« Previous |
1 - 100 of 111
|
Next »
Number of results to display per page
Search Results
2. The East Mediterranean Gas Forum: Convergence of Regional and Energy Security Concerns
- Author:
- Stefy Joseph and Aneeta Thomas Peedikayil
- Publication Date:
- 03-2023
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- As energy insecurity remains an imminent characteristic of energy security, it can simultaneously influence the securitization of non-energy referent objects in other sectors (Adamides and Odysseas 2015). This leads one to examine the geopolitical underpinnings behind the formation of the EMGF which by and large has affected the region as a whole. Egypt, the region’s star player has always played a fundamental role in harbouring relations based on energy and regional security and hence its relations with Greece, Cyprus, Israel, France, Italy and the EU needs examination in the wake of the establishment of the EMGF. The EMGF has been kept as the central pillar in understanding the international political economy behind the energy and regional security convergences by the above-mentioned member states. The objective behind undertaking this study has been to point out the inadequacies in establishing the EMGF which has inevitably shaped the geopolitics of the region.
- Topic:
- Security, Energy Policy, Natural Resources, and Gas
- Political Geography:
- Global Focus
3. Las políticas de seguridad y defensa como valor público y bien común
- Author:
- Xavier Torrens
- Publication Date:
- 06-2023
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- Una nueva perspectiva de la seguridad y la defensa centradaen el enfoque de bienes comunes abre la puerta a una relaciónentre Estado y sociedadcon gobernanza. De hecho, se trata deuna nueva forma de legitimación políticadel uso de la fuerza para garantizar la seguridadrealzándola como bien común(Ostrom, 1900) y como valor público (Moore, 1998). En el escenario actual de riesgos, cada vez la política de seguridad se desarrolla más allá de lo que algunos han llamado en decir lo estrictamente securitario. En este sentido, la teoría de los bienes comunes es un marco conceptual clave para comprender la transformación y el cambio de paradigma en las políticas de seguridad. Las cuestiones que se plantean en este monográfico giran en torno al marco teórico-conceptual de los bienes comunes, o bien a algunos de sus elementos. Desde la perspectiva de los bienes comunes, la seguridady la defensa, y sus políticaspúblicas, tienen en cuenta el valor que se crea a partir de las dinámicas entre distintos actores.
- Topic:
- Security, Defense Policy, Governance, and Society
- Political Geography:
- Global Focus
4. Derecho humano a la seguridad:Prevención del Extremismo Violentocon Vasili Grossman
- Author:
- Verónica Yazmín García Morales Morales
- Publication Date:
- 06-2023
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- El presente estudio aborda el derecho humano a la seguridad desde el enfoque de la Prevención del Extremismo Violento. La Prevención del Extremismo Violento (PEV) es una estrategia en el marco de Naciones Unidas enfocada a fortalecer el respeto de los derechos humanos. La PEV aborda el extremismo violento que conduce al terrorismo desde el enfoque de la prevención y de los derechos humanos. Lo más relevante de esta perspectiva es su innovación para garantizar la seguridad como derecho humano. Es más, la PEVsurge como respuesta a las políticas de seguridad antiterroristas que se consideran insuficientes para erradicar este fenómeno. Las medidas de acción de la PEV, por tanto, van más allá de lo que en sentido estricto se conoce como política securitaria. La educación y la cultura tiene así una función importante en la PEV, como también ponen de relieve las políticas de la UNESCO. El análisis que se desarrolla expone una propuesta de espacio dialógico que aplica la medida de educación, cultura y sensibilización a través de la literatura. Se reflexiona así, a partir del diálogo con Vida y destino de Vasili Grossman, sobre el extremismo violento y los derechos humanos.
- Topic:
- Security, Human Rights, United Nations, Literature, and Countering Violent Extremism
- Political Geography:
- Global Focus
5. Seguridad y defensa,de bienes públicos puros aun enfoquede bienes comunes
- Author:
- Valente Tallabs
- Publication Date:
- 06-2023
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- Frente a la crisis de Estado moderno derivados de cambios globales y amenazas emergentes, frente a las limitaciones y vacíos que actualmente tiene para poder proveer seguridad y defensa, frente a la desvalorización y crítica que sociedades contemporáneas tienen respecto a estas funciones por ser poco democráticas y usualmente unilaterales, conviene hacer una análisis que considere una comprensión más amplia de estos conceptos como bienes públicos puros, para comenzar a contemplarlos como bienes comunes, lo que permitiría un nueva relación entre Estado y sociedad.
- Topic:
- Security, Defense Policy, Public Goods, and Commons
- Political Geography:
- Global Focus
6. Grayzone Aggression: The Need for Deterrence by Denia
- Author:
- Elisabeth Braw
- Publication Date:
- 12-2023
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Cyber deterrence needs to rely on a combination of deterrence by punishment of select attacks and deterrence by denial. By definition, punishment means that deterrence has failed, but given that it’s impossible to deter all cyber attacks and intrusions, Western governments with offensive cyber capabilities could retaliate against specific cyber attackers. The harm done to targets of such retaliation and the arbitrary nature of how they’re selected for punishment would increase the cost in most cyber attackers’ cost-benefit analysis. The public also expects the government to avenge, particularly egregious cyber attacks.
- Topic:
- Security, Cybersecurity, Deterrence, and Non-Traditional Threats
- Political Geography:
- Global Focus
7. Outer Space, Information Warfare, and the Truth
- Author:
- Gabrielle Lim and Joan Donovan
- Publication Date:
- 12-2023
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Despite the distance, outer space and Earth are linked. However, our increasing dependence on space-based assets makes parsing the multitude of challenges and tradeoffs more difficult. Amidst talks of great power competition, space weapons, and commercialization there are equally pressing issues concerning production of knowledge, truth, and accountability. Though these topics sometimes overlap with national security (as with arms treaties or interstate war), they also affect the broad concept of human security—the wellbeing and safety of individuals and communities. As states and international organizations consider what to do to ensure the sustainable development and use of outer space, concerns should go well beyond simply reducing the level of debris, whether asteroids should be mined, or what qualifies as a space weapon.
- Topic:
- Security, Development, Strategic Competition, and Information Warfare
- Political Geography:
- Global Focus and Space
8. Cyber-Nuclear Weapons: Impact on the Modern Warfare Landscape
- Author:
- Shabana Fayyaz and Baqir Malik
- Publication Date:
- 01-2023
- Content Type:
- Journal Article
- Journal:
- South Asian Studies
- Institution:
- Department of Political Science, University of the Punjab
- Abstract:
- The popular trends of information technologies have created a virtual world around the globe with the domain of cyberspace, which offers plenty of opportunities and challenges. In the last few years, several events have been described in terms of cyber warfare or the use of cyber weapons, leading to critical international security concerns. At the same time, there is little research on the definitions and power of what constitutes a cyber weapon and how it can be profiled. In the age of globalization and with the dynamic digital environment a new way of strategy and thinking is developing to introduce the new weapons, which has challenged the strategic environment around the globe and changing the concept of warfare in 21st century. The present article is to develop a preliminary hypothesis for to identifying the power of cyber weapon and how it relates with the nuclear weapon to examining the changing landscape of modern warfare. The comparative analysis of cyber weapons and nuclear weapons will help to understand the exact nature of cyber weapons with comparison of nuclear weapons to conclude which one is more preferable and dangerous in modern warfare techniques. The paper is divided into three sections. First part is brief introduction of genesis of cyber weapons, nature, evolution and its different types. The second part is comparison of cyber weapons to the nuclear weapons based on diverse characteristics (developing of weapons, security, arsenal, uses, target etc.). The third part is an analysis cyber weapon vis-a-vis nuclear weapon on the impact level. The paper conclude that the development of cyber-nuclear weapons has significantly altered the nature of contemporary warfare techniques. As technology continues to advance, the use of a cyber weapons has becomes increasingly likely, which could result in devastating consequences. It is important for nations to develop effective cybersecurity measures and maintain a strong nuclear deterrence strategy to prevent such scenarios from occurring.
- Topic:
- Security, Nuclear Weapons, Cybersecurity, and Weapons
- Political Geography:
- Global Focus
9. PART I: The Singleton Paradox On the Future of Human-Machine Teaming and Potential Disruption of War Itself
- Author:
- Ben Zweibelson
- Publication Date:
- 03-2023
- Content Type:
- Journal Article
- Journal:
- Journal of Advanced Military Studies
- Institution:
- Marine Corps University Press, National Defense University
- Abstract:
- Technological innovation has historically been applied in war and security affairs as a new tool or means to accomplish clear political or societal goals. The rise of artificial intelligence posits a new, uncharted way forward that may be entirely unlike previous arms races and advancements in warfare, including nuclear weapons and quantum technology. This article introduces the concept of a singleton as a future artificial intelligent entity that could assume central decision making for entire organizations and even societies. In turn, this presents what is termed a “singleton paradox” for security affairs, foreign policy, and military organizations. An AI singleton could usher in a revolutionary new world free of war and conflict for all of human civilization or trigger a catastrophic new war between those with a functioning singleton entity against those attempting to develop one, along with myriad other risks, opportunities, and emergent consequences.
- Topic:
- Security, Science and Technology, Machine Learning, Transhumanism, and War Studies
- Political Geography:
- Global Focus
10. Leadership in police work applied to critical contexts: An integrative review and scientific mapping using VOSviewer and Google Trends tools
- Author:
- Lucius Paulo de Carvalho, Ana Paula Grillo Rodrigues, and Marcello Beckert Zappellini
- Publication Date:
- 09-2023
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The aim of this study is to identify cutting-edge studies on the phenomenon of leadership applied to police work, especially in critical contexts, based on an integrative literature review. The integrative review made it possible to survey publications on the subject in the Scopus, Web of Science, Ebsco Host, ScienceDirect, Core, and SciELO databases. Scientific mapping is complemented with the use of VOSviewer and Google Trends tools. The integrative review resulted in 15 studies that fit the research strategy, bringing different leadership approaches, such as instrumental, transformational, charismatic, consultative, ethical, authentic, military, destructive, and laissez-faire, through qualitative and/or quantitative studies. For bibliometric analysis using VOSviewer, the research corpus was expanded to 63 articles, admitting documents that studied leadership with firefighters, military personnel, and police officers. The analysis showed almost no co-authorship link between the 129 authors. The co-occurrence analysis of keywords reveals that leadership strongly links with law enforcement, police, management, crisis management, emergency management, and decision-making, establishing a close relationship between these concepts and a semantic map that underlies the field of study. The analysis of trends by Google Trends in the science category indicates the stability of interest in the topic of leadership in the world. However, the theme of police leadership produced results close to zero. The findings reveal that few studies address leadership in police organisations, and even fewer if critical, dangerous contexts are examined. The trends analysed indicate that worldwide scientific interest in the subject remains low and the theme must be further explored.
- Topic:
- Security, Leadership, Crisis Management, and Police
- Political Geography:
- Global Focus
11. Introducción a “Recursos desiguales: retos de la seguridad en la encrucijada de la sostenibilidad”
- Author:
- Rosa Ana Alija Fernández
- Publication Date:
- 12-2022
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- En lo que va de década,el mundo está asistiendo a una sucesión vertiginosa de amenazas a la seguridad: desde la agresión de Rusia a Ucrania, que ha reavivado tensiones militares entre potencias que parecen evocarla Guerra Fría–con amenaza nuclearincluida–,hasta la pandemia de la COVID-19, la carestía de alimentos, la escasez de energía, o los efectos de la aceleración del cambio climático yla degradación medioambiental. Calificar este último bloque de “nuevas amenazas” sería despreciar la realidad de buena parte de la población mundial, que lleva décadas experimentándolas, y que ya fueron señaladascomo amenazas a la paz y la seguridad por Kofi Annan en su informe Un concepto más amplio de la libertad(SGNU, 2005: párr. 78). Lo que resulta realmente novedoso es que ahora están impactando de lleno en los países desarrollados, que ya no pueden limitarse a tratar de repeler los efectos de estosfenómenos en otros puntos del planetacomo parte de su agenda de seguridadnacional(Wilkin, 2002: 634, 641).Por el contrario, empiezan a constatar que la rápida expansión desde los años 90 del modelo económico neoliberal en un planeta que dispone de recursos limitados está generando ya riesgos a supropia seguridad nacional, además de a la seguridad internacional.Así, poco ha tardado en comenzar a materializarsela previsión realizada porPaul Rogers,quienha señalado que en las dos próximas décadas habrá tres factores predominantes de inseguridad global: i) una turbulenta economía mundial basada en un sistema neoliberal fallido que está incrementando las brechas socioeconómicas, ii) los límites medioambientales a la actividad humana, y iii) el arraigo de una cultura de la seguridad centrada en el uso de fuerza militar como respuesta a las amenazas, incapaz de asegurar la paz y la estabilidad en un mundo socioeconómicamente dividido y medioambientalmente constreñido (Rogers,2019: 139).
- Topic:
- Security, Natural Resources, Inequality, and Sustainability
- Political Geography:
- Global Focus
12. De la Agenda para la Paz a Nuestra Agenda Común: la “sostenibilidad” de la paz
- Author:
- Eugenia López-Jacoiste Díaz
- Publication Date:
- 12-2022
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- El presente artículo analiza el alcance de las agendas políticas de la Naciones Unidas en relación con la paz y la seguridadinternacionales.La percepción integral de las relaciones entre “paz”, “seguridad”y “desarrollo”justifica las nuevas perspectivas multidimensionales, preventivas ysostenibles de toda actividad de construcción y consolidación de la paz, que sigue siendo el principal propósito de esta Organización.En Nuestra Agenda Común(2021), el Secretario General contempla acciones concretas de muy diversa índoley diversidad de materias paraerradica las causas últimas que generan inseguridad y que son un obstáculo para el desarrollo sostenibleal que aspira la comunidad internacional de conformidad con laAgenda 2030. Apuesta porunamayor inversión en prevención y consolidación de la pazcon medidasque van desde el control de armamentos hasta la financiación de las estructuras de consolidación de la paz, pasando por la erradicación de la violencia, en particular contra la mujer,y la búsqueda de nuevos modelos asociativos y cooperativos, pero más allá de los acuerdos previstos en el capítulo VIII de la Carta.
- Topic:
- Security, Development, United Nations, Sustainable Development Goals, and Peace
- Political Geography:
- Global Focus
13. Unmanned Aerial Vehicle - a Lethal Weapon of Tomorrow for Terrorists
- Author:
- Aleksander Olech
- Publication Date:
- 03-2022
- Content Type:
- Journal Article
- Journal:
- Nowa Polityka Wschodnia
- Institution:
- Faculty of Political Science and International Studies, Nicolaus Copernicus University in Toruń
- Abstract:
- Terrorism has been used as a form of combat for centuries. Over the years, the tools used by terrorists have evolved. While attacks with cold weapons still take place, nowadays terrorists also use explosives, machine guns, guided missiles and increasingly often drones. The present growth of the arms market has led to terrorist groups being heavily militarized, as they can successfully acquire modern weapons and subsequently use them in their attacks. This state of affairs has directly affected the security of states and societies, and subsequently became a principal subject of discussion on international security forums. Contemporary global terrorist threats also harness artificial intelligence that supports weaponized robots, missiles, as well as clusters of killer drones. This narrative arose a few years ago, indicating that terrorists may have a vastly greater array of options at their disposal because they may cooperate with some states that would back them up. The chance for terrorist organisations to gain access to artificial intelligence technologies only increased due to the global competition surrounding it. Due to this potential spreading, terrorists will have a chance to operate weapons supported by AI. These events then merge into a deeply concerning scenario which conceivably may have to be confronted. The threat of terrorist organisations possessing and using swarms of drones does not seem to be very distant.
- Topic:
- Security, Science and Technology, Terrorism, Weapons, Drones, and Artificial Intelligence
- Political Geography:
- Global Focus
14. Anxiety, Ambivalence and Sublimation: ontological in/security and the world risk society
- Author:
- John Cash
- Publication Date:
- 04-2022
- Content Type:
- Journal Article
- Journal:
- Uluslararasi Iliskiler
- Institution:
- International Relations Council of Turkey (UİK-IRCT)
- Abstract:
- This article aims to expand the social-theoretical and psychoanalytic range of research on ontological in/ security, by exploring parallel concerns addressed by Beck, Kristeva, Butler and Zizek. These include, first, the psychic roots of othering processes and their encoding into cultural repertoires. Second, the difficulties and possibilities of displacing othering processes within national and international politics. Third, the disruptive effects of globalising processes on the symbolic efficiency of cultures and on their encoded defences against ontological insecurity. Fourth, the crucial significance for political and international relations of the qualitative characteristics of those defences against ontological insecurity that gain predominance within cultural repertoires and their variable norms of recognition. Likewise, the significance of those norms of recognition that challenge established norms and successfully reorganise cultural repertoires.
- Topic:
- International Relations, Security, Defense Policy, and Political Theory
- Political Geography:
- Global Focus
15. Environmental Security in the Anthropocene
- Author:
- Simon Dalby
- Publication Date:
- 03-2022
- Content Type:
- Journal Article
- Journal:
- Brown Journal of World Affairs
- Institution:
- Brown Journal of World Affairs
- Abstract:
- Simon Dalby is a Professor at Wilfrid Laurier University, Waterloo, Ontario, where he teaches in the Balsillie School of International Affairs, and a Senior Fellow at the Centre for International Governance Innovation. He is author of Anthropocene Geopolitics (University of Ottawa Press 2020) and Rethinking Environmental Security (Edward Elgar 2022).
- Topic:
- Security, Environment, Politics, and Anthropocene
- Political Geography:
- Global Focus
16. Desradicalizacióny desvinculación:aspectos formales y teóricos
- Author:
- Roberto Muelas Lobato and David García
- Publication Date:
- 06-2022
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- La radicalización constituye una de las mayores problemáticas a nivel securitario y social. No obstante, el número de detenciones en los últimos años han llevado a replantearse reforzar los modelos de intervención en su relación con la desvinculación y la desradicalización. Como consecuencia, la atención está cambiando hacia los procesos de desvinculación/desradicalización. Tratando de aunar los conocimientos sobre la temática, en el presente manuscrito se realiza una revisión de la literatura que trata de identificar y valorar algunos de los factores y modelos de desvinculación, desradicalización y/o reinserción desarrollados en estas últimas décadas. En primera instancia se conceptualizan la desradicalización, entendida como un proceso social y psicológico por el que el compromiso de un individuo con la radicalización violenta y su participación en ella se reducen hasta el punto de que ya no corre el riesgo de implicarse y participar en actividades violentas, y la desvinculación, proceso mediante el cual un individuo experimenta un cambio de rol o función que suele ir asociado a una reducción de la participación en la violencia. Posteriormente, se analizan los principales factores de empuje y atracción que se han encontrado en la literatura, destacando, por un lado, la desilusión con la estrategia o las acciones del grupo radical y, por otro lado, las relaciones con personas fuera del grupo y las demandas familiares. A continuación, se hacen explícitos siete modelos teóricos propuestos desde distintas disciplinas que tratan de explicar los procesos de desvinculación, desradicalización y/o reinserción social. Entre estos modelos, encontramos la trayectoria de desvinculación,el modelo de inversión,el modelo 3N,el modelo pro-integración,los bucles de refuerzo,el modelo de las dinámicas de la desvinculación y el modelo fénix de desvinculación. Finalmente, se discuten algunas de las similitudes y diferencias de estos modelos y sus principales limitaciones.
- Topic:
- Security, Disengagement, Deradicalization, and Theoretical Models
- Political Geography:
- Global Focus
17. Selected Problems of Security Control in Civil Aviation Based on Own Empirical Research
- Author:
- Gabriel Nowacki and Bohdan Paszukow
- Publication Date:
- 06-2022
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The paper refers to the evolution of methods, new technologies, and devices in security control processes in light of civil aviation requirements, procedures, and increased flow of passengers. The research problem has been defined as follows: How shall the international airport security controls function in the context of regulatory and operational conditions and current and future threats? In reference to the problem, the research hypothesis was defined as follows: Security control in civil aviation consists of screening persons and detecting prohibited articles and mainly depends on the professional competence of security staff and the proper selection and maintenance of electronic assistive devices. Professional competences refer to personnel’s knowledge, experience, qualification, monitoring, operational supervision, and quality control as part of their tasks. The development of new technologies requires the appropriate selection, commensurate with risk analysis, of electronic assistive devices, including equipment, methods, technical means, and their maintenance in a proper technical condition. The paper presents the results of empirical research conducted amongst experienced aviation security forums. Because of its complexity and unpredictability, this problem still leaves a wide margin for improvement and efficiency. The following research methods were used to solve the research problem: theoretical methods and empirical methods: diagnostic survey and expert interview.
- Topic:
- Security, Science and Technology, Terrorism, and Aviation
- Political Geography:
- Global Focus
18. The Role of Material Stocks in the National Security System
- Author:
- Malgorzata Grzelak
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The article consists of two parts. The first part describes the essence of the national security system and its structure. Using the Ishikawa diagram and the value chain, the authors presented the shortcomings of the national security system and a sequence of actions that can improve it. The second part of the article is devoted to material stocks and their role in the analyzed system. The survey research presented in this part of the article confirmed the importance of material stockpiles in ensuring national security. In addition, the research highlighted the need for government organizations to cooperate in the continuous replenishment of material stocks during a crisis.
- Topic:
- Security, Defense Policy, National Security, Pandemic, and COVID-19
- Political Geography:
- Global Focus
19. PLAN E: A Grand Strategy for the Twenty-first Century Era of Entangled Security and Hyperthreats
- Author:
- Elizabeth G. Boulton
- Publication Date:
- 03-2022
- Content Type:
- Journal Article
- Journal:
- Journal of Advanced Military Studies
- Institution:
- Marine Corps University Press, National Defense University
- Abstract:
- A transdisciplinary research project investigated the idea of framing climate and environmental change (CEC) as a new type of threat: a hyperthreat. Traditional military analytical methods were used to assess the hyperthreat and its context and develop ideas about how an adequate response could be conceived. This approach contrasts to prior literature and longstanding geopolitical discourse that identify the risks of taking a securitization approach. Instead, the author argues that it is now riskier not to consider CEC within a mainstream geopolitical and nation-state security strategy. When the hyperthreat of CEC is centered as the main threat to be contained, and its relationship to other threats is analyzed, startling new pathways to stability emerge. The research developed a new theoretical approach called “entangled security” to develop an initial new “grand narrative” and “grand strategy” (PLAN E). This article offers a vision of how military theory can be reimagined to support new policy directions and security priorities.
- Topic:
- Security, Climate Change, Environment, Military Strategy, and Non-Traditional Threats
- Political Geography:
- Global Focus
20. Proposed method for building an anti-drone system for the protection of facilities important for state security
- Author:
- Jędrzej Łukasiewicz
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Unmanned aerial vehicles (UAVs) pose a threat to buildings and facilities important to the security of the state. As they are able to operate like individual aircraft, the number of ways they can be used for terrorist activity is practically unlimited. Anyone in charge of a facility that is crucial for the reliable functioning of a state is obliged to ensure an acceptable level of security. Since drones can be used to attack protected structures, they need to be protected by an anti-drone system. The paper proposes a method for assessing the effectiveness of systems for detecting and neutralising unmanned aerial vehicles. In order to suggest a new method for assessing the effectiveness of anti-drone systems, an analysis of the scientific literature and other documents describing existing anti-drone systems has been carried out. Attacks involving the use of drones, both in wartime and in incidents of terrorism, are also analysed and existing anti-drone solutions assessed. Because there are a variety of technical solutions for the detection and neutralisation of drones, and different location and weather conditions, a universal method is proposed based on probability calculations and neutralisation of drones, using mathematical formulas. This method allows for the effectiveness of the entire anti-drone system to be assessed on the basis of measuring the probability of detection and neutralisation of drones in real conditions. The proposed method allows the effectiveness of the currently existing anti-drone systems to be evaluated and for new methods for detecting and neutralising drones to be proposed. This method, based on mathematical calculations, enables software to be written for simulating anti-drone systems on computers and for the effectiveness of these systems to be confirmed before their construction in a protected facility.
- Topic:
- Security, Defense Policy, Weapons, and Drones
- Political Geography:
- Global Focus
21. Intelligent terrorism as a security threat to critical infrastructure
- Author:
- Ossi Heino
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- This paper considers terrorism as potentially ‘intelligent’, as a threat capable of abusing the critical infrastructures of societies and the related methods for knowledge production. Respectively, it sees critical infrastructures as attractive mediums for terrorist influence. The paper describes the contrast between the logic of providing security and certainty for critical infrastructures and the threat of terrorism, which is evolving in terms of its systemic capacities and intelligence. The way security is provided within critical infrastructures and the way intelligent terrorism could operate seem to separate from each other, thereby creating vulnerability. The paper seeks to enhance the conceptual understanding of this question by describing and closing the gap created by the intellectual separation. By doing so, the article will shed light on the conceptual dimension of the (in)security that has gone unnoticed in the interface between critical infrastructures and terrorism. It outlines the aforementioned dilemma and provides conceptual understanding that makes it easier to grasp and communicate further. The paper shows that the intellectual separation has weakened the possibilities for theoretically understanding and practically recognising terrorism as a phenomenon that is becoming systemically more conscious, more intelligent and potentially increasingly capable in a form of violence that exploits the basic structures of societies and the related knowledge methods for its own purposes. As a conclusion, the paper stresses the importance of profoundly critical tools. Such tools are often perceived as being undesirable or even counter-productive in figuring out the mechanism through the very means utilised in providing for security.
- Topic:
- Security, Terrorism, Infrastructure, Cybersecurity, and Rationality
- Political Geography:
- Global Focus
22. Preparing critical infrastructure for the future: Lessons learnt from the Covid-19 pandemic
- Author:
- Amelia Tomalska
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The objective of this paper is to provide a view on the problem of insufficient state protection of critical infrastructure throughout the Covid-19 crisis. The paper looks at this problem with regard to the definition of critical infrastructure, its content, and also the limitations of current approaches to critical infrastructure protection. The examples relating to the Covid-19 crisis show the practices adopted and suggest possible steps forward. The research methodology implemented in this research is based on a critical analysis of the existing literature. The themes described in this paper show there is an urgent need to change current critical infrastructure protection approaches to a resilience-based modus operandi. Specifically, this paper highlights the need to shift the understanding of critical infrastructure from an object-oriented approach towards essential services/functions and to highlight its complex, socio- technical nature. It also highlights the deficiencies of current, prevention-based approaches to critical infrastructure protection such as the insufficient focus on identification and management process of vulnerabilities, especially in relation to (inter)dependencies resulting from interconnections with other systems. The gravity of the situation caused by the Covid-19 pandemic, despite its negative connotations, can be used as an opportunity to examine the real condition of protection of critical infrastructure. The pandemic suggests that there is much left to be done and because of the unpredictability of the future, we need to start acting as soon as possible.
- Topic:
- Security, Infrastructure, Resilience, COVID-19, and Protection
- Political Geography:
- Global Focus
23. Abstraction-decomposition space for critical infrastructure systems: A framework for infrastructure planning and resilience policies
- Author:
- Stig Rune Sellevåg
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The objective of this work has been to propose a framework that will aid governments with the development of more coherent and effective infrastructure planning and resilience policies through a system-of-systems approach that is grounded in theory for complex sociotechnical systems. The framework has been developed by using a work domain analysis (WDA). The WDA consists of an abstraction hierarchy analysis and a part-whole decomposition. Together, the abstraction hierarchy and the part-whole description form the abstraction-decomposition space (ADS) for which the system constraints apply. By imposing constraints, the WDA promotes design for adaptation where actors within the system are allowed to adapt their behaviour as they find appropriate without violating the system’s constraints. The proposed ADS consists of five levels of abstraction and four levels of decomposition. By applying the ADS, it will aid decision making related to the overall purposes of the critical infrastructure system, the values and priority measures that are used to assess the system’s progress towards the functional purposes, as well as formulation of infrastructure needs that are necessary to achieve the functional purposes. The framework is formative in the sense that it reveals how work can be done in the critical infrastructure system. This is important because it is not feasible to prescribe, describe and risk assess all possibilities for action that are available in complex sociotechnical systems, especially when dealing with unforeseen events. Future research should focus on finding science-based yet useful in practice ways for establishing values and priority measures that encompass sustainability issues and resilience standards.
- Topic:
- Security, National Security, Infrastructure, Resilience, Economic Security, and Adaptation
- Political Geography:
- Global Focus
24. High power wireless power transfer for the future of the battlefield challenges
- Author:
- Mohamed Zied Chaari, Rashid Al-Rahimi, and Otman Aghzout
- Publication Date:
- 12-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- A significant challenge for the military lab is to reduce the weight of a combatant’s battery on the battlefield. Soldiers use electronic devices powered by wearable batteries in landings, operational combat with the enemy, and defensive exercises. Soldiers should always fully charge their wearable batteries before carrying them. The average weight of the battery is approximately 20 kilograms. During military operations, fighters have numerous electronic devices, such as night-vision goggles, headphones, LMR, navigation systems, VHF radios, and sensors. There is a high probability that fighters will lose their lives if the battery they take is uncharged or empty. Many research studies have tried to increase fighting time and maintain soldier life and links based on these devices. In this work, a wireless power transmission system with an RF microwave station and RF/DC converter circuit incorporated into a bulletproof vest will be designed. This system can harvest RF microwave energy to recharge or energize the wearable battery during a military operation. The challenge here is to develop a compact device that can capture the maximum RF strength to charge batteries carried by soldiers. The proposed device therefore considers all parameters to provide sufficient energy to power a computer at 13 watts. The strength of the RF power varies with the distance between the microwave power station Pin = 100 W and the receiver circuit.
- Topic:
- Security, Science and Technology, Armed Forces, and Military
- Political Geography:
- Global Focus
25. Climate-Migration: A Security Analysis within the Context of Green Theory
- Author:
- Tayyar Ari and Faith Bilal Gokpinar
- Publication Date:
- 01-2021
- Content Type:
- Journal Article
- Journal:
- Uluslararasi Iliskiler
- Institution:
- International Relations Council of Turkey (UİK-IRCT)
- Abstract:
- This study aims to discuss climate migration as a relatively new global issue with various dimensions and to widen the current perspective within global politics to be more inclusive and ecocentric. This study argues that traditional international relations theories and practices are ineffective in discussing and analyzing climate migration as a new global security problem. After a discussion of the conceptual problems, the traditional paradigms of international relations, their policy implications, and the traditional actors will be identified as the primary sources of this problems. Finally, we will conclude that the application of an ecocentric perspective, with holistic characteristics, will provide a better understanding of the current problems.
- Topic:
- Security, Climate Change, Environment, Migration, and Green Technology
- Political Geography:
- Global Focus
26. "Is the Internet Trying to Kill Us?" And other Technology Security Unknowns In the New Roaring Twenties
- Author:
- Miles Taylor
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Machines are poised to transform life as we know it... and America isn’t ready. A hundred years ago, machines remade the world. Society in the 1920s was transformed by a proliferation of cars, radios, movies, and airplanes, dramatically altering the way we lived, worked, and played. We did not know it then, but the sweeping technology revolution was poised to change the way we fought, too. The 1930s saw a revolution in military affairs as warfare became deadlier and faster-paced, a foreseeable consequence of the previous decade’s innovations.278 This nevertheless caught many nations by surprise, such as those affected by the German blitzkrieg. We are entering a New Roaring Twenties, and again we are unprepared for how it will affect national security in the decades to come. Make no mistake: today’s innovations will be tomorrow’s economic drivers, which is why we should be actively investing in the bleeding-edge tech of the future. But we must also be vigilant about how such developments will affect our security at home and reshape international conflict, or else risk a reordering of the global balance of power. This article previews several emerging technology dilemmas, what’s being done about them, and why—in some cases—it’s already too late.
- Topic:
- Security, Science and Technology, Cybersecurity, Internet, and Innovation
- Political Geography:
- Global Focus
27. The Climate-Security Century: Three Climate Hotspots
- Author:
- Mark Nevitt
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The climate-security century is here. With global temperatures rising, climate change is poised to massively destabilize the physical environment. This century may well be defined by our ability (or inability) to reduce our collective greenhouse gas emissions. We must also adapt and respond to climate change’s multivariate security impacts. From raging wildfires in Australia and California to melting ice sheets and permafrost in the Arctic, climate change acts as both a threat accelerant and a catalyst for conflict. Climate change is also unlike any other traditional security threat. It accelerates and exacerbates existing environmental stressors—such as sea level rise, extreme weather, drought, and food insecurity—leading to greater instability. Climate change impacts are already taking center stage this century, forcing us to think more broadly about climate change’s relationship with human security and national security. Complicating matters, climate-driven temperature increases do not rise in a neat, uniform fashion around the globe. The pace of climatic change unfolds unevenly and erratically. Some parts of the world—such as the Arctic—are warming at a rate two to three times faster than the rest of the world. Three specific climate-security “hotspots” foreshadow greater destabilization and serve as climate “canaries in a coal mine”—a sneak preview of our climate-destabilized future.
- Topic:
- Security, Climate Change, National Security, and Human Security
- Political Geography:
- Global Focus
28. Pandemic Preparedness: A Conversation with Dr. Jennifer Nuzzo (Interviewed by Dana Hatic)
- Author:
- Jennifer Nuzzo and Dana Hatic
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Fletcher Security Review (FSR): Dr. Nuzzo, thank you for taking the time to speak with FSR today. I would love if you could give us a brief introduction and tell me about what your role has been like since the start of the pandemic. Jennifer Nuzzo (JN): I am an assistant professor at the Johns Hopkins Bloomberg School of Public Health. I am also a senior scholar at the Johns Hopkins Center for Health Security and a senior fellow at the Council on Foreign Relations. I have been involved working on COVID-19 since the first news of an outbreak in China. I run a project called the Outbreak Observatory, which does operational research to improve outbreak responses. One of our activities is to publish a weekly blog, which we do to take stock of what is going on in the world and to try to learn about events—even if we are not actively doing research projects on them, just reminding people that things are happening all the time.
- Topic:
- Security, Interview, Pandemic, and COVID-19
- Political Geography:
- Global Focus and United States of America
29. Post-Covid Security Landscape: A Conversation with Raffaelo Pantucci
- Author:
- Raffaello Pantucci
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Fletcher Security Review (FSR): Thank you for joining FSR today. To begin, what challenges do you believe countries or security practitioners will face in preventing terrorism or countering violent terrorism in a postCOVID-19 world? Raffaelo Pantucci (RP): There are going to be a lot of challenges. The difficulty with trying to make judgments about what is going to happen in a post-COVID world is that we are not in the post-COVID world yet. We are still in the midst of the pandemic, so a lot of this work and assumptions that we look into are based on assessments of what we think could happen. I think a number of things will happen. First, I think we are going to see real pressure on security forces’ resources. On the one hand, kinetic security forces—police and intelligence services—probably will not suffer too much. But the real dilemma will come with some of the upstream funding. Money is being used to try to stop people from being drawn to violent groups in the first place. Countering violent extremism projects will face immense challenges since it is very hard to understand and make direct causal links between the issues the programs are addressing and the ultimate threats. We are going to see a push on budgets and that will result in cuts for security forces. These will have an impact in different ways in different places. Unfortunately, terrorist threats are global. You can have a good grip on your threat matrix, but it has links across borders which are beyond your control. This creates a potential risk if a country you are connected to does not have a grip on their security and are under the same sort of budgetary pressures, then it is possible you will see a negative knockon effect.
- Topic:
- Security, Terrorism, Interview, and COVID-19
- Political Geography:
- Global Focus
30. Grievance in Space and Time: The State, Militias, and the Irredentist Temptation
- Author:
- Bradford McGuinn
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The armed militia is an emblem of political decay. With the weakening of institutions designed to regulate the ambitions and anxieties of those inhabiting a state, and with the erosion of a political culture meant to confer legitimacy upon the rituals of governance, martial energy once held to constitutional prescription in the service of impersonal public rule can be redirected toward private purpose. Dissenting factions within a governmental structure, groups seeking its overthrow, or militias fighting within society itself challenge the viability of states, stability in their regions, and international order. This essay will consider ways in which narratives of grievance play dangerously upon the triangular system of mutual obligation that ideally orders interaction between a state, society, and the military. In this configuration of civil-military relations, the state exercises a “legitimate monopoly” on the production of violence, binding militaries to civilian control. Acting as an acid upon the alloy of this triangle, allowing leakage of “privatized” violence, is a dissatisfaction with a configuration of geography, politics, and culture of such intensity that reality can be considered oppressive.
- Topic:
- Security, Armed Forces, State, and Militias
- Political Geography:
- Global Focus
31. Journal of Advanced Military Studies: Political Warfare and Propaganda
- Author:
- James J. F. Forest, Daniel De Wit, Kyleanne Hunter, Emma Jouenne, Glen Segell, Lev Topor, Alexander Tabachnik, Donald M. Bishop, Phil Zeman, Michael Cserkits, and Anthony Patrick
- Publication Date:
- 03-2021
- Content Type:
- Journal Article
- Journal:
- Journal of Advanced Military Studies
- Institution:
- Marine Corps University Press, National Defense University
- Abstract:
- The digital age has greatly expanded the terrain and opportunities for a range of foreign influence efforts. A growing number of countries have invested significantly in their capabilities to disseminate online propaganda and disinformation worldwide, while simultaneously establishing information dominance at home. Each of the contributions to this issue addresses the central theme of influencing perceptions and behavior. First, Daniel de Wit draws lessons from a historical analysis of the Office of Strategic Services (OSS), America’s intelligence and special operations organization in World War II. In addition to its efforts to collect intelligence on the Axis powers and to arm and train resistance groups behind enemy lines, the OSS also served as America’s primary psychological warfare agency, using a variety of “black propaganda” methods to sow dissension and confusion in enemy ranks.82 As noted earlier, psychological warfare plays a significant role in the conduct of today’s military operations, so de Wit’s research offers important historical lessons for contemporary campaign planners. Next, Kyleanne Hunter and Emma Jouenne examine the uniquely troubling effects of spreading misogynistic views online. Their analysis of three diverse case studies—the U.S. military, the incel movement, and ISIS— reveals how unchecked online misogyny can result in physical behavior that can threaten human and national security. Glen Segell then explores how perceptions about cybersecurity operations can have positive or negative impacts on civil-military relations, drawing on a case study of the Israeli experience. Lev Topor and Alexander Tabachnik follow with a study of how Russia uses the strategies and tactics of digital influence warfare against other countries, while continually seeking to strengthen its information dominance over Russian citizens. And Donald M. Bishop reveals how other countries do this as well, including China, North Korea, Iran, Cuba, and Venezuela. Each is engaged in these same kinds of efforts to control the information that circulates within their respective societies, while using various forms of propaganda against other countries to strengthen their influence and national power. Phil Zeman’s contribution to this issue looks at how China and Russia are trying to fracture American and Western societies through information, disinformation, economic coercion, and the creation of economic dependencies— in many cases capitalizing on specific attributes and vulnerabilities of a target nation to achieve their strategic objectives. Through these efforts, he concludes, China and Russia hope to prevent the will or ability of American or Western states to respond to an aggressive act. Next, Michael Cserkits explains how a society’s perceptions about armed forces can be influenced by cinematic productions and anime, drawing on a case study comparison of Japan and the United States. And finally, Anthony Patrick examines how social media penetration and internet connectivity could impact the likelihood that parties within a conventional intrastate conflict will enter negotiations. As a collection, these articles make a significant contribution to the scholarly research literature on political warfare and propaganda. The authors shed light on the need for research-based strategies and policies that can improve our ability to identify, defend against, and mitigate the consequences of influence efforts. However, when reflecting on the compound security threats described at the beginning of this introduction—involving both cyberattacks and influence attacks—a startling contrast is revealed: we have committed serious resources toward cybersecurity but not toward addressing the influence issues examined in this issue. We routinely install firewalls and other security measures around our computer network systems, track potential intrusion attempts, test and report network vulnerabilities, hold training seminars for new employees, and take many other measures to try and mitigate cybersecurity threats. In contrast, there are no firewalls or intrusion detection efforts defending us against digital influence attacks of either foreign or domestic origin. Government sanctions and social media deplatforming efforts respond to influence attackers once they have been identified as such, but these efforts take place after attacks have already occurred, sometimes over the course of several years. The articles of this issue reflect an array of efforts to influence the perceptions, emotions, and behavior of human beings at both individual and societal levels. In the absence of comprehensive strategies to more effectively defend against these efforts, the United States risks losing much more than military advantage; we are placing at risk the perceived legitimacy of our systems and institutions of governance, as well as our economic security, our ability to resolve social disagreements peacefully, and much more.83 Further, many other nations are also facing the challenges of defending against foreign influence efforts. As such, the transnational nature of influence opportunities and capabilities in the digital age may require a multinational, coordinated response. In the years ahead, further research will be needed to uncover strategies for responding to the threat of digital influence warfare with greater sophistication and success.
- Topic:
- Security, National Security, Politics, Science and Technology, Military Affairs, Women, Radicalization, Cybersecurity, Internet, History, World War II, Propaganda, Deterrence, Disinformation, Israel Defense Forces (IDF), Digital Policy, Psychological Warfare, and Misogyny
- Political Geography:
- Russia, Japan, China, Israel, Global Focus, and United States of America
32. Intrastate cultural and socio-political influences and the realisation of national security: A two-level correlational analysis
- Author:
- Dimitrios G. Pantazis
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- This paper aims to examine how specific domestic social, political, and cultural motives affect the formation and implementation of national security agendas. The following assumptions drive the research rationale behind this essay: Security-making processes are considered non-similar among states due to different domestic political processes, cultural discourses, and socialisation patterns. Therefore, national security agents are constantly being guided by various intrastate settings, which construct attitudes that are ultimately reflected in policy formation and implementation through strategic behavioural manifestations. The realisation of national security is thus dependent on each state actor’s existent strategic culture, and given that, such choices cannot be contemplated in a strictly rational way. The methods of literature review and multi-layered analysis are applied throughout this study. In particular, this text’s reasoning is based on contextualisation, identification, categorisation of variables, and correlational implications. In relation to the findings, the theoretical examination of the objects assessed provides adequate clarification on the interaction between the domestic motives, decision-makers’ perspectives, and strategic cultural manifestations. Specifically, it was critically identified that the two last concepts can have a complementary function during security-making processes, hence producing unique outcomes for each state actor. Consequently, this paper wishes to contribute by giving direction for future research and broader methodological implications on the role of intrastate socio-political and cultural motives as sources of strategic culture and determinants of national security-making attitudes; without ignoring other factors that can respectively affect the aforementioned schemes.
- Topic:
- Security, National Security, Politics, Culture, and Decision-Making
- Political Geography:
- Global Focus
33. Modelling computer networks for further security research
- Author:
- Zsolt Bederna and Tamás Szádeczky
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Computer networks are usually modelled from one aspect, e.g., the physical layer of the network, although this does not allow the researcher to understand all usage of that device. We aim to develop a model which leverages all aspects of a networked computer and, therefore, provides complete information to the scientist for all further security research, especially that related to the social sciences. Network science is about the analysis of any network, from social to protein. It is much easier to analyse computer networks with technical tools than protein networks. It is, therefore, a straightforward way to crawl the web as Albert-Laszlo Barabasi did to model its connections, nodes, and links in graph theory to analyse its internal connections. His analysis was based solely on the network layer. Our methodology uses graph theory and network science and integrates all ISO/OSI (computer networking) layers into the model. Each layer of the ISO/OSI model has its topology separately, but all of them also work as part of the complex system to operate the network. It therefore creates a multipartite graph of the network under analysis. Furthermore, the virtual private networks (VPNs) and application usage are also integrated as nodes and links. With this model, the computer network infrastructure and usage data can be used for further non-computing related research, e.g., social science research, as it includes the usage patterns of the network users.
- Topic:
- Security, Science and Technology, Networks, and Computer Science
- Political Geography:
- Global Focus
34. Paving the way to the Security Council: NGOs’ activism on women’s and children’s issues
- Author:
- Yamya Rocha Rebelo
- Publication Date:
- 12-2021
- Content Type:
- Journal Article
- Journal:
- Revista Brasileira de Política Internacional (RBPI)
- Institution:
- Instituto Brasileiro de Relações Internacionais (IBRI)
- Abstract:
- The relationship between the United Nations Security Council and Non- Governmental Organizations has scarcely been considered in scholarship on international security. This lack of academic interest contrasts with accounts on the engagement of NGOs in the production and advancement of UNSC discussions on women and children. By drawing on international relations and social movements’ theoretical contributions, the paper traces NGOs’ strategies to participate in UNSC thematic debates. By looking at the actions of the Watchlist on Children and Armed Conflict and the NGO Working Group on Women, Peace, and Security, the analysis finds that NGOs have built coalitions among themselves and maintained networks with friendly countries and UN specialized agencies to capitalize on favorable political and institutional opportunities and expand the access to the security sector.
- Topic:
- Security, Gender Issues, United Nations, Children, Women, and NGOs
- Political Geography:
- Global Focus
35. The Enduring Relevance of Naval Power: Reflections on Defence, Security and Power Projection of Sea Frontier
- Author:
- Samuel Oyewole
- Publication Date:
- 07-2021
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- The sea/maritime domain is a critical frontier of human exploration and exploitation for food production, transportation, commerce, research, communication, mining, defence, security, power projection and prestige in international system. These made it a frontier of strategic cooperation, competition and conflict. Consequently, the sea has been militarised by littoral states, which have led to the rise of naval powers, across time and space. Naval power is strategically relevant in defence, security and power projection, as evident in its roles in warfare, deterrence, policing, and diplomacy across history. This is even more pronounced during the golden age of naval power, when the roles of the navy were decisive in outcomes of war, territorial defence and conquest, empire building and maintenance, bargaining, industrialisation, commerce and global policing. However, the strategic relevance of naval power has undergone notable changes with the rise of air, nuclear and space powers. Against this background, this article examines the enduring strategic relevance of naval power over the last century, vis-à-vis its challenges and prospects among other instruments of force and frontiers of defence, security and power projection that have emerged.
- Topic:
- Security, Defense Policy, Military Strategy, Navy, and Maritime
- Political Geography:
- Global Focus
36. Prioritization of Multilaterialsm Agreements on Export Control of Defense Products and Sensitive Technologies by Hierarchical Analysis Process
- Author:
- Luiz Octavio Gaviao, Luciano Dias Dutra, and Sergio Kostin
- Publication Date:
- 07-2021
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- This paper proposes a model to support the decision to choose which multilateral export control regime of defense products and sensitive technologies in which Brazil does not yet participate, namely, Wassenaar Arrangement, Australia Group and Zangger Committee, should be prioritized for adhesion. For the development of this model, the Analytic Hierarchy Process (AHP) method was used, considered adequate for solving problems where criteria are qualitative and decisions tend to be based on personal experiences. The hierarchical structure of the problem used seven criteria (Country Legislation, Regulatory System, Licensing Structure, Enforcement Capacity, International Cooperation, Costs of Adhesion and Benefits for the Defense Industrial Base) to compare the three mentioned agreements. A questionnaire was set up and specialists related to National Defense were selected to answer them, after which their answers were collected, standardized, processed and analyzed. At the end, the agreements were ordered by preference to support decision making, illustrating the application of the proposed model.
- Topic:
- Security, Defense Policy, Military Strategy, Multilateralism, and Defense Industry
- Political Geography:
- Global Focus
37. Security Studies in International Relations: Evolution, Approaches and Contemporary Challenges
- Author:
- Ali Muhammad and Sugeng Riyanto
- Publication Date:
- 07-2021
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- This article examines the growth and evolution of security studies since its emergence to the end the Cold War. Security studies as a subfield in international relations was dominated by realist approach during the Cold War. However, by the of the cold war, the concept of security was debated between the widener–deepener. Not only about the concept, but variety of theoretical approaches also emerged to challenge the traditional realist/liberal approach, such as, constructivism, critical theory, feminism, human security and postcolonialism. There were crucial differences in how these competing approaches constituted referent objects, the sectors to which security is applicable, and epistemological position as well.
- Topic:
- Security, Political Theory, Intellectual History, and Post Cold War
- Political Geography:
- Global Focus
38. Who Feels Climate Anxiety?
- Author:
- Sarah Jaquette Ray
- Publication Date:
- 10-2021
- Content Type:
- Journal Article
- Journal:
- Cairo Review of Global Affairs
- Institution:
- School of Global Affairs and Public Policy, American University in Cairo
- Abstract:
- In the simplest terms, the answer is: it depends on who perceives it as a threat, and what “anxiety” means to them.
- Topic:
- Security, Climate Change, Environment, and Natural Disasters
- Political Geography:
- Global Focus
39. Cybersecurity Politics – Conceptualization of the Idea
- Author:
- Marek Gorka
- Publication Date:
- 01-2021
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The cybersecurity issue discussed in the paper is seen from the perspective of political science with the indication that the subject under discussion concerns the multifaceted nature of the state’s actions, which consists of political, economic, social, and cultural factors. At the same time, the work also intends to prove that cybersecurity is not only a domain of technology because it is the mentioned aspects that shape the conditions of stable development of the state and its citizens in a space dominated by cyber technology in a much more decisive way. Given the growing role of cybertechnology in almost all areas of human life, its importance also forces and inspires political science to question the shape and model of modern policy, which is significantly evolving under the influence of new technologies. On the one hand, emerging cyber threats reveal the weakness of the state and the dependence of state institutions on cybertechnologies, but on the other hand, existing cyber incidents may also motivate many governments to take action to increase the level of cybersecurity.
- Topic:
- Security, International Cooperation, Politics, Cybersecurity, and Conflict
- Political Geography:
- Global Focus
40. Mass Migration as a Hybrid Threat? – A Legal Perspective
- Author:
- Sascha Dov Bachmann and Anthony Paphiti
- Publication Date:
- 01-2021
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- Migration as a weapon sounds like a policy statement by resurgent nationalistic parties (and governments) in the West. However, politics and the human cost aside, what if an adversary (both state and non-state actor) does exploit the current global crisis of mass migration due to globalization, war, and political unrest? This article will look at the ongoing mass migration to the European Union within the wider security context of the so-called hybrid threats and/or ‘grey zone’ tactics. It looks at the various legal categories of migration as how the law can be weaponized as so-called ‘lawfare’ to undermine the existing legal frameworks distinguishing between legal and illegal migration. The authors recognize the possibility that this article will be used as an argument by the political actors involved for their nationalistic and anti-migration politics and policies. Yet, we believe that the potential of abusing the current vacuum for political gains along ideological party lines makes it necessary to provide a wider legal-security focused perspective on mass migration.
- Topic:
- Security, Migration, Immigration, Law, Border Control, and Humanitarian Crisis
- Political Geography:
- Global Focus
41. Public Security and Public Order – Conceptual and Institutional Scope
- Author:
- Janusz Gierszewski and Andrzej Pieczywok
- Publication Date:
- 01-2021
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The publication aims to analyze public security and public order in conceptual and institutional terms as an analytical category of security sciences. The legislator defines neither public security nor public order. So far, they have been treated mainly as categories of administrative law. It is therefore important to assign them analytical content in the new scientific discipline. The research results allowed for the presentation of the thesis that public security and public order are mainly connected with protection against pathological phenomena occurring in the public space, which are minimized by institutions established to ensure it. These categories should constitute the research field (subject) of the security sciences. The research problem formulated in the form of the question: How are public security and public order treated in definitional and institutional terms? The problem was solved based on a critical analysis of the literature. The paper uses theoretical research methods, including analysis of literature and phenomena occurring in society and inference – as a cognitive factor of the subject of analysis. A critical analysis of the literature on this issue played a large role in the cognitive process.
- Topic:
- Security, Political Theory, Public Policy, and Social Order
- Political Geography:
- Global Focus
42. Cybercrime on the Example of Selected Botnets
- Author:
- Przemysław Mazurczak
- Publication Date:
- 01-2021
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The article presents threat analysis resulting from botnet activity on the Internet. Botnet networks are a very common tool among cybercriminals. They enable the acquisition of large amounts of data from computers infected with the virus that creates the given network entirely subordinated to its creator. Currently, many unidentified botnets are a threat to Internet users. Those identified and diagnosed answer the problem of how dangerous a botnet is in the hands of cybercriminals. The article presents statistics and analysis of selected botnets. Currently, there is a decline in the interest in botnets in cybercrime, although many new threats appear, suggesting that botnets will continue to be popular and are still a dangerous weapon in the hands of criminals.
- Topic:
- Security, Crime, Cybersecurity, Information Technology, and Digitalization
- Political Geography:
- Global Focus
43. Multilateralism and the Superpower
- Author:
- Jeremy Greenstock
- Publication Date:
- 02-2021
- Content Type:
- Journal Article
- Journal:
- American Diplomacy
- Institution:
- American Diplomacy
- Abstract:
- Editor’s note: The author served as UK Ambassador to the UN 1998-2003. The UN, with its network of institutions and agencies, is the only truly global organisation. It is a great experiment, not in global governance, because the political direction of the UN lies firmly in the hands of sovereign nations, but in providing both norms and tools for managing the international arena 1. Its system is flawed and may well be unimprovable. But what it tries to do, and does, is indispensable for the avoidance of catastrophic war and for the development of a sustainable world. The UN as an institution is also, not unlike the American Constitution, an adversary of raw power. Born in an era of war and empire, its charter and principles provide shelter and help for weaker nations, and set limitations on the capacity of the strongest countries to throw their weight around selfishly—the generator of empires and wars. It came into being at the instigation of the great powers, and so they know —or they used to know—what they were creating and why. The United States was at the centre of it, seeing it as a great step towards the ending of the era of imperialism. The UN is not just about what happens in the Security Council. The work of the Secretariat, the funds, agencies and programmes, and indeed of several of the intergovernmental institutions such as ECOSOC, is primarily dedicated to every aspect of international development. They act on the premise that if a large part of the world is racked by poverty and disease, the more fortunate part will not have a stable environment in which to enjoy their relative success. The history of regional conflict over the last 75 years bears this out. As the UK’s Permanent Representative between 1998 and 2003, with a permanent place on the Security Council, I made a point of setting my inevitable focus on the Council’s work in the context of this wider UN purpose. The maintenance of international peace and security is an essential component of sustainable development, not just an end in itself.
- Topic:
- Security, United Nations, Governance, Sustainable Development Goals, Multilateralism, and Peace
- Political Geography:
- Global Focus and United States of America
44. Research Perspectives and Boundaries of Thought: Security, Peace, Conflict, and the Anthropocene
- Author:
- Judith Nora Hardt
- Publication Date:
- 06-2021
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- The geological era of the Anthropocene is expected to trigger a paradigm shift across the natural and social sciences. Within International Relations(IR), the arrival of the planetary has generated various debates that range from questioning the very future of the discipline to proposals for how to fix IR. This article takes stock of different research perspectives from three disciplines, namely IR, Earth System Sciences and New Materialism/Posthumanism. With reference to these different perspectives, it examines the ways in which peace, conflict and security are related to the Anthropocene. This panoramic overview reveals also certain demarcations between the research approaches, disciplines and study fields, and aims to trigger future research on overcoming these boundaries of thought and push the research on Anthropocene thinking further.
- Topic:
- International Relations, Security, Conflict, Peace, and Anthropocene
- Political Geography:
- Global Focus
45. An Introduction to ‘Peace, Conflicts and Security in the Anthropocene: Ruptures and Limits’
- Author:
- Ignasi Torrent
- Publication Date:
- 06-2021
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- Throughout the last two decades, numerous disciplines across the natural and social sciences have witnessed the increasing influence of an emerging set of contemporary theoretical trends that delve into the entanglements between the human and its material milieu (see Haraway, 2016; Latour, 2005).Beyond rigid attributed labels, including new materialisms,Actor-Network theory, speculative realisms and object-orientedontology, amongst others, the genealogy of these theoretical movements arguably traces back to the confluence of two mutually reinforcing processes. On the one hand, the current unprecedented techno-scientific progress in areas such as Earth System Sciences and Science and Technology Studies has led to compelling narratives on unsettling events, including the potential effects of global warming as well as the uncertain future implications of developments in fields as, for instance, Artificial Intelligence. As a result of these challenges and speculations, the hypothetical finitude of the human being on the planet, far from abstract apocalyptic discourses, has become a strikingly perceptible experience. In other words, the stories about the distinctive, superior and masterful character of the human on Earth increasingly seem to fade, and its future seems unquestionably inextricable from broader beyond-the-human phenomena(see Tsing, 2015).The present age in which the human has compromised its own existence, or at least its position of dominance, to anthropogenic processes that surpass the sphere of human control has been defined by many scholars as the Anthropocene (see Crutzen &Stoermer, 2000).On the other hand, the tenets of this growing theoretical rubric claim the exhaustion and incapacity of the post-positivist paradigm, arguably the dominant register within critical theory over the last forty years, as unable to provide analytical tools that enhance the comprehensive understanding of the repositioning of the human in the Anthropocene era(see Bryant, Srnicek &Harman, 2011).To be precise, the limits of textual, discursive and semiotic methodological techniques are exposed as insufficient to capture and examine how Anthropocenic processes of transformation are reconfiguring the role of the human on the planet, let alone the relations with its environment.
- Topic:
- Security, Conflict, Peace, and Anthropocene
- Political Geography:
- Global Focus
46. Securitising Covid-19? The Politics of Global Health and the Limits of the Copenhagen School
- Author:
- Daniel Elder Duarte and Marcelo Mello Valenca
- Publication Date:
- 08-2021
- Content Type:
- Journal Article
- Journal:
- Contexto Internacional
- Institution:
- Institute of International Relations, Pontifical Catholic University of Rio de Janeiro
- Abstract:
- The COVID-19 pandemic has sparked controversies over health security strategies adopted in different countries. The urge to curb the spread of the virus has supported policies to restrict mobility and to build up state surveillance, which might induce authoritarian forms of government. In this context, the Copenhagen School has offered an analytical repertoire that informs many analyses in the fields of critical security studies and global health. Accordingly, the securitisation of COVID-19 might be necessary to deal with the crisis, but it risks unfolding discriminatory practices and undemocratic regimes, with potentially enduring effects. In this article, we look into controversies over pandemic-control strategies to discuss the political and analytical limitations of securitisation theory. On the one hand, we demonstrate that the focus on moments of rupture and exception conceals security practices that unfold in ongoing institutional disputes and over the construction of legitimate knowledge about public health. On the other hand, we point out that securitisation theory hinders a genealogy of modern apparatuses of control and neglects violent forms of government which are manifested not in major disruptive acts, but in the everyday dynamics of unequal societies. We conclude by suggesting that an analysis of the bureaucratic disputes and scientific controversies that constitute health security knowledges and practices enables critical approaches to engage with the multiple – and, at times, mundane – processes in which (in)security is produced, circulated, and contested.
- Topic:
- Security, Health, Pandemic, and COVID-19
- Political Geography:
- Global Focus
47. Naming Terror: Impact of Proscription on Negotiations with Non-State Armed Groups
- Author:
- Flavia Eichmann
- Publication Date:
- 05-2020
- Content Type:
- Journal Article
- Journal:
- Journal of Public and International Affairs (JPIA)
- Institution:
- School of Public and International Affairs (SPIA), Princeton University
- Abstract:
- This article explores what impact terrorist blacklists have on negotiated solutions to armed conflicts involving listed non-state armed groups. Even though conflicts that involve non-state armed groups do not usually end through these groups’ military defeat, governments around the globe tend to adopt hard-security approaches with regard to inner-state conflicts. Especially when groups resort to terrorist tactics, governments tend to be reluctant to engage peacefully with these actors and instead commonly rely on terrorist blacklists in order to delegitimize and restrict groups’ activities. While these blacklists are effective in criminalizing the operations of these groups, they can also severely impede peaceful dialogue and thus negatively impact the resolution of conflicts. Especially the work of NGOs and third-party peace practitioners is greatly constrained by criminalizing any form of interaction with listed groups. Additionally, in the absence of a universal definition of what constitutes a terrorist group, lists vary from country to country and the criteria for groups and individuals to get listed are often extremely vague. Furthermore, most lists fail to re-evaluate the proscribed groups on a regular basis and delisting procedures lack transparency. This article finds that blacklists severely disincentivize peaceful engagement with non-state armed groups and thus calls for a revision of contemporary proscription regimes in order to shift the focus of counterterrorism approaches towards viewing peaceful dialogue as a first option and not a last resort.
- Topic:
- Conflict Resolution, Security, Terrorism, Non State Actors, Violent Extremism, Negotiation, and Peace
- Political Geography:
- Global Focus and United States of America
48. The Influence of Diplomacy on Controversies: A Comparative Study Between Diplomatic Mediation and Armed Conflict
- Author:
- Cícero Ricci Cavini
- Publication Date:
- 06-2020
- Content Type:
- Journal Article
- Journal:
- Brazilian Journal of African Studies
- Institution:
- Brazilian Journal of African Studies
- Abstract:
- International Security developed after the World War II, under the aspect of state protection. Traditional security currents have developed their theories in a Cold War environment, thus, there are epistemological elements of Rationalism and Positivism (Barrinha 2013; Lasmar 2017). The goal of this study is to observe the influence of diplomacy on international controversies, analyze real situations where diplomacy influenced the mediation choice and the armed conflict choice, and finally, deepen the knowledge of the consequences of war and mediation. The article has its theoretical framework on Post-Structuralism, characterized by Lasmar (2017) by the conditioning of the human being as meaning and attributor of the facts (social construction). In the International Security sphere, Post-Structuralism must nominate the threat or the protection as also the means for this. Therefore, it can expose the hidden intentions in the act of political construction (including political speech). The authors and researchers Christer Jönsson and Karin Aggestam question the preference of the states for mediation or war, and, given that, we intend to contribute with analysis under the diplomatic prism. Thus, we can align the revisited theory to the diplomatic actions, collaborating with the international security system.
- Topic:
- Conflict Prevention, International Relations, Security, and Diplomacy
- Political Geography:
- Brazil and Global Focus
49. Counter Terrorist Trends and Analyses (CTTA) – Volume 12 Issue 03: COVID-19 and Terrorism
- Author:
- Raffaello Pantucci, Abdul Basit, Kyler Ong, Nur Aziemah Azman, V. Arianti, and Muh Taufiqurrohman
- Publication Date:
- 04-2020
- Content Type:
- Journal Article
- Journal:
- Counter Terrorist Trends and Analysis
- Institution:
- Centre for Non-Traditional Security Studies, S. Rajaratnam School of International Studies
- Abstract:
- The Coronavirus Disease 2019 (COVID-19) pandemic has redefined almost all spheres of modern life. While states around the world are redeploying their financial resources, energies and military capabilities to cope with the challenge of the coronavirus, terrorist groups across the ideological spectrum have positioned themselves to exploit the gaps created by these policy re-adjustments. Terrorist groups are milking people’s fears amid confusion and uncertainty to promote their extremist propagandas. The rearrangement of global imperatives will push counter-terrorism and extremism down the priority list of the international community. Anticipating these policy changes, existing counter-terrorism frameworks and alliances should be revisited to devise cost-effective and innovative strategies to ensure continuity of the fight against terrorist groups. With these considerations in mind, this special issue of the Counter Terrorist Trends and Analyses (CTTA) features four articles that identify and assess important security risks around COVID-19, given its far-reaching social, economic and geopolitical impact. In the first article, Raffaello Pantucci reasons that COVID-19 will have a deep-seated and prolonged impact across government activity, both in terms of the categorisation of risks, as well as the resources available to tackle other issues. Perceptions of risk around terrorist threats may shift, with states grappling with stark economic, social and political challenges. At the same time, security threats continue to evolve, and may even worsen. According to the author, some of the tools developed to deal with the pandemic can potentially be useful in tracking terrorist threats. However, resource constraints will require states, on a global scale, to think far more dynamically about how to adequately buffer much-needed security blankets both within and beyond their borders. In the second article, Abdul Basit outlines the opportunities and potential implications that COVID-19 has created for terrorist groups across the ideological divide. According to the author, terrorist groups have exploited the virus outbreak to spread racial hatred, doomsday and end-of-times narratives. Among jihadist groups, IS has taken a more totalitarian view of the coronavirus pandemic, while Al-Qaeda (AQ) and the Taliban have used it as a PR exercise to gain political legitimacy. Far-right groups in the West have spun it to promote native nationalism, border restoration and anti-immigration policies. Terrorist groups have increased their social media propaganda to radicalise and recruit vulnerable individuals. At the same time, these groups have urged their supporters to carry out lone-wolf attacks and use the coronavirus as a bioweapon. In the post-COVID-19 world, revisiting existing counter-terrorism frameworks to devise more adaptable and cost-effective strategies would be needed to continue the fight against terrorism. In the next article, V. Arianti and Muh Taufiqurrohman observe that the COVID-19 outbreak has had a varied impact on Indonesia’s security landscape. On the one hand, it has emboldened IS-affiliated Indonesian militant groups to step up calls for attacks, with the government seen as weakened amidst a worsening domestic health crisis. On the other, ongoing indoctrination and recruitment activities of militant groups have also faced disruptions. According to the authors, counter-terrorism strategies will need to be reoriented as circumstances evolve, particularly in dealing with the arrest of militants and the subsequent processes of their prosecution and incarceration. Finally, Kyler Ong and Nur Aziemah Azman examine the calls to action by far-right extremists and the Islamic State (IS), which reveals varying degrees of organisational coherence in the respective movements. According to the authors, such variations influence these two groups’ preferred techniques, tactics and procedures adopted in seeking to exploit the health crisis. For its part, IS has a more organised hierarchical structure, even if it has increasingly granted autonomy to its affiliates to plan and execute attacks. In comparison, the absence of a central authority, or command structure in the far-right, can lead to a fragmentation of interests. These factors invariably create uncertainties in how, when and where extremists of both ilk may seek to operationalise an attack.
- Topic:
- Security, Government, Health, Terrorism, Counter-terrorism, Al Qaeda, Islamic State, and COVID-19
- Political Geography:
- South Asia, Indonesia, Southeast Asia, and Global Focus
50. Cybersecurity: State Attack and Response Strategies
- Author:
- Josephine Wolff and Ta-Chun Su
- Publication Date:
- 07-2020
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- . One of the questions that has always been very interesting to me is “Who do we hold responsible when something goes wrong with cybersecurity?” While that is a technical question—because often when something goes wrong, there is a technical component since you are dealing with a computer and the Internet—it also very much has to do with what our liability regimes say, what our policies say, what our social norms and expectations say about who we hold accountable and who is expected to pay for the damage. So for me, I think cybersecurity is about trying to understand what we mean when we talk about the "secure Internet,” what it looks like to have a secure Internet, and who we hold responsible for all the different components of how you get there. To whom do we say “It’s your job not to answer the phishing emails,” or “It’s your job to look for bug traffic on the network.” How do we piece together that entirely complicated ecosystem of different stakeholders, and how do we identify what their different roles and responsibilities should be? ...
- Topic:
- Security, Science and Technology, Cybersecurity, and Interview
- Political Geography:
- Global Focus
51. Secure Communities A Conversation with Carrie Conway
- Author:
- Alexandra Heffern
- Publication Date:
- 07-2020
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- I have worked in development for almost twenty years, but when I declared my focus, I had not originally thought “I definitely want to do conflict-related programming and work in conflict zones.” Given my trajectory though, I organically started to do that. I received my undergraduate degree from the University of Vermont, and at that point the only way to study international development was through their Agricultural Economics program. After finishing school, my first real introduction to the field was when I started working with Oxfam in Boston. At first it was a very administrative position, but then I was lucky and had the opportunity to go overseas as the program officer in Cambodia, which is where I would say I began my career. At that point, I really wanted to work with an NGO — I had not even thought about working with USAID or a contractor — but in Cambodia I had the opportunity to work as a local American hire with USAID. After that I went to Clark University for graduate school, and after Clark I had a number of program management roles for USAID, all of which were in conflict zones. For example, I spent time working in Timor-Leste with Tetra Tech ARD, I spent time in Afghanistan, and I served as Chief of Party in Sudan for a conflict transition program. After being overseas I decided to return to the United States and began working with Chemonics, specifically supporting their Libya and Lebanon programs in the Office of Transition Initiatives...
- Topic:
- Security, Conflict, Interview, and USAID
- Political Geography:
- Global Focus and United States of America
52. The New Institutionalism: A tool for analysing defence and security institutions
- Author:
- Valerijs Bodnieks
- Publication Date:
- 12-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The aim of this paper is to investigate new institutionalism, its trends and their application in the analysis of security and defence institutions. The research is based on an analysis of theoretical literature to explore a system of assumptions about new institutionalism. Different approaches have been examined, including historical, rational choice, and sociological approaches. Historical institutionalism can be applied to identify the usefulness of past decisions, policy choices, appropriate strategy choices, and specific acquisitions for future policymakers, whereas rational choice institutionalism allows us to determine the influence of security and defence institutions on actors and their choices, how actors use the institutional framework for their own benefit, and how actors’ choices influence the state policy. Finally, sociological institutionalism focuses on recognising actors’ cognitive scripts and the changes they undergo, as well as causes that influence and determine cognitive scripts. Defence institutions are based on a precise regulative and normative framework and cognitive scripts of the highest authorities. Therefore, the external framework and the particular political impact on the supranational level can cause changes on the national level. New institutionalism provides an important perspective on the specifics of security and defence policy, actors’ individual and collective goals, their strategies and interests as well as cognitive scripts.
- Topic:
- Security, Defense Policy, Institutions, and Rational Choice
- Political Geography:
- Global Focus
53. Assessment of the effectiveness of the security features of personal wireless networks
- Author:
- Janusz Gierszewski and Michał Matuśkiewicz
- Publication Date:
- 12-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Wireless network communication standards have become very common due to the huge benefits of their application. The use of radio waves to create networks has reduced infrastructure costs and increased the mobility of devices. The advantages of wireless communication (WLAN) also pose a challenge to the security of transmitted data. However, the use of a wireless signal poses certain threats to network security. The aim of the study was to analyse problems related to the security of WLAN 802.11. and assess its resistance to various attack strategies. It was assumed that wireless networks have an insufficient level of security. The assumed assumption is verifiable due to the ability to monitor events in networks. In order to verify the hypothesis, a number of experiments have been carried out in laboratory conditions, concerning the currently used WLAN protections from the IEEE 802.11 family of standards. The electromagnetic waves used for communication are available to the public at a distance of a few / several dozen metres from the communicating devices. It is easy to monitor air traffic using a network card that operates in monitor mode. The communication itself cannot be secured in any way, so data encryption is one way of secure transmission. During the research, the applied security features were successfully broken with the help of publicly available tools. The obtained results are distinguished by a high level of objectivity and reliability in the assessment of applied wireless network security. It was shown that there are still imperfections in the security and it is possible to break the security measures. The consequences of attacks are very serious and lead to a breach of each of the attributes of secure information. Practice has shown that it is impossible to create a wireless network that is fully secure. The findings of the study should be used to develop methods to improve information security, as well as to raise users’ awareness of existing threats. Not all users of wireless networks are aware of how easy some of the commonly used security features are to break.
- Topic:
- Security, Cybersecurity, and Networks
- Political Geography:
- Global Focus
54. Testing the efficiency of laser technology to destroy the rogue drones
- Author:
- Mohamed Zied Chaari and Somaya Al-Maadeed
- Publication Date:
- 12-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- A large body of research shows the increasing numbers of drones attacks despite RF jammer systems and other technologies. This incredible increase in drone attacks means that the existing solutions are not enough to stop it. The objective of the article is to present a study on the combination of a laser beam with an optical focusing system to create a new cannon to crush rogue drones. The experimental method relies on an innovative design incorporating a laser module and groups of optical lenses to focus the power in one point to carbonize any target. Specifically, it is the laser with an adjustable lens position from 477mm to 617mm to focus the laser beam on the desired distant object. We measured the necessary time to burnt acrylic plastic, wood, and hard carton from a distance of 55 metres. It was noticed that the laser efficiency is proportional to the laser power and time the cannon is turned on. Tests on the laser cannon revealed that laser burner technology can destroy illegal drones. However, it was found that the laser is affected by adverse weather conditions, such as fog, rain, and clouds. Apart from that, the frailty of this technique is connected with the stabilizing system requirements, energy, overheating, and the time needed to destroy an object. Regardless of the drawbacks of the technique, the laser is the only solution with high efficiency that can ruin or intercept autonomously programmed drones, as this cannot be achieved by the RF jammer or any other solutions. The procedure can be repeated with new changeables to achieve a postive result, specifically, the use CO2 laser tube with a high-efficiency chiller to increase the laser power.
- Topic:
- Security, Science and Technology, Weapons, Drones, and Laser Technology
- Political Geography:
- Global Focus
55. Countering terrorism in the shadows: The role of private security and military companies
- Author:
- Iveta Hlouchova
- Publication Date:
- 12-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The article identifies the main features of the PSMCs’ involvement in counterterrorism operations and outlines what their future involvement might look like with its implications for international peace and security. The main methods used to gather data and to draw inferences are a content analysis of relevant primary and secondary sources, and a discourse analysis, used as a method of examining the prevailing discourse surrounding the activities of PSMCs, seeking to understand the level of transparency, accountability and attributability of these actors. So far, the PSMCs’ potential for counterterrorism has not been fully exploited. There are many challenges surrounding the existence and operations of PSMCs, mainly lack of transparency and accountability, the continuous significance of the plausible deniability and political expediency PSMCs provide to nation governments, and an insufficient and inadequate international regulatory and control framework with no sanction or enforcement mechanisms. Most recently, the tendency to re-legitimise PSMCs’ activities can be identified. There will most probably be an expansion of PSMCs’ activities in the near future, as climate change consolidates security as a commodity, not a right. Therefore, there is a renewed urgency for adequate and effective international regulatory and control mechanisms on their activities on the international level.
- Topic:
- Security, Privatization, Counter-terrorism, Regulation, and Proxy War
- Political Geography:
- Global Focus
56. Compulsory military service as a social integrator
- Author:
- Ronen Itsik
- Publication Date:
- 09-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Compulsory military service has become very rare over the last 30 years, in the western world. In the past, most countries considered military service as a socialisation platform, given the fact that most of the population was recruited and military units were a "meeting point" for different cultures – because of that the service then was functional as a social integrator. The current research studied changes in social attitude during compulsory military service in Israel, where the society is considered to be essentially divided around ethnical and national issues. This study is based on an analysis of the attitudes of 3200 internet questionnaire participants via social networks in Israel, followed by a U-test of the collected data. Half of the participants were high-school students (average age 17) and half of them discharged soldiers (average age 23). Analysis of the results reveals significant evidence: discharged soldiers tend to be more tolerant then high-school students with regard to other cultures and ethnic origins. A discharged IDF soldier is less afraid of security threats and considers budget prioritisation towards social welfare to be more important than security challenges. These findings show that compulsory military service can still be effective as a social integrator, even in the post-modern world where countries are dealing with migration issues and ethno-national tensions.
- Topic:
- Security, Defense Policy, Army, Conscription, and Social Integration
- Political Geography:
- Israel and Global Focus
57. The future of energy security of states
- Author:
- Jarosław Gryz
- Publication Date:
- 06-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The work focuses on the controversy about technological progress and unlimited access to all kinds of energy acquisition, storage and distribution. It suggests a formula for energy acquisition and usage which embraces issues of peace and war, social conflicts, and stability determined by access to energy conditioned by the state of the climate of our planet. The question is how will an interdisciplinary combination of progress and future implementation of technologies influence energy security of states and social entities, their natural environment, up to 2030 and beyond? The methods used in the work rely on a non – linear approach to disruptive technologies combined with empirical verifiability of scientific progress in the field of energy acquisition and use. They are reinforced with drivers taken from development scenarios gained through technological development in quantum mechanics, molecular biology, and computational techniques. The result is a conceptual approach to energy acquisition and distribution for states, their communities and individuals regardless of whether the technologies are “civil” or “military” in their essence. The recalled disruptive technologies shape factors of social development and create conditions for human existence and the natural environment that influence the security of states and social entities. The development of automation and robotics, digital transformation, bio-technologies and cognitive science creates new energy security for states, social entities and the natural environment. Technologies for the generation, processing and distribution of energy create an almost unlimited perspective of reconfiguration of existing forms of life and their safety.
- Topic:
- Security, Energy Policy, Science and Technology, and State
- Political Geography:
- Global Focus
58. Coronavirus and the Future of Globalization
- Author:
- Aamer Raza
- Publication Date:
- 12-2020
- Content Type:
- Journal Article
- Journal:
- Review of Human Rights
- Institution:
- Society of Social Science Academics (SSSA)
- Abstract:
- Coronavirus Pandemic has generated a discussion regarding the future of globalization. This article places this new wave of pessimism regarding the future of globalization in the broader tension surrounding globalization that has existed in international relations discourse since the end of the Cold War. The article points out some of the previous challenges endured by globalization. It also points out that whereas at this point popular media and news commentary portray pessimism as the dominant feeling, the trend towards multilateralism and global cooperation is also discernable in other responses to the pandemic.
- Topic:
- Security, Globalization, Populism, Multilateralism, Coronavirus, and COVID-19
- Political Geography:
- Global Focus
59. Migrations and Security. The Problematic Circularity ‘Philosophy, Law and Politics’
- Author:
- Giovanni Bombelli
- Publication Date:
- 05-2020
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- This article focuses on the problematic nexus migration-security, which calls into question classical philosophical-legal and political categories (State, law, territory) dating back to the origins of the modernity. The analysis of Hobbes’ and Grotius’ insights allows to grasp the distance between the modern framework and the post-modern scenarios. The contemporary complex societies are characterized by fundamental socio-legal transitions, in particular as regards the notion of “privacy”, and by the progressive implementation of a new model of law and politics relations that is closely connected to the crucial role played by technology. In the light of this horizon, the migration issue, and its relations with the political phenomenon called “populism”, should be fundamentally understood in a cultural perspective even before its immediate sociological, political and legal projections.
- Topic:
- Security, Migration, Politics, Culture, and Law
- Political Geography:
- Spain and Global Focus
60. No Such Thing as a Perfect Partner: The Challenges of “By, With, and Through”
- Author:
- Emily Knowles
- Publication Date:
- 06-2020
- Content Type:
- Journal Article
- Journal:
- PRISM
- Institution:
- Institute for National Strategic Studies (INSS), National Defense University
- Abstract:
- Taking a peacebuilding approach to working with local militaries and armed groups means using assistance to fragmented security sectors to increase cooperation between various formal and informal elites in a weak state. This approach places less emphasis on developing conventional military power and more emphasis on facilitating and improving relations between the different factions within the security sector and between the security sector and the civilian population. If international providers help local partners perform better at military tasks without ensuring that the forces have local legitimacy and strong accountability, progress is likely to be fleeting and could actually exacerbate civilian harm and the underlying drivers of violent conflict.
- Topic:
- Security, Defense Policy, Military Strategy, Peacekeeping, Conflict, and Local
- Political Geography:
- Global Focus
61. Elite Incentives and Power Dynamics in Fragile States
- Author:
- Sarah Rose
- Publication Date:
- 06-2020
- Content Type:
- Journal Article
- Journal:
- PRISM
- Institution:
- Institute for National Strategic Studies (INSS), National Defense University
- Abstract:
- By 2030, it is estimated that half of the world’s poor will be concentrated in fragile states. These are countries where the social contract between the government and its people is weak or absent—a breakdown which both creates a heightened risk of shocks from conflict, violence, pandemic illness, and/or natural disasters, and limits the country’s resilience to them. The increasing interlinkage between global development and state fragility, the potential cross-border nature of some of the risks, and the deeply mixed track record of successful international intervention to date, have prompted many donor organizations—including the United States—to reorient their policies and approaches to better support fragile states’ pathways to peace, stability, and resilience.
- Topic:
- Security, Poverty, Inequality, Fragile States, Borders, and Peace
- Political Geography:
- Global Focus
62. World Oil Security on a Precipice
- Author:
- Charles F. Doran
- Publication Date:
- 03-2020
- Content Type:
- Journal Article
- Journal:
- Brown Journal of World Affairs
- Institution:
- Brown Journal of World Affairs
- Abstract:
- By attacking a major Saudi oil facility at Abqaiq on 13 September 2019, Iran established a new norm regarding oil security. Now, no oil field, pipeline, refinery, supertanker, or port facility is free from internecine warfare between oil-producing (OPEC) governments. Ironically, in attempting to defend a coun- try from supply interruption, the United States risks worsening the magnitude and scope of that supply interruption rather than preventing its occurrence. In the era of highly accurate drones and missiles, the old oil field motto “all oil comes from a single barrel” has taken on a newly negative connotation. World oil stability rests on a precipice. Both exporters and importers suffer from supply interruption, although perhaps not equally, universally, or simultaneously. Supply interruption may benefit those who have oil to sell through resultant oil price increases if their own exports have not been interrupted. The same cannot be said for buyers who, unless they are energy speculators on the futures market, ardently want to prevent supply interruption and the virtually certain subsequent (though sometimes not lasting) increase in price.
- Topic:
- Security, Markets, Oil, and Energy
- Political Geography:
- Global Focus and Gulf Nations
63. Space Defense in Europe. Policy and Security Aspects
- Author:
- Malgorzata Polkowska
- Publication Date:
- 01-2020
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- Today countries participating in space activities, share serious concerns about militarization of space. The defense of space can become an important issue in the international arena, because counteracting emerging threats will probably be associated not only with the development of technology and operational capabilities, but also with the creation of political alliances or attempts at international agreement on certain “rules of the game” for space operations. Ultimately, the growing importance of “space for defense” creates the need for “defense of space”. Individual countries remain the main actors in the field of space defense. Military strategies are defined at national level, and the development and exploitation of military space assets are managed by national organizations. Today, most European countries recognize space as a strategic area, next to land, sea, air and, increasingly, cyberspace, but they have adopted different policies and doctrines depending on their sensitivity, priorities and concerns. European space forces also have different governance structures with significant differences in the distribution of roles and responsibilities, including space agencies and private entities.
- Topic:
- Security, Defense Policy, Military Strategy, and Space
- Political Geography:
- Global Focus
64. Entre políticos y criminales: corrupción política en Colombia 2013-2018 (Between Politicians and Criminals: Political Corruption in Colombia 2013-2018)
- Author:
- Pedro Piedrahita Bustamante
- Publication Date:
- 12-2020
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- La corrupción es un delito que genera afectaciones políticas, específicamente a la construcción del Estado y la democracia. Es decir, restringe las habilidades de las instituciones para lograr el objetivo de promover el bienestar general a través de la creación de poderes secretos que entorpecen la idea de la democracia como poder público que se realiza ante el público. Así, la corrupción política crea un poder secreto, controlado por funcionarios públicos y políticos profesionales que favorecen diversas redes criminales asociadas a otros delitos y afectan las instituciones y el principio de publicidad en la democracia. El objetivo de la investigación es analizar la corrupción política en Colombia entre 2013 y 2018 desde la perspectiva del Crimen Organizado Transnacional (COT). Para esto se considera que para abordar la corrupción política como delito transnacional es necesario superar el fenómeno de narcotización del delito y reconocer que la corrupción política es también un delito relevante, que funciona en red y que se asocia con otras dinámicas criminales para buscar beneficios económicos del Estado o afectarlo. El enfoque metodológico fue cualitativo y se utilizó el método fenomenológico-hermenéutico en el análisis de la información histórica recopilada desde el siglo XVI que sirvió de contexto para establecer la relación de la corrupción con otros delitos en el país y de los diferentes casos de corrupción analizados en el período de estudio. Se aclara que solo se tienen en cuenta aquellos casos que se ajustan al análisis de corrupción transnacional por los vínculos con otras redes. Se evidencia que entre 2013 y 2018 hubo casos de corrupción política con nexos criminales asociados al narcotráfico, el lavado de activos, la prostitución, entre otros. No obstante, varios de estos hechos no parecen tener la misma relevancia informativa que los típicos casos de soborno, financiación ilegal de campañas o carteles de contratación. Esto se entiende como una oportunidad para seguir profundizando en este tipo de investigaciones.
- Topic:
- Security, Corruption, Crime, Politics, and Organized Crime
- Political Geography:
- Colombia, South America, and Global Focus
65. Critical infrastructure in the shaping of national security
- Author:
- Ewa Żaboklicka
- Publication Date:
- 03-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Critical infrastructure plays a key role in ensuring the national security of a state, due to important functions thereof in military, economic, and public administration sectors. The destruction, damage, failure or other deprivation of critical infrastructure of its operational capabilities constitutes a direct threat to the structural and personal security of the state. The research methods and techniques implemented in the research process itself primarily hinge on critical analysis of acts of law and organisational and competence-related documents, subject-matter literature, synthesis and inference in order to reach the formulated objectives based on efficiency criteria. The main findings indicate that critical infrastructure is perceived as a set of systems which exerts a substantial impact on the security of the state and, obviously, its inhabitants. The results advocate for a reflection that critical infrastructure embraces a number of facilities which appear to be remarkably diverse. They are buildings, structures, installations, equipment and services which, integrally, form cohesive systems which allow the proper functioning of a given state. It is the state whose role is just to supervise and coordinate, whereas the operators of critical infrastructure are the ones who are to protect it. The overall findings of this paper present the notion that safeguarding critical infrastructure is a task of crucial importance to the national security of a state and, therefore, it would be worth reconsidering the intensification of rules which apply to the infrastructure of national security and its efficient functioning.
- Topic:
- Security, National Security, Infrastructure, and Crisis Management
- Political Geography:
- Global Focus
66. Components of defence strategies in society’s information environment: a case study based on the grounded theory
- Author:
- Erja Birgitta Mustonen-Ollila, Martti Lehto, and Jukka Heikkonen
- Publication Date:
- 03-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The data collected was analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components was developed using the Grounded Theory. This study shows that the goal of politically and militarily hostile actors is to weaken society’s information environment, and that their operations are coordinated and carried out over a long time period. The data validates past studies and reveals relationships between the components of defence strategies. These relationships increase confidence in the validity of these components and their relationships, and expand the emerging theory. First, the data and findings showed 16 inter-connected components of defence strategies. Second, they showed that the political, military, societal, power, and personal goals of the hostile actors carrying out cyber operations and cyber attacks are to weaken society’s information environment. Third, they revealed that cyber operations and cyber attacks against networks, information and infrastructures are coordinated operations, carried out over a long time period. Finally, it was revealed that the actors defending society’s information environment must rapidly change their own components of defence strategies and use the newest tools and methods for these components in networks, infrastructures and social media.
- Topic:
- Security, Oil, Maritime, and Energy
- Political Geography:
- Global Focus
67. Near-Earth Objects (NEO) and other current space threats
- Author:
- Radosław Bielawski
- Publication Date:
- 03-2020
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The subject of the study are space threats – Near-Earth Objects (NEO) and Potentially Hazardous Asteroids (PHA). The research methods employed in this article included the classic theoretical methods used in security sciences and a practical method – a quantitative study of social media. At present, space threat studies aim to resolve the terminological confusion related to NEOs, to determine current and potentially hazardous space objects and estimate the potential threats from them. The research is also expected to come up with two methods for estimating NEO threats, the Palermo and Torino scales. The practical result is to evaluate the public mood regarding NEO threats. Studies have shown that certain active space objects are capable of reaching the Earth’s surface and colliding with human-made in-space objects and devices, such as communication satellites. Should this happen, it could cause substantial social damage and destabilise state security, particularly if elements of critical infrastructure of the state were to be affected. Continuous monitoring of NEOs may play a central role in the provision of security. Furthermore, the public should be kept abreast of the threats.
- Topic:
- Security, Space, Non-Traditional Threats, and Near Earth Object (NEO)
- Political Geography:
- Global Focus
68. Re-thinking Biological Arms Control for the 21st Century
- Author:
- Filippa Lentzos
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- International treaties prohibit the development and use of biological weapons. Yet concerns about these weapons have endured and are now escalating. It is high time to take a hard look at technical and political developments and consider how the international security policy community should respond. A major source of the growing concern about future bioweapons threats stem from scientific and technical advances. Innovations in biotechnology are expanding the toolbox to modify genes and organisms at a staggering pace, making it easier to produce increasingly dangerous pathogens. Disease-causing organisms can now be modified to increase their virulence, expand their host range, increase their transmissibility, or enhance their resistance to therapeutic interventions.[1] Scientific advances are also making it theoretically possible to create entirely novel biological weapons,[2] by synthetically creating known or extinct pathogens or entirely new pathogens.[3] Scientists could potentially enlarge the target of bioweapons from the immune system to the nervous system,[4] genome, or microbiome,[5] or they could weaponize ‘gene drives’ that would rapidly and cheaply spread harmful genes through animal and plant populations.[6] Concurrent developments in other emerging technologies are also impacting potential future biological weapons threats. Developments in artificial intelligence and machine learning could speed up identification of harmful genes or DNA sequences. Artificial intelligence and machine learning could also potentially enable much more targeted biological weapons that would harm specific individuals or groups of individuals based on their genes, prior exposure to vaccines, or known vulnerabilities in their immune system.[7] Big Data and ‘cloud labs’ (completely robotized laboratories for hire) facilitate this process by enabling massively scaled-up experimentation and testing, significantly shortening ‘design-test-build’ timeframes and improving the likelihood of obtaining specificity or producing desired biological functionality.[8] Other developments provide new or easier ways to deliver pathogens or biological systems. Nanotechnology could potentially create aerosolized nanobots dispersing lethal synthetic microbes or chem-bio hybrids through the air,[9] or in vivo nanobots releasing damaging payloads inside human bodies.[10] Aerosol or spraying devices attached to swarms of small unmanned aerial vehicles, or drones, could be another potential means to disperse biological agents. Additive manufacturing, or 3D printing, could circumvent barriers imposed by national export control systems on controlled laboratory equipment or dispersal devices.
- Topic:
- Security, Health, Science and Technology, Treaties and Agreements, Biosecurity, and Weapons
- Political Geography:
- Global Focus
69. Technology and Tensions in the Global Commons
- Author:
- Kristi Govella
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- For most of history, the domains of the global commons were unclaimed, largely because the technology to access and utilize them did not exist.[1] In areas such as the high seas and outer space, it was impossible for states to establish and maintain sovereign control. Even as the relevant technologies developed, costliness and controls kept them initially concentrated largely in the hands of just a few major powers such as the Unit- ed States and the Soviet Union. For the United States, “command of the commons” became the military foundation of its hegemony, granting it the ability to access much of the planet and to credibly threaten to deny the use of such spaces to others.[2] Bipolar competition between the United States and the Soviet Union strongly influenced developments in the maritime and outer space domains. In the case of cyberspace, a more recent addition to the traditional global commons, the United States was also initially dominant due to its role in pioneering associated technologies. However, over time and particularly since the end of the Cold War, continuing technological innovation and diffusion have made these domains accessible to a growing number of countries. This technological progress was born of both cooperation and competition between states. While some states chose to develop certain technologies indigenously, many acquired knowledge and equipment from abroad. Globalization of industry has made it easier for states to obtain a variety of foreign technologies, even lowering the threshold for them to procure disruptive military capabilities. In addition, over the last two decades, American primacy has been increasingly challenged by the rise of China, which has impacted the dynamics of technological development and diffusion across multiple domains. As China has acquired the technology to become more active in the commons, it has prompted major regional powers, such as Japan and India, to accelerate their own technological advancement, and other mid-sized and smaller countries have also become increasingly engaged.[3] The consequence of this multiplication of technologically sophisticated actors has been the erosion of American primacy in the global commons. Although the United States still remains the most dominant player, it is faced with a more densely populated field, and management of these spaces has become more difficult. This article examines this trend in the high seas, outer space, and cyberspace since the end of the Cold War, with attention to the ways in which the rise of China and the relative decline of the United States have catalyzed greater engagement with the commons, particularly among the countries in Asia that find themselves most affected by this power transition. I argue that advances in and diffusion of technology have transformed the global commons into increasingly crowded domains characterized by interstate competition and heightened tensions. Whether these tensions prevail depends on the creation and strengthening of regimes to manage interactions and promote shared rules and norms...
- Topic:
- International Relations, Security, Globalization, and Science and Technology
- Political Geography:
- China, Global Focus, and United States of America
70. How Much Does a “Privacy” Weigh?
- Author:
- Paul Rosenzweig
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Benjamin Franklin is famous, in part, for having said, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” Though historical evidence suggests Franklin’s quote has been misinterpreted,[1] the aphorism has come to stand for the proposition that privacy and security stand in opposition to each other, where every increase in security likely results in a commensurate decrease in privacy, and vice versa. Couched in those terms, the privacy/security trade-off is a grim prospect. We naturally want both privacy and security to the greatest extent possible. But Franklin tells us this is impossible — that privacy and security are locked in a zero-sum game where the gain of one comes only at the loss of the other. Of course, this characterization is assuredly flawed; it is certainly possible to adopt systems that maximize both privacy and security in a Pareto optimal way. That is one of the reasons why so many privacy and security experts simply revile the “balancing” metaphor — it obscures more than it illuminates...
- Topic:
- Security, Science and Technology, Cybersecurity, and Privacy
- Political Geography:
- Global Focus and United States of America
71. A Healthier Way for the Security Community to Partner with Tech Companies
- Author:
- Douglas Yeung
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Digital data captured from social media, cell phones, and other online activity has become an invaluable asset for security purposes. Online mapping or cell-phone location information can be used to collect intelligence on population movement, or to provide situational awareness in disasters or violent incidents. Social-media postings may be used to vet potential immigrants and job applicants, or to identify potential recruits who may be likely to join the military. However, breakdowns in relationships between the tech industry and would-be consumers of technology’s handiwork could imperil the ability of security stakeholders to use this data. Ongoing issues have already begun to shape some technologists’ views on the ethical use of artificial intelligence and other technologies in war and conflict and their impact on human rights and civil liberties. It isn’t difficult to imagine a series of future incidents further souring collaboration between technologists and security stakeholders. In contrast to its reluctance over security matters, the tech industry has been a willing partner for government agencies and communities that promote health and wellbeing—topics that present less of an ethical challenge. Although it may not be immediately apparent, wellbeing and security have much in common. Could the security community take a page from wellbeing efforts to improve their collaboration with the tech industry?...
- Topic:
- Security, Science and Technology, Business, Surveillance, and Private Sector
- Political Geography:
- Global Focus and United States of America
72. Nuclear Weapons with 21st Century Technology: A Conversation with John Borrie
- Author:
- John Borrie and Fletcher Security Review Staff
- Publication Date:
- 07-2019
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- John Borrie is the research coordinate and program lead at the United Nations Institute for Disarmament Research. He’s currently working on continuing and expanding dialogues about disarmament and the impact of nuclear weapons on humanitarian affairs. He previously worked on weapons control for both the International Committee of the Red Cross and as a New Zealand diplomat. Borrie holds a doctorate in philosophy from the University of Bradford.
- Topic:
- Security, Nuclear Weapons, Science and Technology, and Interview
- Political Geography:
- United Nations and Global Focus
73. Differences between Third World Security Approaches and Postcolonial Security Approaches: State, Culture and Modernity
- Author:
- Neslihan Dikmen-Alsancak
- Publication Date:
- 09-2019
- Content Type:
- Journal Article
- Journal:
- Uluslararasi Iliskiler
- Institution:
- International Relations Council of Turkey (UİK-IRCT)
- Abstract:
- The aim of this article is to discuss the differences between the theoretical outlooks of the Third World security approaches and the postcolonial security approaches to security studies. This article is composed of four parts. In the first part, the article investigates what the Third World security approaches and the postcolonial security approaches understand of the concepts of the Third World and postcolonialism. Subsequent three parts discuss differences between the critiques of these two approaches to security studies with respect to three concepts of state, culture, and modernity. Thus, this article compares the critiques of these approaches to security studies and their contributions to critical approaches to security.
- Topic:
- Security, Post Colonialism, and Third World
- Political Geography:
- Turkey and Global Focus
74. Rethinking International Security: Feminist Critiques in International Relations
- Author:
- Ayşe Ömür Atmaca and Pınar Gozen Ercan
- Publication Date:
- 01-2019
- Content Type:
- Journal Article
- Journal:
- Uluslararasi Iliskiler
- Institution:
- International Relations Council of Turkey (UİK-IRCT)
- Abstract:
- The discipline of International Relations (IR) has defined its boundaries through masculine terms, which makes women and gender relations hardly visible. Nevertheless, women have always been an inseparable part of interstate relations, and the world’s most important problems cannot be treated separately from gender politics. On grounds of the basic assumptions of feminist IR theories, the aim of this study is to analyse how feminism offers new ways to understand contemporary issues of international security. In this vein, feminist IR literature is analysed from the perspective of security, and feminist critiques are exemplified through the concept of the “Responsibility to Protect”.
- Topic:
- International Relations, Security, Feminism, and Responsibility to Protect (R2P)
- Political Geography:
- Global Focus
75. Manufacturers and Security Providers: A Conceptual Essay
- Author:
- Silviu Petre and Ella Ciuperca
- Publication Date:
- 08-2019
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- This article aims to contribute to the theoretical clarification of certain widely used terms in scholarly literature as well as in public statements made by policymakers, pundits, media people but insufficiently exaplained, namely security producers and security consumers. Although frequently present, neither political science nor international relations literature have grappled with them, therefore rendering scholars incapable to grasp the complexity of inter-state position.
- Topic:
- Security, Science and Technology, Manufacturing, and Industry
- Political Geography:
- Global Focus
76. The Influence of strategic culture on shaping security policy
- Author:
- Adrian Mitrega and Marian Kozub
- Publication Date:
- 12-2019
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Objectives: The aim of the article is to present the role that strategic culture plays in creating and shaping security of the future. Taking account of the purpose of this paper, the main research problem took the form of the following question: To what extent does strategic culture have an influence on shaping security of the future? Methods: In order to achieve the aim of this paper and solve the main research problem, the following research methods will be applied: method of analysis, synthesis and method of conclusion.The empirical methods facilitate examination of processes with the aim of drawing conclusions. The article uses research method such as observation. Results: Strategic culture is not a dogma or a camera through which we can look into the past or the future. It is a tool useful for understanding how and what the circumstances are in which a country defines appropriate measures and goals to achieve its goals regarding security. Conclusions: Strategic culture can help to understand the real cultural identity of a particular entity (such as a country or an organization) and its role in the system of international relations in a better way. Therefore, it can contribute to a better understanding of security policy implemented by the entity and what is more, the analysis of strategic culture can lead to a better understanding of the opponent's strategic behaviour on the basis on how the opponent defines victory, defeat, loss or suffering.
- Topic:
- Security, Future, and Strategic Culture
- Political Geography:
- Global Focus
77. The impact of crime on security in tourism
- Author:
- Hrvoje Mataković
- Publication Date:
- 12-2019
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Objectives: Tourism has become one of the main economic sectors of the 21st century. Today, tourism is facing various security threats such as terrorism, crime and potential armed conflicts, and the most common security threat to tourism is crime. The aim of this paper is to analyse how crime affects security in tourism and to describe the consequences of crime for tourism. Methods: A descriptive method was used in this paper to explain the concept of security in tourism and to analyse the relationship between tourism and crime. The data was drawn from the scientific and professional literature and policy documents on this subject. Results: The impact of crime on tourism can be seen on two levels: the macro and micro levels. The impact of crime on the macro level refers to its effects on society in general, on the social community or tourist destination, and the impact of crime at the micro level refers to the effects of crime on individuals. The most significant impact of crime on a tourist destination is the negative image of the destination, resulting in reduced tourist demand. The impact of crime on the micro level is evident in the influence on the behaviour and attitudes of tourists, and their decision to visit or revisit a destination where criminal incidents happen. Conclusions: Crime can have a very negative impact on tourism and security in tourism can not be taken for granted, so it is necessary to make significant efforts to ensure a safe environment for tourists. In order to prevent crime and to create a safe environment for tourists, it is necessary to ensure the cooperation all stakeholders involved in tourism: the tourism industry, local community, national authorities, police and state agencies.
- Topic:
- Security, Crime, Tourism, and Victimization
- Political Geography:
- Global Focus
78. Modern aspects of the development of security in air transport under the conditions of air terrorism
- Author:
- Daniel Michalski and Adam Radomyski
- Publication Date:
- 12-2019
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Objectives: The authors determined the following aim of this article: identifying threats generated by air terrorism as well as characterizing the forms, methods, and manners. Methods: Authors used theoretical methods of research. The article presents research findings with regard to the organization and operation of security systems in civil air transport. At the article, the authors focused on air terrorism and security system in the airport. Results: The presented results of the study are not limited only to the theoretical aspects of terrorism. Authors also characterize organizational and technical undertakings that have already been implemented into security systems in aviation by national and intergovernmental institutions, responsible for its protection. Conclusions: Regardless of the form of air terrorism and applied means, an important issue is a fact that every attempt to intercept an aerial asset is attractive for terrorists, due to the fact that each time it causes not only damage or destruction of the machine itself and the death of passengers, but it is also a real threat to airport infrastructure, installations and urban residents. In addition, the events are accompanied by high-profile media coverage.
- Topic:
- Security, Terrorism, Transportation, and Airports
- Political Geography:
- Global Focus
79. Combating destabilising forces in modern operations. Research report
- Author:
- Wojciech Robert Więcek
- Publication Date:
- 09-2019
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Undertaking to determine scientifically substantiated conditions for the functioning of destabilising forces and methods for countering them in contemporary operations fits in the broad scope of security. This paper reports the results of the study that employed survey methodology to investigate the matter of destabilising forces in order to provide the contribution to the current body of literature in the field. Recently published scientific and non-scientific studies in Polish and English on destabilising forces, despite the semantic differences, refer to a large extent to the problem of acting and combating such groups. The paper puts forward a series of conclusions and proposals with the intention of inspiring the critical evaluation and to encourage substantive polemics in the pages of specialist scientific periodicals. This material may serve as the basis for further detailed research into destabilising forces – the subject that is not only a pressing current issue, but above all a prospective area for research as part of the security sciences.
- Topic:
- Security, Science and Technology, Research, Destabilization, and Military
- Political Geography:
- Global Focus
80. Preparing for future security challenges with practitioner research
- Author:
- David Last, Travis Morris, and Bernadette Dececchi
- Publication Date:
- 06-2019
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Mid-sized countries face a changing security environment, and cannot be certain that the knowledge and practices of the past will serve the future. The officers, professors, and researchers in defence universities are the custodians of military sciences that must adapt to these changing situations. Practitioner research should be modelled and encouraged in defence universities as a vehicle for advancing military sciences to meet new challenges. Previous practitioner research in higher and adult education has highlighted the need for experiential learning in other professions. The authors report on practitioner research by professors at pre-commission military academies to improve cadets’ understanding of peace and conflict. Military and police education is often experience-based, but there are few reports of practitioner research on its effectiveness, nor of combining peace and conflict education with out-of-classroom experiences. Legitimation Code Theory provides tools for understanding different teaching approaches. Comparing four cases of practitioner research on experiential learning the authors present models for practitioner research on teaching peace and conflict through out-of-classroom experiences, and conclude with means of evaluating learning experiences by pre-commission cadets, drawing on legitimation code theory. This is increasingly important for military academies striving to meet academic standards, but also to preserve professional values and young officer motivation to confront new challenges.
- Topic:
- Security, Education, Armed Forces, Research, Future, and Military
- Political Geography:
- Global Focus
81. “Autonomisation” of security and defence systems
- Author:
- Artur Kuptel
- Publication Date:
- 03-2019
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Development of systems with an evolving level of autonomy is among the most controversial and yet promising aspects of military forces’ modernisation. The application of quasi- artificial intelligence in combat machines opens a new uncharted area of possibilities. In essence, these modifications aim to reduce the extent of human interference in the functioning of unmanned systems virtually to none. The potential risks are explored in dangerous scenarios, which consider that apart from offering far-reaching advantages of using platforms with autonomic capabilities, they can be used against humanity. These scenarios assume a pivotal role in forecasting possible directions for development of the armed forces. This paper attempts to determine the essence of combat systems autonomy while focusing on a few of the most sensitive issues. For a transparent and credible debate on combat systems autonomy, it is adviseable that no ambiguity is present in terminological, ethical, legal and technological complexities, whose misinterpretation may become a source of unnecessary understatements or even lead to distortion of the debate.
- Topic:
- Security, Defense Policy, Science and Technology, Armed Forces, Artificial Intelligence, and Autonomy
- Political Geography:
- Global Focus
82. Climate Change: Conflict and Cooperation (Full Issue)
- Author:
- Meagan Torello, Rafael Leal-Arcas, Caitlin Werrell, Francesco Femia, Carmel Davis, Ziad Al Achkar, Ang Zhao, Buddhika Jayamaha, Jahara "Franky" Matisek, William Reno, Molly Jahn, Therese Adam, Peter J. Schraeder, Juan Macias-Amoretti, and Karim Bejjit
- Publication Date:
- 09-2018
- Content Type:
- Journal Article
- Journal:
- The Journal of Diplomacy and International Relations
- Institution:
- School of Diplomacy and International Relations, Seton Hall University
- Abstract:
- In the first issue of our 20th volume, the cooperative and conflictual nature of climate change in international relations is explored. Rafael Leal-Arcas analyzes the necessity of a symbiotic relationship between bottom-up and top-down negotiations to implement clean energy consumption. Following, Caitlin Werrell and Francesco Femia begin this issue's dialogue on climate change and security. Carmel Davis discusses the effects of climate change on Sub-Saharan Africa's ability to develop and subsequently mitigate conflict. Similarly, Ziad Al Achkar outlines the economic, environmental, and security threats in the Arctic as its ice continues to melt. Zhao Ang then discusses China's ability and incentives to pursuing a greener economy. Following, Buddikha Jayamaha, Jahara Matisek, William Reno, and Molly Jahn discuss the security and development of climate change implications in the Sahel region. The main portion of this issue proudly concludes with the Journal's interview with former Swiss Ambassador Therese Adam on climate change negotiations and the great potential for civil society engagement. Following the climate change portion of this issue, we feature a special sup-topic: Africa Rising. Here, Peter Schraeder discusses the effects of President Donald Trump's foreign policy in Africa. Juan Macías-Amoretti analyzes the role of Islam in Moroccan politics, while Karim Bejjit concludes with a discussion on Morocco's growing relationship with the AU.
- Topic:
- Security, Climate Change, Diplomacy, Environment, Islam, Regional Cooperation, Conflict, and Donald Trump
- Political Geography:
- Africa, China, Europe, Asia, North Africa, Switzerland, Morocco, Sahel, and Global Focus
83. The Thirty Years Climate Warning: Climate Change, Security, and the Responsibility to Prepare
- Author:
- Caitlin Werrell and Francesco Femia
- Publication Date:
- 09-2018
- Content Type:
- Journal Article
- Journal:
- The Journal of Diplomacy and International Relations
- Institution:
- School of Diplomacy and International Relations, Seton Hall University
- Abstract:
- The end of the Cold War coincided with the beginning of global awareness about the risks of climate change. This paper analyzes a thirty-year period beginning with the establishment of the Intergovernmental Panel on Climate Change (IPCC) in 1988 and the fall of the Berlin Wall in 1989, and ending in the present year of 2018. This period is characterized by unprecedented social, political, economic and climatic shifts, as well as first-time technological change-including improvements in our ability to predict future changes in the climate and their implications for international security.1 Importantly, while some of these changes have caught the international security community off-guard, we have seen the climate risks coming for many decades. The combination of unprecedented risks and foresight underscore a “Responsibility to Prepare.” This involves taking all possible steps to avoid an unmanageable climate, and climate-proofing of our security institutions at national, regional and international levels.
- Topic:
- Security, Climate Change, Cold War, Science and Technology, and International Security
- Political Geography:
- Global Focus
84. Threat Multiplier: The Growing Security Implications of Climate Change: A Conversation with Sherri Goodman
- Author:
- Sherri Goodman and Eli Stiefel
- Publication Date:
- 07-2018
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Sherri Goodman is an experienced leader and senior executive, lawyer and director in the fields of national security, energy, science, oceans and environment. She is a Senior Fellow at the Woodrow Wilson International Center and CNA (Center for Naval Analyses), and a Senior Advisor for International Security at the Center for Climate and Security. At CNA, Goodman also served as Senior Vice President and General Counsel and was the founder and Executive Director of the CNA Military Advisory Board, whose landmark reports include National Security and the Threat of Climate Change (2007), and National Security and the Accelerating Risks of Climate Change (2014), Advanced Energy and US National Security (2017), and The Role of Water Stress in Instability and Conflict (2017), among others. Previously, she served as the President and CEO of the Consortium for Ocean Leadership. From 1993-2001, Goodman served as the first Deputy Undersecretary of Defense (Environmental Security).
- Topic:
- Security, Climate Change, Energy Policy, Environment, and Geopolitics
- Political Geography:
- Global Focus and United States of America
85. From Energy to Climate Security: The EU’s Evolving Views
- Author:
- Ellen Scholl
- Publication Date:
- 07-2018
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The European Union (EU) has increasingly interconnected energy and climate policy, with the formulation of the Energy Union as one notable — if yet incomplete — step in this direction. In addition to the linkages between energy policy and efforts to reduce greenhouse gas emissions to meet climate goals under the Paris Agreement, the EU has been increasingly vocal about the link between climate and security, and under- taken (at least rhetorical) efforts to incorporate climate security concerns into broader externally focused policy areas. This shift toward a focus on climate security, however, raises questions of how energy security and climate security relate, the impact of the former on the latter, and how the Energy Union fits into this shift, as well as how the EU characterizes climate risk and how this relates to geopolitical risks in its broader neighborhood. It also begs the question of how to go beyond identifying and conceptualizing the security risks posed by climate change to addressing them. This paper charts changes in the EU’s energy and climate security discourse, focusing on their intersection in the Energy Union and the EU’s promotion of the energy transition to lower carbon forms of energy, and the relevant risks in the European neighborhood. The paper concludes that while the EU has evolved to include climate priorities and climate risks into foreign and security policy thinking, the complicated relation- ship between climate change and security complicates efforts to operationalize this in the EU, in relations with the broader European neighborhood, and beyond...
- Topic:
- Security, Climate Change, Energy Policy, and Regional Cooperation
- Political Geography:
- Europe, Global Focus, and European Union
86. Human Trafficking and Climate Change: Understanding the Disastrous Relationship
- Author:
- Alice C. Hill
- Publication Date:
- 07-2018
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Human trafficking is a horrendous crime: it degrades human security and undermines the rights of people around the globe. Although the exact number of victims worldwide remains elusive, the extent of human trafficking stands to increase in coming years for several reasons, including the accelerating rate of climate change. A warming world will almost certainly bring more disasters that result in greater displacement of people from their homes and livelihoods. This, in turn, puts them at greater risk of trafficking. Human trafficking is a highly lucrative crime, with few perpetrators successfully prosecuted and transnational criminal and terrorist groups repeatedly using it as a source of revenue. These factors, in combination with worsening climate change impacts will, in all likelihood, yield ever more human trafficking victims. At its core, human trafficking involves forcing another against his or her will to work, perform sex acts, or succumb to debt bondage. Despite its name, the crime does not necessarily involve movement: the key element is coercion. Over 170 nations have signaled their opposition to human trafficking by joining the United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, and virtually all countries have registered official opposition to trafficking in humans. Despite these pronouncements, human trafficking occurs with staggering frequency. While precise estimates of the number of persons trafficked are difficult to obtain, the U.S. Department of State speculated in its 2017 Trafficking in Persons Report that there may be “tens of millions” of victims worldwide.[1] Other international organizations “estimate that about 25 million people are victims” of human trafficking in the world.[2] In all likelihood, those numbers will grow due in part to the increasing effects of climate change...
- Topic:
- Security, Climate Change, Crime, and Human Trafficking
- Political Geography:
- Global Focus and United States of America
87. Navy Classification: Proposal for a Comparative Methodology
- Author:
- Francisco Eduardo Alves de Almeida and Ricardo Pereira Cabral
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- Classification of navies according to their relative power has been a challenge for the academic area that works with issues in the field of Security and Defense. Qualitative ratings have been presented by renowned researchers such as Colin Gray, Hervé Coutau-Begarie and Michael Morris, however these attempts have stumbled in its simplicity and little scope. From studies based on open access sources, this paper tries to develop a comparative methodology that would not only take into account qualitative but also quantitative factors. This innovative method was used to classify the navy of the different states in a ranking of power taking into account parameters such as the number of means, shipbuilding capacity, number of bases and arsenals, naval assets and availability of resources, among others, in order to rank naval powers. This methodology aims to reduce uncertainties in the classification of navies and serve as a reference for future works in the academic area that are dedicated to the fields of Security and Defense.
- Topic:
- Security, Defense Policy, Military Strategy, Maritime, and Classification
- Political Geography:
- Global Focus
88. Killing Norms Softly: US Targeted Killing, Quasi-secrecy and the Assassination Ban
- Author:
- Andris Banka and Adam Quinn
- Publication Date:
- 07-2018
- Content Type:
- Journal Article
- Journal:
- Security Studies
- Institution:
- Security Studies
- Abstract:
- This article argues that when actors engage in controversial new security practices, it is misconceived to view secrecy as an opposed, counterproductive alternative to the pursuit of legitimation. Rather, we propose, deployment of “quasi-secrecy”—a combination of official secrecy with leaks, selective disclosure, and de facto public awareness—can be an effective strategy for achieving normalization and legitimation while containing the risks entailed by disclosure. We support this claim via a detailed case study of US targeted killing. First, we establish the existence of an American norm against targeted killing during the period 1976–2001. We then detail the process by which an innovation in practice was secretly approved, implemented, became known, and was gradually, partially officially acknowledged. We argue that even if quasi-secrecy was not in this instance a coherently-conceived and deliberately pursued strategy from start to finish, the case provides proof of concept for its potential to be deployed as such.
- Topic:
- Security, Legitimacy, Normalization, and Secrecy
- Political Geography:
- Global Focus
89. Defence infrastructure - an attempt at identification
- Author:
- Piotr Krzykowski
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Security and infrastructure are two closely related terms, which is why they are so often referred to at the same time. In today’s world, infrastructure is essential to ensure broadly understood security, and a lack of security will not fulfil its basic role. Today, identified threats and challenges to national security, and thus to the security of the state, evoke the need to participate in preparing all components of the defence system of the state. The management of state defence is a very complex process, requiring a properly prepared system to function reliably in times of peace, but also in times of crisis and war. Its role is to integrate individual elements of the defence system into a uniform and efficient whole. Effective defence activities and ensuring the security of its citizens and all its assets are the core activities of the state. The defence area of the state is now comprehensive in nature and is of interest to the entire apparatus of state power. The aim of the article is to present the role of the defence infrastructure in the life of the state, its relation to national security and an attempt to identify the defence infrastructure of the state, taking into account the key state infrastructure.
- Topic:
- Security, Defense Policy, and Infrastructure
- Political Geography:
- Global Focus
90. Unmanned Aerial Vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development
- Author:
- Radosław Bielawski, Witold Rządkowski, and Rafał Perz
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- This paper explores the directions for the application of unmanned aerial vehicles in the provision of security to vital elements of a country’s critical infrastructure. The analysis focuses on two paths of development: the first one refers to the transportation system, the latter is related to the gas supply network – the basic components of a country’s critical infrastructure. The first section of this paper will examine the current state of knowledge in the field, and is designed as a reference of terminology pertaining to unmanned aerial vehicles (definitions and classification). The section shall furthermore provide a basis for and a contribution to the developed conceptual-semantic framework for UAV research. The first direction of development is described in terms of the characteristics and assumptions of the system; this includes an overview of the specific requirements of the unmanned platform itself, as well as the elements of the system, such as a local monitoring centre and other components. Furthermore, this section provides the overview of the designated mobile application, whose development is expected to improve the efficiency of system operation, which is a conceptual novelty considering similar developments. The second direction concerns the development of an unmanned system of production, storage, and use of chemical and radioactive substances, including pipelines for hazardous substances. The programme that fits perfectly in the framework of the second considered branch of development is “Cricket” [Polish: “Świerszcz”] – a programme implemented in the periodic inspection of gas supply infrastructure. The description of the programme in question included specifying the technical and operational requirements for the fight devices as well as for the equipment.
- Topic:
- Security, Development, Infrastructure, Military, and Unmanned Aerial Vehicle (UAV)
- Political Geography:
- Global Focus
91. Students’ opinions about the subject of Security Education in upper secondary schools
- Author:
- Barbara Drapikowska
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The article is empirical and constitutes a qualitative analysis of students’ attitudes towards the implementation of the subject of Security Education in upper secondary schools to which they attended. The research attention was focused on the form of conducting classes, issues raised on the subject, assessment of their usefulness and proposals for improvements presented by students. The self-assessment of self-attitude towards the subject and level involved in the acquisition of the core curriculum was also presented.
- Topic:
- Security, Education, Students, Qualitative Research, and Teaching
- Political Geography:
- Global Focus
92. Strengthening defence research as part of higher military education for future security challenges
- Author:
- Nebojsa Nikolic
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- This paper evaluates the potential for defence research to contribute to the long-term development of higher military education. Motivation for the paper emerged from recent organisational changes at the Ministry of Defence by which the Strategic Research Institute (SRI), joined the University of Defence (UoD). Both institutions, SRI and UoD, are obligated and dedicated towards respecting and implementing national strategies, laws and norms related to scientific research and education as well as towards fulfi llment of prescribed accreditation standards for academic education and scientific research. The main idea here is to evaluate a scientific research approach conducted by the SRI, through the lens of the guiding principles for development of academic studies which are declared in the national strategy for education development. A few of the questions we tried to answer were: how relevant are the research topics?; who needs research results?; how should the research process be conducted?; and what about the quality of research results? Development of scientific research connections, higher education and practical needs of the military organisation are very important for all three domains, particularly for future security challenges. Military research organisations, along with the higher education component, have to be capable of perceiving future security challenges, conducting scientific research and offering some proposals based on scientific methodology. However, in the selection of the research topics, they have to respect the views, needs and priorities of other organisational entities which are part of the military organisation.
- Topic:
- Security, Defense Policy, Education, Reform, and Military
- Political Geography:
- Global Focus
93. The subjective dimension of Security Education
- Author:
- Krzysztof Drabik
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Subjectivity in education is not a new issue. It defines the position and role of participants in educational processes (teacher, students). However, education combined with problems of security may raise some doubts in interpretation. It is about identifying the subjects of security. If you adopt the premise that a set of security subjects is not restricted to man and social groups, then security education should also consider other subjects. Moreover, the hazard society, as a product of the postmodern era involves the need for scientific research and public discussion about man as the subject in the process of education and social relations in general.
- Topic:
- Security, Education, Research, and Subjectivity
- Political Geography:
- Global Focus
94. Security Education in dangerous times
- Author:
- Andrzej Pieczywok
- Publication Date:
- 12-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The article is concerned with the problems of Security Education in the context of threats to man`s existence. The aim of the article is to present the possibilities of Security Education from processual and technical (educational) aspects to prevent threats. The main research objective adopted by the author is: What are the main threats to mankind and how are they prevented by Security Education? The main focus is on the problems of education and threats to mankind. The article consists of an introduction outlining the significance of the subject. The most typical threats to man`s security and how Security Education could prevent them are described later.
- Topic:
- Security, Education, and Research
- Political Geography:
- Global Focus
95. The threat of cyber attacks in urban conurbations
- Author:
- Marta Bachor
- Publication Date:
- 09-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- This paper investigates the threat of cyber attacks in urban conurbations. The first section attempts to define cyberspace and to identify potential objects of attack in the city. The second section analyses the history of past cyber attacks, and the final section gives an overview of activities performed by states and organisations with a view to countering and eliminating cyber threats.
- Topic:
- Security, Cybersecurity, Urban, and Non-Traditional Threats
- Political Geography:
- Global Focus
96. Defence diplomacy – an important tool for the implementation of foreign policy and security of the state
- Author:
- Lech Drab
- Publication Date:
- 09-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- "Defence diplomacy” is a relatively new term, created in response to post-Cold War needs to name new tasks and international functions completed by the armed forces and the leadership of the Ministries of National Defence. However, it should not be understood as a kind of traditional “military plus diplomacy”. The lack of a universally recognised definition of “defence diplomacy” means that states try to adapt its content to the needs of their own security policy. In Poland, the term “defence diplomacy” appears in journalism, but there is no precise reference to it in the documents concerning foreign and security policy. The main goal of defence diplomacy is the co-formation and implementation of the state security policy, and its task - to create stable, long-term international relations in the field of defence. Conceptualisation of the concept is a starting point for understanding its role as one of the most important instruments of foreign policy and the security of contemporary states.
- Topic:
- Security, Foreign Policy, Defense Policy, Diplomacy, and Military
- Political Geography:
- Global Focus
97. Open source intelligence (OSINT) as an element of military recon
- Author:
- Agata Ziółkowska
- Publication Date:
- 06-2018
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- One of the most basic functions of the state is to ensure the security to it and its citizens. Significant elements are: perseverance, political independence, territorial integrity and maintenance proper level of life quality. Today’s intelligence, which is part of the structures of security organs, belongs to the elite part of the special forces performing strategic goals. Therefore, acquiring the information by OSINT is important not only for the institution itself but also for citizens. OSINT is one of the means by which security is provided to the internal and external states. Open source information is one of the agents of economic, political, military, etc. Books, periodicals, statistical yearbooks, social networking sites and daily newspapers belong to the basic, verified sources. In globalized world, OSINT has particular importance because, due to the obtained information, the state can take defensive action. In this article, the author pointed out the use of OSINT in the military diagnosis.
- Topic:
- Security, Government, Reconnaissance, Military, and Open Source Intelligence (OSINT)
- Political Geography:
- Global Focus
98. Below the Threshold: Gray Warfare and the Erosion of U.S. Influence: A Conversation with Hal Brands
- Author:
- Austin Bowman
- Publication Date:
- 07-2017
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Hal Brands is a Henry A. Kissinger Distinguished Professor of Global Affairs at the Johns Hopkins University School of Advanced International Studies (SAIS). He is also the author and editor of several books, the most recent including Making the Unipolar Moment: U.S. Foreign Policy and the Rise of the Post-Cold War Order (2016) and What Good is Grand Strategy? Power and Purpose in American Statecraft from Harry S. Truman to George W. Bush (2014).
- Topic:
- Security, Defense Policy, Alliance, Conflict, and Gray Zone
- Political Geography:
- North America, Global Focus, and United States of America
99. Is it Possible to Ensure Development without Security and Security without Development? Transformation of Security-Development Relationship and its Conceptualization with Different Approaches
- Author:
- Arda Bilgen
- Publication Date:
- 10-2017
- Content Type:
- Journal Article
- Journal:
- Uluslararasi Iliskiler
- Institution:
- International Relations Council of Turkey (UİK-IRCT)
- Abstract:
- Despite radical changes and transformations at global scale in the past decades, security and development have retained their critical positions in global political agenda with their theoretical and practical dimensions. Over time, two areas have also undergone significant changes and transformations and converged to each other, especially after the emergence of human security and human development. The aim of this study is to broadly describe and discuss how “human” has become the common denominator of security and development and in what ways two areas have been conceptualized under security-development nexus. In this regard, common characteristics of security and development, paradigm shifts in both areas, their convergence process, different ways as to how security-development relationship has been conceptualized, and critiques towards such attempts will be discussed.
- Topic:
- Security, Development, and Human Security
- Political Geography:
- Turkey and Global Focus
100. Toward Practical Cyber Counter Deception
- Author:
- Christopher Porter
- Publication Date:
- 02-2017
- Content Type:
- Journal Article
- Journal:
- Journal of International Affairs
- Institution:
- School of International and Public Affairs, Columbia University
- Abstract:
- Nation-states increasingly engage in strategic deception in cyberspace, frustrating traditional counter deception approaches. This paper evaluates and critiques the philosophical underpinnings and practical implications of existing military-political counter deception and computer forensic approaches. Analysts can better detect and expose strategic deception campaigns in cyberspace by focusing on the size and organizational strength threat actors need to conduct the operations.
- Topic:
- Security, Science and Technology, Military Strategy, and Cybersecurity
- Political Geography:
- Global Focus