s rich historical overview of post-Cold War U.S.-Russia relations remains extremely relevant in understanding the recent trajectory and current state of the bilateral relationship. ​
  • Topic: Security, Cold War, Government, History, Bilateral Relations, Trump
  • Political Geography: Russia, Eurasia, North America, United States of America
  • Author: Christopher Gibson
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Chris Gibson is a former Republican Congressman from upstate New York, and is currently the Stanley Kaplan Distinguished Visiting Professor of American Foreign Policy at Williams College. Prior to his congressional service, Mr. Gibson had a 24-year career as an Army officer before retiring as a Colonel. His services included tours in the First Gulf War, the Balkans, multiple combat tours in Iraq and a humanitarian tour to Haiti after the 2010 earthquake. His new book Rally Point addresses the current divisions within U.S. politics and the risks we face if they continue to inhibit the U.S. government from fulfilling its necessary functions.
  • Topic: Security, Government, National Security, Interview
  • Political Geography: North America, United States of America
  • Author: Jefferson Morley, Brian O'Keefe
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In his new biography The Ghost: The Secret Life of CIA Spymaster James Jesus Angleton, veteran journalist Jefferson Morley probes an enigma others have chronicled but none satisfactorily explained. Angleton, “a founding father of U.S. mass-surveillance policies,” joined the Agency’s predecessor, the OSS, in its early years and reigned as chief of its Counterintelligence Staff for an extraordinary two decades until his abrupt retirement in 1974.[1] His personal mystique and complicated tenure have given rise to a small but formidable contingent of biographies, novels, and film characters. What Morley adds to the intrigue is a refusal to be seduced by the beguiling charm of his subject, preferring instead to deliberately scrutinize Angleton’s expansive power, ideological intransigence, and lasting influence. ​ Morley’s timeline spans Angleton’s career, though he peppers his narrative with nods to formative experiences at Yale, post-CIA pursuits, and family affairs. The story unfolds chronologically through four tersely titled and equally distributed sections (Poetry, Power, Impunity, Legend), each of which is further demarcated under a dozen or more pithy subheadings (Mole, Oswald, Kim...). Readers might experience the rhythm as too serial for the genre, and while the chronological method is helpful in charting Angleton’s ascent, Morley rarely lingers long enough with a scene to breathe life into its cast. Save a few animated vignettes, the reader is less a participant in the sensory and internal worlds of Morley’s subjects than a recipient of his detective digging, sundry sources, and interpretive reflections... ​
  • Topic: Security, Intelligence, History, Book Review, Surveillance
  • Political Geography: North America, United States of America
  • Author: Ursula Kazarian
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: The independent development of renewable energy resources — and especially solar energy production, in the short term — may present the best opportunity for both intrastate and interstate autonomy in the South Caucasus, and may particularly benefit the Republic of Armenia, whose current energy portfolio is almost entirely supplied, owned, and, until recently, operated by Russia.
  • Topic: International Relations, Security, Climate Change, Energy Policy, Natural Resources
  • Political Geography: Russia, Armenia, South Caucasus
  • Author: Guadalupe Correa-Cabrera
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: The rapid growth of organized crime in Mexico and the government’s response have driven an unprecedented rise in violence and impelled major structural economic changes, including the recent passage of energy reform. My latest book entitled Los Zetas Inc. asserts that these phenomena are a direct and intended result of the emergence of the brutal Zetas criminal organization and the corporate business model they have advanced in Mexico. Because the Zetas share some characteristics with legal transnational businesses that operate in the energy and private security industries, the criminal corporation is compared in the book with ExxonMobil, Halliburton, and Blackwater (renamed “Academi” and now a Constellis company). ​ Combining vivid interview commentary with in-depth analysis of organized crime as a transnational and corporate phenomenon, I propose a new theoretical framework for understanding the emerging face, new structure, and economic implications of organized crime in Mexico. Arguing that the armed conflict between criminal corporations (like the Zetas) and the Mexican state resembles a civil war, I identify the key winners and losers of this episode in Mexico’s most recent history. The groups that seem to have benefited — or will potentially benefit — the most (directly or indirectly) from the novel criminal scheme introduced by the Zetas, the Mexican government’s reaction to it, and the resulting brutality appear to be corporate actors in the energy sector, transnational financial companies, private security firms (including private prison companies), and the United States border-security/military-industrial complex.
  • Topic: Security, Crime, Energy Policy, Drugs
  • Political Geography: North America, Mexico
  • Author: Ishan Khokar, Celeste Wallander
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Celeste Wallander is President and CEO of the U.S.-Russia Foundation. She served as Special Assistant to the President and Senior Director for Russia/Eurasia on the National Security Council (2013-2017), as the Deputy Assistant Secretary of Defense for Russia/Ukraine/Eurasia (2009 to July 2012), professor at American University (2009-2013), visiting professor at Georgetown University (2006-2008), Director for Russia/Eurasia at the Center for Strategic and International Studies (2001-2006), Senior Fellow at the Council on Foreign Relations (2000- 2001), and professor of Government at Harvard (1989-2000). She is the author of over 80 publications on European and Eurasian security issues, focused on Russian foreign and defense strategy. She received her Ph.D. (1990), M.Phil. (1986) and M.A. (1985) degrees from Yale University. She is a member of the Council on Foreign Relations, the Atlantic Council of the United States, and the International Institute for Strategic Studies.
  • Topic: Security, Energy Policy, Bilateral Relations, Interview
  • Political Geography: Russia, Eurasia, North America, United States of America
  • Author: Alice C. Hill
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Human trafficking is a horrendous crime: it degrades human security and undermines the rights of people around the globe. Although the exact number of victims worldwide remains elusive, the extent of human trafficking stands to increase in coming years for several reasons, including the accelerating rate of climate change. A warming world will almost certainly bring more disasters that result in greater displacement of people from their homes and livelihoods. This, in turn, puts them at greater risk of trafficking. Human trafficking is a highly lucrative crime, with few perpetrators successfully prosecuted and transnational criminal and terrorist groups repeatedly using it as a source of revenue. These factors, in combination with worsening climate change impacts will, in all likelihood, yield ever more human trafficking victims. ​ At its core, human trafficking involves forcing another against his or her will to work, perform sex acts, or succumb to debt bondage. Despite its name, the crime does not necessarily involve movement: the key element is coercion. Over 170 nations have signaled their opposition to human trafficking by joining the United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, and virtually all countries have registered official opposition to trafficking in humans. Despite these pronouncements, human trafficking occurs with staggering frequency. While precise estimates of the number of persons trafficked are difficult to obtain, the U.S. Department of State speculated in its 2017 Trafficking in Persons Report that there may be “tens of millions” of victims worldwide.[1] Other international organizations “estimate that about 25 million people are victims” of human trafficking in the world.[2] In all likelihood, those numbers will grow due in part to the increasing effects of climate change...
  • Topic: Security, Climate Change, Crime, Human Trafficking
  • Political Geography: Global Focus, United States of America
  • Author: Julie Wilhelmsen, Maia Brown-Jackson
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Julie Wilhelmsen is a senior research fellow at the Norwegian Institute of International Affairs. She conducts research in the fields of critical security studies, Russian foreign and security policies and the radicalization of Islam in Eurasia. Wilhelmsen has also written about convergence in Russian and Chinese interests in Central Asia and about Russian approaches to the fight against terrorism. She holds a master’s degree in post-Soviet and Russian studies from the London School of Economics and holds a PhD in Political Science at the University of Oslo.
  • Topic: Security, Terrorism, History, Conflict
  • Political Geography: Russia, Eurasia, Soviet Union, Chechnya
  • Author: Derek Mitchell, Maia Brown-Jackson
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Derek Mitchell is senior advisor to the Asia Program at the U.S. Institute of Peace. Ambassador Mitchell was confirmed by the U.S. Senate on June 29, 2012, as the first U.S. ambassador to the Republic of the Union of Myanmar in 22 years. He took up his post in July 2012, and departed March 2016. Ambassador Mitchell has authored numerous books, articles, and opinion pieces on Asian security affairs. He received an M.A. in Law and Diplomacy from the Fletcher School at Tufts University and a B.A. from the University of Virginia.
  • Topic: Security, Human Rights, Ethnicity, Conflict
  • Political Geography: Southeast Asia, Myanmar
  • Author: Frederic Gateretse-Ngoga
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Over the years the African continent has made significant strides in ensuring its voice is heard on the global scene. Despite this progress, Africa is still not perceived as a credible business partner. Although Africa has experienced significant economic growth, it is still considered “jobless” growth. A “youth bulge” is also appearing across the continent, which can be both an asset and a ticking time bomb. Overall, Africa continues to witness diverse threats to its peace and security, ranging from communal, ethno-religious, and pastoralist conflicts to violent extremism, and most recently, the increasing impacts of climate change. Combined, these threats have claimed an enormous number of lives and properties, displaced millions, and destroyed sources of livelihoods all while stunting socio-economic progress. It is critical for the African Union (AU) and its member states to collectively address the root causes and to understand the multidimensionality of security in Africa to avoid further bloodshed. ​ Understanding what breeds instability is essential in preventing the outbreak of violence and conflict. Instability is often caused by four main factors: power contestation, lack of inclusivity, unequal distribution of resources, and impunity. If these root causes are not addressed in a timely manner, instability is inevitable. Over the years, several strategies have been employed at national, regional, and continental levels to address conflicts. We are perplexed by the dynamics of the existing threats, as well as the patterns of the emerging threats. Assessments reveal an increasing inter-relatedness of the existing and emerging threats and predict their escalation if they are not adequately addressed in a timely manner. ​ More often than not, the signs of potential violent conflicts exist, but the corresponding responses are relatively weak or late. This trend has compelled world leaders to advocate for prevention at the earliest stage given the enormous humanitarian, psychological, and socio-economic costs of violence. As such, the imperatives of matching early warning with early response to prevent and or mitigate violent conflicts cannot be overemphasized. However, these strategies should not be implemented separately or haphazardly, but in concerted and coordinated manners to ensure tangible impacts... ​
  • Topic: Conflict Prevention, Security, Political stability, Conflict
  • Political Geography: Africa, African Union
  • Author: Robert Hamilton
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: U.S. Army Colonel Robert E. Hamilton is a Black Sea Fellow at the Foreign Policy Research Institute and is a professor in the Department of National Security and Strategy at the U.S. Army War College. He has served as a strategic war planner and country desk officer at U.S. Central Command, as the Chief of Regional Engage- ment for Combined Forces Command-Afghanistan, and as the Chief of the Office of Defense Cooperation at the U.S. Embassy in Georgia and as the Deputy Chief of the Security Assistance Office at the U.S. Embassy in Pakistan. Colonel Hamilton was a U.S. Army War College fellow at the Center for Strategic and International Studies in Washington, DC, where he authored several articles on the war between Russia and Georgia and the security situation in the former Soviet Union. Colonel Hamilton holds a PhD in International Relations from the University of Virginia. Colonel Robert Hamilton spoke with The Fletcher Security Review in early November 2017 at Fletcher’s Religion, Law and Diplomacy Conference. The following conversation is an excerpt from their extensive interview.
  • Topic: Security, Conflict, Syrian War, Identities, Interview
  • Political Geography: Bosnia, Middle East, Syria, North America, United States of America
  • Author: Evelyn Farkas, Ryan Rogers
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Dr. Evelyn N. Farkas is a nonresident senior fellow at the Atlantic Council, and a national security analyst for NBC/MSNBC. She served from 2012 to 2015 as deputy assistant secretary of defense for Russia/Ukraine/ Eurasia, responsible for policy toward Russia, the Black Sea, Balkans, and Caucasus regions and conventional arms control. From 2010 to 2012 she served as senior adviser to the supreme allied commander Europe and special adviser to the secretary of defense for the NATO Summit. Prior to that, she was a senior fellow at the American Security Project, and executive director of the Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism. From April 2001 to April 2008, she served as a professional staff member of the Senate Armed Services Committee on Asia Pacific, Western Hemisphere, Special Operations Command, peace and stability operations, combatting terrorism, counternarcotics, homeland defense, and export control policy. Dr. Farkas obtained her MA and PhD from The Fletcher School of Law and Diplomacy and is a member of the Council on Foreign Relations. She is a member of the board of trustees of Franklin & Marshall College and Aspen Institute Socrates Seminar, and Harold Rosenthal Fellowship advisory boards. She has received several Department of Defense and foreign awards and an honorary doctorate from Franklin & Marshall College. In January 2018, Dr. Farkas discussed a range of issues concerning Russia and the post-Soviet space with the Fletcher Security Review. The conversation took place in the run-up to the March 2018 presidential elections in Moscow and before President Putin’s highly publicized Presidential Address to the Federal Assembly, in which he unveiled a number of new nuclear weapon systems currently under development by the Russian Federation.
  • Topic: Security, Bilateral Relations, Geopolitics, Grand Strategy
  • Political Geography: Russia, Eurasia, Ukraine, Syria, North America, United States of America
  • Author: Meagan Torello, Rafael Leal-Arcas, Caitlin Werrell, Francesco Femia, Carmel Davis, Ziad Al Achkar, Ang Zhao, Buddhika Jayamaha, Jahara "Franky" Matisek, William Reno, Molly Jahn, Therese Adam, Peter J. Schraeder, Juan Macias-Amoretti, Karim Bejjit
  • Publication Date: 09-2018
  • Content Type: Journal Article
  • Journal: The Whitehead Journal of Diplomacy and International Relations
  • Institution: School of Diplomacy and International Relations, Seton Hall University
  • Abstract: In the first issue of our 20th volume, the cooperative and conflictual nature of climate change in international relations is explored. Rafael Leal-Arcas analyzes the necessity of a symbiotic relationship between bottom-up and top-down negotiations to implement clean energy consumption. Following, Caitlin Werrell and Francesco Femia begin this issue's dialogue on climate change and security. Carmel Davis discusses the effects of climate change on Sub-Saharan Africa's ability to develop and subsequently mitigate conflict. Similarly, Ziad Al Achkar outlines the economic, environmental, and security threats in the Arctic as its ice continues to melt. Zhao Ang then discusses China's ability and incentives to pursuing a greener economy. Following, Buddikha Jayamaha, Jahara Matisek, William Reno, and Molly Jahn discuss the security and development of climate change implications in the Sahel region. The main portion of this issue proudly concludes with the Journal's interview with former Swiss Ambassador Therese Adam on climate change negotiations and the great potential for civil society engagement. Following the climate change portion of this issue, we feature a special sup-topic: Africa Rising. Here, Peter Schraeder discusses the effects of President Donald Trump's foreign policy in Africa. Juan Macías-Amoretti analyzes the role of Islam in Moroccan politics, while Karim Bejjit concludes with a discussion on Morocco's growing relationship with the AU.
  • Topic: Security, Climate Change, Diplomacy, Environment, Islam, Regional Cooperation, Conflict, Donald Trump
  • Political Geography: Africa, China, Europe, Asia, North Africa, Switzerland, Morocco, Sahel, Global Focus
  • Author: Carmel Davis
  • Publication Date: 09-2018
  • Content Type: Journal Article
  • Journal: The Whitehead Journal of Diplomacy and International Relations
  • Institution: School of Diplomacy and International Relations, Seton Hall University
  • Abstract: What are the implications of climate change for security in low-income countries? As global warming approaches and passes 1.5°C, climate change will reduce income, disrupt social relations, and fragment authority. I focus on Sub-Saharan Africa (SSA) because its large agricultural sector is sensitive to climate change and will likely see effects earlier than in other regions. The first section discusses climate change, particularly on the large agricultural sector in SSA. The next two sections analyze two channels by which climate change will affect SSA. First, a survey of quantitative analyses demonstrates a correlation between the level and growth of income and the outbreak of civil wars; climate change will likely decease income in the agricultural sector so the frequency of civil war outbreak will likely increase. Second, climate change will reduce the salience of then-current qualitative strategies of survival and increase the salience of new ones, which will likely increase social disruption and reduce government authority. The last sections discuss adaptation and conclude that a major effect of climate change will be fragmented authority and increased disorder in low-income areas.
  • Topic: Security, Agriculture, Civil War, Climate Change, Conflict
  • Political Geography: Africa
  • Author: Caitlin Werrell, Francesco Femia
  • Publication Date: 09-2018
  • Content Type: Journal Article
  • Journal: The Whitehead Journal of Diplomacy and International Relations
  • Institution: School of Diplomacy and International Relations, Seton Hall University
  • Abstract: The end of the Cold War coincided with the beginning of global awareness about the risks of climate change. This paper analyzes a thirty-year period beginning with the establishment of the Intergovernmental Panel on Climate Change (IPCC) in 1988 and the fall of the Berlin Wall in 1989, and ending in the present year of 2018. This period is characterized by unprecedented social, political, economic and climatic shifts, as well as first-time technological change-including improvements in our ability to predict future changes in the climate and their implications for international security.1 Importantly, while some of these changes have caught the international security community off-guard, we have seen the climate risks coming for many decades. The combination of unprecedented risks and foresight underscore a “Responsibility to Prepare.” This involves taking all possible steps to avoid an unmanageable climate, and climate-proofing of our security institutions at national, regional and international levels.
  • Topic: Security, Climate Change, Cold War, Science and Technology, International Security
  • Political Geography: Global Focus
  • Author: Charles E Ziegler
  • Publication Date: 06-2018
  • Content Type: Journal Article
  • Journal: The Whitehead Journal of Diplomacy and International Relations
  • Institution: School of Diplomacy and International Relations, Seton Hall University
  • Abstract: According to classical realism, diplomacy is the means by which states defend their interests and achieve their objectives short of war, using a mixture of persuasion, compromise, and the threat of force. In the quartercentury since the collapse of the Soviet Union, Russian diplomacy has evolved from a passive, Western-orientation toward a muscular, multilateral and assertive posture. In the immediate post-perestroika years Russian diplomacy reflected the nascent democratic character of the new Russia, and the search for a new post-Soviet identity. Since Vladimir Putin ascended to the presidency, Russian diplomacy has become highly effective at several diplomatic issues. These include: Promoting and representing Russian national interests; defending key principles of sovereignty; non-interference in internal affairs; and respect for Russia as a great power; consolidating the former Soviet space as a privileged sphere of Russian influence; and addressing Russia’s vital security concerns in the Eurasian region, including concerns with The North Atlantic Treaty Organization (NATO) and the European Union (EU) expansion eastward.
  • Topic: Security, Diplomacy, Politics, History, Military Affairs
  • Political Geography: Russia, Eurasia, Soviet Union
  • Author: Ghulam Qumber, Waseem Ishaque, Saqib Riaz
  • Publication Date: 01-2018
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: The paper through the lens of Security Dilemma, implores the international institutions in general and USA in concert with China in particular, to take the driving seat to forestall any eventuality of a nuclear catastrophe to take place in South Asian security architecture. The world is reminded that the Indian ploy of resorting to „Bilateralism‟, has neither borne any dividends in the past 70 years in thwarting the Security Dilemma, nor is likely to resolve any thing at their own any time soon, before it is too late.
  • Topic: Security, Defense Policy, Nuclear Weapons, Power Politics, Nuclear Power
  • Political Geography: Pakistan, China, South Asia, Punjab
  • Author: Ahmed Minhas, Farhat Konain Shujahi, Ghulam Qumber
  • Publication Date: 07-2018
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: Nuclear security has always been a sensitive area for international cooperation and even for sharing the best practices. States have been guarding the information about their nuclear security measures. With the introduction of terrorism phenomenon after 9/11 incident, the international community has been conscious about possibility of an act of nuclear or radiological terrorism. The US President Barack Obama undertook the task of securing the world from this new kind of terrorism and initiated process of Nuclear Security Summits (NSS)from 2010-2016 in which 53 heads of states were invited. It was the highest forum at which nuclear security was discussed; although, cautiously. NSS entrusted IAEA with the lead role in nuclear security at parallel with the nuclear safety. How the IAEA stands up to its added responsibilities in the post NSS process has to be seen in times to come. Pakistan has also come a long way in perfecting its nuclear security measures especially under the challenging scenario of Global War on Terror (GWOT) being contested within and around Pakistan’s geographical borders. Despite the challenging security environments, Pakistan’s nuclear security measures remained steadfast and not a single terrorist act happened. An appraisal of Pakistani nuclear security approach would be useful for nuclear technology aspirant states as a model of nuclear security best practices.
  • Topic: Security, Defense Policy, Nuclear Weapons, Military Strategy, Nuclear Power
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Bethany Atkins, Trevor Pierce, Valentina Baiamonte, Chiara Redaelli, Hal Brewster, Vivian Chang, Lindsay Holcomb, Sarah Lohschelder, Nicolas Pose, Stephen Reimer, Namitha Sadanand, Eustace Uzor
  • Publication Date: 05-2017
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: From the United States to the Switzerland, this year’s Journal draws on a diverse range of authors’ experiences and studies to analyze a varied—yet timely—set of current issues. By spotlighting topics such as climate change, voting rights, and gender issues, JPIA contributes to the debates that are occurring today. The strong use of quantitative analysis and in-depth study of resources ensures that this year’s Journal adds a select perspective to the debate that hopefully policymakers will find useful and actionable.
  • Topic: Security, Climate Change, Development, Narcotics Trafficking, Law, Prisons/Penal Systems, Elections, Women, Brexit, Multilateralism, Private Sector, Carbon Tax, Carbon Emissions, Gerrymandering
  • Political Geography: Britain, Afghanistan, Africa, China, South Asia, Central Asia, Asia, Nigeria
  • Author: Benedict Wilkinson, Erin Montague, Maria Giulia Amadio Viceré
  • Publication Date: 03-2017
  • Content Type: Journal Article
  • Journal: The International Spectator
  • Institution: Istituto Affari Internazionali
  • Abstract: At a time when Europe faces numerous crises, there is a real need for rigorous evidence to underpin effective policymaking. However, a gap between academia and policy creates clear obstacles in the use of evidence in policymaking. Many of these enduring obstacles are manifest in the inherent differences between separate communities: academics have difficulty communicating research in an applicable manner, and policymakers, in turn, tend to focus on operational motivations. The gap widens considerably when foreign, security and defence policy within the complex institutional structures of the European Union is considered. In addition to these well known barriers to evidence-based policy, there are two more obstacles in the defence and security space: sovereignty and dispersed decision-making. A dialogue of best practices must be opened up to broker knowledge in the EU context.
  • Topic: Security, Foreign Policy, Defense Policy, Academia
  • Political Geography: Europe, European Union
  • Author: Edward M. Gabriel
  • Publication Date: 03-2017
  • Content Type: Journal Article
  • Journal: The Ambassador's Review
  • Institution: Council of American Ambassadors
  • Abstract: From a strategic perspective, Morocco’s decision to join the African Union (AU) 33 years after quitting the bloc illustrates King Mohammed VI’s vision of his country’s role on the continent as a platform for regional economic, political and security cooperation. It followed almost two decades of personal diplomatic efforts by the king to further Morocco’s goal of supporting greater regional and continen­tal stability through common economic and political interests. Although some observers in the United States may have been surprised, the move—announced by King Mohammed VI in the summer of 2016—is a natural next step in his South-South economic diplomacy. Because of that diplomacy, at the African Heads of State Summit in Addis Ababa this past January, Morocco not only gained admission to the African Union, but it did so with the support of an overwhelming majority—39 of 54— member states. Morocco’s desire to play a stronger leadership role is seen by the king as rooted in the country’s historic ties throughout the region, as well as its long-standing outreach to build ties beyond its existing network in francophone and African countries on the Atlantic. For him, the move has a cultural and economic logic, as well as a strategic one. The AU decision also comes at a time when the United States is, according to various news reports, considering repositioning North African countries (except Egypt), as part of the Africa division at the National Security Council and the Africa bureau of the State Department, rather than as part of the Middle East departments. In the Near Eastern Affairs bureau, Morocco policy was not a high priority, mainly because it was a non-problem in a very troubled region. With the new configuration, I hope attention to Morocco will better reflect its role as one of Africa’s top economic and security power­houses, with one of the continent’s most democratic governance structures and most liberal economies, as well as its potential position as the preferred economic gateway to Africa for the United States and other world powers. This could have a profound impact on Morocco’s importance to U.S. policy and raise the value of our longstanding partnership with this key African nation.
  • Topic: Security, Regional Cooperation, Culture, African Union
  • Political Geography: Africa, North Africa, Morocco
  • Author: Ches Thurber, Austin Bowman
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Ches Thurber is an Assistant Professor of Political Science at Northern Illinois University. He was previously a research fellow at the Chicago Project on Security and Terrorism at the University of Chicago and at the Harvard Kennedy School’s Belfer Center for Science and International Affairs. His current book project, Strategies of Violence and Nonviolence in Revolutionary Movements, examines why political movements seeking to overthrow the state embrace strategies of either armed insurgency or civil resistance.
  • Topic: Security, Islam, Non State Actors, Sectarianism, Social Movement, Conflict, Interview
  • Political Geography: Iraq, Middle East, Syria, North America, United States of America
  • Author: Peter Engelke
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In February 2017, California’s Oroville Dam threatened to collapse due to an unprecedented level of water in its reservoir. Faced with the possibility of calamity (Oroville Dam is the nation’s tallest at 770 feet), state officials evacuated 200,000 people from downstream areas.[1] The Oroville incident followed another high-profile water tragedy in the United States. In December 2015, Flint, Michigan Mayor Karen Weaver declared a state of emergency because lead contamination from Flint’s ancient water pipes poisoned the city’s water supply, making it unsafe to drink.[2] Michigan’s governor, Rick Snyder, and President Obama both followed with similar declarations. Flint sadly became a national symbol of incompetence, to some even proof of deliberate malfeasance by public officials. Despite remedies to fix the problem, Flint’s water remains unsafe, and the city’s residents continue to go about their lives drinking bottled water. These cases are more than just poignant demonstrations of the truism that water is life. They show that even in advanced societies, there is a fine line between water security and insecurity, between having and not having on-demand clean water in exactly the right quantities at precisely the right moment. In the United States, we are the beneficiaries of past investments in water infrastructure that have removed water insecurity from our lives. We believe that simply turning a tap provides clean, drinkable water as a free good of nature, as readily available to everyone as it is to us. Unfortunately, this assumption is not only untrue, it is dangerous to boot. A great many societies around the world are water insecure, meaning their inhabitants do not enjoy what Americans take as a given. As water is fundamental to public health, economic activity, energy and agricultural production, and countless other uses, the poor supply of water or disruption in that supply is a serious threat to domestic and international security...
  • Topic: Security, Environment, Health, Water, Infrastructure
  • Political Geography: North America, United States of America
  • Author: Rand Quinn
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Despite a profound global impact over the first half of the twentieth century, polio is largely an afterthought throughout the developed world. Vaccines engineered in the late 1950s paved the way for a precipitous drop in global disease burden with the onset of the World Health Organization-led (WHO) Global Polio Eradication Initiative (GPEI) starting in 1988. Recent indicators of the program’s success include a declaration of eradication in India[1] and a teeteringly low infection rate in Nigeria;[2] two of the disease’s last bastions. This progress, however, has been notably stifled by the steady persistence of a wild poliovirus reservoir centered in northern Pakistan along the Afghanistan-Pakistan (Af-Pak) border. Throughout significant portions of recorded history this region’s volatility has been well-documented, including a currently sustained network for the training of terrorist fighters dating back to the period of the 1979 Afghan-Soviet War.[3] These networks serve to both attract fledgling radical jihadist recruits and supply fighters globally, markedly providing many of the transnational fighters taking part in the Syrian Civil War. Their movement in and out of the Af-Pak region has provided a major disease vector for poliovirus. The location of a terrorist network transit hub in by far the world’s largest remaining reservoir of wild poliovirus poses a major challenge for policymakers. Due to several factors, including a decline in healthcare infrastructure throughout the western world, the situation presents a legitimate epidemiological threat. However, the issue is more importantly an exemplar of the morphing nature of multidimensional threats, which are likely to become more prevalent in an era of globalization, failed states, and an inability to effectively address social issues amidst the threat of kinetic warfare...
  • Topic: Security, Environment, Health, Terrorism, World Health Organization, Infectious Diseases, Borders
  • Political Geography: Pakistan, Afghanistan, South Asia, Middle East, United States of America
  • Author: Robert Pulwer, Hans Binnendijk
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Dr. Hans Binnendijk is Vice Chairman of the Fletcher School Board. He has served in senior positions at the National Security Council, the Senate Foreign Relations Committee and the State Department. He has directed think tanks at Georgetown University, the National Defense University, and in Europe. He writes frequently on national security policy.
  • Topic: International Relations, Security, Government, Politics, Partnerships, Trump
  • Political Geography: Russia, China, North America, United States of America
  • Author: Harry Oppenheimer, Nicole Nguyen
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Nicole Nguyen’s A Curriculum of Fear: Homeland Security in U.S. Public Schools presents an ethnography of Milton High School (a pseudonym), which, when presented with dwindling resources, a reputation for disciplinary issues, and poor marks, made a Faustian bargain with the national security apparatus. The book was meticulously researched, with rich detail on social and environmental forces at play in its educational context. However, the author’s own political and normative biases will leave many readers frustrated that the book’s presentation does not live up to its content.
  • Topic: Security, Education, Homeland Security, Book Review, Ethnography
  • Political Geography: North America, United States of America
  • Author: Otto H. Van Maerssen
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In a fairly humid, subtropical section of the United States, there is a site where sporadic gunfire sometimes rattles the windows of buildings nearby. At times, plaintive howls can be heard through those windows: the wails of wounded officers lying on neatly trimmed fields under the bright sun, waving their arms desperately to attract the attention of medics converging on a nearby field ambulance. Meanwhile, scores of military officers, civilian officials and law enforcement personnel inside the buildings barely notice, and all resist the presumably well-ingrained temptation to spring into action. Ignoring the noise outside is certainly understandable, for the sounds are from just some of many training exercises on the Army’s sprawling military base at Fort Benning, Georgia. The military officers, civilian officials and law enforcement personnel are students at one of the base’s facilities, the Western Hemisphere Institute for Security Cooperation (WHINSEC), and are deadly serious about their studies – on countering transnational threats, UN peacekeeping operations, and intelligence analysis of transnational operations, among other courses offered. But, there is one notable feature that distinguishes the educational exercises at this building from any other, and which unites the students in this particular facility: every student in every course begins studies with classes on human rights and democracy, as delineated by the U.S. experience.
  • Topic: Security, Education, Government, Human Rights, Regional Cooperation, Military Affairs, Democracy
  • Political Geography: South America, North America, United States of America
  • Author: Zhao Yun
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Space cooperation is already taking place in the Asia-Pacific region. At the moment, there are three ongoing space cooperation platforms in this region. Japan and India host two regional forums respectively: the Asia-Pacific Regional Space Agency Forum (APRSAF) (1993) and the Centre for Space Science and Technology Education in Asia and the Pacific (CSSTEAP) (1995). The APRSAF is a loose platform for voluntary information exchange on an annual basis. It does not pursue any legally binding agreements, but rather provides a flexible framework “to promote regional cooperation in space development and utilization through voluntary cooperative efforts of participating countries and organizations.”
  • Topic: Security, International Cooperation, Science and Technology, Space
  • Political Geography: United Nations, Asia-Pacific
  • Author: Monica M. Ruiz
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: There are often misunderstandings among member states in international organizations (IO) regarding the legal nature of certain acts. Issues of privileges and immunities based on the principle of functional necessity, both inherent and implied powers, and the principle of good faith under common law are continuously criticized and debated by both member states and IOs alike. For this reason, international legal order can be a process of continuous transition and constant evolution. This essay analyzes the development and changes of legal norms in the European Union’s (EU) Common Foreign and Security Policy (CFSP). On that basis, it will unfold by looking at the EU’s legal structure to create a solid framework for understanding the current challenges for common European defense policy in relation to Russia’s involvement in Ukraine. Although there have been substantial legal improvements introduced by the Treaty of Amsterdam (effective 1999) and by the Treaty of Nice (effective 2003) to help clarify the ambiguous nature of the CFSP, its objectives remain wide and abstract. This further precludes the EU from formulating a joint and coherent stance on issues related to defense...
  • Topic: Security, Defense Policy, International Law, International Organization, Treaties and Agreements
  • Political Geography: Russia, Ukraine, European Union
  • Author: Austin Bowman
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Hal Brands is a Henry A. Kissinger Distinguished Professor of Global Affairs at the Johns Hopkins University School of Advanced International Studies (SAIS). He is also the author and editor of several books, the most recent including Making the Unipolar Moment: U.S. Foreign Policy and the Rise of the Post-Cold War Order (2016) and What Good is Grand Strategy? Power and Purpose in American Statecraft from Harry S. Truman to George W. Bush (2014).
  • Topic: Security, Defense Policy, Alliance, Conflict, Gray Zone
  • Political Geography: North America, Global Focus, United States of America
  • Author: Graeme Wood, Eli Stiefel
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Graeme Wood is a correspondent for The Atlantic. He was the 2015 - 2016 Edward R. Murrow Press Fellow at the Council on Foreign Relations and is a lecturer in political science at Yale University. He was formerly a contributing editor to The New Republic and books editor of Pacific Standard. He was a reporter at The Cambodia Daily in Phnom Penh in 1999, then lived and wrote in the Middle East from 2002 to 2006. He has received fellowships from the Social Sciences Research Council (2002-2003), the South Asian Journalists Association (2009), the East-West Center (2009-2010), and the U.S. Holocaust Memorial Museum’s Center for the Prevention of Genocide (2013-2014). He has appeared many times on television and radio (CNN, ABC, BBC, MSNBC, et al.), was the screenwriter of a Sundance Official Selection (2010, short film), and led a Nazi-hunting expedition to Paraguay for a History Channel special in 2009.
  • Topic: Security, Non State Actors, Islamic State, Journalism
  • Political Geography: Iraq, Middle East, Syria, United States of America
  • Author: Melanie Carina Schmoll
  • Publication Date: 01-2017
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: Security and resources are closely linked together. To broaden the category of security from strictly military and defense issues to include energy and resource security is not a new idea. Ultimately, “security is what actors make it.“ This definition of securityis a wide ranging one and includes political and military aspects as well as societies and their developments including many actors and different levels and sectors – so called `units`. This wide definition is also useful for analysing the Levant region, which is currently undergoing a period of transformation. On the one hand, developments since 2010 have applied increasing pressure on the actors of the so called sub-Regional Security Complex (RSC) Levant. On the other hand, new development can be observed in the level of interdependence in the substitution of natural resources like water, gas and oil. Internal transformation of the region has occurred and will lead to a transition of the region. The impact on security dynamics with regard to energy and resources will have consequences for the entire Levant and beyond.
  • Topic: Security, Defense Policy, Regional Cooperation, Natural Resources
  • Political Geography: Middle East, Israel, Palestine, Lebanon, Syria, Mediterranean, Levant
  • Author: Petra Dolata
  • Publication Date: 01-2017
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: While some of the announcements and approaches to energy by Donald Trump may sound like familiar stories of energy security, they are significantly different. Any discussion on energy security is driven by an inward-looking perspective, which highlights the economic dimension of creating jobs while tapping into a discourse that emphasizes America’s greatness.
  • Topic: Security, Economics, Energy Policy, Job Creation
  • Political Geography: United States, North America
  • Author: Katherine E. Himes
  • Publication Date: 04-2017
  • Content Type: Journal Article
  • Journal: The Whitehead Journal of Diplomacy and International Relations
  • Institution: School of Diplomacy and International Relations, Seton Hall University
  • Abstract: Science forms an important nexus with diplomacy and international relations. First, science in diplomacy supports foreign policy objectives. Second, diplomacy for science utilizes international relations to facilitate and advance cross-border scientific and engineering relationships and programs. Third, science for diplomacy leverages scientific and technical cooperation to bolster relations between and among countries. The term science diplomacy captures these three relationships.
  • Topic: Security, Diplomacy, Science and Technology, Water, Partnerships
  • Political Geography: Central Asia, Asia
  • Author: Colin Robertson, Max Cleland, Dennis McConaghy, Amy Myers Jaffe, Petra Dolata, Monica Gattinger, Kelly Ogle, Dennis McConaghy, Michael Mousseau, Kenneth P. Green, John Haffner, Jim Burpee
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: The Global Exchange
  • Institution: Canadian Global Affairs Institute (CGAI)
  • Abstract: The Global Exchange is the Canadian Global Affairs Institute’s quarterly magazine featuring topical articles written by our fellows and other contributing experts. Each issue contains approximately a dozen articles exploring political and strategic challenges in international affairs and Canadian foreign and defence policy. This special issue focuses on energy.
  • Topic: Security, Climate Change, Energy Policy, Environment, Oil, Water, Infrastructure, Gas, Regulation, Tax Systems, Risk, Services, Renewable Energy
  • Political Geography: Canada, North America
  • Author: Iram Khalid, Arifa Kayani
  • Publication Date: 01-2017
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: Nuclear terrorism has emerged as one of the principal concerns for states maintaining nuclear weapons technology as well as states maintaining peaceful nuclear programs. The idea is that non-state entities, in pursuance of their goals of achieving maximum tactical leverage over states, aspire to either jeopardize nuclear facilities as a means to warrant a radiological anomaly or would, in worst case scenario, acquire or construct weaponized devices. The concept of Improvised Nuclear Device (IND) or Radiological Dispersal Device (RDD) is both argued as a plausibility and as a reality in current global technological layout. More specified to South Asia, where non-state entities are allegedly employed for transnational target acquisition and the where the security paradigms are hampered by technological inferiority, it is speculatively concluded that chances of such occurrences are marginally higher as compare to other nations. Vulnerabilities of South Asia pertaining to radiological terrorism are extended internationally based upon proliferation patterns in South Asia, utilization of proxies for achievement of leverage, comparative technological inferiority of nuclear facilities and auxiliary systems, spread and introduction of terrorism in South Asia, lack of understanding of nuclear terrorism and inability to proactively participate in international non-proliferation regimes and designs. Important considerations in these regards would then have to focus on efficacy of security infrastructure from production to disposal and from civilian to military nuclear installations. Where in South Asia, states have maintained secrecy and state control over nuclear installations, radiological terrorism seems a highly unlikely scenario postulation but being cautious is still operationally necessary.
  • Topic: Security, Nuclear Weapons, Terrorism, Infrastructure, Nuclear Power
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Ghazala Abbas, Umbreen Javaid
  • Publication Date: 01-2017
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: Pakistan came into clash with the U.S. in 2011 over its long-standing backing of Islamist activists. The executing of Osama bin laden raised many questions against Pakistan’s intelligence agencies. On the other hand law and order situation became worse. Pakistan’s different clashes, and also Pakistan Taliban savagery, keep on claiming a great many lives. Economically Pakistan was not in a position to provide job opportunities for upcoming population. Both the government and military authorities seem unwilling to roll out basic financial improvements to pull in essential worldwide developmental aid.
  • Topic: Security, Terrorism, Foreign Aid, Counter-terrorism, Islamism
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Iram Khalid
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: Countering terrorism is an essential national strategy. Pakistan, is making long term counter terrorism policies .This present research focuses on the role of police regarding this issue by raising some questions. What are the perceptions of public about police legitimacy, police performance, procedural justice and distributive justice? What are the instigating factors that may influence publics‟ attitude towards police and counter terrorism policing strategies? Pakistan police force must improve its police public relationship as a method to employ in combating and dealing with terror threats, since this strategy will have a direct impact on fight against terrorism in Pakistan. Miscreants attacked states legal institutions to make it more fragile in order to challenge the writ of the government. Police has also become target for these extremist groups in Pakistan because of its politicization that some terrorist organizations consider against their religious ethos so the role of police becomes important in the affairs of state. The best practices for fight against radicalization, Building Trust between the Citizens and the Police: Incorporating International Experiences and Police – Army Cooperation are important steps. Since the police is conscientious for positively symbolizing the authority of the state, their conduct to citizens is imperative for promotion of law-abiding approach amongst the public. Responsible role of police will help the state and society to counter terrorism in Pakistan.
  • Topic: Security, Law Enforcement, Counter-terrorism, Criminal Justice, State
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Shabana Fayyaz
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: The presence of ISIS in South Asia remains a matter of debate and concern for both the statesmen and civil society at large. It‟s physical, virtual, social, and magnitude of influence is at times totally rejected or overblown by the certain section of intelligentsia and policy makers. So far, South Asian states have failed to voice a singular recognition and express desire for regional collective response to this dangerous trend. The paper looks into the patterns of ISIS presence in major South Asian states and analyze the policy response for academic clarity and discussion respectively. Parallel to this, how regional collective response can be harnessed following traditional tools of diplomacy and dialogue is also highlighted.
  • Topic: Security, Peacekeeping, Violent Extremism, Islamic State, Transnational Actors
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Farhan Navid Yousaf
  • Publication Date: 07-2017
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: South Asia hosts almost a quarter of the world‟s population. Despite achieving consistent economic growth, the region is marked by dense poverty and human deprivation. In this article, I discuss the issue of human security and argue that governments of the region need to focus on burgeoning nontraditional security threats to promote well-being of the people and improve the quality of their lives by investing resources in human development and implementing the constitutional provisions needed to protect fundamental human rights and dignity. In order to address political-economic-social-cultural disparities and achieve prosperity, the onus is far more on the countries themselves to prioritize the human security agenda through mutual collaboration.
  • Topic: Security, Human Rights, Poverty, Regional Cooperation, Inequality, Economy
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: G. John Ikenberry
  • Publication Date: 03-2016
  • Content Type: Journal Article
  • Journal: Political Science Quarterly
  • Institution: Academy of Political Science
  • Abstract: For more than half a century, the United States has played a leading role in shaping order in East Asia. This East Asian order has been organized around American military and economic dominance, anchored in the U.S. system of alliances with Japan, South Korea, and other partners across Asia. Over the decades, the United States found itself playing a hegemonic role in the region—providing security, underwriting stability, promoting open markets, and fostering alliance and political partnerships. It was an order organized around “hard” bilateral security ties and “soft” multilateral groupings. It was built around security, economic, and political bargains. The United States exported security and imported goods. Across the region, countries expanded trade, pursued democratic transitions, and maintained a more or less stable peace.
  • Topic: Security, Diplomacy, International Trade and Finance, Treaties and Agreements, Bilateral Relations, Hegemony
  • Political Geography: Japan, East Asia, South Korea
  • Author: Andrei Gheorghiță
  • Publication Date: 06-2016
  • Content Type: Journal Article
  • Journal: Ethics & International Affairs
  • Institution: Carnegie Council
  • Abstract: In the contemporary political environment, the added value brought by leaders to the electoral performance of the parties appears to be significant and growing. However, the impact of leader evaluations on the vote choice is likely to vary from one voter to another. This article explores the influence of voter characteristics on the magnitude of leader effects in the context of the 2012 legislative elections in Romania. Five such characteristics are considered: objective political knowledge, subjective political information, party identification, political engagement, and time of voting decision. For this purpose, the paper employs data from the 2012 Romanian Election Studies (RES) three-wave panel survey. The analyses prove a significant influence of political knowledge and party identification and negligible effects of the other three voter characteristics considered. Thus, political knowledge appears to stimulate the manifestation of leader effects. Similarly, voters holding partisan ties appear to experience higher levels of personalization. The implications of these findings are discussed extensively.
  • Topic: Security, Human Welfare, Politics, Governance, Elections
  • Political Geography: Romania
  • Author: Megan Campbell, Geoff Cooper, Kathryn Alexander, Aneliese Bernard, Nastasha Everheart, Andrej Litvinjenko, Kabira Namit, Saman Rejali, Alisa Tiwari, Michael Wagner
  • Publication Date: 05-2016
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: It is rare to find a journal that examines women’s participation in South Sudan in one chapter and the exploitation of outer space resources in the next; that dissects the effects of Chinese investment in Sub-Saharan Africa and demystifies the Ferguson effect. But the Journal of Public and International Affairs is not your average journal. It represents the very best of what graduate-level public policy students have to contribute to the pressing policy debates of today. It is wide-ranging in subject matter and trenchant in its recommendations. Founded in 1990, but with an ancestor publication dating back to 1963, the JPIA is based on the notion that students of public policy have important things to say about public affairs and that careful analysis and targeted critique can pave the way for meaningful change and progress. The graduate students published in this year’s JPIA combine practical experience from around the world with intensive academic study. They have spent the last year diving deep into the issues they are passionate about and have all been challenged by the need to move past descriptive analysis and towards concrete solutions. These papers represent the best of their scholarship.
  • Topic: Security, Gender Issues, Government, Regional Cooperation, International Affairs, Foreign Direct Investment, Counter-terrorism, Women, Inequality, Protests, Policy Implementation, Rural, Sanitation
  • Political Geography: China, Iran, Middle East, India, Central America, West Africa, North America, South Sudan, Sahel, United States of America
  • Author: Kristin A. Wagner, Satgin Hamrah, Benjamen Franklen Gussen, Robert Mason, Robert Maguire, Adi Saleem Bharat, Lauren Fisher, Joseph Sadek, Dalia Ghanem-Yazbek, Serhat S. Çubukçuoğlu
  • Publication Date: 01-2016
  • Content Type: Journal Article
  • Journal: Harvard Journal of Middle Eastern Politics and Policy
  • Institution: The John F. Kennedy School of Government at Harvard University
  • Abstract: Our Spring 2016 volume encapsulates the dangerous developments in MENA over the course of the past year. While the international community hoped for a resolution to the five-year Syrian Civil War, the conflict has further divided the region into a sectarian split, pitting Shia Iran and the Sunni gulf states on opposing sides. Additionally, Russia’s brief military intervention, finally winding down as of March 2016, has further destabilized the country and significantly increased the flow of refugees into the heartland of Europe. With the November 2015 Paris attacks, the threat of the so-called Islamic State (Daesh) to the west was finally realized, calling into question ongoing efforts to counter violent extremism, as well as to resolve the Syrian Civil War. Meanwhile, Turkey’s increasing two-front war against the Kurdistan Workers’ Party (PKK) and Daesh has resulted in a series of deadly terrorist attacks throughout the country, putting further pressure on Turkish leadership to both find a solution to the Kurdish question and stem the refugee flow transiting northward from Syria. It is through this lens that the Spring 2016 edition has been crafted. With conflict and instability abound, we present first an exclusive interview with Speaker of the Iraqi Parliament Salim al-Jabouri. On a more positive note, JMEPP also interviewed Tunisia’s Minister of Economic Infrastructure and Sustainable Development, Hedi Larbi, on Tunisia’s relative stability and success in its post-Jasmine Revolution transition. This year’s featured articles include Robert Mason’s assessment of the Saudi leadership and the perilous position it now finds itself in, both geopolitically and domestically; and Serhat S. Çubukçuoğlu’s eyes on Turkey’s natural gas ambitions as being linked to settling the Cypriot peace talks, as well as re-establishing partnerships with its regional neighbors in the eastern Mediterranean. Benjamen Franklen Gussen creates a new picture of a geographically reoriented Middle East, while Dylan MaGuire analyzes the no-fly zone option in Syria, with a look back to previous operations in Iraq and Libya. Focusing on gender, Dr. Dalia Ghanem-Yazbeck looks at integration and inclusion of women in Algeria’s military, yet presents a critique on its superficiality. With an eye on Turkey’s destabilized southern border region, Joseph Sadek provides commentary on the political and geostrategic jostling between Turkey and its Kurdish population, as well as the complex relationships between Turkey, the PKK, and Syrian People’s Protection Units (YPG) rebels. Turning to terrorism, Lauren Fisher presents an argument against the stovepipe methodology of countering violent extremism by exploring the complexities behind the topic. Finally, we conclude with a literature review by Adi Saleem Bharat on the Boycott, Divest, Sanction (BDS) movement as it pertains to academia.
  • Topic: Conflict Resolution, Conflict Prevention, Security, Development, Gender Issues, Peace Studies, Infrastructure, Armed Forces, Violent Extremism, Women, Radicalization, Islamic State, Political stability, Arab Spring, Humanitarian Intervention, Syrian War, Negotiation, Kurds, BDS
  • Political Geography: Iraq, Israel, Libya, Palestine, Algeria, Saudi Arabia, Syria, Tunisia, Cyprus
  • Author: Patrick M. Cronin, Seongwon Lee
  • Publication Date: 04-2016
  • Content Type: Journal Article
  • Journal: International Journal of Korean Studies
  • Institution: International Council on Korean Studies
  • Abstract: The United States relies on its ability to project military power far forward of its shores in defense of national and allied interests. Yet the diffusion of technology, especially long-range and precision-guided munitions, poses profound challenges to this core assumption undergirding U.S. extended deterrence and alliance contingency response. The U.S. Department of Defense is seeking technological and operational innovations to deal with these unfavorable trends, largely through military modernization programs that are designed to preserve the United States’ capacity to deter aggression, dissuade adventurism, reassure allies, and defend allied and national interests in the event of conflict. Most analysis of America’s so-called “Third Offset Strategy” has focused on deploying leading-edge technologies to overcome China’s military modernization programs. Almost nothing has been written about a Third Offset Strategy through the prism of the Korean Peninsula. Yet the Third Offset Strategy can bolster the alliance’s response to North Korea, reinforce deterrence, and support regional security. This paper seeks to fill a gap in the analysis by assessing the emerging U.S. defense programs with respect to North Korea, Peninsula contingencies, and ROK–U.S. alliance cooperation on regional and outof-area security issues.
  • Topic: Security, Defense Policy, Alliance, Deterrence
  • Political Geography: Asia, North Korea, South America, United States of America
  • Author: James F. Durand
  • Publication Date: 04-2016
  • Content Type: Journal Article
  • Journal: International Journal of Korean Studies
  • Institution: International Council on Korean Studies
  • Abstract: This paper assesses Japan’s role in Korean security using the quasialliance model. Developed by Professor Victor Cha, the quasi-alliance model to analyze the security relationship between Japan and the Republic of Korea, “two states that remain unallied despite sharing a common ally.” Cha defined the quasi-alliance model as “the triangular relationship between two states that are not allied, but share a third party as a common ally.” A key assumption is that the third state serves as the “great-power protector of the two states, and therefore exit opportunities for the two are limited.” While historical issues affected relations between Tokyo and Seoul, American security policies were the primary determinant of cooperation between Japan and Korea. American policy changes produced distinct “abandonment” or “entrapment” responses within the U.S.-Japan and U.S.-ROK security alliances: shared perceptions yielded cooperation, while differing views produced friction. This paper analyzes America’s East Asia policies during the Bush and Obama administrations to assess Japanese and Korean reactions. Analyzed through the quasi-alliance model, American policies produced asymmetric responses in Japan and Korea, inhibiting security cooperation between Tokyo and Seoul. Diverging views of China exacerbated inherent friction between Korea and Japan. Thus, Japan will play a limited role in Korean security.
  • Topic: Security, Grand Strategy, Alliance
  • Political Geography: Japan, China, Asia, South Korea, North Korea, United States of America
  • Author: Adam Lajeunesse, P. Whitney Lackenbauer
  • Publication Date: 04-2016
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: The Arctic has emerged as a topic of tremendous hype over the last decade, spawning persistent debates about whether the region’s future is likely to follow a cooperative trend or spiral into conflict. Official Canadian military statements, all of which anticipate no near-term conventional military threats to the region, predict an increase in security and safety challenges and point to the need for capabilities suited to a supporting role in an integrated, whole-of-government (WoG) framework. This entails focused efforts to enhance the government's all-domain situational awareness over the Arctic, to prepare responses to a range of unconventional security situations or incidents in the region, and to assist other government departments (OGD) in their efforts to enforce Canadian laws and regulations within national jurisdiction. Despite popular commentaries suggesting that military deficiencies in the North make Canada vulnerable, we argue that the Canadian Armed Forces are generally capable of meeting its current and short-term requirements and is responsibly preparing to meet the threats to Canadian security and safety that are likely emerge over the next decade.
  • Topic: Security, Diplomacy, Nationalism, Military Strategy
  • Political Geography: Canada, North America, Arctic
  • Author: Christopher Roberts, Tim Stapleton
  • Publication Date: 10-2016
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: During the Second World War, Canadian expeditionary forces played a proportionally significant role in the war in Europe, but, just like the First World War, Canada avoided or was not asked to consider deployment of land forces in any significant way to African theatres of operations. Not since the South African War (also known as the Second Anglo-Boer War) of 1899-1902 had Canadian-raised combat arms units been sent to the continent. Between 1956 and 1969, however, Africa became an active theatre of operations for the Canadian Armed Forces (CAF), but in substantially new roles: peacekeeping (Suez, Congo) and military training and assistance outside the North Atlantic Treaty Organization (NATO) (Ghana, Tanzania and Nigeria). Africa was the experimental lab for both of these new taskings, and the first time Canadians served alongside, under, or trained soldiers from newly independent African states. Canada’s early engagement with post-colonial Africa was led by security, commercial, and world order considerations, with the CAF and not official humanitarian and/or development assistance at the forefront. Where commercial and security concerns characterized Canada’s initial activity (1955-1965), between 1965 and 1975 development, “facilitated by, rather than caused by, the public’s increasing responsiveness to the humane internationalism of the era,” came to dominate Canada-Africa relations.1 From one of the lowest contributors to foreign aid on a proportional Gross National Product basis in the early 1960s, Canada had surpassed many other major and minor Western donors by the middle of the 1970s.2 Not unrelatedly, the 1970s also marked a nadir of Canadian defence spending, with the CAF shrinking in personnel, its presence in Europe halved, and its ships, aircraft, vehicles, and even small arms aging without replacement. Under Prime Minister Pierre Elliot Trudeau, from 1968 to 1979, the government’s international fiscal envelope skewed spending heavily towards development at the expense of defence. Peacekeeping – or at least support for “Collective Measures for maintenance of peace and security embodied in the Charter of the United Nations”3 – that rated first mention in the 1964 White Paper on Defence – dropped to last in the foreign policy priorities articulated in the 1970 foreign policy overhaul, Foreign Policy for Canadians,4 and the subsequent 1971 White Paper on Defence. Military training assistance efforts shrank to a care and maintenance basis in the 1970s, totalling less than 0.25% of Canada’s growing annual foreign aid budget.5 Kilford concludes his chapter on the winding down of military assistance in the early 1970s with the observation that it took thirty years (until the early 2000s) “before the funds allocated for military assistance even came close to the amount spent in the 1960s.”6 These periodic shifts that privileged defence/security over development, or development over defence/security (to use two of the “3Ds” of diplomacy, defence, and development now in regular use), have represented a somewhat regular thematic influence in Canadian relations with Africa. At times, especially during the “human security” era of the late 1990s, development and security were seen as complementary. In the mid-2010s, however, there is wide consensus that security, development, and governance are the three crucial interlocking pillars required to underpin Africa’s economic prosperity, human empowerment, and regional stability. In other words, one cannot be prioritized at the expense of the others if any kind of long-term stability is the goal of local and international stakeholders. Over fifty years of pursuing development and conflict-management in Africa and fifteen years of doing the same in Afghanistan have produced agreement on the three pillars but no consensus about how to go about cultivating them concurrently. Many good intentions around state-building, poverty alleviation, humanitarian intervention, and conflict amelioration have foundered on the shoals of the hard reality of political and economic complexity and vested interests, both local and international. This is the conundrum which lies behind this “African security” themed issue of the Journal of Military and Strategic Studies. It follows a workshop the editors co-chaired, in June 2016 at the University of Calgary, on the precise theme of “Revisiting Africa in Canadian security planning and assessment,” an initiative which grew out of that conundrum.7 As Canada signals it will again increase its involvement in addressing African security and development challenges,8 the workshop examined the difficulties in mobilizing consensus around what Canada and other external actors can and should do, as well as some of the multifaceted security challenges facing contemporary Africa, from terrorism and transnational criminal networks to political elites who are not that interested in deepening constitutionalism. This collection of essays showcases the research and insights of a handful of the over thirty participants at the June workshop.9
  • Topic: Security, Military Strategy, Military Affairs
  • Political Geography: Africa, Canada, North America
  • Author: Ulf Engel
  • Publication Date: 10-2016
  • Content Type: Journal Article
  • Journal: Journal of Military and Strategic Studies
  • Institution: Centre for Military, Security and Strategic Studies
  • Abstract: Ulf Engel assesses the recent evolution of German security policy towards and engagement in Africa which should serve as a useful comparative model for Canada. Notably, in 2014 the German government adopted a comprehensive and networked approach through its Africa Policy Guidelines which is something completely lacking in Canada.
  • Topic: Security, International Cooperation, Foreign Aid
  • Political Geography: Africa, Europe, Canada, Germany, North America
  • Author: David J. Bercuson, Jean-Christophe Boucher, J. L. Granatstein, David Carment, Teddy Samy, Paul Dewar, Roy Rempel, Eric Miller, Anthony Cary, Chris Westdal, Rolf Holmboe, Randolf Mank, Marius Grinius, P. Whitney Lackenbauer, Adam Lajeunesse
  • Publication Date: 03-2016
  • Content Type: Journal Article
  • Journal: The Global Exchange
  • Institution: Canadian Global Affairs Institute (CGAI)
  • Abstract: The Dispatch (later called The Global Exchange) is the Canadian Global Affairs Institute’s quarterly magazine featuring topical articles written by our fellows and other contributing experts. Each issue contains approximately a dozen articles exploring political and strategic challenges in international affairs and Canadian foreign and defence policy. This Spring 2016 issue includes articles on Canada's international reputation, foreign relations, defense policy and more.
  • Topic: International Relations, Security, Defense Policy, Peacekeeping, Cybersecurity, Weapons , Brexit, Nonproliferation, Syrian War, Trans-Pacific Partnership, Peace
  • Political Geography: Britain, Russia, China, Canada, Israel, Asia, North Korea, Syria, North America, Arctic
  • Author: David J. Bercuson, Julian Lindley-French, Alan Stephenson, Neil Desai, John Adams, Charity Weeden, Elinor Sloan, Mike Day, Stephen M. Saideman, Kyle Matthews, David McLaughlin
  • Publication Date: 09-2016
  • Content Type: Journal Article
  • Journal: The Global Exchange
  • Institution: Canadian Global Affairs Institute (CGAI)
  • Abstract: The Dispatch (later called The Global Exchange) is the Canadian Global Affairs Institute’s quarterly magazine featuring topical articles written by our fellows and other contributing experts. Each issue contains approximately a dozen articles exploring political and strategic challenges in international affairs and Canadian foreign and defence policy. This Fall 2016 issue includes articles on climate change, digital security, Brexit and more.
  • Topic: Security, Defense Policy, Climate Change, Diplomacy, Cybersecurity, Brexit, Military Spending, Alliance, Space
  • Political Geography: Britain, Turkey, Canada, North America, United States of America
  • Author: Abdul Majid, Mahboob Hussain
  • Publication Date: 01-2016
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: Kashmir is the oldest and the most serious dispute between Pakistan and India. Various efforts at the bilateral and multilateral levels could not resolve this problem. The two countries have fought hot and cold wars which undermined their bilateral relations. India’s efforts to strengthen its control of Kashmir by use of force have always been questioned by Pakistan that supports Kashmiri demand for right self determination under the UN Resolution of 1948-49. This paper analysis the origins of the Kashmir dispute, its influence on Indo-Pakistan relations, and the prospects for its resolution.
  • Topic: Security, Human Rights, United Nations, Territorial Disputes
  • Political Geography: Pakistan, South Asia, India, Kashmir
  • Author: Iram Khalid, Mazhar Abbas Khan
  • Publication Date: 07-2016
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: Water is an essential ingredient for the preservation of life on earth. Maintaining the food chains and humanizing the life standards are closely connected to the fresh and clean water accessibility. But, declining the magnitude of water and enhancing of its demands have extended the space between water accessibility and water demand. In Pakistan like many other countries of the world particularly in Asia, high population growth rates, feudal and aristocratic dominancy over community advantageous areas, swiftly urbanization, climatic changes, local and social variances in collaboration of absence of institutional responsibility and governance malfunctions have pressurized and over-stressed the water resources of the country. Although, water is not the only threat to human security of Pakistan but an infuriating factor to worsen the human security conditions in the country. Such water-stressed conditions in the country are mostly misused by some pressure groups and non-state actors to exploit the deprived people for the purpose of the promotion of their respective agendas. Therefore, it is dire need to understand the water accessibility, accepted water allocation among provinces, water mechanisms, inconsistency and requirement in Pakistan and its connection with security threats. This paper portrays the analysis about some of the most important inclinations and challenges in the areas of water availability and demands in Pakistan and its close connection with security of common people in the country. It examines the dynamic responsible factors behind these issues and evaluates the repercussions for human development and security and also recommends some suggestions for both the state and the general public in order to face the challenge by doing more with something less.
  • Topic: Security, Climate Change, Migration, Natural Resources, Water
  • Political Geography: Pakistan, South Asia, Punjab
  • Author: Umbreen Javaid, Azhar Rashid
  • Publication Date: 07-2016
  • Content Type: Journal Article
  • Journal: South Asian Studies
  • Institution: Department of Political Science, University of the Punjab
  • Abstract: The purpose of this Research paper is to explore China's relations with the Central Asian region and to study its embodied effects on Pakistan.
  • Topic: Security, Energy Policy, International Trade and Finance, History, Partnerships, Economy, Triangular Relations
  • Political Geography: Pakistan, China, South Asia, Central Asia, Kazakhstan, Kyrgyzstan, Tajikistan, Uzbekistan, Turkmenistan, Punjab
  • Author: John R. Murnane
  • Publication Date: 10-2016
  • Content Type: Journal Article
  • Journal: American Diplomacy
  • Institution: American Diplomacy
  • Abstract: In a series of interviews with Jefferey Goldberg in the April 2016 Atlantic, President Barack Obama provided a much-needed and sober reappraisal of the limits of American power and a realistic view of U.S. foreign policy based on a careful assessment of priorities, or what Goldberg calls the “Obama Doctrine.” The heart of the president’s approach is the rejection of the “Washington Playbook.” Obama told Goldberg, “there’s a playbook in Washington that presidents are supposed to follow. It’s a playbook that comes out of the foreign-policy establishment. And the playbook prescribes responses to different events, and these responses tend to be militarized responses.”1 According to the Playbook, military power and the “creditability” it provides is the principle instrument of American foreign policy; it has been accepted wisdom at think tanks and among foreign policy experts since the end of World War II; Obama has challenged this dictum.
  • Topic: Security, Foreign Policy, Diplomacy, Government, Conflict
  • Political Geography: Middle East, United Nations, Syria, North America, United States of America
  • Author: Mark Zachary Taylor
  • Publication Date: 01-2015
  • Content Type: Journal Article
  • Journal: Political Science Quarterly
  • Institution: Academy of Political Science
  • Abstract: This dense, powerful volume offers profound insights into the U.S. innovation system and its driving forces. The driving forces are Americans' twin desires for technology-based military supremacy (which demands government action) and small government (which militates against it). These twin forces have produced a highly successful, ever-evolving, and unique set of federal institutions and policies, which Linda Weiss calls the “national security state” (NSS). The NSS is the secret to American innovation. Since World War II, it has dominated high-risk innovation, revolutionary technological change, and the formation of new S industries. Weiss's book also reveals that the NSS is not static, but changes in response to changes in perceived geopolitical threats and to shifts in popular anti-statist sentiments. The book explains why the NSS came about, how it works, and glimpses its future. - See more at: http://www.psqonline.org/article.cfm?IDArticle=19346#sthash.kIPIPtW6.dpuf
  • Topic: Security, Government
  • Political Geography: United States, America
  • Author: Todd S. Sechser
  • Publication Date: 01-2015
  • Content Type: Journal Article
  • Journal: Political Science Quarterly
  • Institution: Academy of Political Science
  • Abstract: At around 5,000 total warheads, the U.S. nuclear stockpile today is a fraction of its former self. One therefore might presume that U.S. nuclear doctrine has undergone an equally significant transformation since the end of the Cold War. Thomas M. Nichols disabuses readers of this notion, showing how the machinery of “mutual assured destruction” remains predominant even though the world that spawned this doctrine disappeared with the Soviet Union. But this doctrine is now obsolete, Nichols argues. Deterrence no longer requires—if it ever did—an expansive nuclear inventory with diverse delivery platforms, a launch-on-warning alert posture, and convoluted targeting plans. In Nichols's view, a pocket-sized nuclear deterrent would be adequate. Yet U.S. strategy remains saddled with the costly baggage of an arms competition that ended a quarter-century ago. - See more at: http://www.psqonline.org/article.cfm?IDArticle=19347#sthash.Giq99dtz.dpuf
  • Topic: Security, Cold War, Nuclear Weapons
  • Political Geography: United States, Soviet Union
  • Publication Date: 02-2015
  • Content Type: Journal Article
  • Journal: Ethics & International Affairs
  • Institution: Carnegie Council
  • Abstract: Ethics International Affairs is pleased to announce the publication of its winter 2014 issue. This issue includes an essay by Jacinta O'Hagan and Miwa Hirono on "cultures of humanitarianism" in East Asia; articles by Christopher Kutz on torture, American security policy, and norm death, and Ruben Reike on an international crimes approach to preventing mass atrocities; a book symposium on Mathias Risse's On Global Justice, featuring contributions from Richard Arneson, Helena de Bres, Anna Stilz, and Risse; and a review essay by Nancy Birdsall on Thomas Piketty's Capital.
  • Topic: Security, Culture
  • Political Geography: America, East Asia
  • Author: David Blagden
  • Publication Date: 04-2015
  • Content Type: Journal Article
  • Institution: Chatham House
  • Abstract: The international system is returning to multipolarity—a situation of multiple Great Powers—drawing the post-Cold War 'unipolar moment' of comprehensive US political, economic and military dominance to an end. The rise of new Great Powers, namely the 'BRICs'—Brazil, Russia, India, and most importantly, China—and the return of multipolarity at the global level in turn carries security implications for western Europe. While peaceful political relations within the European Union have attained a remarkable level of strategic, institutional and normative embeddedness, there are five factors associated with a return of Great Power competition in the wider world that may negatively impact on the western European strategic environment: the resurgence of an increasingly belligerent Russia; the erosion of the US military commitment to Europe; the risk of international military crises with the potential to embroil European states; the elevated incentive for states to acquire nuclear weapons; and the vulnerability of economically vital European sea lines and supply chains. These five factors must, in turn, be reflected in European states' strategic behaviour. In particular, for the United Kingdom—one of western Europe's two principal military powers, and its only insular (offshore) power—the return of Great Power competition at the global level suggests that a return to offshore balancing would be a more appropriate choice than an ongoing commitment to direct military interventions of the kind that have characterized post-2001 British strategy.
  • Topic: Security, Cold War
  • Political Geography: Russia, China, Europe, Brazil
  • Author: Paul Cornish, Andrew M. Dorman
  • Publication Date: 04-2015
  • Content Type: Journal Article
  • Institution: Chatham House
  • Abstract: Whichever party or parties form the next UK government, a Strategic Defence and Security Review (SDSR) is expected to begin soon after the general election in May. The review might be a 'light touch' exercise—little more than a reaffirmation of the SDSR produced by the coalition government in 2010. It seems more likely, however, that the review will be a lengthier, more deliberate exercise and one which might even last into 2016. For those most closely engaged in the process the challenge is more complex than that confronted by their predecessors in 2010. The international security context is more confused and contradictory; the UK's financial predicament is still grave; security threats and challenges will emerge that cannot be ignored; the population's appetite for foreign military engagement appears nevertheless to be restricted; and prevailing conditions suggest that the risk-based approach to national strategy might be proving difficult to sustain. Two key questions should be asked of the review. First, in the light of recent military experiences, what is the purpose of the United Kingdom's armed forces? Second, will SDSR 2015–16 sustain the risk-based approach to national strategy set out in 2010, and if so how convincingly? Beginning with a review of the background against which SDSR 2015–16 will be prepared, this article examines both enduring and immediate challenges to the national strategic process in the United Kingdom and concludes by arguing for strategic latency as a conceptual device which can complement, if not reinvigorate, the risk-based approach to national strategy and defence.
  • Topic: Security
  • Political Geography: United Kingdom
  • Author: Joanna Hecht, Sam duPont, Cynthia Barmore, Natasha Geber, Abby McCartney, Emily A. Wiseman, Jordan Dantas, Stephanie Leutert, Lauren Dunn
  • Publication Date: 05-2015
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: Cynthia Barmore builds on primary survey research conducted in Bosnia and Herzegovina to offer new explanations of the constraints placed on farmers by an unreformed land system. Natasha Geber addresses an underexplored policy area, looking at Russia’s geopolitical ambitions in the Arctic and offering a perspective on the chances of international cooperation on Arctic issues. Abby McCartney pulls together two seemingly disparate policies, seeing an opportunity for New Jersey to expand its successful drug court program using provisions of the Affordable Care Act. Emily Wiseman looks at how women and girls still tend to be excluded from post-disaster relief efforts, even though almost all implementers understand that this exclusion exacerbates gender inequality and retards reconstruction. Jordan Dantas analyzes the drop in piracy off the Somali coast, and finds private sector success where military solutions failed. Stephanie Leutert offers a clear-eyed perspective on the divergent narratives about the Obama Administration’s deportation policies, and analyzes how those policies have impacted immigrant communities. Lauren Dunn looks at two programs for using mobile phones to provide basic banking services—a success and a failure—and offers lessons for how the regulatory environment and existing institutions must shape program design.
  • Topic: Security, Gender Issues, Government, Immigration, Piracy, Women, Conflict, Rural, Drugs, Land Rights, Barack Obama, Medicaid
  • Political Geography: Russia, India, Haiti, North America, Somalia, Arctic, United States of America, Bosnia and Herzegovina
  • Author: Nuno P. Monteiro, Alexandre Debs
  • Publication Date: 01-2015
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: What causes nuclear proliferation? What role do security threats play in driving states to acquire nuclear weapons? Intuitively, security is the most important factor driving nuclear acquisition. Yet existing security theories of proliferation, while accounting for why some states with grave security concerns have developed nuclear weapons, are unable to explain why others have not. Today only nine states have the bomb, a number much lower than the pessimistic predictions made by early security-based arguments on the causes of proliferation. Clearly, the view that "security is the only necessary and sufficient cause of nuclear proliferation" is not borne out by the history of the nuclear age. This limitation of existing security theories has exposed them to criticism on several fronts. Initially, a burgeoning scholarship emerged focusing on the nonsecurity "sources of the political demand for nuclear weapons." More recently, "supply-side" arguments on proliferation view states' demand for nuclear weapons (for security or other reasons) as largely irrelevant, claiming instead that the odds of nuclear acquisition depend on the availability of international nuclear assistance.
  • Topic: Security
  • Political Geography: United States