Search

You searched for: Topic Security Remove constraint Topic: Security
Number of results to display per page

Search Results

  • Author: Cornelius Adebahr
  • Publication Date: 05-2020
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: The rift between Europe and the United States over Iran is deepening. To regain leverage, the Europeans should engage all eight Gulf states in talks about regional security and nonproliferation. The rift between Europe and the United States over Iran is deepening. Two years of U.S. maximum pressure on Tehran have not yielded the results Washington had hoped for, while the Europeans have failed to put up enough resistance for their transatlantic partner to change course. Worse, the U.S. policy threatens to destabilize the broader Persian Gulf, with direct consequences for Europe. To get ahead of the curve and regain leverage, the European Union (EU), its member states, and the United Kingdom have to look beyond their relations with the Islamic Republic and address wider regional security challenges. The United States’ incipient retreat as a security guarantor and Russia’s increased interest in the region make it necessary for Europe to engage beyond its borders. Despite being barely alive, the 2015 international nuclear deal with Iran offers a good starting point. The Europeans should regionalize some of the agreement’s basic provisions to include the nuclear newcomers on the Arab side of the Gulf. Doing so would advance a nonproliferation agenda that is aimed not at a single country but at the region’s broader interests. Similarly, the Europeans should engage Iran, Iraq, and the six Arab nations of the Gulf Cooperation Council in talks about regional security. Rather than suggesting an all-encompassing security framework, for which the time is not yet ripe, they should pursue a step-by-step approach aimed at codifying internationally recognized principles at the regional level.
  • Topic: Security, Nuclear Weapons, Treaties and Agreements, Nonproliferation
  • Political Geography: Europe, Iran, Middle East, United States of America
  • Author: Robert Springborg, F.C. "Pink" Williams, John Zavage
  • Publication Date: 02-2020
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: The United States, Russia, and Iran have chosen markedly different approaches to security assistance in the Middle East, with dramatic implications for statebuilding and stability. The Middle East and North Africa (MENA) region is the world’s testing ground for the effectiveness of security assistance provided by global and regional powers. That security assistance has contributed to the intensity and frequency of proxy wars—such as those under way or recently wound down in Libya, Yemen, Syria, and Iraq—and to the militarization of state and substate actors in the MENA region. Security assistance is at the core of struggles for military, strategic, ideological, and even economic preeminence in the Middle East. Yet despite the broad and growing importance of security assistance for the region and for competition within it between global and regional actors, security assistance has been the subject of relatively little comparative analysis. Efforts to assess relationships between the strategic objectives and operational methods of security assistance providers and their relative impacts on recipients are similarly rare.
  • Topic: Security, Geopolitics, Political stability, State Building
  • Political Geography: Russia, Iran, Middle East, United States of America
  • Author: Christian Ruhl, Duncan Hollis, Wyatt Hoffman, Tim Maurer
  • Publication Date: 02-2020
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: As cyber insecurity has become a growing problem worldwide, states and other stakeholders have sought to increase stability for cyberspace. As a result, a new ecosystem of “cyber norm” processes has emerged in diverse fora and formats. Today, United Nations (UN) groups (for example, the Group of Governmental Experts [GGE] and the Open-Ended Working Group [OEWG]), expert commissions (for example, the Global Commission on the Stability of Cyberspace), industry coalitions (for example, the Tech Accord, the Charter of Trust), and multistakeholder collectives (for example, the Paris Call for Trust and Security in Cyberspace) all purport to identify or operationalize various normative standards of behavior for states and/or other stakeholders in cyberspace. As some of these processes wind down (for example, the Global Commission) and others wind up (for example, the OEWG), cyber norms are at a crossroads where each process’s potential (and problems) looms large.
  • Topic: Security, Science and Technology, Cybersecurity, Geopolitics, Norms
  • Political Geography: Global Focus
  • Author: Frederic M. Wehrey
  • Publication Date: 03-2020
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: The escalation and spillover of Libya's conflict has posed mounting security challenges for Tunisia and exposed shortfalls in the country's defense transformation, in the areas of capability gaps, interagency coordination, intelligence sharing, strategic planning, and in the military's relationship with foreign security patrons.
  • Topic: Security, Defense Policy, Conflict
  • Political Geography: Libya, North Africa, Tunisia
  • Author: Eunsun Cho
  • Publication Date: 05-2020
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: As the unparalleled ability of big data to capture and process real-time information signals a revolution in public administration, countries around the world have begun to explore the application of the technology to government functions. At the forefront of these efforts is China, which is planning to launch the social credit system (SCS), a data-powered project to monitor, assess, and shape the behavior of all citizens and enterprises. This new frontier of digital surveillance raises questions about how the United States will incorporate data technology into its own politics and economy. This article argues that the U.S. needs a comprehensive nationwide data protection framework that places limits on surveillance by both private business and the government. Without drawing its own baseline for personal data protection, the United States risks missing the already narrowing opportunity to define its balance between democracy, security, and growth.
  • Topic: Security, Science and Technology, Democracy, Surveillance
  • Political Geography: China, Asia-Pacific, United States of America
  • Author: Flavia Eichmann
  • Publication Date: 05-2020
  • Content Type: Journal Article
  • Journal: Woodrow Wilson School Journal of Public and International Affairs
  • Institution: Woodrow Wilson School of Public and International Affairs, Princeton University
  • Abstract: This article explores what impact terrorist blacklists have on negotiated solutions to armed conflicts involving listed non-state armed groups. Even though conflicts that involve non-state armed groups do not usually end through these groups’ military defeat, governments around the globe tend to adopt hard-security approaches with regard to inner-state conflicts. Especially when groups resort to terrorist tactics, governments tend to be reluctant to engage peacefully with these actors and instead commonly rely on terrorist blacklists in order to delegitimize and restrict groups’ activities. While these blacklists are effective in criminalizing the operations of these groups, they can also severely impede peaceful dialogue and thus negatively impact the resolution of conflicts. Especially the work of NGOs and third-party peace practitioners is greatly constrained by criminalizing any form of interaction with listed groups. Additionally, in the absence of a universal definition of what constitutes a terrorist group, lists vary from country to country and the criteria for groups and individuals to get listed are often extremely vague. Furthermore, most lists fail to re-evaluate the proscribed groups on a regular basis and delisting procedures lack transparency. This article finds that blacklists severely disincentivize peaceful engagement with non-state armed groups and thus calls for a revision of contemporary proscription regimes in order to shift the focus of counterterrorism approaches towards viewing peaceful dialogue as a first option and not a last resort.
  • Topic: Conflict Resolution, Security, Terrorism, Non State Actors, Violent Extremism, Negotiation, Peace
  • Political Geography: Global Focus, United States of America
  • Author: Shaoyu Yuan
  • Publication Date: 02-2020
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: Tensions in the South China Sea continue to rise. China’s People’s Liberation Army Navy (PLAN)’s Rear Admiral Lou Yuan, regarded as a hawkish military commentator, recently proclaimed that the continuing dispute over the ownership of the South China Sea could be resolved by sinking two US aircraft carriers. Statements like these result in a legitimate fear that China’s increasing presence in the South China Sea might spark a kinetic military conflict with the United States. However, while most Western scholars and media are paying excessive attention to the rise of China, few are contemplating China’s weaknesses in the region. Despite China’s constant verbal objections and rising tensions with the United States in the last century, the world has yet to witness any major military confrontation between the two superpowers. China will continue to avoid directly confronting the United States in the South China Sea for at least another decade because China’s military remains immature and defective.
  • Topic: Security, Power Politics, Territorial Disputes, Grand Strategy, Conflict
  • Political Geography: China, Asia, North America, South China, United States of America
  • Author: Max Erdemandi
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: Recent discussions on the Turkish state’s actions, which have devastated Kurdish people within and outside of its borders, suffer from a familiar deficiency: they neglect the historical and cultural foundations of the dynamics that placed the Kurdish people at the center of Turkey’s national security policy. Serious human rights violations and voter suppression in southeast Turkey, the massacre of Kurdish people in various parts of northern Syria, and purging of Kurdish politicians on false accusations are all extensions of Turkey’s decades-long, repeated policy mistakes, deeply rooted in its nationalist history. Unless there is a seismic shift in the drivers of Turkish security policy, especially as it pertains to the Kurdish people, Turkey is bound to repeat these mistakes. Furthermore, threat externalization with linkage to legitimacy of rule will further erode the democratic institutions of the state and other authentic aspects of Turkish identity.
  • Topic: Security, Nationalism, Ethnicity, Syrian War, Borders, Violence, Kurds
  • Political Geography: Turkey, Middle East, Syria, Kurdistan
  • Author: Richard L. Morningstar
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: On November 18, the Georgetown School of Foreign Service welcomed former U.S. Ambassador to the European Union Richard Morningstar for a conversation on energy security in the Caspian region. Prior to the event, GJIA sat down with Ambassador Morningstar to discuss the intersection of energy and geopolitics, legacies from the Soviet Union, and energy security challenges facing Central Asian states.
  • Topic: Security, Energy Policy, Geopolitics, Interview
  • Political Geography: Europe, Central Asia, Soviet Union, Caspian Sea, United States of America
  • Author: Obert Hodzi
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: With a few exceptions, armed civil wars are no longer commonplace in Africa, but anti-government protests are. Instead of armed rebels, unarmed civilians are challenging regimes across Africa to reconsider their governance practices and deliver both political and economic change. In their responses, regimes in countries like Zimbabwe, Cameroon, Rwanda, and Burundi have favored the combat mode—responding to dissent with military and repressive means. With few options, civilian movements look to the United States for protection and support while their governments look to China for reinforcement. If the United States seeks to reassert its influence in Africa and strengthen its democratic influence, its strategy needs to go beyond counterterrorism and respond to Africa’s pressing needs while supporting the African people in their quest for democracy and human rights.
  • Topic: Security, Conflict, State Violence, Civilians
  • Political Geography: Africa, China, Asia, North America, United States of America
  • Author: David Smith
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: Civilian governance in Pakistan has never lasted longer than eleven years. 2019 is the eleventh year since General Pervez Musharraf resigned the presidency and fears of a coup may exist, but one is not probable—at least not in the near-term future. In fact, two recent Chiefs of Army Staff (COAS)—Generals Kayani and Raheel in 2009 and 2014, respectively—considered taking, but decided not to take, direct control of the government. These decisions demonstrate that military rule is no longer necessary because the Army has already attained its major goals of de facto control of the country’s nuclear and missile programs, key foreign relationships, the military budget, and national security decision-making. In effect, the military has achieved what I have previously termed a “coup-less coup.” Instead of the traditionally fraught civil-military relationship, it seems that, for the first time in Pakistan’s turbulent history, the government and military agree on the three major issues facing Pakistan: domestic politics, the economy, and India. However, key variables, such as economic stability, could quickly change the course of this relationship.
  • Topic: Security, Economics, Governance, Conflict, Civilians, Military Government
  • Political Geography: Pakistan, South Asia, India
  • Author: Ian Williams
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: For decades, China has engaged in a fervent game of “catch-up” with U.S. military capabilities. This effort, which has ballooned China’s defense spending to 620 percent of its 1990 level, is beginning to bear real fruit. While still far from achieving military parity, China’s military technology and doctrine are quickly coalescing into a coherent form of warfare, tailored to overpowering the U.S. military in a short, sharp conflict in the Eastern Pacific. This strategy of “informationized” warfare focuses first on eroding U.S. situational awareness, communications, and precision targeting capabilities.
  • Topic: Security, Science and Technology, Military Affairs, Weapons , Military Spending, Conflict, Surveillance
  • Political Geography: China, Asia, North America, United States of America
  • Author: Alessandro Marrone
  • Publication Date: 04-2020
  • Content Type: Commentary and Analysis
  • Institution: Istituto Affari Internazionali
  • Abstract: The COVID-19 pandemic will negatively affect the defence field from a budgetary, industrial and politicostrategic point of view, particularly in Europe. Depending on the pandemic’s duration, its economic consequences and national and EU responses, effects may range from contained damages to a much wider European security crisis.
  • Topic: Security, Defense Policy, Crisis Management, Coronavirus
  • Political Geography: Europe, European Union
  • Author: Ehud Eiran
  • Publication Date: 04-2020
  • Content Type: Working Paper
  • Institution: Istituto Affari Internazionali
  • Abstract: Israel is still holding to its traditional security maxim. Based on a perception of a hostile region, Israel’s response includes early warning, deterrence and swift – including pre-emptive – military action, coupled with an alliance with a global power, the US. Israel is adjusting these maxims to a changing reality. Overlapping interests – and perhaps the prospect of an even more open conflict with Iran – led to limited relationships between Israel and some Gulf states. These, however, will be constrained until Israel makes progress on the Palestine issue. Israel aligned with Greece and Cyprus around energy and security, which may lead to conflict with Turkey. Russia’s deployment in Syria placed new constraints on Israeli freedom of action there. The US’s retrenchment from the Middle East is not having a direct effect on Israel, while the Trump administration’s support for Israel’s territorial designs in the West Bank may make it easier for Israel to permanently expand there, thus sowing the seeds for future instability in Israel/Palestine. The EU could try and balance against such developments, but, as seen from Israel, is too divided to have a significant impact. Paper produced in the framework of the FEPS-IAI project “Fostering a New Security Architecture in the Middle East”, April 2020.
  • Topic: Security, Foreign Policy, Defense Policy, Gas, Hezbollah
  • Political Geography: Russia, Iran, Middle East, Israel, Greece, Palestine, Saudi Arabia, Cyprus, United States of America, Mediterranean
  • Author: Terry Babcock-Lumish, Tania Chacho, Tom Fox, Zachary Griffiths
  • Publication Date: 03-2020
  • Content Type: Special Report
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: As the Indo-Pacific region enters a period of uncertainty, this monograph details the proceedings of West Point’s 2019 Senior Conference 55. Scholars and practitioners convened to discuss and debate strategic changes, and experts shared thoughts during keynote addresses and panels on economics, security, technology, and potential futures in this critically important region.
  • Topic: Security, Science and Technology, Military Strategy, Armed Forces, Military Affairs
  • Political Geography: Asia, North America, United States of America, Indo-Pacific
  • Author: C. Anthony Pfaff
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: Security cooperation with Iraq remains a critical component of the US-Iraq relationship. Despite neighboring Iran’s ability to limit US political and economic engagement, Iraq still seeks US assistance to develop its military and to combat resurgent terrorist organizations. This monograph provides a historical and cultural basis from which to understand the limitations and potential for US cooperation with Iraq’s armed forces.
  • Topic: Security, Politics, Terrorism, Military Strategy, Armed Forces, Military Affairs, Islamic State, Economy
  • Political Geography: Iraq, Middle East, North America, United States of America
  • Author: Ghaith al-Omari
  • Publication Date: 02-2020
  • Content Type: Policy Brief
  • Institution: The Washington Institute for Near East Policy
  • Abstract: By granting Israel much more say over the sovereignty of a future Palestinian state and its ability to absorb refugees, the document may undermine the administration’s ability to build an international coalition behind its policies. President Trump’s “Peace to Prosperity” plan was presented as a departure from previous approaches—a notion that invited praise from its supporters (who saw it as a recognition of reality) and criticism from its opponents (who saw it as an abandonment of valued principles). The plan does in fact diverge from past efforts in fundamental respects, yet there are also some areas of continuity, and ultimately, the extent to which it gains traction will be subject to many different political and diplomatic variables. Even so, the initial substance of the plan document itself will play a large part in determining how it is viewed by various stakeholders, especially those passages that veer away from the traditional path on core issues. Part 1 of this PolicyWatch assessed what the plan says about two such issues: borders and Jerusalem. This second installment discusses security, refugee, and narrative issues.
  • Topic: Security, Foreign Policy, Refugees, Peace
  • Political Geography: Middle East, Israel, Palestine, North America, United States of America
  • Author: Mehdi Khalaji
  • Publication Date: 03-2020
  • Content Type: Policy Brief
  • Institution: The Washington Institute for Near East Policy
  • Abstract: Even as their lack of transparency worsens the public health crisis, the Supreme Leader and other officials have systematically gutted any civil society elements capable of organizing substantial opposition to such policies. Iran’s ongoing coronavirus epidemic has left the people with less reason than ever to trust the information and directives issued by their leaders. Part 1 of this PolicyWatch discussed the clergy’s role in aggravating this problem, but the state’s mistakes and deceptions have been legion as well. They include scandalous discrepancies between official reports after a period of denial that the virus had entered the country; a health system that was unprepared to deal with such a disease promptly and properly; and official resistance to implementing internationally recommended precautionary measures, such as canceling flights from China and quarantining the center of the outbreak. These decisions have sown widespread confusion about facts and fictions related to the virus, the most effective medically proven ways to control it, and the degree to which it is spreading throughout the country. As a result, an already restive population has become increasingly panicked about the future and angry at the state. Yet can the coronavirus actually bring down the regime? The harsh reality is that the state has left little space for opposition to organize around health issues, or any issues for that matter. Instead, it has sought to confuse the people and redirect their anger toward external enemies, even as its own policies contribute to the crisis.
  • Topic: Security, Foreign Policy, Civil Society, Health, Public Health, Coronavirus
  • Political Geography: Iran, Middle East, United States of America
  • Author: Frank Aum, Jacob Stokes, Patricia M. Kim, Atman M. Trivedi, Rachel Vandenbrink, Jennifer Staats, Joseph Yun
  • Publication Date: 02-2020
  • Content Type: Policy Brief
  • Institution: United States Institute of Peace
  • Abstract: A joint statement by the United States and North Korea in June 2018 declared that the two countries were committed to building “a lasting and stable peace regime on the Korean Peninsula.” Such a peace regime will ultimately require the engagement and cooperation of not just North Korea and the United States, but also South Korea, China, Russia, and Japan. This report outlines the perspectives and interests of each of these countries as well as the diplomatic, security, and economic components necessary for a comprehensive peace.
  • Topic: Conflict Resolution, Security, Diplomacy, Economy, Peace
  • Political Geography: Russia, Japan, China, Asia, South Korea, North Korea, Korean Peninsula, United States of America
  • Author: Raffaello Pantucci, Abdul Basit, Kyler Ong, Nur Aziemah Azman, V. Arianti, Muh Taufiqurrohman
  • Publication Date: 04-2020
  • Content Type: Journal Article
  • Journal: Counter Terrorist Trends and Analysis
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: The Coronavirus Disease 2019 (COVID-19) pandemic has redefined almost all spheres of modern life. While states around the world are redeploying their financial resources, energies and military capabilities to cope with the challenge of the coronavirus, terrorist groups across the ideological spectrum have positioned themselves to exploit the gaps created by these policy re-adjustments. Terrorist groups are milking people’s fears amid confusion and uncertainty to promote their extremist propagandas. The rearrangement of global imperatives will push counter-terrorism and extremism down the priority list of the international community. Anticipating these policy changes, existing counter-terrorism frameworks and alliances should be revisited to devise cost-effective and innovative strategies to ensure continuity of the fight against terrorist groups. With these considerations in mind, this special issue of the Counter Terrorist Trends and Analyses (CTTA) features four articles that identify and assess important security risks around COVID-19, given its far-reaching social, economic and geopolitical impact. In the first article, Raffaello Pantucci reasons that COVID-19 will have a deep-seated and prolonged impact across government activity, both in terms of the categorisation of risks, as well as the resources available to tackle other issues. Perceptions of risk around terrorist threats may shift, with states grappling with stark economic, social and political challenges. At the same time, security threats continue to evolve, and may even worsen. According to the author, some of the tools developed to deal with the pandemic can potentially be useful in tracking terrorist threats. However, resource constraints will require states, on a global scale, to think far more dynamically about how to adequately buffer much-needed security blankets both within and beyond their borders. In the second article, Abdul Basit outlines the opportunities and potential implications that COVID-19 has created for terrorist groups across the ideological divide. According to the author, terrorist groups have exploited the virus outbreak to spread racial hatred, doomsday and end-of-times narratives. Among jihadist groups, IS has taken a more totalitarian view of the coronavirus pandemic, while Al-Qaeda (AQ) and the Taliban have used it as a PR exercise to gain political legitimacy. Far-right groups in the West have spun it to promote native nationalism, border restoration and anti-immigration policies. Terrorist groups have increased their social media propaganda to radicalise and recruit vulnerable individuals. At the same time, these groups have urged their supporters to carry out lone-wolf attacks and use the coronavirus as a bioweapon. In the post-COVID-19 world, revisiting existing counter-terrorism frameworks to devise more adaptable and cost-effective strategies would be needed to continue the fight against terrorism. In the next article, V. Arianti and Muh Taufiqurrohman observe that the COVID-19 outbreak has had a varied impact on Indonesia’s security landscape. On the one hand, it has emboldened IS-affiliated Indonesian militant groups to step up calls for attacks, with the government seen as weakened amidst a worsening domestic health crisis. On the other, ongoing indoctrination and recruitment activities of militant groups have also faced disruptions. According to the authors, counter-terrorism strategies will need to be reoriented as circumstances evolve, particularly in dealing with the arrest of militants and the subsequent processes of their prosecution and incarceration. Finally, Kyler Ong and Nur Aziemah Azman examine the calls to action by far-right extremists and the Islamic State (IS), which reveals varying degrees of organisational coherence in the respective movements. According to the authors, such variations influence these two groups’ preferred techniques, tactics and procedures adopted in seeking to exploit the health crisis. For its part, IS has a more organised hierarchical structure, even if it has increasingly granted autonomy to its affiliates to plan and execute attacks. In comparison, the absence of a central authority, or command structure in the far-right, can lead to a fragmentation of interests. These factors invariably create uncertainties in how, when and where extremists of both ilk may seek to operationalise an attack.
  • Topic: Security, Government, Health, Terrorism, Counter-terrorism, Al Qaeda, Islamic State, COVID-19
  • Political Geography: South Asia, Indonesia, Southeast Asia, Global Focus
  • Author: James M Dorsey, Raffaello Pantucci, Bilveer Singh, Noor Huda Ismail
  • Publication Date: 03-2020
  • Content Type: Journal Article
  • Journal: Counter Terrorist Trends and Analysis
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: The high-profile assassination of General Qassim Soleimani, the commander of the Iranian Revolutionary Guard Corps’ Quds Force (QF), on January 3 in Baghdad marked the lowest point in US-Iran relations in recent times. It triggered a new spell of geopolitical tensions in the Middle East with far-reaching consequences for South and Southeast Asia. Soleimani’s killing has also coincided with the potential rejuvenation of the Islamic State (IS), and ongoing anti-government protests in Iraq, Iran and Lebanon. Soleimani’s killing was bound to have reverberations beyond the Middle East. Muslim-majority states in South and Southeast Asia, where both Saudi Arabia and Iran have engaged in sectarian proxy wars by funding and influencing the Sunni and Shia segments of the population. While states in both regions have condemned Soleimani’s killing, they have stayed largely neutral to avoid getting sucked into rising geopolitical tensions. Against this backdrop, the March issue of the Counter Terrorists Trends and Analyses (CTTA) features three articles that explore different dimensions of Soleimani’s death and their geopolitical implications. In the first article, James M. Dorsey argues that as US-Iran tensions have eased in recent months, Iranian hardliners, emboldened by a sweeping mandate earned in recent domestic elections, remain committed to a well-honed strategy of escalating asymmetric warfare. According to the author, this raises the prospects for a full-scale war, with the United States also still pursuing a maximum pressure campaign on Iran that has to date, yet to produce tangible results. In the second article, Raffaello Pantucci reasons that despite a general consensus that the US-Iran rupture will ease pressure on transnational jihadist groups in the Middle East theatre, it remains unclear how Soleimani’s killing will shape their future behaviour. On the one hand, Iran-backed Shia militias are likely to step up their operations, which will exacerbate sectarian fault-lines in the region and feed into IS’ self-portrayal as the saviours of Sunnis. Conversely, pragmatism continues to define interactions between Tehran and Sunni jihadist groups such as the Islamic State and Al Qaeda, who appear happy to cooperate to ensure broader strategic goals. Next, Bilveer Singh examines the implications of Soleimani’s assassination for South and Southeast Asia. regions where both Iran and Saudi Arabia enjoy ideological influence among the Muslim-majority states. Sunni Malaysia and Indonesia have reservations about Tehran, but domestic political pressures are likely to endear Iran to them more than the US. The impact in South Asia could be more varied, mostly affecting Afghanistan and Pakistan. Iran through its Shia militant proxies can undermine US interests in Afghanistan. The QF has also recruited significant Shia militias in Afghanistan and Pakistan respectively for operations in Syria. Moreover, Pakistan has to walk a tight rope given Iran has an inside track to its significant Shia population. Besides cross and intra-regional assessments of Soleimani’s assassination within the broader US-Iran fissures, the threat landscapes in Indonesia and West Africa, both long-time hotbeds for terrorist activity in their respective regions, are also examined in this issue. Firstly, Noor Huda Ismail takes a closer look at pro-IS terrorist networks in Indonesia, a country that is home to the world’s largest Muslim population. By examining the background, tactics and modus operandi of local terrorist groups, both online and offline, and comparing their legacy with those of previous militant Islamist movements, the author believes important learning lessons can be drawn to help mitigate future security threats. Finally, Atta Barkindo analyses the jihadist threat in the Sahel region, where a landscape conducive to terrorist activities provides the fertile ground for IS and Al-Qaeda to grow by linking up with local militant networks. The tactical sophistication exhibited in terrorist attacks by Sahelian jihadist groups, particularly in Nigeria and the Lake Chad region, testifies to a growing footprint of global jihadism. Sahel provides an arterial life-line through the region, by facilitating the movement of goods and people between the Mediterranean and West Africa, which has been enormously beneficial to terrorist groups involved in organised criminal enterprises. Moreover, desertification and environmental degradation have also created a conducive environment for criminal activities and terrorism.
  • Topic: Security, Terrorism, Bilateral Relations, Counter-terrorism, Al Qaeda, Islamic State, Protests
  • Political Geography: Iraq, Iran, Middle East, Lebanon, Southeast Asia, United States of America
  • Author: Ong Keng Yong, Noorita Mohd Noor, Iftekharul Bashar, Muhammad Saiful Alam Shah Bin Sudiman, Nodirbek Soliev, Remy Mahzam, Amalina Abdul Nasir
  • Publication Date: 01-2020
  • Content Type: Journal Article
  • Journal: Counter Terrorist Trends and Analysis
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: The January issue provides an overview of terrorist and violent extremist threats in key countries and conflict zones in the Asia-Pacific throughout 2019. Regional specific threats and responses covering Southeast Asia, South Asia, Central Asia, China and the Middle East are assessed. In addition, themes such as the online narratives propagated by global threat groups and counter-ideological dimensions of terrorism and violent extremism are analysed. Globally, despite suffering severe territorial, leadership and organisational losses in 2019, Islamist terror groups Islamic State (IS) and Al Qaeda (AQ) continued to pose the most potent terrorist threat. Early in the year, IS’ territorial reign was ended by American-backed coalition forces, following which its networks became scattered and, in a bid to overcome its physical decimation, more decentralised across the globe. The death of IS’ “Caliph”, Abu Bakr Al-Baghdadi, in October 2019, raised further questions about the group’s continued resiliency. Yet, IS has proved persistent and adaptive. The group’s violent ideology continues to bind its myriad followers across regions. In the aftermath of its territorial and leadership losses, IS’ terror attacks and online offensives have been sustained. The global security landscape was further complicated by the emergence of Right Wing Extremist groups as violent actors on the world stage in 2019. Mass political protests around the world further underscored growing dissatisfaction with the present status quo, amid perceptions that some states are unable to articulate masses’ aspirations and meet their demands. The threat of Islamist terrorism will persist into 2020, especially with escalating geo-political tensions in the Middle East. Overcoming the physical and ideological threat by global militant groups, including far-right extremist groups, will remain very much a work in progress in the year ahead.
  • Topic: Security, Terrorism, Counter-terrorism, Al Qaeda, Islamic State, Protests, Violence
  • Political Geography: China, South Asia, Central Asia, Middle East, North Africa, Southeast Asia
  • Author: Christopher Chen, Angelo Paolo L. Trias
  • Publication Date: 05-2020
  • Content Type: Working Paper
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: Water is a fundamental element of survival and growth on Earth. As a prerequisite for life and an important economic resource, it supports all aspects of everyday activity. Ensuring that water is available, accessible and safe for current and future generations is among humanity’s greatest challenge. One of the most important Non-Traditional Security (NTS) challenges facing Southeast Asia is water security. This NTS Insight explores water security issues in Southeast Asia and examines the ways it threatens states and societies. While water security challenges are not new in the region, the nature of issues are changing, making it important to assess how such threats are defined, negotiated, and managed. The NTS governance process begins with identifying and understanding NTS challenges, and ways they are securitised. By looking at case studies at the sub-national, national and regional level, this paper seeks to present some of the major water security issues in the region, how they affect states and societies, and why they merit urgent attention and resources. This Insight explains why addressing sub-national water security challenges require consultative and participatory approaches that facilitate open democratic dialogue and local collective action. It will also lay out how deliberate planning, careful implementation, and judicious monitoring of water management policies are needed at both the national and regional levels. Further, while it is not easy to reconcile developmental goals with environmental protection, the gravity of the situation requires more preventive diplomacy and subregional collaborative mechanisms which are geared towards averting water conflicts. Overall, it aims to help formal and informal NTS actors working through various channels to gain further understanding of emerging water security challenges in Southeast Asia.
  • Topic: Security, Environment, Natural Resources, Water
  • Political Geography: Asia, Southeast Asia
  • Author: Susan Ariel Aaronson
  • Publication Date: 04-2020
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: From posting photos and videos to tracking physical activity, apps can do almost anything, but while they may seem like harmless fun, they may also pose a threat to personal data and national security. This paper compares the different responses of the United States, Canada and Germany to data risks posed by popular apps such as FaceApp, Facebook, Strava, TikTok and ToTok. These apps and many others store troves of personal data that can be hacked and misused, putting users (and the countries in which they live) at risk.
  • Topic: Security, Digital Economy, Social Media, Data
  • Political Geography: United States, Europe, Canada, Germany, North America
  • Author: Gaurav Sharma, Marc Finaud
  • Publication Date: 05-2020
  • Content Type: Working Paper
  • Institution: The Geneva Centre for Security Policy
  • Abstract: Due to the importance India attaches to potential threats to its maritime security, its diplomacy has increasingly focused on the Indian Ocean region (IOR) and it has increased cooperation with Indian Ocean states. In the last five years, India has also established security partnerships with major IOR strategic stakeholders such as France and the United States. India has increasingly invested in providing military training, weapons support and disaster relief assistance to “like-minded” states in the IOR. Due to the potential risks of escalation to nuclear-weapons use should conflict occur with other countries in the region such as China and Pakistan, it would be in India’s interests to promote more confidence and
  • Topic: Security, Diplomacy, Nuclear Weapons, Military Affairs, Missile Defense
  • Political Geography: Pakistan, China, South Asia, India, Indian Ocean
  • Author: Kirill Semenov
  • Publication Date: 04-2020
  • Content Type: Working Paper
  • Institution: The Geneva Centre for Security Policy
  • Abstract: The situation in Idlib poses a challenge to the Assad government. Damascus has neither the forces nor the means to resolve the problem. Moreover, any operation conducted against the Syrian moderate opposition and the radical alliance “Hayat Tahrir al-Sham” (HTS) concentrated in this region could be significantly problematic for the government. Turkey seeks to establish a protectorate or security zone in Idlib to accommodate those fleeing regime-held areas and prevent a new refugees flow into Turkey. The gains achieved by the Turkish operation in Idlib by the establishment of the security zone has potentially been lost as a result of the subsequent Russian backed Syrian government offensive, which has created a problem for Turkey with hundreds of thousands heading toward the Turkish border and threatening to exasperate what is already a costly refugee problem for Ankara. In order for Turkey to address issues in Idlib, including IDPs and economic problems, it first needs to deal with the HTS, ideally finding a way to dissolve the group. This could potentially be an area of cooperation for Moscow and Ankara. This may be necessary to prevent a deterioration in the security situation and long-term destabilisation of the area.
  • Topic: Security, Refugees, Economy, Political stability, Displacement, Syrian War, Hay'at Tahrir al-Sham (HTS), Transition
  • Political Geography: Russia, Turkey, Middle East, Syria, Idlib
  • Author: Jean-Pierre Keller
  • Publication Date: 04-2020
  • Content Type: Working Paper
  • Institution: The Geneva Centre for Security Policy
  • Abstract: Since the fall of Baghuz city in North East of Syria in March 2019, thousands of women, children and former IS fighters have been imprisoned in either camps or prisons. Following the Turkish military operation in October 2019, the security conditions have deteriorated, resulting in fewer guards as well as more instability and vulnerability for all those imprisoned. The worsening living conditions, the absence of adequate medical care and lack of access to education endanger the future of the children imprisoned in the camp. Moreover, the influence of the Muhajirats remains constant as a means for the spreading of propaganda inside and outside the camps.
  • Topic: Security, Human Rights, Children, Women, Islamic State, Transition
  • Political Geography: Turkey, Middle East, Syria, United States of America
  • Author: Marcin Andrzej Piotrowski
  • Publication Date: 04-2020
  • Content Type: Special Report
  • Institution: The Polish Institute of International Affairs
  • Abstract: Iran’s official figures on cases and deaths from COVID-19 (the disease resulting from coronavirus, SARS-CoV-2) do not reflect the real scale of the pandemic in that country, which might be among the hardest hit in the world. The pandemic will deepen the economic crisis and disfunction of the state, becoming a challenge to Iran’s ruling elite. The regime might survive thanks to the security apparatus and, in parallel, continue its support of Shia militias in Lebanon, Iraq, and Yemen, and the Syrian government. Only the succession of power after Ali Khamenei will be the real test of the coherence of the Iranian elite, and in case of disruption, it might result in the collapse of Iran’s theocracy.
  • Topic: Security, Foreign Policy, Economics, Government, Health, Coronavirus, Pandemic, Elites
  • Political Geography: Iraq, Iran, Middle East, Yemen, Lebanon, Syrian Arab Republic
  • Author: Sara Nowacka
  • Publication Date: 05-2020
  • Content Type: Special Report
  • Institution: The Polish Institute of International Affairs
  • Abstract: The activity of the Popular Mobilisation Forces (PMF), a state-financed organisation of around 60 militias, deepens the political crisis in Iraq. This was mirrored in their brutal suppression of anti-government protests and a series of attacks between PMF Kataib Hezbollah (KH) forces and U.S. troops. The structure of the PMF and their political influence in Iraq and abroad prevent the state from controlling the militias. This hinders attempts to calm the ongoing protests in Iraq and threatens the security of the military missions present there. The absorption of PMF members directly into the army and demobilisation of some militias could counteract this.
  • Topic: Security, Non State Actors, Islamic State, Protests, Militias
  • Political Geography: Iraq, Middle East, North America, United States of America
  • Author: Anna Maria Dyner
  • Publication Date: 05-2020
  • Content Type: Special Report
  • Institution: The Polish Institute of International Affairs
  • Abstract: Outside its borders, Russia has military bases in the post-Soviet space and in Syria. The main goal is to increase Russian military security and political influence in countries in which these bases are located. Despite economic difficulties related to the drop in oil and gas prices and the costs of the COVID-19 pandemic, Russia will maintain its network of bases, which it considers an important element of influence.
  • Topic: Security, Foreign Policy, Economics, Military Strategy, Coronavirus
  • Political Geography: Russia, Eurasia
  • Author: Jakub Benedyczak
  • Publication Date: 06-2020
  • Content Type: Special Report
  • Institution: The Polish Institute of International Affairs
  • Abstract: COVID-19 has become an opportunity for the Russian authorities to increase repressive measures and test Chinese solutions for digital control of society. Most of the solutions will probably be maintained after the pandemic eases, especially given the deepening economic crisis and potential of protests.
  • Topic: Security, Human Rights, Surveillance, Coronavirus
  • Political Geography: Russia, China, Eurasia
  • Author: Paweł Markiewicz
  • Publication Date: 06-2020
  • Content Type: Special Report
  • Institution: The Polish Institute of International Affairs
  • Abstract: The Arctic has become another contested area between the U.S., Russia, and China. The region’s growing importance for global trade and American security means the U.S. goal is largely to maintain freedom of navigation in the Arctic. For this reason, the Trump administration strives to increase American capacities to operate in the Arctic. The effects of the COVID-19 pandemic will delay implementing these plans; nevertheless, they will be achieved in the long term and the U.S. will also expect support in the Arctic from NATO allies.
  • Topic: Security, Foreign Policy, NATO, International Trade and Finance
  • Political Geography: Russia, China, Arctic, United States of America
  • Publication Date: 03-2020
  • Content Type: Policy Brief
  • Institution: Mitvim: The Israeli Institute for Regional Foreign Policies
  • Abstract: This policy paper sets out the various interests and goals of global powers (the US, Russia, China and the EU) in the Mediterranean, and the measures they are undertaking to implement them. The document also describes Israeli policies vis-àvis the powers’ activities in this region, and points to the principles that should guide them. The paper is based on a July 2019 meeting in Jerusalem of the research and policy working group on Israel in the Mediterranean, held at the initiative of the Mitvim Institute, the Hebrew University’s Leonard Davis Institute for International Relations and Haifa University’s National Security Studies Center.
  • Topic: International Relations, Security, Foreign Policy
  • Political Geography: Russia, China, Middle East, Israel, United States of America, Mediterranean
  • Author: Ronen Zeidel
  • Publication Date: 03-2020
  • Content Type: Working Paper
  • Institution: Mitvim: The Israeli Institute for Regional Foreign Policies
  • Abstract: The final months of 2019 were marked by widespread, prolonged protests throughout Iraq, which began in October. Baghdad was the focal point of the demonstrations, which were directed at the ruling political elite and the state backing it: Iran. Prime Minister Adil AbdulMahdi resigned at the end of November, throwing official Iraq into a political vacuum and guaranteeing that any premier appointed to replace him would be considered an interim ruler and as such, his government would only be accepted by the weakened political elite, but not by a significant part of the population. This article reviews the changes that occurred in 2019 in the nature of Israel-Iraq cooperation, as they relate to diplomatic, security, economic and civilian aspects.
  • Topic: Security, Foreign Policy, Bilateral Relations, Civilians
  • Political Geography: Iraq, Middle East, Israel, Palestine
  • Author: Einat Levi
  • Publication Date: 04-2020
  • Content Type: Working Paper
  • Institution: Mitvim: The Israeli Institute for Regional Foreign Policies
  • Abstract: This article examines the current Israel-Morocco cooperation and its development through 2019. It briefly describes developments in diplomatic, security, economic and civilian arenas in order to find common ground and identify trends. Naturally, the paper will not elaborate much on the security-intelligence aspect of the cooperation, despite its centrality, due to its classified nature.
  • Topic: Security, Diplomacy, Regional Cooperation, Bilateral Relations, Economy
  • Political Geography: Middle East, Israel, Palestine, North Africa, Morocco
  • Author: James M Dorsey
  • Publication Date: 05-2020
  • Content Type: Commentary and Analysis
  • Institution: The Begin-Sadat Centre for Strategic Studies (BESA)
  • Abstract: The coronavirus pandemic and its economic fallout may rewrite the security as well as the political and economic map of the Middle East. The crisis will probably color Gulf attitudes towards the region’s major external players: the US, China, and Russia. Yet the Gulf States are likely to discover that their ability to shape the region’s map has significantly diminished.
  • Topic: Conflict Prevention, International Relations, Security, Trade
  • Political Geography: Russia, China, Middle East, United States of America, Gulf Nations
  • Author: James M Dorsey
  • Publication Date: 03-2020
  • Content Type: Commentary and Analysis
  • Institution: The Begin-Sadat Centre for Strategic Studies (BESA)
  • Abstract: Turkish president Recep Tayyip Erdoğan is at odds with just about everybody. He is on opposite sides with Russia in Syria as well as Libya and is trying the patience of his US and European allies. Turkey and Russia are testing the limits of what was always at best an opportunistic, fragile partnership aimed at capitalizing on a seemingly diminishing US interest in the Middle East, already evident under President Barack Obama and continuing under Donald Trump, who is haphazardly redefining what he sees as America’s national interests.
  • Topic: Security, Geopolitics, Recep Tayyip Erdoğan
  • Political Geography: Russia, Turkey, Middle East, Libya, Syria
  • Author: Uzi Rubin
  • Publication Date: 01-2020
  • Content Type: Special Report
  • Institution: The Begin-Sadat Centre for Strategic Studies (BESA)
  • Abstract: Israeli PM Benjamin Netanyahu’s warning on the emergent Yemen-originating missile threat corresponds to Iran’s modus operandi of surrounding its foes with missile “rings of fire” and will enable Tehran to complete the missile encirclement of the Jewish state as a step toward its eventual demise. Israel must do its utmost to confront this new strategic threat by establishing an alert system and defense capabilities against Yemen-originating cruise and ballistic missiles, whatever the cost.
  • Topic: Security, Military Affairs, Geopolitics, Weapons
  • Political Geography: Iran, Middle East, Israel, Yemen
  • Author: David Carment
  • Publication Date: 01-2020
  • Content Type: Policy Brief
  • Institution: Canadian Global Affairs Institute (CGAI)
  • Abstract: After three years of limited discussion, the leaders of France, Germany, Russia and Ukraine renewed their peace talks to resolve the separatist conflict in Eastern Ukraine (Donbas). Efforts to facilitate a peaceful resolution to the conflict in the Donbas began five years ago with the meeting of the Trilateral Contact Group on Ukraine. This framework, developed by the Organization for Security and Co-operation in Europe (OSCE), attempted to facilitate a dialogue between Russia and Ukraine through the mediation of an impartial actor, and it culminated in the Minsk I (September 2014) and then Minsk II (February 2015) agreements. The Minsk II agreements comprised a 13-point peace plan, chief among which is an arrangement specifying support for the restoration of the Ukrainian-Russian border. While the implementation of the military portions of the Minsk II agreements were finalized within three months of signing, the political and security portions remained unresolved. Though President Vladimir Putin has declared his intent to protect the Russian-speaking peoples of the region, he has also stated he has no interest in reclaiming Eastern Ukraine. Not surprisingly, since Russia’s ultimate goal is undeclared, the conflict has proved very difficult to resolve.
  • Topic: Conflict Resolution, Security, Territorial Disputes, Negotiation
  • Political Geography: Russia, Europe, Ukraine, Canada, France, Germany, United States of America
  • Author: Plamen Pantev
  • Publication Date: 02-2020
  • Content Type: Research Paper
  • Institution: Institute for Security and International Studies (ISIS)
  • Abstract: The first reflection about the geopolitical environment that Bulgaria faced after the tectonic systemic shifts in the end of the 80s and the beginning of the 90s of the 20th century thirty years later is that the efforts of the country to influence the transformation of the Balkans into a regional security community were successful. The second reflection is that Bulgaria was not able to influence effectively a similar development in the Black Sea area. Both the Balkans and the Caspian Sea-Caucasus- Black Sea area were conflictual knots of relations inherited from the Cold War divide. While the traditional European great powers that polarized the Balkan system of international relations pushing the small countries one against the other and the United States had the strategic interest of pacifying the South Eastern region of Europe, the dominating great power in the Black Sea area – Russia, aimed at preserving the opportunities of coming back to the territories that the Soviet Union lost after its collapse by preserving various degrees of conflictness in the neighbouring countries. Depending on the general condition of the Russian economy and state as well as its domestic political status different opportunities were either designed or just used to preserve the profile of Russia of the empire that sooner or later will be back. What are, in this regard, the perceptions in Bulgaria of the annexation of Crimea?
  • Topic: Security, International Security, Geopolitics, Conflict, Empire
  • Political Geography: Russia, Caucasus, Soviet Union, Bulgaria, Caspian Sea
  • Author: Helena Legarda
  • Publication Date: 02-2020
  • Content Type: Working Paper
  • Institution: International Institute for Strategic Studies
  • Abstract: China hits back after NATO calls it a security challenge, dormant Chinese hacking group resumes attacks, and more.
  • Topic: Security, Defense Policy, NATO, Diplomacy
  • Political Geography: United States, China, Europe, North Atlantic, Beijing, Asia, Vietnam, Sri Lanka
  • Author: Przemysław Osiewicz, Alex Vatanka, Suzanne Kianpour
  • Publication Date: 02-2020
  • Content Type: Video
  • Institution: Middle East Institute (MEI)
  • Abstract: The relationship between the European Union and the Middle East is facing a critical period of change, given the changing leadership in key European Union bodies, rising tensions with regard to Iran, and increasing confrontation between the United States and Iran. The Middle East Institute is pleased to invite you to a conversation with MEI scholar Przemysław Osiewicz, who will discuss his recently released paper series on the impact of leadership changes in key EU bodies such as the EU high representative for foreign and security policy, the European Commission, and the European Council on EU-MENA relations. He will be joined by MEI Senior Fellow Alex Vatanka and moderator Suzanne Kianpour to explore divergences between the United States and the EU approaches in their policies toward Iran, internal divisions within the EU on engagement with Iran, the role of economic factors, and the future of the JCPOA.
  • Topic: International Relations, Security, Foreign Policy, Politics, Geopolitics, Leadership
  • Political Geography: Iran, Middle East, United States of America, European Union
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: Strong data encryption thwarts criminals and preserves privacy. At the same time, it complicates law enforcement investigations. A Carnegie working group looks to move the debate forward.
  • Topic: Security, Science and Technology, Law Enforcement, Privacy
  • Political Geography: Global Focus, United States of America
  • Author: Ariel Levite
  • Publication Date: 10-2019
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: In an increasingly digitized world, information and communication technologies (ICTs), and especially operational technologies (OTs), have assumed critical importance for governments, industry, and the general public worldwide. Yet trust in the integrity of these products and services is declining because of mounting concerns over inadvertent vulnerabilities in the supply chain and intentional backdoor interventions by state and corporate actors. Compounding the problem, these legitimate security concerns are sometimes exaggerated for political and commercial reasons—a counterproductive dynamic that fuels rivalries, fragments the marketplace, increases anxiety, stifles innovation, and drives up costs. Inarguably, some governments have been intervening in the ICT/OT supply chain or at least laying the groundwork for such interventions. They believe the pursuit to be justifiable and legal, citing objectives related to intelligence, law enforcement, and military operations. Whether valid or not, the concern is that certain corporations are actively or passively weakening the security of the supply chain and final products either at the behest of governments or for questionable purposes. Another concern is that both state and corporate interventions could leverage or mask what are purely lax security standards or flaws in products and services. And this further reduces trust in ICT/OT.
  • Topic: Security, Government, Science and Technology, Private Sector
  • Political Geography: Global Focus
  • Author: Erik Brattberg, Tomáš Valášek
  • Publication Date: 11-2019
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: European defense cooperation has made unprecedented strides since 2014 and further progress is expected under the new European Commission. Driving these developments are a combination of internal and external factors. Among them is a more challenging security environment in Europe, the disruptive impact of the Brexit negotiations and the election of U.S. President Donald Trump, demands for deeper European Union (EU) integration in the wake of the 2009 eurozone debt crisis, and defense industrial rationales. As the 2016 European Global Strategy makes clear, the EU’s ambition is to become a more strategically autonomous security player capable of taking more independent action, especially in its own neighborhood. But this will require the decisionmaking structures that can act swiftly and autonomously in crises, the necessary civilian and operational capabilities to carry out these decisions, and the means to produce the necessary capabilities through a competitive high-tech European defense industrial base. The evolving EU defense cooperation goes far beyond crisis management operations. At its core, it has the goal of leveraging EU tools to strengthen European security. In particular, new EU defense initiatives such as Permanent Structured Cooperation (PESCO) and the European Defense Fund (EDF), though still nascent, are potential game changers in this regard. PESCO operates as a platform for groups of member states to cooperate on defense capability projects. The EDF, as an internal market instrument backed up by European Commission co-funding, has the potential to spur and incentivize collaboration on the development and acquisition of new capabilities between member states. These initiatives lay a framework upon which stronger cooperation can gradually be structured. Nevertheless, these new European defense schemes will have to have the right level of ambition, be successfully implemented, and contribute to strengthening both European and transatlantic security.
  • Topic: Security, Defense Policy, Transatlantic Relations
  • Political Geography: Europe, European Union
  • Author: Erik Brattberg, Philippe Le Corre
  • Publication Date: 12-2019
  • Content Type: Working Paper
  • Institution: Carnegie Endowment for International Peace
  • Abstract: The evolving strategic dynamics in the Indo-Pacific are of paramount importance for the future of the rules-based international order. While the United States is redirecting strategic focus to the region as part of its Free and Open Indo-Pacific strategy, Europe is also stepping up its role—leveraging a strong economic profile, long-standing bilateral ties, and active engagement in various regional multilateral forums. The European Union (EU) and its member states can make distinct contributions to an open, transparent, inclusive, and rules-based regional order, though not necessarily always in lockstep with Washington. Though few European countries have formally acknowledged the new U.S. strategy, the concept’s emphasis on rules-based order and multilateralism bears many similarities to the EU’s own outlook. The EU and many of its member states are becoming more ambivalent about Chinese power and are seeking to counter certain problematic Chinese economic behaviors, and the Indo-Pacific offers opportunities for transatlantic cooperation, though U.S.-EU diplomatic relations under U.S. President Donald Trump are significantly strained. However, the U.S. administration’s fixation on short-term transactional diplomacy, lack of commitment to multilateralism, and strong emphasis on Chinese containment are putting a damper on such collaboration with EU members. Admittedly, Europe does not aspire to be a traditional hard power in Asia, lacks significant military capabilities in the region, and is reluctant to pick sides in the escalating U.S.-China competition. Only two European middle powers—France and the United Kingdom (UK)—can project serious military force in the region, as Europe has long underinvested in defense spending and needs to prioritize more immediate security threats. But Europe can amplify its political and security role in the Indo-Pacific by leveraging the growing Franco-British presence and better utilizing the EU’s collective role. Key European countries have already expanded their security footprint in the Indo-Pacific through a more regular naval presence, bilateral and multilateral joint exercises, arms sales, and various other forms of defense cooperation. Europe’s economic role is already considerable too, as the EU is a top trade and investment partner of most regional states. Washington should welcome greater European involvement in the Indo-Pacific. A greater European presence in the region advances the U.S. objective of promoting a tighter regional security architecture with vital partners like Japan and India. Similarly, the EU’s support for the Association of Southeast Asian Nations (ASEAN) can help foster a more multilateral, cooperative Asian security architecture. As for economic and trade policy, U.S. and EU interests in the region largely overlap but do diverge in significant ways. While both Europe and the United States are keen on increasing trade flows and addressing unfair Chinese economic practices, the EU’s emphasis on free trade has allowed it to either complete trade agreements or launch new negotiations with regional partners like Australia, Japan, and Singapore. Despite the limitations constraining the transatlantic diplomatic agenda, meaningful joint and/or complementary European and U.S. action in the Indo-Pacific remains achievable, particularly between France, the UK, and the United States, though other European countries and the EU could get involved too. While the EU is not likely to formally endorse the U.S. slogan of a Free and Open Indo-Pacific, Europeans can still meaningfully advance its objectives, which are overwhelmingly consistent with the EU’s own interests and values. Washington should encourage this trend and simultaneously seek to do more to incorporate European players as key partners on the implementation of its own Free and Open Indo-Pacific strategy.
  • Topic: Security, Power Politics, Bilateral Relations, Transatlantic Relations
  • Political Geography: China, Europe, United States of America, Indo-Pacific
  • Author: Jeannette Greven
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: The U.S. Security Coordinator (USSC) mission in Jerusalem was created in 2005 to help implement security sector reform within the Palestinian Authority (PA). With a single-minded focus on “counterterrorism,” Washington considered the USSC an ancillary mechanism to support U.S. diplomatic and political efforts to resolve the Israeli-Palestinian conflict. Despite upending long-standing U.S. policy and cutting all other forms of aid to the Palestinians, the Trump administration has maintained the USSC in the run-up to the “Deal of the Century.” This article draws on original interviews with security personnel responsible for enacting USSC interventions. It uses their insights to highlight how the mission tethered Israeli political aims to its remit, and the distorting ramifications that have ensued for Palestine and the Palestinians. In uncovering the full parameters of Washington’s securitization policy, this history also points to the ways in which the PA has consequently been woven into the U.S.-led “global War on Terror.”
  • Topic: Security, Sovereignty, International Security, Military Affairs, Negotiation, Settler Colonialism
  • Political Geography: United States, Israel, Palestine, Jerusalem
  • Author: Seth Anziska
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: A 2019 investigation by the Israeli NGO Akevot and Haaretz newspaper has uncovered official suppression of crucial documents about the Nakba in Israeli archives. The Journal of Palestine Studies is publishing print excerpts and a full online version of the buried “migration report,” which details Israel’s depopulation of Palestinian villages in the first six months of the 1948 war, a document that clearly undermines official Israeli state narratives about the course of events. In methodical fashion, this report provides contemporaneous documentation of Israeli culpability in the expulsion of Palestinians from their homes and the systematic depopulation of so-called Arab villages in the first six months of the war. Alongside a discussion of key revelations in the newly available document, this introduction situates the broader pattern of erasure within historiographical debates over 1948 and questions of archival access. It examines how accounts of Israel’s birth and Palestinian statelessness have been crafted in relation to the underlying question: who has permission to narrate the past?
  • Topic: Security, Migration, Population, Ethnic Cleansing, Settler Colonialism, State Building
  • Political Geography: United States, Israel, Palestine
  • Author: Munir Fakher Eldin
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Journal of Palestine Studies
  • Institution: Institute for Palestine Studies
  • Abstract: In 1967, Israel occupied the western section of Syria’s Golan Heights, expelling some 130,000 of its inhabitants and leaving a few thousand people scattered across five villages. Severed from Syria, this residual and mostly Druze community, known as the Jawlanis, has been subjected to systematic policies of ethno-religious identity reformulation and bureaucratic and economic control by the Israeli regime for half a century. This essay offers an account of the transformation of authority, class, and the politics of representation among what is now the near 25,000-strong Jawlani community, detailing the impact of Israeli occupation both politically and economically. During an initial decade and a half of direct military rule, Israel secured the community’s political docility by restoring traditional leaders to power; but following full-on annexation in 1981, new forces emerged from the popular resistance movement that developed in response. Those forces continue to compete for social influence and representation today.
  • Topic: Security, Defense Policy, National Security, Population, Occupation, Ethnic Cleansing, Settler Colonialism
  • Political Geography: United States, Israel, Palestine
  • Author: Elizabeth N. Saunders
  • Publication Date: 10-2019
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: When and how do domestic politics influence a state's nuclear choices? Recent scholarship on nuclear security develops many domestic-political explanations for different nuclear decisions. These explanations are partly the result of two welcome trends: first, scholars have expanded the nuclear timeline, examining state behavior before and after nuclear proliferation; and second, scholars have moved beyond blunt distinctions between democracies and autocracies to more fine-grained understandings of domestic constraints. But without linkages between them, new domestic-political findings could be dismissed as a laundry list of factors that do not explain significant variation in nuclear decisions. This review essay assesses recent research on domestic politics and nuclear security, and develops a framework that illuminates when and how domestic-political mechanisms are likely to affect nuclear choices. In contrast to most previous domestic arguments, many of the newer domestic-political mechanisms posited in the literature are in some way top-down; that is, they show leaders deliberately maintaining or loosening control over nuclear choices. Two dimensions govern the extent and nature of domestic-political influence on nuclear choices: the degree of threat uncertainty and the costs and benefits to leaders of expanding the circle of domestic actors involved in a nuclear decision. The framework developed in this review essay helps make sense of several cases explored in the recent nuclear security literature. It also has implications for understanding when and how domestic-political arguments might diverge from the predictions of security-based analyses.
  • Topic: Security, Arms Control and Proliferation, Nuclear Weapons, Treaties and Agreements, International Security, Domestic politics, Nonproliferation
  • Political Geography: Russia, United States, China, Iran, North Korea
  • Author: Marina Henke
  • Publication Date: 04-2019
  • Content Type: Journal Article
  • Journal: International Security
  • Institution: Belfer Center for Science and International Affairs, Harvard University
  • Abstract: Many countries serving in multilateral military coalitions are “paid” to do so, either in cash or in concessions relating to other international issues. An examination of hundreds of declassified archival sources as well as elite interviews relating to the Korean War, the Vietnam War, the Gulf War, the Iraq War, the North Atlantic Treaty Organization operation in Afghanistan, the United Nations–African Union operation in Darfur, and the African Union operation in Somalia reveals that these payment practices follow a systematic pattern: pivotal states provide the means to cover such payments. These states reason that rewarding third parties to serve in multilateral coalitions holds important political benefits. Moreover, two distinct types of payment schemes exist: deployment subsidies and political side deals. Three types of states are most likely to receive such payments: (1) states that are inadequately resourced to deploy; (2) states that are perceived by the pivotal states as critical contributors to the coalition endeavor; and (3) opportunistic states that perceive a coalition deployment as an opportunity to negotiate a quid pro quo. These findings provide a novel perspective on what international burden sharing looks like in practice. Moreover, they raise important questions about the efficiency and effectiveness of such payment practices in multilateral military deployments.
  • Topic: Security, National Security, Regional Cooperation, International Security, Military Strategy, Military Affairs, Alliance
  • Political Geography: United States, Iraq, Kuwait, Vietnam, Korea, Somalia
  • Author: Bradley O. Babson
  • Publication Date: 04-2019
  • Content Type: Special Report
  • Institution: Georgetown Journal of International Affairs
  • Abstract: Since his first-annual New Year’s speech in 2012 setting North Korea’s policy priorities, Kim Jong Un has emphasized his commitment to economic development, notably promising his people that they will never have to tighten their belts again. The Byunjin policy of equally prioritizing economic development and security through nuclear and missile programs reflects Kim’s desire to assure regime stability by delivering broad-based economic development while establishing a security environment that deters external threats and potential domestic unrest. While United States policy has used sanctions and other pressures to stymie Kim’s ambitions, the Kim regime has nonetheless modestly furthered economic development and significantly advanced security through its nuclear and missile testing programs.
  • Topic: Security, Development, Economics, Human Rights, Sanctions
  • Political Geography: Asia, North Korea, North America, United States of America
  • Author: Elina Noor
  • Publication Date: 11-2019
  • Content Type: Commentary and Analysis
  • Institution: Lowy Institute for International Policy
  • Abstract: Malaysia’s foreign and security policy faces myriad challenges, but not much is likely to change under Mahathir Mohamad’s ‘New Malaysia’ framework. The return of Mahathir Mohamad to the prime ministership of the country he had previously led for 22 years has raised questions about the direction Malaysia’s foreign and security policy might take. While there may be some course-corrections in foreign and security policy under Mahathir’s Pakatan Harapan government, it will not stray far from the approach of previous administrations. Continuities will include its non-aligned status, its pragmatic dealings with both the United States and China, its focus on ASEAN centrality and Malaysia’s economic development through trade. Malaysia will revisit its earlier “Look East” policy; it has plans to upgrade its defence capabilities in the South China Sea; and it will take a more consultative approach to foreign policy-making.
  • Topic: Security, Foreign Policy, Government, Politics, Economic Development
  • Political Geography: Malaysia, Asia
  • Author: Linus Hagström, Magnus Hagström
  • Publication Date: 12-2019
  • Content Type: Journal Article
  • Journal: The International Spectator
  • Institution: Istituto Affari Internazionali
  • Abstract: Periods of mutual enmity in US-North Korean relations are typically interrupted by more conciliatory gestures. How can the many twists and turns in this relationship be explained and hopefully overcome so that more long-lasting détente is accomplished? Drawing eclectically on realism and constructivism, we conclude that a nuclear deal should address not only North Korea’s interests in security and regime survival, but also its status concerns. Applying the same theories to the other part of the dyad – the US – we conclude that it may now have material interests in ameliorating the relationship, but that such a development requires US foreign policy discourse to cease depicting North Korea as “irrational” and “evil”.
  • Topic: Security, Nuclear Weapons, Realism, Constructivism
  • Political Geography: Asia, North Korea, North America, United States of America
  • Author: Assem Dandashly, Gergana Noutcheva
  • Publication Date: 03-2019
  • Content Type: Journal Article
  • Journal: The International Spectator
  • Institution: Istituto Affari Internazionali
  • Abstract: The European Union’s (EU) impact on the political governance of the European neighbourhood is varied and sometimes opposite to the declared objectives of its democracy support policies. The democracy promotion literature has to a large extent neglected the unintended consequences of EU democracy support in Eastern Europe and the Middle East and North Africa. The EU has left multiple imprints on the political trajectories of the countries in the neighbourhood and yet the dominant explanation, highlighting the EU’s security and economic interests in the two regions,cannot fully account for the unintended consequences of its policies. The literature on the ‘pathologies’ of international organisations offers an explanation, emphasizing the failures of the EU bureaucracy to anticipate, prevent or reverse the undesired effects of its democracy support in the neighbourhood.
  • Topic: Security, Foreign Policy, Democracy, Economy, Bureaucracy
  • Political Geography: Europe, Middle East, Eastern Europe, North Africa, European Union
  • Author: Andrea Dessì
  • Publication Date: 12-2019
  • Content Type: Special Report
  • Institution: Istituto Affari Internazionali
  • Abstract: This study on Libya is one of a series of reports prepared within the framework of the EU-LISTCO project, funded under the EU’s Horizon 2020 programme. Libya is a special case within the EU-LISTCO project. It is in the western region of North Africa, bordered by the Mediterranean Sea to the north, Algeria and Tunisia to the west, Chad and Niger to the south, Sudan to the south-east and Egypt to the east. The security and stability of Libya is fundamental for the economic and political future of Europe, particularly in relation to migration, radicalisation and political economy. Because of the NATO-led intervention that brought about the collapse of the Libyan Arab al-Jamahiriyah, the country has now entered an interrelated social, economic and political crisis, and violence has been simmering for the past eight years. While the collapse of the previous government has been beneficial for some, numerous armed political actors now control the Libyan territory, supported and funded by external powers that often have contradictory political agendas. The purpose of this report is to answer the following research questions: what is the background of areas of limited statehood and contested order in Libya?; how and when can areas of limited statehood and contested order in Libya turn into governance breakdown and/or violent conflict, and how can these threats affect the security of the EU?; what are the resilience mechanisms in Libya?
  • Topic: Security, Governance, Political stability, State, Crisis Management, Resilience
  • Political Geography: Europe, Middle East, Libya
  • Author: Gonzalo Huertas
  • Publication Date: 09-2019
  • Content Type: Policy Brief
  • Institution: Peterson Institute for International Economics
  • Abstract: The unrelenting surge in prices in Venezuela has crippled the economy and deepened the humanitarian crisis there. Huertas lays out a feasible stabilization plan to stop Venezuela’s hyperinflation. The extent of the humanitarian crisis and shortage of basic goods and services suggests that, on the fiscal side, a stabilization plan should focus primarily on reallocating rather than reducing spending. The authorities should avoid austerity policies and instead spend on taking care of the Venezuelan people. Stabilizing the price level while providing relief to the country’s population would require significant financial assistance from the rest of the world, so it is critical that Venezuela secure strong financial support from the international community. Successful stabilization requires a credible plan to transition to a responsible fiscal policy, the financial resources to carry it out, and the political will to sustain it.
  • Topic: Security, Economics, Finance, Inflation, Humanitarian Crisis
  • Political Geography: South America, Venezuela
  • Author: Adnan Mazarei
  • Publication Date: 06-2019
  • Content Type: Policy Brief
  • Institution: Peterson Institute for International Economics
  • Abstract: Suffering under Western sanctions and security challenges, Iran faces problems as well from its fragile banking system, which has been languishing for decades. Liquidity and solvency weaknesses pose a growing risk to the country’s financial stability. The sanctions reimposed by the United States in 2018 have heightened these vulnerabilities, but the problems also result from the heavy-handed role of the state, corruption, and the Central Bank of Iran’s failure to regulate and supervise the system. Iran’s ability to avoid a run on its banks is aided by their reliance on liquidity assistance, deposit insurance, and regulatory forbearance from the central bank. Depositors are forced to be patient because they have limited options to invest elsewhere. Iran has thus avoided a full-blown banking crisis. But the situation is not sustainable. Banks remain susceptible to external shocks, which could come from a complete halt to oil exports or war.
  • Topic: Security, Financial Crisis, Sanctions, Banks, Financial Institutions
  • Political Geography: Iran, Middle East, North America, United States of America
  • Author: Claudia Biancotti, Paolo Ciocca
  • Publication Date: 04-2019
  • Content Type: Policy Brief
  • Institution: Peterson Institute for International Economics
  • Abstract: Over the past few years, it has become apparent that a small number of technology companies have assembled detailed datasets on the characteristics, preferences, and behavior of billions of individuals. This concentration of data is at the root of a worrying power imbalance between dominant internet firms and the rest of society, reflecting negatively on collective security, consumer rights, and competition. Introducing data sharing mandates, or requirements for market leaders to share user data with other firms and academia, would have a positive effect on competition. As data are a key input for artificial intelligence (AI), more widely available information would help spread the benefits of AI through the economy. On the other hand, data sharing could worsen existing risks to consumer privacy and collective security. Policymakers intending to implement a data sharing mandate should carefully evaluate this tradeoff.
  • Topic: Security, Government, Science and Technology, Privacy, Internet, Monopoly, Artificial Intelligence
  • Political Geography: Global Focus
  • Author: Samuel Bendett
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Following the end of the Cold War, the Russian Federation lagged behind the United States in terms of advanced technology in warfighting. However, after substantial spending on modernization starting in 2008, the Russian military and the nation’s defense sector have been making great strides at developing remotely operated and autonomous technologies and integrating them in their tactics and combat operations. Russia is also starting to invest in Artificial Intelligence (AI) development with specific military applications. These developments affect the ability of the United States to meet the goals in its new National Security Strategy; in order to meet its stated December 2017 objective of renewing American competitive advantage in key military areas, the United States should be aware of key adversarial developments such as Russia’s emerging unmanned, autonomous, and AI capabilities, and prepare itself in terms of appropriate capabilities, tactics, and plans...
  • Topic: Security, Science and Technology, Military Affairs, Military Spending, Artificial Intelligence
  • Political Geography: Russia, Eurasia, United States of America
  • Author: Heather Williams
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Dr. Heather Williams is a lecturer in the Defence Studies Department and Centre for Science and Security Studies at King’s College London. She also does research for the Institute for Defense Analyses on Strategy, Forces, and Resources, and previously was a Research Fellow at Chatham House. Williams received her doctorate from King’s College London for her dissertation on U.S.-Russia arms control from 1968-2010.
  • Topic: Security, Arms Control and Proliferation, Science and Technology, Weapons , Interview
  • Political Geography: Russia, Eurasia, North America, United States of America
  • Author: Christine Sixta Rinehart
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: The United States has been using Remotely Piloted Aircraft (RPA) to assassinate terrorist targets since its first RPA strike on November 3, 2002, when a U.S. Predator fired a hellfire missile at a car traveling through the Mar’ib province of Yemen. The intelligence cycle of this targeted killing process is murky at best, and the policy has changed throughout the successive administrations of U.S. presidents. Details exist but there is no defined tangible chain of analysis concerning the selection of the target, the monitoring of the target, and finally, the assassination of the target. This paper attempts to elucidate the intelligence chain of analysis concerning American targeted killing and examine how the intelligence cycle of targeted killing varies through successive presidential administrations. ​ This paper will begin with a short analysis of relevant literature, although sources concerning this topic are scarce. The occurrence of targeted killings of U.S. citizens will also be explained in the literature section. The paper will continue with an elaboration of a generic intelligence cycle model, which will be used to illustrate the intelligence cycle of U.S. targeted killings using both the Reaper and the Predator RPA.[1] The paper will then address differences in the intelligence cycles and processes that have occurred between successive presidents since targeted killing first began in 2002 with President George W. Bush. Lastly, the paper will provide policy prescriptions in reference to improving targeted killing in the Middle East and Africa...
  • Topic: Security, Intelligence, Drones, Targeted Killing
  • Political Geography: Africa, Middle East, North America, United States of America
  • Author: Prakash Menon
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Technology often seduces potential adversaries through a promise of relief from security threats only to deceive through the inevitable action-reaction cycle. In the universe of security, technology is contestable both by technology itself and by doctrinal prescriptions and operational countermeasures. The advantage provided by new technology is mostly ephemeral in that provides the momentum for an endless cycle that is best described as chasing one’s own tail. Only political intervention through mutual understanding, doctrinal prudence, and regulating the search for operational supremacy holds potential to escape the stranglehold of the action-reaction cycle. The elusive search for Ballistic Missile Defense (BMD) is a prime example. This paper seeks to interrogate the role of the technology-security dynamics in the context of the Sino-Indian nuclear weapon relationship. ​ The context of the Sino-Indian nuclear weapon relationship is clouded by the enhancing reach of India’s missiles[1], the evolving Chinese reaction to U.S. nuclear modernization accompanied by a shift in nuclear posture, and a shared belief in the role of nuclear weapons that is signified by No First Use (NFU) doctrine. The latter point represents political intervention while the two former signify the action-reaction cycle which is primarily a product of technology. However, both China and India must contend with nuclear powers that espouse First Use. China in dealing with the United States and Russia who are quantitatively superior nuclear powers, while India deals with Pakistan whose claims of quantitative superiority are contested. ​ In technological terms, the rise of China and the U.S. reaction resulting in contemporary geopolitical flux at the global level has impacted the evolution of China’s nuclear arsenal. The most prominent illustration of this is China’s reaction to the United States’ withdrawal from the Ballistic Missile Defense Treaty. Earlier China had eschewed development of BMD, but the United States’ quest to create BMD has caused China to attempt to develop its own BMD system as well as systems that can overcome BMD like multiple independently targetable reentry vehicles (MIRVs) and Hyper Glide Vehicles (HGVs). Similarly, India has reacted to developments in China and Pakistan by launching an indigenous BMD development program...
  • Topic: Security, Nuclear Weapons, Bilateral Relations, Weapons
  • Political Geography: Pakistan, China, South Asia, India, Asia
  • Author: Filippa Lentzos
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: International treaties prohibit the development and use of biological weapons. Yet concerns about these weapons have endured and are now escalating. It is high time to take a hard look at technical and political developments and consider how the international security policy community should respond. ​ A major source of the growing concern about future bioweapons threats stem from scientific and technical advances. Innovations in biotechnology are expanding the toolbox to modify genes and organisms at a staggering pace, making it easier to produce increasingly dangerous pathogens. Disease-causing organisms can now be modified to increase their virulence, expand their host range, increase their transmissibility, or enhance their resistance to therapeutic interventions.[1] Scientific advances are also making it theoretically possible to create entirely novel biological weapons,[2] by synthetically creating known or extinct pathogens or entirely new pathogens.[3] Scientists could potentially enlarge the target of bioweapons from the immune system to the nervous system,[4] genome, or microbiome,[5] or they could weaponize ‘gene drives’ that would rapidly and cheaply spread harmful genes through animal and plant populations.[6] ​ Concurrent developments in other emerging technologies are also impacting potential future biological weapons threats. Developments in artificial intelligence and machine learning could speed up identification of harmful genes or DNA sequences. Artificial intelligence and machine learning could also potentially enable much more targeted biological weapons that would harm specific individuals or groups of individuals based on their genes, prior exposure to vaccines, or known vulnerabilities in their immune system.[7] Big Data and ‘cloud labs’ (completely robotized laboratories for hire) facilitate this process by enabling massively scaled-up experimentation and testing, significantly shortening ‘design-test-build’ timeframes and improving the likelihood of obtaining specificity or producing desired biological functionality.[8] Other developments provide new or easier ways to deliver pathogens or biological systems. Nanotechnology could potentially create aerosolized nanobots dispersing lethal synthetic microbes or chem-bio hybrids through the air,[9] or in vivo nanobots releasing damaging payloads inside human bodies.[10] Aerosol or spraying devices attached to swarms of small unmanned aerial vehicles, or drones, could be another potential means to disperse biological agents. Additive manufacturing, or 3D printing, could circumvent barriers imposed by national export control systems on controlled laboratory equipment or dispersal devices. ​
  • Topic: Security, Health, Science and Technology, Treaties and Agreements, Biosecurity, Weapons
  • Political Geography: Global Focus
  • Author: Kristi Govella
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: For most of history, the domains of the global commons were unclaimed, largely because the technology to access and utilize them did not exist.[1] In areas such as the high seas and outer space, it was impossible for states to establish and maintain sovereign control. Even as the relevant technologies developed, costliness and controls kept them initially concentrated largely in the hands of just a few major powers such as the Unit- ed States and the Soviet Union. For the United States, “command of the commons” became the military foundation of its hegemony, granting it the ability to access much of the planet and to credibly threaten to deny the use of such spaces to others.[2] Bipolar competition between the United States and the Soviet Union strongly influenced developments in the maritime and outer space domains. In the case of cyberspace, a more recent addition to the traditional global commons, the United States was also initially dominant due to its role in pioneering associated technologies. However, over time and particularly since the end of the Cold War, continuing technological innovation and diffusion have made these domains accessible to a growing number of countries. ​ This technological progress was born of both cooperation and competition between states. While some states chose to develop certain technologies indigenously, many acquired knowledge and equipment from abroad. Globalization of industry has made it easier for states to obtain a variety of foreign technologies, even lowering the threshold for them to procure disruptive military capabilities. In addition, over the last two decades, American primacy has been increasingly challenged by the rise of China, which has impacted the dynamics of technological development and diffusion across multiple domains. As China has acquired the technology to become more active in the commons, it has prompted major regional powers, such as Japan and India, to accelerate their own technological advancement, and other mid-sized and smaller countries have also become increasingly engaged.[3] ​ The consequence of this multiplication of technologically sophisticated actors has been the erosion of American primacy in the global commons. Although the United States still remains the most dominant player, it is faced with a more densely populated field, and management of these spaces has become more difficult. This article examines this trend in the high seas, outer space, and cyberspace since the end of the Cold War, with attention to the ways in which the rise of China and the relative decline of the United States have catalyzed greater engagement with the commons, particularly among the countries in Asia that find themselves most affected by this power transition. I argue that advances in and diffusion of technology have transformed the global commons into increasingly crowded domains characterized by interstate competition and heightened tensions. Whether these tensions prevail depends on the creation and strengthening of regimes to manage interactions and promote shared rules and norms...
  • Topic: International Relations, Security, Globalization, Science and Technology
  • Political Geography: China, Global Focus, United States of America
  • Author: Sharon Bradford Franklin
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In 2017, leaders of the U.S. Intelligence Community warned that “more than 30 nations are developing offensive cyberattack capabilities.”1 This means that more than 30 countries may be conducting hacking operations as a method for surveillance, disruption, or destruction. Unregulated cyber surveillance and cyberattacks by government actors can pose risks not only to a government’s foreign adversaries, but also to its own citizens. Thus, as the United States and other nations work to enhance their own offensive cyber capabilities, as well as to develop strategies to defend against potential attacks, it is critical that these countries establish legal regimes to govern such conduct in cyberspace. Although Germany has established a legal framework to regulate government hacking activities,[2] few countries have done so.[3] ​ To bring government hacking operations within the rule of law, a crucial step is to design rules regarding the management of vulnerabilities that governments discover or acquire. As with other cyber actors, when governments conduct hacking operations, this frequently involves exploiting vulnerabilities in computer hardware and software systems. But these same flaws can also be manipulated by a government’s foreign adversaries or other malicious actors. Therefore, when countries consider their abilities to rely on hacking as an investigative tool, as well as their interests in exploiting vulnerabilities for military and intelligence operations, they must also evaluate the capacity of information and communications technology providers to repair bugs and protect the cybersecurity of all users. Determining whether to exploit a vulnerability or disclose it to a vendor for patching involves balancing a variety of different security concerns against each other. ​ Some countries have made progress in formalizing the rules for making these decisions and in publicizing these rules to promote public accountability. In November 2017, the United States released a charter governing its Vulnerabilities Equities Process (VEP), which outlines how the U.S. government weighs the various competing equities.[4] The charter delineates which components of the government will participate in determinations regarding whether to disclose or retain each newly discovered vulnerability, and it sets forth the criteria to be used and the process to be followed in making such assessments. One year later, the United Kingdom (UK) announced its Equities Process, which follows a similar approach.5 Most recently, in March 2019, Australia released its “Responsible Release Principles for Cyber Security Vulnerabilities,”[6] and Germany is currently working to develop a VEP and is expected to make information about its process public in early 2019.[7] However, as described below, the VEP procedures revealed to date need further improvement,[8] and most of the nations with offensive cyber capabilities have not developed—or at least have not announced—any such framework...
  • Topic: Security, Intelligence, Science and Technology, Cybersecurity
  • Political Geography: North America, United States of America
  • Author: Paul Rosenzweig
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Benjamin Franklin is famous, in part, for having said, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” Though historical evidence suggests Franklin’s quote has been misinterpreted,[1] the aphorism has come to stand for the proposition that privacy and security stand in opposition to each other, where every increase in security likely results in a commensurate decrease in privacy, and vice versa. ​ Couched in those terms, the privacy/security trade-off is a grim prospect. We naturally want both privacy and security to the greatest extent possible. But Franklin tells us this is impossible — that privacy and security are locked in a zero-sum game where the gain of one comes only at the loss of the other. ​ Of course, this characterization is assuredly flawed; it is certainly possible to adopt systems that maximize both privacy and security in a Pareto optimal way. That is one of the reasons why so many privacy and security experts simply revile the “balancing” metaphor — it obscures more than it illuminates... ​
  • Topic: Security, Science and Technology, Cybersecurity, Privacy
  • Political Geography: Global Focus, United States of America
  • Author: Nina Jankowicz
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Nina Jankowicz is writing a book on the evolution of Russian influence campaigns in Eastern Europe. She has previously worked advising the Ukranian government on communication and managed democracy assistance programs for Russia and Belarus. She is currently a Global Fellow at the Woodrow Wilson International Center for Scholars’ Kennan Institute and has previously served as a Fulbright-Clinton Public Policy Fellow.
  • Topic: Security, Territorial Disputes, Geopolitics
  • Political Geography: Russia, Ukraine, Eastern Europe
  • Author: David Sanger, Travis Frederick
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In The Perfect Weapon, David Sanger argues that the nature of global power itself is undergoing dramatic changes, brought about by the proliferation of highly advanced cyber capabilities. Today, internet access is nearly ubiquitous, the cost of entry is low, and, particularly in the domain of cyberwarfare, there is one fundamental fact: offensive capabilities have critically outpaced cyber defenses. A weak and impoverished nation like North Korea can hold large swaths of public and private infrastructure in America at risk, steal military OpPlans, and pilfer millions of dollars from foreign banks. A Kremlin reeling from sanctions, low oil prices, and historically low public trust is able to threaten the very foundations of American democracy through targeted social media campaigns and hacking and leaking the emails of a major political party. But while the offensive advantage has given weaker powers greater capacity to pursue their geopolitical objectives, U.S. leadership has found that their response options have not similarly benefitted. America’s offensive cyber prowess so exceeds its own defensive capabilities that officials often hesitate to strike back for fear of establishing norms of retaliation against vulnerable infrastructure or inciting unintended escalation. Sanger argues that without an open public debate among government policy makers, military planners, and academics to coordinate a grand strategy, the United States will be forced to accept a world of constant cyberattacks, limited response options, and the greater risk of capitulating to foreign coercion...
  • Topic: Security, Intelligence, Science and Technology, Cybersecurity, Book Review
  • Political Geography: North America, United States of America
  • Author: Douglas Yeung
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: Digital data captured from social media, cell phones, and other online activity has become an invaluable asset for security purposes. Online mapping or cell-phone location information can be used to collect intelligence on population movement, or to provide situational awareness in disasters or violent incidents. Social-media postings may be used to vet potential immigrants and job applicants, or to identify potential recruits who may be likely to join the military. ​ However, breakdowns in relationships between the tech industry and would-be consumers of technology’s handiwork could imperil the ability of security stakeholders to use this data. Ongoing issues have already begun to shape some technologists’ views on the ethical use of artificial intelligence and other technologies in war and conflict and their impact on human rights and civil liberties. It isn’t difficult to imagine a series of future incidents further souring collaboration between technologists and security stakeholders. ​ In contrast to its reluctance over security matters, the tech industry has been a willing partner for government agencies and communities that promote health and wellbeing—topics that present less of an ethical challenge. Although it may not be immediately apparent, wellbeing and security have much in common. Could the security community take a page from wellbeing efforts to improve their collaboration with the tech industry?...
  • Topic: Security, Science and Technology, Business , Surveillance, Private Sector
  • Political Geography: Global Focus, United States of America
  • Author: John Borrie
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: John Borrie is the research coordinate and program lead at the United Nations Institute for Disarmament Research. He’s currently working on continuing and expanding dialogues about disarmament and the impact of nuclear weapons on humanitarian affairs. He previously worked on weapons control for both the International Committee of the Red Cross and as a New Zealand diplomat. Borrie holds a doctorate in philosophy from the University of Bradford.
  • Topic: Security, Nuclear Weapons, Science and Technology, Interview
  • Political Geography: United Nations, Global Focus
  • Author: Lewis Milford, Samantha Donalds
  • Publication Date: 07-2019
  • Content Type: Journal Article
  • Journal: Fletcher Security Review
  • Institution: The Fletcher School, Tufts University
  • Abstract: In the last few years, Washington has been preoccupied with a debate about the security of the nation’s electric grid. The debate is as old as the grid itself: as electrification has come to drive all commerce and government, making it a key element of the country’s national security, what is the best way to protect the grid from terrorist, weather, or cyber-related threats or attacks? ​ As with most things of a political nature, where you stand depends on where you sit. ​ Proponents of coal, oil, and nuclear make the argument that traditional large-scale power plants are not only vital to grid stability, but also that this centralized generation model is the only economically or techno- logically feasible option.[1] It’s an old argument wrapped in new national security rhetoric, and it’s increasingly straining against the facts. More and more analysis and real-life examples show that distributed renewable energy, combined with energy storage technologies, can provide reliable power more affordably and reliably than the centralized generation alternatives...
  • Topic: Security, Energy Policy, Infrastructure, Electricity
  • Political Geography: North America, United States of America
  • Author: Antulio J. Echevarria II, Sam J. Tangredi, Mathieu Boulegue, Keir Giles, C. Anthony Pfaff, Karen J. Finkenbinder, Massimo Pani, Richard A. Lacquement Jr., John F. Sullivan
  • Publication Date: 07-2019
  • Content Type: Special Report
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: Our 2019 Spring/Summer issue of Parameters features three forums. In the first forum, A2/AD Myths: Chinese & Russian, Sam Tangredi’s “Anti-Access Strategies in the Pacific: The United States and China” puts Beijing’s A2/AD capabilities in perspective and encourages the United States to consider developing an anti-access strategy of its own to deter possible Chinese aggression in the South China Sea. Keir Giles and Mathieu Boulegue’s “Russia’s A2/AD Capabilities: Real and Imagined,” explode some of the myths concerning Russia’s A2/AD capabilities and recommend ways to promote a stronger defense of the Baltic states and Eastern Europe. The second forum, Enhancing Security & Stability, considers how to address emerging and periodic challenges in regional and functional stability. In “Human Security in the Arctic: Implications for the US Army,” Tony Pfaff explains the growing importance of Arctic security for Army strategists. The challenges of climate change will require the Army, including the Alaska National Guard, to reallocate forces to this important region. In “Projecting Stability: A Deployable NATO Police Command,” Massimo Pani and Karen Finkenbinder propose methods NATO could use to project a stability force to crisis situations within 5 days, to be augmented with additional police forces and command elements within 30 days. Our third forum, On Strategic Foundations, offers two articles that explore the reliability of some of the conceptual foundations of our strategic thinking. Richard Lacquement Jr. discusses the use of historical analogies as one of humanity’s most important adaptive techniques in “Analogical Thinking: The Sine Qua Non for Using History Well.” He suggests pattern recognition may aid in clarifying context and in guiding action in unfamiliar intellectual terrain. In “Reconsidering Sun Tzu,” John Sullivan challenges readers to be more critical of orthodox interpretations of Sun Tzu’s Art of War. After all, the unexamined theory is not worth teaching.
  • Topic: Security, Defense Policy, Armed Forces, Military Affairs
  • Political Geography: Russia, China, Asia, North America, Arctic, United States of America
  • Author: Antulio J. Echevarria II, Eric B. Setzekorn, Richard G. Malish, Kelly A. Grieco, Vinay Kaura, Paul E. Vera Delzo, Richard Milburn, Brandon T. Euhus
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: The Strategic Studies Institute of the U.S. Army War College
  • Abstract: The Autumn issue of Parameters opens with a forum featuring two contributions that highlight some important Challenges for USCivil-Military Relations. The first contribution, “Policy Revolt: Army Opposition to the Korea Withdrawal Plan” by Eric Setzekorn, argues senior US Army leaders adopted a Fabian strategy of indirect resistance to Carter’s desire to reduce the number of troops stationed in Korea. The strategy worked. But the author leaves us wondering whether that success was a positive development for US civil-military relations. The second article, “The Walter Reed Scandal and the All-Volunteer Force” by Richard Malish, provides intriguing evidence that the American public might have put the AVF on a pedestal high enough that it harms civil-military relations. Our second forum, On Alliances and Coalitions, offers three essays addressing the importance of integrating disparate perspectives under a common strategy. The first article, “Fighting and Learning in the Great War: Four Lessons in Coalition Warfare” by Kelly Grieco, describes the key insights the United States and its allies drew, or ought to have drawn, during the First World War. All of these, as Grieco shows, have immediate relevance today. The second contribution to the forum, Vinay Kaura’s article “India-US Relations: From Distant Partners to an Alliance” suggests American and Indian interests are converging in a manner that makes an alliance between them, hitherto inconceivable, now a worthy objective. Paul Vera Delzo’s “Toward a Whole-of-Government Approach: Revamping Peru’s Strategy Process” describes how Peru can obtain greater efficiency and effectiveness from its strategies by integrating all government agencies. The final forum, On Clausewitz, presents two articles that challenge nontraditional interpretations of On War. Richard Milburn’s “Reclaiming Clausewitz’s Theory of Victory” takes on Emile Simpson’s “Clausewitz’s Theory of War and Victory in Contemporary Conflict” (Parameters Winter 2017–18). Milburn rejects Simpson’s view and maintains Clausewitz’s theory of victory remains relevant in the twenty-first century. Brandon Euhus’s “A Clausewitzian Response to ‘Hyperwarfare’ ” urges military planners to remember the human dimension of war, as expounded upon by military writers from Thucydides to Mao Zedong, is ultimately the decisive one.
  • Topic: Security, International Affairs, Armed Forces, Military Affairs, Army
  • Political Geography: India, North America, Korea, United States of America
  • Author: Ghaith al-Omari, Ben Fishman
  • Publication Date: 10-2019
  • Content Type: Policy Brief
  • Institution: The Washington Institute for Near East Policy
  • Abstract: On the twenty-fifth anniversary of the peace treaty, both parties and the United States have strategic interests in upholding and reinforcing the relationship. The optimism that characterized the signing of the Israel-Jordan peace treaty a quarter-century ago has long since dissipated. Today, the peace rests on a strong security foundation but lacks popular support, particularly on the Jordanian side. Nevertheless, there remain important opportunities for strengthening Israel-Jordan relations and preserving that pillar of America’s steadily eroding security architecture in the Middle East. It is critical for Washington to prioritize Jordan on its agenda. This includes urging the still-to-be-formed Israeli government to take responsible action on two fronts: keeping Amman’s interests in mind when formulating policy toward the West Bank, and implementing long-delayed initiatives that would help Jordan’s struggling economy.
  • Topic: Security, Treaties and Agreements, Bilateral Relations, Territorial Disputes, Negotiation, Peace
  • Political Geography: Middle East, Israel, Palestine, Jerusalem, Jordan, United States of America
  • Author: Olena Tregub
  • Publication Date: 05-2019
  • Content Type: Special Report
  • Institution: United States Institute of Peace
  • Abstract: In the wake of the Euromaidan protests that toppled the government of Viktor Yanukovych in 2014, Ukrainian activists and civil society organizations have pressed hard for anti-corruption reforms and greater openness and transparency in the public sector. Five years later, however, corruption remains a fixture of civic life—and a majority of Ukrainians believe the fight against corruption has been a failure. This new report reviews the changes that have taken place in the anti-corruption movement since the Euromaidan and identifies practical actions the international community can take to support reform efforts in Ukraine.
  • Topic: Security, Corruption, Governance, Reform, Democracy, Rule of Law, Protests, Accountability, Transparency, Justice
  • Political Geography: Europe, Ukraine
  • Author: Nur Aziemah Azman, V. Arianti, Amalina Abdul Nasir, Sylvia Windya Laksmi, Kenneth Yeo
  • Publication Date: 09-2019
  • Content Type: Journal Article
  • Journal: Counter Terrorist Trends and Analysis
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: The Islamic State’s (IS) territorial losses and military defeat in Iraq and Syria have not weakened the militant landscape in Southeast Asia. Rather, the regional threat landscape has become more resilient and competitive, with pro-IS militant groups exhibiting better operational capabilities, knowledge of explosive-making and networking linkages. Moreover, pro-IS groups in the region have found traction by exploiting local issues to spread the terror group’s extremist ideology. Several major challenges have emerged from the recent setback to IS in the Middle East. First is the issue of returning foreign fighters (FTFs) and how to deal with them. Such returnees pose a plethora of legal, political and security challenges to Southeast countries, particularly Malaysia, Indonesia and the Philippines. A second challenge is IS’ efforts to declare new wilayat (provinces) in different parts of the world. While IS has officially declared the East Asia wilayat based in the Philippines, the declaration of new wilayat cannot be ruled out as witnessed in South Asia and Africa. Further, terrorist groups such as IS constantly require increasing financial resources to expand and sustain their operations. In Southeast Asia, IS-linked groups have set up Islamic charities to raise funds and conceal their activities. Against this backdrop, the September issue of the Counter Terrorists Trends and Analyses (CTTA) features four articles looking at different aspects and dimensions of Southeast Asia’s threat landscape in the post-territorial caliphate environment. The first article by V. Arianti and Nur Aziemah Azman argues that the IS fighters in Indonesia may continue to empower their affiliated groups in the country. According to the authors, this is evident by the apparent attempts by Indonesian IS fighters in Syria to create a wilayah (province) in Indonesia by strengthening two Indonesian militant groups, the Mujahidin Indonesia Timur (MIT, Mujahidin of Eastern Indonesia) and Jamaah Ansharud Daulah (JAD, Congregation of Supporters of IS). IS acknowledged Indonesia as part of its East Asia Wilayah (encompassing primarily the Philippines and Indonesia) in July 2018. In the second article, Sylvia Windya Laksmi examines the nexus between charities and terrorism financing, through the case-study of the IS-affiliated Jamaah Ansharut Daulah (JAD) in Indonesia. Given recent reports of convictions around the world of non-profit organisations that misuse their revenues to finance the activities of terrorists, the article details three themes that emerge from JAD’s activities in Indonesia: (i) sham charities set up by the group as a conduit to generate funds to ensure its sustainability; (ii) funds raised for charitable causes funneled into terrorist activities and (iii) social media used to not only recruit members but also raise funds. Given IS’ focus on global expansion in the post-caliphate era, the multi-pronged threat posed by its affiliate networks in Indonesia and surrounding region, of which terrorism financing is a component, will need to be addressed by policymakers and security agencies going forward. The next article by Amalina Abdul Nasir upholds that despite numerous setbacks in Syria, IS is quite determined to stay alive in Malaysia. The pro-IS Malaysian militant groups are exploiting local issues to advance the terror group’s extremist ideology. In this new phase, according to the author, Malaysian IS supporters have acquired better bomb-making capabilities and fostered deeper operational linkages with foreign militants. Moreover, Malaysia is also dealing with the issue of returning fighters. The Malaysian policymakers need to ensure an effective rehabilitation policy in dealing with returning militants and to continue to carefully manage the ethnic and religious climate in Malaysia so as to minimise exploitation of related local issues by pro-IS groups. Finally, Kenneth Yeo discusses the prospects for a consolidation of foreign terrorist fighters (FTFs) in the Southern Philippines following IS‘ territorial losses this year. According to the author, IS’ weakened presence in the Iraq-Syria theatre has positioned the Philippines as an attractive destination for FTFs in Southeast Asia given its status as an alternate conflict theatre within jihadist discourse. The article argues there could be a consolidation of rebel forces in hotspots such as Mindanao, with IS affiliated groups seeking to complement local fighters with FTFs and youth militants to launch attacks and gain territory. With the added impetus of a leadership transition within IS’ networks in the Philippines, comprehensive counter-terrorism measures are needed to address these developments, which also have regional implications.
  • Topic: Security, Terrorism, Counter-terrorism, Islamic State, Political stability, Conflict
  • Political Geography: Indonesia, Malaysia, Middle East, Philippines, Southeast Asia
  • Author: Abdul Basit, Iftekharul Bashar, Amresh Lavan Gunasingham, Jade Hutchinson
  • Publication Date: 06-2019
  • Content Type: Journal Article
  • Journal: Counter Terrorist Trends and Analysis
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: Current narratives on terrorism and violent extremism by governments, policymakers and law enforcement agencies are largely Islam-centric with an overt focus on the military defeat of terrorist groups. This issue firstly looks into the assumed link between a reduction or elimination of territorial control by terrorist groups and their so-called ‘defeat’. Using the Islamic State (IS) as a study, this issue explicates further on a group’s cross-border/global networks, linkages and ideological spread to assert that the victory-defeat framework against IS is flawed, as its threat has transformed into a network of smaller cells and geographically dispersed cells. Secondly, this issue looks at the rising threat of far-right extremism and terrorism; a phenomenon which has been under-explored, given the Islam-centric nature of terrorism in recent decades. For instance, it has been reported that 71 percent of fatalities linked to terrorism between 2008 and 2017 in the United States were committed by far-right extremists and white supremacists. This issue specifically examines the recent Christchurch terrorist attack in New Zealand by a far-right extremist and possible implications for the Asia Pacific region. In the first article, Abdul Basit discusses the narrative of defeat against IS after US forces eliminated its last physical stronghold in Syria. It is argued that while IS territory shrank considerably, the group is still active with its ideological appeal attracting smaller networks and cells globally. The author states that IS has managed to remain relevant and active despite losing its physical sanctuaries due to three reasons: (i) revising the ideological narrative; (ii) organisational restructuring; and (iii) forming new networks. This is likely to have far-reaching implications on the global threat landscape that will witness a rise in low-end urban terrorism, more competition from rival groups and reactionary violence from right-wing extremists. Next, Amresh Gunasingham studies the recent attacks in Sri Lanka on Easter Sunday that heightened post-war ethnic tensions and brought forth civil war traumas amidst an ongoing political crisis. The article examines the possibility of a communication gap among security agencies that prevented early detection of one of the deadliest terrorist attacks in the country’s history. It further details the motivations for the attack as: (i) the Wahhabi factor; (ii) anti-Muslim violence furthering radicalization; and (iii) the possible links to IS. Possible implications and responses to the attack include a rise in anti-Muslim sentiments and violence with tightened security measures imposed by the state. In order to ensure long-term stability, the state needs measures to promote ethnic and religious harmony with strong counter-terrorism legislation. Iftekharul Bashar details the threat landscape in Western Myanmar, focusing on (i) Arakan Rohingya Salvation Army (ARSA), an ethno-nationalist group and (ii) IS and Al-Qaeda (AQ), both Islamist terrorist groups. The article argues that the threat brought on by ethnic violence and Islamist terrorism is facilitated by grievances of the local Rohingya Muslims and motivations for revenge and active presence of IS and AQ networks in the South and Southeast Asia region. The exploitation of the local refugee crisis by IS and AQ coupled with ARSA’s resilience requires comprehensive responses that centre on communal harmony in addition to hard-power measures. Lastly, Jade Hutchinson discusses the far-right terrorist threat, specifically in light of the Christchurch shooting at two mosques in New Zealand in March 2019 where 51 people were killed. The article focuses on the attack, the attacker, his links to other far-right extremist groups and the key role the Internet and social media played in facilitating the attack. This incident in New Zealand signals the possibility of further copycat attacks in Australia and other countries, further recruitment towards far-right extremism online and the need to devise policies to effectively counter far-right extremism in the online space.
  • Topic: Security, Terrorism, Counter-terrorism, Refugees, Islamic State, Political stability, Conflict, Syrian War
  • Political Geography: South Asia, Middle East, Sri Lanka, Syria, New Zealand, Myanmar, United States of America
  • Author: Amalina Abdul Nasir, Mustapha Kulungu, Shafi Mostofa
  • Publication Date: 02-2019
  • Content Type: Journal Article
  • Journal: Counter Terrorist Trends and Analysis
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: The landscape of Islamist terrorism is diverse, multifaceted and fractious, simultaneously characterised by inter and intra-group rivalries and various forms of cooperation at the operational, tactical and strategic levels. It cuts across geographical, gender and ideological lines/boundaries. More importantly, it evolves at a very rapid pace resulting in fluid security and conflict environments in different geographical locales. For instance, there are local groups like Nigerian Boko Haram that are trying to globalise their jihadist agenda through affiliations with the Islamic State (IS). However, this cooperation is not entirely collegial and is marked by friction and a trust deficit on both ends. In contrast, Al-Qaeda’s (AQ) South Asian affiliate, Al-Qaeda in the Indian Subcontinent (AQIS), despite its regional character is localising its recruitment and operational strategies to avoid visibility from media and security agencies. AQIS is abstaining from violence while Boko Haram is engaging in violence to gain public attention. At the same time, the evolution of the terrorist landscape in Indonesia and Malaysia from Jemaah Islamiyah (JI) and AQ-dominated to IS-led and inspired, has affected the recruitment and participation of women. The growing involvement of female militants in diverse roles gives rise to further security threats. In this issue, the first article by Mustapha Kulungu examines the genesis of Boko Haram in Nigeria as a local movement representing grievances of Muslims to its transformation as an operationally strong terrorist group. The author writes that the growing links over the last few years between IS and Boko Haram have added to the lethality and brutality of the latter, which has relied on narratives of Muslim victimhood in Nigeria to expand its footprint outside the country. The article analyses Boko Haram’s organisational structure, operational strategies, sources of funding and ideological ambitions. While it is argued that Boko Haram’s growing capabilities will undermine the US’ interests in Africa, enhancing US-Nigerian security cooperation may act as a counter Boko Haram’s threat. The second article by Shafi Mostofa discusses AQIS’ online and offline propaganda operations in Bangladesh and the various political and ideological narratives the group has used to grow further. Along with issuing several online videos and pamphlets, AQIS publishes two Bengali language magazines: Al-Balagh and Azan. In these publications, AQIS has frequently invoked four themes to justify its activities in Bangladesh. These four themes are: Indian hegemonic ambitions in South Asia, Muslim persecution, religious credentials of the head of a Muslim state and Islamic values. The author argues that AQIS is targeting affluent Bangladeshi youth for recruitment. AQIS’ continued online propaganda is likely to have negative security implications. As such, the author recommends adoption of long-term kinetic and non-kinetic counter-terrorism and counter-extremism strategies to neutralise AQIS. The last article by Amalina Abdul Nasir observes how women’s roles in terrorism have evolved in Indonesia and Malaysia from JI to an IS-dominated threat landscape. Overall, the roles of women have become more diverse due to IS’ physical inroads in the region, particularly in light of online recruitment through the open and close media platforms. The author discusses the evolution of women’s roles from wives and mothers to suicide bombers and combatants as recently witnessed in Indonesia and Malaysia. This development will need to be addressed by counter-terrorism agencies so as to mitigate its impact on the security threat landscape. It also requires an examination of the current perception of women in terrorist groups, and developing policies that factor in the gender-inclusive nature of the terrorist landscape in parts of Southeast Asia.
  • Topic: Security, Gender Issues, Terrorism, Counter-terrorism, Women, Al Qaeda, Islamic State, Boko Haram
  • Political Geography: Bangladesh, Africa, South Asia, Indonesia, Malaysia, Middle East, North Africa, Nigeria, Southeast Asia
  • Author: Margareth Sembiring
  • Publication Date: 07-2019
  • Content Type: Working Paper
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: International garbage disputes are rare. Lately, however, the world witnesses waves of newsworthy trash saga. From the Philippines shipping containers of rubbish back to Canada, to Malaysia planning to return tons of garbage back to countries of origin, to China’s near-total ban of plastic waste import, it is hard not to wonder whether this is a real sign of rising environmentalism. Have countries begun to think that the environment is worthy of a similar priority as the economy? This Insight argues that behind the seemingly growing pro-environment attitudes, it still remains to be seen whether this trend is sustainable in the long run. Considering that the global waste trade is a multi-billion dollar industry, the balance may tip to favour the economic activities again once the dust has settled back. The paper first looks at a brief description of the global waste trade industry. It then discusses some of the contemporary development in the global waste industry particularly on the issues of waste smuggling and China’s plastic waste import ban. It describes related experiences in Indonesia, Malaysia, Vietnam, the Philippines and Thailand.
  • Topic: Security, Environment, Economy, Trade, Waste
  • Political Geography: China, Malaysia, Canada, Philippines, Southeast Asia, Global Focus
  • Author: Julius Caesar Trajano
  • Publication Date: 03-2019
  • Content Type: Working Paper
  • Institution: S. Rajaratnam School of International Studies
  • Abstract: The Philippines and China signed a Memorandum of Understanding (MoU) in Cooperation on Oil and Gas Development, demonstrating their willingness to explore joint development as a pathway to collaboration, notwithstanding their territorial disputes. Recent commentaries on joint development are mostly framed on legal challenges, South China Sea (SCS) rows, geopolitics, and state-centric security issues. However, there have been no extensive discussions on the potential contributions from non-state stakeholders that can make joint development agreements environmentally sound, sustainable, and less political. These stakeholders are the oil companies, fishermen and coastal communities. In this regard, this NTS Insight explores potential roles of these stakeholders in promoting joint initiatives to share and develop resources in the SCS. It argues that the engagement and participation of non-state stakeholders in resource sharing and joint management must be pursued to address key non-traditional security challenges in the SCS. It also examines mechanisms to integrate marine environmental protection and sustainable fishing management into joint development agreements.
  • Topic: Security, Development, Treaties and Agreements, Bilateral Relations, Territorial Disputes
  • Political Geography: China, Philippines, Southeast Asia, South China Sea
  • Author: Samuel B. H. Faure
  • Publication Date: 05-2019
  • Content Type: Working Paper
  • Institution: Centre d'Etudes et de Recherches Internationales
  • Abstract: Published in the context of Brexit, this research paper analyses the ‘double relationship’ between Britain and Europe: being ‘in’ by taking part in co-operation with other European states, and at the same time being ‘out’ by staying away from or even leaving multilateral programmes in Europe. This dilemma is worked on from the case of defence procurement policy. How does the British government decide to be both ‘in’ and ‘out’ of Europe by participating in the A400M military transport aircraft programme and withdrawing from the EuroMale UAV programme? Based on exclusive data, the decision in favour of the A400M (‘in’) is explained by the action of political, administrative and industrial actors who perceive the A400M as a ‘truck’ rather than a ‘race car’. As for the British State’s decision not to participate in the EuroMale programme (‘out’), it is conditioned by a weakening of the political will of political actors, and at the same time by a strengthening of conflicting relations between French and British administrations and industries. In doing so, this research contributes to the literature on the acquisition of armaments in strategic studies, and to the literature on differentiated integration in European studies.
  • Topic: Security, Defense Policy, Political Economy, European Union, Brexit, Conflict, Europeanization
  • Political Geography: United Kingdom, France, Western Europe, European Union
  • Author: Laurent Gayer
  • Publication Date: 04-2019
  • Content Type: Special Report
  • Institution: Centre d'Etudes et de Recherches Internationales
  • Abstract: The history of industrial capitalism and its modes of domination is intimately linked to that of violent entrepreneurs deploying their coercive resources at the service of workplace discipline, the extraction of surplus value and the securitization of the accumulation cycle. The relationship between capital and coercion is always fraught with tensions, though, and sustains new vulnerabilities among securityconsuming elites. The manufacturing economy of Karachi is a particularly fertile ground for studying this endogenous production of insecurity by security devices. The relations between Karachi’s factory owners and their guards have generated their own economy of suspicion. Various attempts to conjure this shaky domination have generated new uncertainties, calling for new methods of control to keep the guards themselves under watch.
  • Topic: Security, Political Violence, Corruption, Crime, Political Economy, Sociology, Urbanization, Material Culture, Political Science
  • Political Geography: Pakistan, South Asia, Asia
  • Author: David Díaz Arias, Luisa Cajamarca, Maya Collombon, Olivier Dabène, Gaspard Estrada, Manuel Gárate, Marie-Laure Geoffray, Damien Larrouqué, Frédéric Louault, Maria Teresa Martínez, Anaís Medeiros Passos, Kevin Parthenay, Gustavo Pastor, Carlos A. Romero, Pierre Salama, Sebastián Urioste
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Centre d'Etudes et de Recherches Internationales
  • Abstract: Amérique latine - L’Année politique is a publication by CERI-Sciences Po’s Political Observatory of Latin America and the Caribbean (OPALC). The study extends the work presented on the Observatory’s website (www.sciencespo.fr/opalc) by offering tools for understanding a continent that is in the grip of deep transformations.
  • Topic: Conflict Resolution, Security, Civil Society, Corruption, Crime, Democratization, Nationalism, Political Economy, Religion, Governance, Peacekeeping, Economy, Political Science, Regional Integration, Memory, Transnational Actors
  • Political Geography: Brazil, Argentina, Colombia, Cuba, Latin America, Nicaragua, Caribbean, Venezuela, Mexico, Costa Rica, Chile, Peru, Paraguay, Bolivia
  • Author: Sarah Miller
  • Publication Date: 06-2019
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: This paper considers how responsibility for ensuring refugee protection and access to solutions can be shared more reliably across the United Nations’ system, by examining entry points beyond traditional humanitarian actors (including peace and security actors in the United Nations), as well as the role states can play in supporting a broader response from the UN system. It draws upon a range of literature and concepts, including the Responsibility to Protect doctrine, offering a mapping and analysis of the proposed UN reforms within the humanitarian, development, financial, and peace and security sectors. It then considers how these reforms might be relevant to responsibility sharing in displacement situations and lays out some of the broader challenges to greater responsibility sharing. Finally, the paper provides recommendations for how to more fully engage these other actors — within the United Nations and beyond — to improve the prevention of, response to and resolution of displacement.
  • Topic: Security, United Nations, Refugee Issues, Displacement, Humanitarian Crisis
  • Political Geography: Global Focus
  • Author: Melissa Hathaway
  • Publication Date: 06-2019
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: In recent years, the world has witnessed an alarming number of high-profile cyber incidents, harmful information and communications technology (ICT) practices, and internationally wrongful acts through the misuse of ICTs. Over the last 30 years, a unique and strategic vulnerability has been brought to society — by allowing poorly coded or engineered, commercial-off-the-shelf products to permeate and power every aspect of our connected society. These products and services are prepackaged with exploitable weaknesses and have become the soft underbelly of government systems, critical infrastructures and services, as well as business and household operations. The resulting global cyber insecurity poses an increasing risk to public health, safety and prosperity. It is critical to become much more strategic about how new digital technologies are designed and deployed, and hold manufacturers of these technologies accountable for the digital security and safety of their products. The technology industry has fielded vulnerable products quickly — now, it is crucial to work together to reduce the risks created and heal our digital environment as fast as society can.
  • Topic: Security, Science and Technology, Cybersecurity, Digital Economy, Surveillance
  • Political Geography: Global Focus
  • Publication Date: 09-2019
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: Canada’s Arctic Agenda: Into the Vortex brings together leading Arctic thinkers to examine key elements of Canadian Arctic and Northern policy. These experts reflect on the progress that has been made in the past few years in Arctic policies and programs and consider the impact of powerful forces of change and division, both within Canada and abroad, which have produced a vortex of economic, security, environmental and identity challenges for the Canadian Arctic. Addressing the intense, if understated, debate on Canada’s Arctic agenda, this report’s contributors share the consistent message that Northerners must play a leadership role in creating and implementing the policies that affect them. The report also includes a collection of interviews with Jane Glassco Northern Fellows. These thoughtful Indigenous women from across the North in Canada share their perspectives and ideas on the policy issues that require urgent attention to ensure the prosperity of their Northern communities. The well-informed essays and interviews in this report will spark conversation about Canada’s Arctic policy priorities and provide concrete advice to inform the work of Canada’s policy makers moving forward.
  • Topic: Security, Economics, Environment, Identities
  • Political Geography: Canada, North America, Arctic
  • Author: Guy Marcel Nono
  • Publication Date: 11-2019
  • Content Type: Working Paper
  • Institution: Centre for International Governance Innovation
  • Abstract: For more than a decade, there has been a lot of focus on how sustainable development relates to international investment law. The growing trend of including general and security exceptions clauses in international investment agreements (IIAs) has also been highlighted. However, the nexus between general IIAs and security exceptions and the achievement of the SDGs has not been explored.
  • Topic: Security, International Law, Sustainable Development Goals, Investment
  • Political Geography: Global Focus
  • Author: Lisa Denney
  • Publication Date: 12-2019
  • Content Type: Policy Brief
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This Tool is part of the DCAF, OSCE/ODIHR, UN Women Gender and Security Toolkit, which comprises nine Tools and a series of Policy Briefs. Within police services, this Tool is aimed at the policy rather than the operational level, with relevance for senior police, gender units and those interested in improving police effectiveness through integrating a gender perspective. While police services are a key audience for this Tool, it is intended for a wide readership – including parliaments, government departments with policing responsibilities, civil society organizations, development partners, international police assistance providers and researchers working to improve policing and gender equality. Police reform is not solely the work of police services, but of a wider set of actors who support and influence the police and their operating environment. This Tool sets out a range of options for integrating a gender perspective and advancing gender equality in and through policing, drawing on experience from multiple contexts. While it provides guidance in terms of examples and checklists which borrow from good practices in different contexts, what is relevant will differ across time and place and require adaptation. For that reason, the Tool also sets out conditions that are important in achieving progress. The Tool includes: why a gender perspective is important for policing; what policing that advances gender equality and integrates a gender perspective looks like; how policing can advance gender equality and integrate a gender perspective; case studies that draw out learning from specific contexts; suggestions for assessing a police service’s integration of gender; other useful resources.
  • Topic: Security, Gender Issues, Governance, Law Enforcement, Women, Criminal Justice
  • Political Geography: Geneva, Europe, United Nations, Switzerland, Global Focus
  • Author: Anna Marie Burdzy, Lorraine Serrano, Megan Bastick
  • Publication Date: 01-2019
  • Content Type: Policy Brief
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This Policy Brief is part of the DCAF, OSCE/ODIHR, UN Women Gender and Security Toolkit, which comprises nine Tools and a series of Policy Briefs. The other Tools and Policy Briefs in this Toolkit focus on specific security and justice issues and providers, with more focused attention on what gender equality looks like and how to achieve it in particular sectors. It is intended that the Toolkit should be used as a whole, with readers moving between Tools and Policy Briefs to find more detail on aspects that interest them. This Policy Brief explains why integrating a gender perspective is important to the regulation of private military and security companies (PMSCs) and provides guidance to States on doing so in national legislation, contracting and procurement policies, as well as certification, oversight and accountability frameworks for PMSCs. The Policy Brief: Outlines what PMSCs are and the role of States in their regulation; explains why a gender perspective is needed for effective regulation of PMSCs; and presents a range of priorities and entry points for States to integrate a gender perspective in regulation of PMSCs.
  • Topic: Security, Gender Issues, Law Enforcement, Women, Inequality
  • Political Geography: Geneva, United Nations, Global Focus
  • Author: Marta Ghittoni, Léa Lehouck, Megan Bastick
  • Publication Date: 01-2019
  • Content Type: Policy Brief
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This Policy Brief is part of the DCAF, OSCE/ODIHR, UN Women Gender and Security Toolkit, which comprises nine Tools and a series of Policy Briefs. The other Tools and Policy Briefs in this Toolkit focus on specific security and justice issues and providers, with more focused attention on what gender equality looks like and how to achieve it in particular sectors. It is intended that the Toolkit should be used as a whole, with readers moving between Tools and Policy Briefs to find more detail on aspects that interest them. This Policy Brief explains how applying the principles of good security sector governance and engaging with security sector reform (SSR) can help to achieve the goals of the Women, Peace and Security (WPS) Agenda. Over the last decade the UN system and many states and international actors have recognized that SSR should be gender responsive, identifying and addressing the different security and justice needs of women and men, girls and boys, across different parts of the community. In some SSR programmes, priorities have been set to promote the participation of women in the security sector. At the same time there is a need to step up the engagement of the WPS community with issues of security sector governance. This Policy Brief argues that applying a security sector governance lens to WPS helps to reveal the key barriers to and drivers of change. This Policy Brief: Explains the principles of good security sector governance; examines how security sector governance and SSR are addressed in the WPS Agenda; outlines how a security sector governance approach can catalyse the transformative and sustained change needed to realize the WPS Agenda.
  • Topic: Security, Gender Issues, Law Enforcement, Women
  • Political Geography: Geneva, United Nations, Global Focus
  • Author: Henri Myrttinen, Megan Bastick
  • Publication Date: 01-2019
  • Content Type: Policy Brief
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This Tool is part of the DCAF, OSCE/ODIHR, UN Women Gender and Security Toolkit, which comprises nine Tools and a series of Policy Briefs. Tool 1 is mainly intended for use by policymakers and practitioners working in or working with security and justice sector institutions to increase gender equality – be it equality within the institutions themselves, or achieved through the work of the institutions within society. Some users might be approaching these issues through implementation of Women, Peace and Security (WPS) commitments, or in relation to a security sector reform (SSR) process. The Tool also aims to be of use more widely to justice and security providers, people involved in oversight and management, civil society organizations, the media and academic researchers. The other Tools and Policy Briefs in this Toolkit focus on specific security and justice issues and providers, with more focused attention on what gender equality looks like and how to achieve it in particular sectors. It is intended that the Toolkit should be used as a whole, with readers moving between Tools and Policy Briefs to find more detail on aspects that interest them. The Tool: Introduces why gender matters in security sector governance (SSG) and in SSR processes, and outlines the benefits of integrating a gender perspective. It explains key concepts that are used in the Toolkit: gender, intersectionality, masculinities, femininities, LGBTI, gender equality and gender perspective, and also SSG and SSR. It gives an overview of some of the relevant international, regional and national legal obligations with respect to gender and SSG and SSR processes. It presents a vision of what integrating a gender perspective and promoting gender equality mean for security and justice providers, for management and oversight of sector and justice services, and for SSG and SSR processes. It presents several different pathways for the security and justice sector to integrate a gender perspective into SSG and SSR processes and advance gender equality. It focuses upon: defining security needs in an inclusive, gender-responsive manner; adopting policy frameworks to integrate gender equality into justice and security governance; gender training for security and justice providers; using staff with specialized gender expertise; changing masculine institutional cultures to increase women’s participation and diversity. It offers advice on how to overcome resistance to working on gender equality within the security and justice sector. It suggests elements of an institutional self-assessment checklist on integrating a gender perspective. It lists other useful resources to support work on gender equality with the security and justice sector, and in relation to SSG and SSR.
  • Topic: Security, Gender Issues, Law Enforcement, Women, Criminal Justice, LGBT+
  • Political Geography: Geneva, United Nations, Global Focus
  • Author: Samantha Crompvoets
  • Publication Date: 01-2019
  • Content Type: Case Study
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This guide aims to collate and share knowledge and experience from NATO, NATO Partners and other armed forces regarding good practice when developing, implementing, and evaluating a gender-responsive organizational climate assessment. This guide is structured in five parts to describe the why and how of undertaking an organizational climate assessment in armed forces. It provides step-by-step advice, along with case study examples, for progressing your climate assessment from thought to action.
  • Topic: Security, Gender Issues, Law Enforcement, Women
  • Political Geography: Geneva, United Kingdom, Canada, United Nations, Spain, Global Focus
  • Author: Jasper Linke
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This SSR Backgrounder explains how SSR features in peace processes and how it is linked to other aspects of security, justice and democratic governance. It highlights some of the main factors that influence the inclusion of SSR in peace processes, including the roles and strategies of mediators in shaping the negotiations. It also discusses what issues of SSR are typically not addressed in peace processes and some of the principal challenges of SSR negotiation and implementation. This SSR Backgrounder answers the following questions: Why is SSG central to peace processes? How can SSR feature in peace processes? What aspects of SSR are often neglected in peace processes? What other security arrangements in peace processes are relevant to SSR? What are the challenges of including SSR in peace processes?
  • Topic: Security, Peace Studies, Governance, Reform, Transitional Justice
  • Political Geography: Geneva, Global Focus
  • Author: Ronja Harder, Jasper Linke
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: Civil society engagement is part of a culture of participation that enhances the democratic nature of decision-making about security. The expertise and independent interests of civil society provide a counter-balance to government policy by providing policymakers with a wider range of perspectives, information and alternative ideas. However, civil society activism is not always democratic or representative of the population’s needs or interests and does not automatically lead to effective oversight. This SSR Backgrounder explains how civil society can improve the accountability and effectiveness of the security sector. This SSR Backgrounder answers the following questions: What is civil society? How can civil society improve SSG? How can working with civil society help state security and justice institutions? When does civil society make insecurity worse? What challenges does civil society face?
  • Topic: Security, Defense Policy, Civil Society, Governance
  • Political Geography: Geneva, Global Focus
  • Author: Ronja Harder, Jasper Linke
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This SSR Backgrounder is about applying the principles of good security sector governance (SSG) to policing through police reform. The police are the primary state security provider responsible for protecting people and property through public assistance, law enforcement, the maintenance of peaceful public order, and the identification and prevention of crime. The goal of police reform is to ensure that policing becomes more effective, more accountable and more responsive to the needs of all members of society within a framework of democratic security sector governance. This SSR Backgrounder answers the following questions: What is police reform? Why is police reform necessary? Is there a model for police reform? How are police reforms carried out? How is gender equality part of police reform?
  • Topic: Security, Gender Issues, Law Enforcement, Reform
  • Political Geography: Geneva, Global Focus
  • Author: Ronja Harder, Jasper Linke
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: Gendarmeries and constabulary-type police go by many names, but all combine characteristics of both the military and civilian police. Because of their unique skill sets, demand for such forces to face new threats to domestic and international security has increased everywhere. However, the mixed military–civilian characteristics of gendarmeries and constabulary-type police pose special challenges for democratic civilian control and the appropriate use of force, especially in domestic law enforcement. This SSR Backgrounder describes the roles and functions of gendarmeries and similar forces and explains how applying the principles of good SSG enables them to fulfil their legitimate mission of protecting both state and human security with respect for human rights and the rule of law. This SSR Backgrounder answers the following questions: What are gendarmeries and constabulary-type police? What roles can gendarmeries play in domestic security? How can gendarmeries contribute to international security? Are gendarmeries compatible with democratic security governance? What does SSR mean for gendarmeries?
  • Topic: Security, Human Rights, Law Enforcement, Military Affairs, Rule of Law
  • Political Geography: Geneva, Global Focus
  • Author: William McDermott
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This SSR Backgrounder explains what ombuds institutions for the armed forces are, what they do and how they contribute to good governance of the security sector. These institutions provide oversight of the armed forces by receiving and investigating complaints, thereby improving the accountability, transparency, effectiveness and efficiency of the armed forces. They are an essential feature of democratic security sector governance that ensures respect for the rule of law and human rights. This SSR Backgrounder answers the following questions: What are ombuds institutions for the armed forces? What are the different types of ombuds institutions? How do ombuds institutions contribute to good SSG? How do ombuds institutions handle complaints? Why should complaints be encouraged? What kinds of investigations can ombuds institutions conduct? Are ombuds institutions part of the justice sector? How do ombuds institutions ensure the enforcement of their recommendations?
  • Topic: Security, Governance, Armed Forces, Military Affairs
  • Political Geography: Geneva, Global Focus
  • Author: Thammy Evans
  • Publication Date: 01-2019
  • Content Type: Special Report
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: This SSR Backgrounder is about applying the principles of good security sector governance (SSG) to defence through defence reform. The military is concerned with the defence of a state and its people. By increasing democratic oversight and control, defence reform ensures that military power is used according to the will and in defence of the population. Defence reform enables the military to fulfil its mandate more efficiently and effectively, in order to function flexibly in a dynamic security environment. This SSR Backgrounder answers the following questions: What is defence reform? Why reform defence? Who carries out defence reform? How does a defence reform process work? What links defence reform to good SSG and SSR? How to overcome barriers to defence reform?
  • Topic: Security, Defense Policy, Governance, Reform
  • Political Geography: Geneva, Global Focus
  • Author: Mario Joyo Aguja, Hans Born, Pou Sothirak, Paul Chambers, Iis Gindarsah, Rastam Mohd Isa, Nurul Izzati Kamrulbahri, Mohd Syahir Naufal Mahmud Fauzi, Yin Myo Thu, Aries A. Arugay
  • Publication Date: 09-2019
  • Content Type: Case Study
  • Institution: Geneva Centre for Security Sector Governance (DCAF)
  • Abstract: The publication "€Good Governance of the Security Sector in Southeast Asia: What Role for Parliament?" is a compilation of contributions submitted at the 10th Anniversary Workshop of the Inter-Parliamentary Forum on Security Sector Governance in Southeast Asia (IPF-SSG) in Siem Reap on 15-16 September 2016. The publication consists of country case studies of Cambodia, Indonesia, Malaysia, Myanmar and the Philippines.
  • Topic: Security, Governance, Law Enforcement, Rule of Law
  • Political Geography: Geneva, Indonesia, Malaysia, Asia, Philippines, Cambodia, Southeast Asia, Myanmar