Sommario PART 2 .................................................................................................................................................. 3 UNCERTAINTY: ................................................................................................................................. 3 Polarity ............................................................................................................................................. 6 Culture ............................................................................................................................................. 7 Cap XII: War ..................................................................................................................................... 8 Chapter XIII: Coercion ..................................................................................................................... 9 Chapter XIV: Peace and Violence .................................................................................................. 10 Chapter XV: Human Security ......................................................................................................... 11 Chapter 16, The Responsibility To Protect ................................................................................... 12 Chapter 17, Development ............................................................................................................. 13 Part 3: Institutions ............................................................................................................................. 14 Chapter XVIII: Alliances ................................................................................................................. 14 Chapter XIX: Regional Organizations ............................................................................................ 15 Chapter XX: The United Nations ................................................................................................... 16 Chapter 21: Peace Operations ...................................................................................................... 17 Chapter 22, The Nuclear Disarmament and Non-Proliferation Regime ...................................... 18 Chapter 23 Private security companies ........................................................................................ 19 PART 4 ................................................................................................................................................ 20 GENOCIDE AND CRIMES AGAINST HUMANITY ............................................................................ 20 ETHNIC CONFLICT .......................................................................................................................... 21 TERRORISM .................................................................................................................................... 25 COUNTERTERRORISM.................................................................................................................... 27 COUNTERINSURGENCY: ................................................................................................................ 28 INTELLIGENCE: ............................................................................................................................... 30 TRANSNATIONAL ORGANIZED CRIME (TOCs) .............................................................................. 31 INTERNATIONAL ARMS TRADE ..................................................................................................... 34 MIGRATION AND REFUGEEES: ...................................................................................................... 36 ENERGY SECURITY ......................................................................................................................... 39 WOMEN, PEACE AND SECURITY ................................................................................................... 41 ENVIRONMENTAL CHANGE: .......................................................................................................... 43 Ch. 38: Outer space ....................................................................................................................... 44 Chapter 36 , Health........................................................................................................................ 45 Chapter XXXVII: Cybersecurity ...................................................................................................... 46 THEORETICAL APPROACHES .............................................................................................................. 47 Realism ........................................................................................................................................... 48 Liberalism ....................................................................................................................................... 50 Constructivism ............................................................................................................................... 52 Critical Theory ................................................................................................................................ 53 Feminism ........................................................................................................................................ 54 Women gender and security.......................................................................................................... 55 Post structuralism .......................................................................................................................... 55 Securitization ................................................................................................................................. 56 Post-colonialism ............................................................................................................................. 59 SECURITY STUDIES: AN INTRODUCTION PART 2 UNCERTAINTY: The security dilemma is a foundational concept since it engages with all existential condition of uncertainty, that is explicit or immanent in all human relations. Hence, uncertainty is not an occasional and passing phenomenon but rather it is an inherent and inescapable reality in the lives of individuals and groups. It can be uneven in how it is perceived, understood and manifested in practice. In fact, when states practice cooperation or security communities are created, some degree of security is achieved even in the house of constant uncertainty. However, state decision makers can never be certain about the current and future intentions of those with the capability of harming them militarily and so unresolvable uncertainty occurs. Unresolvable uncertainty can be caused by first and foremost the ambiguous symbolism of weapons and their development. The ambiguous symbolism of weapons refers to the difficulty of safely distinguishing between “offensive” and “defensive” weapons. If it is easy to distinguish offensive and defensive weapons alone, the combination of the two might be more ambiguous. At the base of the ambiguous symbolism there is the other minds problems, according to which there is only limited understanding of the intentions and motives, hopes and fears and emotions and feelings on the part of the decision makers of one state about their counterparts elsewhere. Intentions are therefore susceptible to interpretation. The interaction of the ambiguous symbolism or weaponry and the other minds problem helps to ensure that politics among states takes place under the shadow of unresolvable uncertainty. Therefore, the security dilemma theorized by Herz is considered fundamental in security studies. Leaders must face both the dilemma of interpretation and the dilemma of response. In the former case, leaders must decide whether military developments on the part of others are for defensive purposes only or whatever they are for offensive purposes. Conversely, the dilemma of response offers decision makers two broad approaches to what they perceive to be happening: act or wait. If a dilemma is settled in favor of the view that another state is a definite threat to one’s own national security, there is no longer a security dilemma: the dilemma has been resolved, maybe mistakenly, and the relationship is best understood at that point as a strategic challenge. Thinking that moving from a dilemma to a challenge would leave uncertainties behind is incorrect: while removing certain uncertainties, it only opens another set, namely the risks that accompany arms races and actual conflicts. The result is a spiral of security competition that makes everybody more insecure: the so-called security paradox. According to Booth and Wheeler, a security paradox is a situation in which two or more actors, seeking only to improve their own security, provoke through their words or actions an increase in mutual tension, resulting in less security all round. Therefore, we can conceive the anarchical system of international relations as a system driven by fear. On the one hand, according to Herz, fear created a powerful structure of mistrust and conflict between groups. Butterfield on the other hand, believed that fear derived from the general inability of individual decision makers to understand how their own peaceful motives and defensive\reactive intentional could be interpreted as threatening by others. The problem of mistrust is clearly maximized when present uncertainties are set against a historical record of a conflictual relationship between the states and nations concerned or future expectations of unpredictability. Therefore, the idea of future uncertainty appears to construct international politics as an inescapable insecurity trap. Those entitled to state security must never rely on best-case forecasting when assessing potential threats to their well-being. Instead the guiding principle about future uncertainty in a selfhelp system must be mistrust. There are three a priori logics that have framed the ways theorists have understood the security dilemma: - The fatalistic logic is a set of assumptions proposing that security competition can never be escaped in int. politics. They argue that the search for security is primordial. States cannot trust each other in the anarchical condition of int. politics, relations between them are essentially competitive, sometimes violent and always characterized by a degree of insecurity. - The mitigator logic is a set of assumptions proposing that security competition can be ameliorated or dampened down for a time, but not finally eliminated. They accept that the int. system is technically anarchic, but they do not believe that this must necessarily mean that anarchy is synonymous with chaos and violent conflict. Mitigator logic introduced the idea of “security regimes” which seek through mutual learning and institutionalization to bring a degree of predictable order into relations between states, with the aim to promote mutual security through a variety of cooperative and confidence-building mechanisms rather than the modalities of fatalism (Gorbachev after 1985- security dilemma sensibility) - The transcender logic is a set of assumptions proposing that the social, political and economic character of human existence is self-constitutive, not determined. They believe that history has got us where we are and that it is possible to construct radically different world orders. The most significant theory connected to transcender logic is the security community: according to Karl Deutsh, it is a group of people that has become integrated within a territory and share a sense of community and of institutions and practices strong enough to assure dependable expectations of peaceful change among its population. The security community of Europe has become characterized by positive interactions between states and societies at multiple levels with states no longer targeting each other in a military sense. The security dilemma in the 21st century: - The prospect of a new Cold War: IR students have long been concerned with the instabilities supposedly caused by power transitions between rising and falling great powers. Today, this concerned is focused on the rivalry between China and the United States. The US and China share some common interests such as stability in the Korean peninsula, but there are potential flashpoints, notably across the Taiwan Strait and the South China Sea. Both are zones of tensions. Together they represent an active theatre of security dilemma dynamics. The potential for military escalation is significant as well as mistrust. Chinese strategic planners have been worried that US decision makers might consider that a BMD shield become part of an offensive strategy of nuclear pre-emption, designed in any future crisis to give the US escalation dominance over China. Conversely, US decision makers have longterm concerns about China’s intentions regarding their weaponizing of space. However, China did nothing to allay US concerns, it has only claimed that it wants to limit not accelerate the completion in outer space. With a fatalist logic, however there is not prudent alternative for US planners but to treat all deployments in space as potentially offensive, including peaceful ones. If both governments make fatalistic assumptions about each other’s intentions on these various issues they will feel compelled to seek security at the expense of each other, resulting in strategic dynamics that will lead to the construction of their relationship as a Cold War narrative. - The dynamics of new arms competitors: In several regional situations, security dilemma dynamics have the potential to work in well-understood ways to provoke new arms competitors with all their attendant dangers. This might be global, in the case of Russia versus US, regional, India and China, they might be conventional, like South versus North Korea, nuclear, with numerous possibilities in the Middle East, or both conventional and nuclear, as in the case of India and Pakistan. In particular, the latter case is the regional hotspot where fears of new arms races are most acute. Indeed, in South Asia the nuclear armaments competition is driven by Pakistan fears of India’s conventional superiority, while India’s position is complicated by having to also face a Chinese nuclear adversary that has played a key role in the development of Pakistan’s nuclear program. Given the acute mistrust on both sides, any security dilemmas look likely to be resolved conservatively and so rivalry between the two states in both the conventional and nuclear spheres will continue. - Towards a world of many nuclear powers? International order faces the long-term threat of the breakdown of the Nuclear Non-Proliferation Treaty, followed by the spread of nuclear weapons technology to an increasing number of states. Across the world there continues to be a diffusion of proliferation-sensitive civilian nuclear technologies and these development fuel uncertainties about states developing nuclear weapons under the guise of a civilian nuclear programme. If, as a consequence of the resolving of dilemmas of interpretation in a mistrustful way, governments begin to hedge against the collapse of the NPT by weaponizing their own civilian programmes, the outcome would significantly multiply dangers such as accidental nuclear war, nuclear entrepreneurship, nuclear acquisition by terrorists etc etc. - Terrorism and the spread of mistrust: The danger of terrorism has become globalized and multilevel, with potential danger s ranging from individual attacks and future “spectaculars” seeking to replicate the imagery of the bringing down of the Twin Towers in NY. The iconic case of the globalization of the security dilemma in our new age of uncertainty occurs in those situations in which fellow citizens may no longer be trusted to share the same values. When one fears that a fellow citizen may be ready to use violence to further extremists causes, the security dilemma becomes individualized as well as globalized. Uncertainty in the 21 st century is set to be intense, multilevel and multidirectional and that many of the key issue areas are likely to be subject to security dilemma dynamics. Polarity Polarity assumes that the distribution of capabilities largely determines what the behavior of actors will be. It usually only refers to the quantity of states and tries to capture the essentials of the global power structure. The concept became explicit during the Cold War, where only two states were able to have effects on the entire international scene. However, the concept of polarity had 3 problems during the Cold War: the USSR was an incomplete superpower because they were weak in economic terms despite their richness in material resources; the two hegemonies did not avoid the emergence of other economic great powers such as India, Japan and West Germany. Furthermore, there was a clear possible challenger to the bipolar hegemonial scene: China and its emergence as a regional power. After the collapse of the USSR, the bipolar system collapsed, and 3 possible scenarios came up: - A multipolar system which sees as main powers US, Russia, EU, Japan - Unipolarity in the hands of the US (Waltz: only transition) - A-polarity Neorealists considered the first two cases obsolete. However, in the 1990s, the US became gradually the sole hegemon thanks to the economic crisis in Asia and the Gulf War. For neorealists, in general there are two alternatives: the US maintains its unipolar hyperpower or another actor, mainly China, climbs up creating a new bipolar balance of power. In the first case, the US should employ any public policy to prevent any challenger, while in the second case, the only question is whether the arrive of bipolarity will be with a crisis or peaceful. Another scenario may come up, where there are no superpowers but only great powers. In general, we can say that it is very hard to predict the polarity change, also because the definition of polarity does not include non-state actors of IR and it excludes any kind of potentially collaborative motives of relation. It can be attractive as a theoretical starting point, it is a useful guide, well established as both a theoretical approach to understanding the international power structure and as a social fact in the public debates about world politics. Culture Defining culture could be very hard. It is an elusive concept that can change according to a purpose. In IR and security studies there are four definitions of culture: - As a web of meaning culture is understood as an historically transmitted pattern of meanings expressed in symbolic forms by means of which men communicate - As a social construct scholars suggest that our view of the world is shaped by how social knowledge organizes how we see the world, meaning that members of the same culture are likely to share interpretations of the world - As field, habitus and practice discourse refers to what counts as a problem and social relations that define practices and action - As discourse guardare appunti What comes up from these definitions is that culture is not fixed but it changes with time for drastic events as well as small adaptation. Hence, since it is not fixed and not unique, meaning that there are also sub-cultures, we should consider it a strong factor in decision making but not the sole one. In particular, security studies are clearly becoming more open to the importance of culture, both in terms of strategic culture and in terms of peacebuilding culture. Strategic culture may be defined as shared beliefs and behaviors among militaries that shape identities, influence relationships and affect the manner in which armed forces define and achieve their security objectives. Hence, culture must not be ignored; power politics alone is not enough to explain variation in the strategic choices of countries, and strategic culture is both constraining and constituting. Culture = identity = what is considered appropriate and legitimate in the use of force For what regards peacekeeping culture, the UN became highly involved with that after the Cold War. It embodies what is behind these decisions, and especially what is behind bad decisions such as those taken during the Rwanda genocide in 1994. The main characteristics of peacekeeping culture are a commitment to liberal peacekeeping; form of paternalism that derive from the belief among peacebuilders that they know best. Therefore, by denying the existence of culture in security studies, there is a risk to be unequipped to understand the world or addressing problems in the best suiting way. War War is a social phenomenon that is present beyond the war front and time. Warfare is the art of groups using organized violence and it has impacts in the human’s perspective of the social world. Studies proved that war is only possible because humans are biologically predisposed for violence, this might mean that warfare is a consequence of human psychology. Despite that there are various limits that have been imposed on both the theory and practice of warfare. It has been analyzed that in terms of its cultural, legal, political, and sociological dimensions. Cultural: warfare maybe different depending on when and where; what we see as an act of war, may be defined as differently from the others. Legal: war is the legal condition which equally permits two or more hostile groups to carry on a conflict by armed forces. Hence war is different from peace because it is a state of legal contestation through military means. Political: warfare is organized violence carried on by political units against each other. Violence is not war unless it is carried out in the name of a political unit, which distinguished it from murder. Sociologically: war is a social form of relations and a full spectrum social phenomenon. There are three main philosophies of war: the first one is the “political warfare”, defined as an act of violence intended to compel an opponent to fulfill our will. The second one is the “eschatological philosophy” which believe in a final war leading to the unfolding of some design (wither messianica or global). According to the “cataclysmic philosophy” war is a catastrophe that will hit some portion of humanity or the entire human race. It affects all of us, no one is responsible or benefit from it. Some scholar argued that globalization has created “new wars” which are new in goals, methods and systems of finance. They can be seen as the progressive erosion of the state’s monopoly on the use of force. They are driven by economic aspirations with political or ideological motivations playing only a minor role. They are very difficult to bring to a decisive end. Also, the domains are changing, from geographic ones to more technological ones, developed by robot military as well as outer space and cyber space. The US National Intelligence Council predicts that the risk of armed conflict will rise during the next two decades because of new technologies, strategies and evolving geopolitical context. Hence, warfare must remain central to security studies. Also because as mentioned before, the character of warfare is changing with the access of new participants in the battlefields. Chapter XIII: Coercion Coercion is a distinctive strategy in which the intention is to use threats to pressure another actor into doing something against their wishes. It changes in terms of objective methods and capacity to counter coercion. We can understand the coercion as one of the possible strategies among consensual strategy and controlling strategy. The first one aligns choices with those of others without the threat or use of force; the second one involves the use of force to restrict another strategic choice and finally coercive strategy involves the deliberate use of overt threats of force to influence another’s strategic choices. Whether a threat is effective at influencing the target’s strategic choices will depend on the target's perception of the threat and other factors that go into its decision calculus. In terms of objectives, coercion can be divided into “deterrence” the use of threats to dissuade an adversary from initiating an undesirable act; and “compellence” which is the strategy to persuade an adversary to doing or not doing something. These two concepts defer in terms of initiative, time scale, and the nature of demands. Indeed, deterrence involves making clear what the coercer considers undesirable and then waiting, leaving the overt act to the adversary; it has no time limit; and threats are usually clear because the aim is to preserve the status quo. Conversely, compellence involves initiating an action that stops or becomes harmless by the response of the targets. It might require the coercer to use force until the targets act. It requires a deadline to become relevant and compelling threats tend to communicate only the general direction of compliance. The construction of effective military threats depends on more direct forms of communication and on credibility. Even if a threat is well constructed, they might be only one part of the target's decision calculus. The limits and possibilities of coercion can be assessed considering terrorism, which is by default a coercive strategy: terrorism is difficult as a coercion strategy not only because the gap between means and ends but of the magnified problems with communicating threats. Coercion is usually associated with the threat of punishment but when a target can respond to the punishment it may be willing to risk the cost of retaliation. There are two types of costs: resistance and compliance. The first ones are those involved in defying the coercer's demands, which can be those involved in trying to prevent the coercer from executing the threat and the pain imposed by the coercer's action. Hence, coercion can be understood as an attempt by A to present B with a choice between two types of costs: that of resisting A’s efforts an incurring in the A’s subsequent plan and that of complying with A’s demands. Coercion succeeds if B prefers cost of compliance than those of resistance. Coercion might influence the development of power relationships between the protagonists. Acts of coercion might have a wider impact on the management of conflict between adversaries. Even if they do not generate a reputation for the coercer, they might convince the target that certain actions are best avoided owing to the likely reaction of the coercer. Hence, the political context, both domestic and international will impact the construction of coercive strategies and their outcome. Chapter XIV: Peace and Violence Violence is the center of security studies. Traditional security theorists equate military power with security. The more tools of violence a state has, the more it can be project power. Violence can be legitimate or illegitimate, intentional and direct or structured and subtle. Direct violence involves an identifiable person who acts to carry out violence against another identifiable person. Structural violence does not require an identifiable actor. Everyday violence is experienced at multiple levels and is an elusive and political term. Scheper-Hughes Refers and defines everyday violence as the “small wars and invisible genocides” that plague the socially vulnerable and cause them to suffer inordinately. Examples are infant mortality, slow starvation, sexual and physical abuse is, diseases etc. Peace can bring up a paradox namely when a state increases military force or police units, it is becoming safer or is becoming more politically repressed and thus violent. Non-violent actions involve engaging in conflict but without using violence or threat. It is always defined in relation to violence. There are 3 categories of nonviolent techniques: protests, persuasion, non-cooperation and nonviolent intervention. It is the acting against oppression, injustice or violence without the use of violence or threat. However, it is different from pacifism because it might be chosen because of its tactical usefulness rather than out of the sole rejection of violence. Therefore, violence plays a dual role within security studies as both a source of insecurity and the means to achieve it. Chapter XV: Human Security The concept was introduced in the UN's Development programs in 1994 Human Development Report. It distinguishes the general security concept, associated with security of the states, and security concerned with human life and dignity. Human security threats are divided into 7 categories: political, such as freedom and human rights; personal such as torture; food; health; economic and community security. The UNDP report found 4 essential characteristics of human security: universal, interdependent, the imperative of prevention, people-centered. The concept of human security is a call to action to increase the capabilities of individuals to address their own security and confirming that people are the most active participants in determining their well-being. Hence, human security is achieved when individuals or multiple actors have the freedom to identify by risks and threats to their well-being and values. While individuals have a clear role in identifying their own security, they are also limited. Indeed, individual action is insufficient. States, on the other hand may co-opt the human security agenda to add legitimacy to business-as-usual practices or even to help justify illiberal ends. However, human security is still struggling to find a proper space in the literature of security studies. Some scholars state that human security is nothing more than a tool to further state and international agendas. Critical approaches to human security have exposed activities and processes taking place on the ground, where individuals are constantly creating spaces of security that are often fragile but in constant development. Human security perspectives are not irrelevant to so-called traditional or state security priorities articulated by governments. In situation where states are weak, fragile or virtually non-existent, the relevance of community needs and interests can be crucial to strengthening security at multiple levels. Chapter 16, The Responsibility To Protect The principle of the responsibility to protect was introduced during the 2005 World Summit after the horrors of the Rwandan genocide of 1994 and of the crimes against humanity in Bosnia and Syria. The principle was based on three pillars: (1) the responsibility of the state to protect its population from genocide, war crimes, ethnic cleansing and crimes against humanity; (2) The international community’s responsibility to assist the state to fulfill its responsibility to protect; (3) The international community's responsibility to take timely and decisive actions through peaceful diplomatic and humanitarian means, and in the case that it fails, other forceful means in a manner consistent with chapters 6, 7 and 8 of the UN charter. The political dilemma at the heart of the UN charter is: how should stay behave in cases where maintaining faith in human rights means refusing to respect the right of non-interference? As mentioned before, the turning point which pushed the UN states to rethink the nature of humanitarian intervention had been the Rwanda genocide in 1994. Also the case of Kosovo was critical: according to Dang sovereignty as responsibility implied the existence of a “higher authority capable of holding supposed sovereigns accountable” and that dominant authority should place collective interests ahead of the national interest of its members. In 2001, after the 9/11, the ICISS published a report stating that states have primary responsibility to protect their citizens from genocide and mass atrocities. If states are unwilling to do so, the principle of non-interference yields to the responsibility to protect. Moreover, the ICISS states that the responsibility to protect includes a responsibility to react, prevent and rebuild politics and societies afterwards. In 2005 the World Summit argued that the decisions about the use of force was removed and submitted by the unique authorization of the Security Council and that crises are under international concern only if the government manifestly fails to protect their population. In 2009 the security general released the “implementing the responsibility to protect” document, outlining a wide range of measures that individual states, regional organizations and the UN system might consider to implement the three principles of the R2P. Today, at least 55 states developed national mechanisms to support the responsibility to protect. Basically, the R2P is an attempt to reconfigure the relationship between sovereignty and fundamental human rights in a way that strengthens the protection of vulnerable populations while protecting international rules about non-intervention Chapter 17, Development The relationship between development and state has become common sense because the majority of armed conflicts occur in developing countries. In general development is associated with a change from one form to another and an improvement. In international relations, development is intended as improvement of the lines of people living in poverty in poor countries. It is associated with the GDP per capita but not univocally. indeed, economic growth does not always guarantee improvement in all aspects of human development. Paul Collier introduce the concept of “conflict traps” according to which poorer countries experience increased likelihood corruption and failure of government to meet citizens expectations. According to the modernization theory, states can have a transition from pre-modern to modern societies through economic development. The Washington consensus was useful in this matter in supporting market-based solutions to development challenges. It proved to be successful in the case of Latin America, but it was also inefficient in Africa. Indeed, the “one size fits all” approach was highly criticized, because ultimately the Washington consensus approach led to greater inequalities. The exception where the Asian tigers. In terms of International Security, countries with a low level of development often lack capacity to control their borders and ensure security in their territory. Indeed, poor territorial control can provide opportunities for trafficking of arms, drugs or people. Another element leading to conflict linked to development is the rise of horizontal inequalities. According to Steward, States experiencing horizontal inequalities should tackle them directly through development policies including forms of affirmative actions, even if this means sacrificing economic efficiency. Human development is multidimensional as outlined by the UNDP, hence human development, human security and needs are clearly correlated. For individuals to feel secure they need to be able to meet their basic needs. Development and security are interconnected and reducing poverty and enhancing human security are central to the achievements of peace potentially within and between states. Part 3: Institutions Chapter XVIII: Alliances International alliances are among the most significant phenomena in security studies and world politics more generally. They are extremely valuable for advancing a state's interest and an external effort for achieving an end, especially for smaller states with the limited material resources. There are different definitions of alliance, starting from a security cooperation to a multilateral agreement of terms. A few things must be taken into consideration to categorize an alliance: (1) its formation conditions (2) the dynamics (3) the balance of power (4) state behavior There are different factors that may cause the collapse of an alliance. One is major war but generally we could say that if there is a change in the conditions that generated the alliance, it will collapse. The most relevant theories of alliance formation are focused on international determinants or domestic factors. The former emphasizes the state form alliance in order to combine their military capabilities and thereby improve their security positions. In this case states may form alliances to balance the power of other states or to respond to a threat. For what concerns domestic determinants, alliances may generate because of culture, background, ideologies and political institutions. States tend to pair with similar ones. Scholars believe that alliances between democratic states are likely to be strong and resilient because of the relative stability of public preferences and the greater continuity of national leadership. Alliances may include or develop intergovernmental organizations to facilitate cooperation among their members. Or they may contain or acquire institutional capabilities that can be used for tasks beyond those for which it was created. Another thing that can ensure longevity in the socialization of member states. These interactions may lead to the development of more similar worldviews. NATO 1949, 12 states, Response to the threat of the Soviet Union; it survived the fall of the USSR; its longevity is given by the residual threat of the USSR; new threats emergence; the intra alliance function that NATO has played in ensuring friendly relations among its members. Future difficulties for NATO may be potential new threats and the possibility that European countries will be faced with the choice to prioritize EU structure to NATO. Chapter XIX: Regional Organizations Regional organizations are formal bodies comprising a membership that is usually geographically delimited. Security in this case may be understood as building a more secure community or promoting human security. The main early types of regional institutions that could be defined are multi-purpose organizations, incorporating security, economic and political functions and security alliances. The first wave of regional institution building took place to create a more robust set of international institutions to prevent these social, political and economic upheavals (disaster) that had been taken the world to war after 1939. This worked especially in the developing world in Africa and the Middle East. They were not able to ensure security but were able to promote regional unity, peacekeeping and decolonization. With the Cold War of the Warsaw Pact and the NATO were born, in reaction of the superpower's dominance: this wave improved regional self-sufficiency and cooperation in a changing world. The last wave was associated with the creation of the European Union. Today, regional institutions have grown in number, expanding the roles and memberships in gained increased international recognition. However, new challenges have emerged particularly regarding peace operations and the coordination of anti-terrorism and WMD policies. Terrorism and WMD proliferation are not new but they have been classed as core security threats by dominant States and thus captured the center of the contemporary security debate, demanding appropriate institutional responses. A major driver to regionalism in security affairs has been changes in the international system, with States and organizations responding to shifts in the global and regional bounds of power. Also, States and other actors evidently attain value to regional institutions which have survived and developed new functions. Finally, regional organizations create common identity that influences their capacity to cooperate. However, while identity is crucial they also need to protect their power and influence and attend to their own security concerns in a way that preserves a regional autonomy and order. In general, regionalism and security affairs must be understood as a response to the dominant security order. Regional institutions also provide useful normative frameworks conditioning members behavior and signaling to outsiders. Chapter XX: The United Nations The UN was conceived during WW2 and born in June of 1945. Its main purpose is to maintain peace and security. It includes almost all countries on the planet. There are three facets of the UN: - the inter-governmental institution, so the arena for decision making and negotiation - the administrative entity, meaning leaders and staff members - the collection of non-state actors that routinely engage the world body. The main organs of the UN are the Security Council, the General Assembly, and the secret area. The Security Council Is responsible for maintaining international order. It is composed of five permanent members with veto power and 10 rotating members. It has coercive authority, and it may impose diplomatic and economic situations or even authorize military force. The General Assembly Is formed by all member states that have equal status and one vote. All the decisions taken there are recommendations and not binding. But the assembly can discuss issues of international peace and security and make X actions to states and Council. The Secretariat Is composed by international civil servants who must be completely independent from the government and must not be influenced by states. The Secretary General is appointed by the assembly and is a crucial role: they are charged with carrying out Security Council decisions and have the power to call the Security Council's attention to any matter which in their opinion may threaten the maintenance of international peace and security. In the new Millennium, the UN is mostly dealing with both Interstate intrastate disputes. One major concern regards globalization, particularly because it has weakened the borders and generated more tensions. Contemporary conflicts are therefore waged and found different from most previous Interstate wars. More actors participate and new challenges occur such as migration and terrorism. In addition to addressing conflicts once they erupt, the UN has attempted to focus on the phases before and after wars: conflict resolution, peacemaking, peacekeeping, peace enforcement and peacebuilding. It is also engaged in matters of terrorism (counter-terrorism committee) and disarmament and nonproliferation (NPT Treaty + Chemical Weapons Convention + Biological Toxins and Weapons Convention). Chapter 21: Peace Operations International peace operations serve problem-solving purposes. There are five different kinds of categories of peace operations: (1) conflict prevention refers to the application of structural or diplomatic measures to keep intrastate or Interstate tensions and disputes from escalating (2) peacemaking to address conflicts in progress (3) peacekeeping to preserve peace and to assist in implementing agreements (4) peace enforcement the application with authorization of the Security Council, to use coercive measures to restore peace and security (5) peace building to reduce the risk of lapsing or relapsing into conflict by strengthening national capabilities for conflict management According to the Brahimi Report of 2000, which is the Report of the Panel on UN Peace Operations, there is a need for strengthening the UN's capacity to undertake a wide range of missions. Several reforms were applied along with the need for the UN to maintain 5000 troops that would be ready to deploy in 30/90 days. These reforms were intended to give the UN the capacity to launch one new large operation a year. The Department of Peace Operations was created to plan, manage, deploy and support the UN peacekeeping operations. It is in partner with the Department of Field Security which aims to bring peace and stability to conflict zones around the world. Moreover, the High-level Independent Panel on Peace Operations was born as a revisionist agenda to the Brahimi report. In general, peace operations are understood to help bringing and maintaining conditions that reduce or eliminate violent conflicts. The presence of peacekeepers reduced risk of conflict by over 50%. It was demonstrated that both traditional and coercive operations had a similar effect, they were both key and bringing credibility of the missions. Also, mandate and stabilization criteria are easier to achieve with domestic elite cooperation, local peace incentives and international political will. However, the meaning of peace operations continues to be framed as a security-centered business of strategies to meet threats to International Security. In general, peace operations could well contribute to a more equitable dispensation of global security. Counterinsurgency vs Peacekeeping The Nuclear Disarmament and Non-Proliferation Regime After their appearance in 1945, nuclear weapons became the 1st guarantors of peace during the Cold War. The 1st of July 1968, the Nuclear Non-Proliferation treaty was signed by 5 nuclear powers, namely US, USSR, UK, France and China. The aim was to prevent new states from acquiring nuclear weapons. However, it was not successful since now nuclear weapons states are nine including Israel, India and Pakistan which have not joined the treaty. Three challenges are now associated with nuclear weapons. The first one is related to secrecy. It is estimated that the 90% of the world's nuclear arsenal is in hands of the USA in Russia. Some of the NPT states have made significant cuts in their arsenals but the lack of transparency makes it difficult to accurately assess where these reductions are complete, verifiable and irreversible. The second challenge comes from a set of states which have not signed the NPT and the Comprehensive Test Ban Treaty. Pakistan and Israel did not sign the treaty because of security concerns while India wanted a prominent seat in determining world fairs. The third challenge comes from non-state actors such as al Qaeda and ISIS. There is a serious possibility that armed transnational non state actors seeking nuclear weapons might receive information from illicit network of experts such as in the case of Dr. Khan. To address these three challenges, three approaches were generated. The traditional multilateral institutional approach, linked to treaty-based negotiation, strong method in setting norms and principles in international law but it is weak in the enforcement. The non-treaty based multilateral approach based on a legally binding instrument to prohibit nuclear weapons, at least putting the concept of nuclear weapons - based on deterrence on notice. The final approach is an ad hoc, noninstrumental, non-conventional approach led by individual states to address the immediate challenge of non-proliferation, including preventive wars or the Nuclear Security Summit. These approaches are stronger in enforcement dimension but weaker and international law and establishing norms and principles. Also, given the inability of the existing regimes to address the proliferation challenges of today these ad hoc initiatives are likely to flourish. Private security companies In the two decades after the Cold War, the common sense and security studies that control sanctioning and use of violence was in the hands of states was disrupted by private security activity. PSC are companies that under contract perform services that are provided usually by military or police forces. Some claim that the turn to PSC threatens and undermines state control and democratic processes. While others believe that PSC can indeed offer solutions to untraceable security problems. Privatization effect on capabilities vary depending on the context. It sometimes leads to greater capabilities and sometimes to lesser. Strong states are usually capable of dealing with the risk of privatization while weak states with ineffective and corrupt forces have the least to lose from the capabilities offered by private sectors and less capability to deal with risks. PSC usually provides three different categories of military support: military advice and training, operational support, logistical support. PSC have a corporate structure and operate openly posting jobs on their websites. They also gained some degree of international acceptance. PC market have some unique features namely they don't provide foot soldiers but rather act as supporters, trainers and force multipliers for local forces. Also, states do not authorize private takeover of other territories. Among the reasons for the spread of this market is the fact that there was an increase in available supply, an increase in demand for military skills, the ideology of capitalism that led people to see private alternatives as obvious, the help given by PSC to reach governments at the end of Cold War and to developing countries. Both material and ideational changes placed private military and security options on the agendas. The reluctance of states to take over on a variety of missions and the poor performance of multilateral institutions have made the private alternative appear more workable due to prevailing beliefs that private means cheaper and better. PART 4 GENOCIDE AND CRIMES AGAINST HUMANITY According to Lemkin, genocide is something embedded in human society, indeed in the human psyche. Genocide is defined as an empirical phenomenon. Lemkin conined the term “genocide” and defined it as “a coordinate plan of different actions aiming at the destruction of essential foundations of the life of national groups, with the aim of annihilating the groups themselves. Genocide is directed against the national group as an entity and the actions involved are directed against individuals not in their individual capacity but as members of the national group”. Article II of the UN Convention on the Prevention and Punishment of the Crime of Genocide states that genocide means any acts committed with intent to destroy, in whole or in part, a national, ethical, racial or religious group. The acts are: killing members of the group, causing serious bodily or mental harm to members of the group, deliberately inflicting on the group conditions of life calculated to bring about its physical destruction in whole or in part, imposing measures intended to prevent births within the group, forcibly transferring children of the group to another group. More significant that its wording was the challenge the convention posed to the essential norm of the international system: state sovereignty and the rights to non-interference in “domestic” affairs. Lemkin had hoped to displace that norm. Several factors contributed to a resurgence of interest in genocide from the 1970s to the 1990s and to its growing use as a buttress for legal, activists and military intervention. Among these factors: the continuing evolution of the HR regime, demonstrated by the Helsinki Accords, the UN convention against apartheid and torture and the growing influence of non-governmental organizations such as AI and Human Rights Watch. Equally significant was the end of the Cold War. However, the break-up of the Soviet Empire produced a wave of wars of succession, predominantly in Central Asia, some with genocidal overtones. - - 1991 Yugoslavia 1994 Rwanda 1999 East Timor: The Timor case suggested that the tolerance of the international community of states, and their publics, for genocide and mass atrocity might be declining and the nation of a “responsibility to protect” may be gaining ground. 2004 Darfur The founding the ICC was the culmination of legal mechanisms developed over the decades to confront genocide. The signatories sought to create a permanent body to supplement national legal institutions and to supplant the “ad hoc tribunals” devised for the former Yugoslavia and Rwanda. However, as the legal machinery to confront mass atrocities has evolved, a clear preference has emerged for charges of “crimes against humanity” over “genocide”. Although the Nuremberg Charter of August 1945 focused on “crimes against peace”, the charter established two core elements of “crimes against humanity” that have lasted to the present. This led to the benchmark definition of “crimes against humanity” in the Rome Statute of the International Criminal Court. According to the statute, such crimes must be committed as part of a “widespread or systematic attack” and perpetrators must have the mens rea that their crimes are committed as part of that wider attack not in isolation. It is also important to stress that only individuals may be charged with crimes against humanity as is also the case with genocide. States or regimes as a collectivity cannot be held to account. It is apparent that the crimes against humanity prohibited in the Rome Statute are a great deal broader than those banned by the Genocide Convention. However, a couple of interesting points of crossover with the UN Genocide Convention are worth mentioning: the definition of extermination is almost identical to Art 2.c of the Genocide Convention, which bans “acts deliberately inflicting on the group condition of life calculated to bring about its physical destruction in whole or in part. The Rome Statue stands: the intentional infliction of conditions of life inter alia the deprivation of access to food and medicine in which a group of individuals who do not share any common characteristics are killed; the crime against humanity of persecution incorporates the four group protections extended by the Genocide Convention but supplements them with other variables that many genocide scholars and activists have longed to see added to anti-genocide provisions. The substantial civil society mobilization against genocide and crimes against humanity constitute another significant and positive development. However, genocide and crimes against humanity remain potent threats to the security of individuals and communities. ETHNIC CONFLICT Ethnic identities have been present since the beginning of times and they frequently conflicted with one another. Most ethnic conflicts are peaceful but inevitable when linguistic and religious groups mix. In the 20th century ethnic conflicts were more important than ever before. Indeed, civil wars were more common than international conflicts. The same trend continued in the 21 st century. Moreover, about half of the internal armed conflicts were, at least in part, ethnic conflicts. Ethnic conflicts have been one of the major sources of insecurity in the world. Ethnic conflicts can be bloody. In fact, on one list of the 10 deadliest civil wars of the 20 th century, half of the cases were ethnic conflicts. Each of these conflicts is estimated to have cost upward of a quarter of a million lives, most of them civilians. Ethnic conflicts might include massacres, mass rape, the forcible emptying of cities and regions, torture, the creation of concentration. Ethnic conflicts became a major source of disruption, conflict and refugees for neighboring countries as well. They became major international issues and therefore are central issue for security studies. Experts disagree about what could be defined as an ethnic conflict. From an anthropologist point of view, what they all have in common is that the groups involved are primarily ascriptive. Hence, membership in the groups is typically assigned at birth and it is difficult to change. They have a “sticky” identity, hard to change even if they are not marked by the kind of obvious physical differences (ex. African Americans from white Africans). According to Adam Smith, a group is an ethnic group if its members share the following traits: common name, common descent, elements of a shared culture, common historical memories and attachment to a particular territory. Where does ethnicity comes from? - Ethnicity is a primordial identity and implied that it was essentially unchangeable. This view implies that ethnic conflicts are based on “ancient hatreds” that are impossible to eradicate and nearly impossible to manage. However, most people have multiple identities, hence, which identity is more important that the others? Identities do sometimes change, new ones emerge and old ones disappear, depending on the time of crisis. - Since people shift their identity, ethnic identity is not primordial at all but merely “instrumental”. People follow ethnic leaders when it is in their interests to do so, and leaders try to create ethnic solidarity when it works for them. ethnic conflicts can be blamed primarily on selfish leaders who mislead their followers in pursuit of their own power. - This view mixes the first two by emphasizing the degree to which people create their identities. This view points out that ethnic identities are “socially constructed”, they are not natural in the sense that a simple primordialist view would assume, even when racial distinctions are just a matter of custom (African-Americans accept the label “black” but in South Africa most of them would be classified as “coloured” rather than as darker, purely African “blacks”). Moreover, constructivists pointed out that the source of these customs was “invented traditions”, writers and scholars who created the “myth-symbol complex”. The latter establishes the “accepted” history of the group and the criteria for distinguishing who is a member, it identifies heroes and enemies and glorifies symbols of the group’s identity. When can we define a conflict as an ethnic conflict? A conflict is ethnic only if the sides involved are distinguished primarily in the basis of ethnicity. Often one or both sides in an ethnic conflict will be a coalition of ethnic groups, rather than one, but the conflict is still ethnic because the people involved choose sides based on their ethnic group membership. What are violent ethnic conflicts about? The long- term trend is that the number of violent ethnic conflicts increased steadily from the endo of the Second World War until the mid-1990s, but then it started to drop. These conflicts were about political power in a disputed territory. In most of the recent conflicts, including Syria, Iraq and Afghanistan, the combatants are fighting to dominate the entire country. Other cases may be about a regional minority who wants to separate and form their own state or at least their own autonomous region (Ukraine 2011). Often the goals are unclear. Only rarely these conflicts are religious ones, in the sense that one group is trying to impose its religion on the other one. The biggest exception is Sudan, where the main grievance of the Christian and animist southerners was the attempt by the Sudanese government to impose Islamic law on the whole country. In general, the motives are mixed such in the case of ISIS: they try to impose both the Sunni Arabs against adherents of other sects and the Sunni Islam. Another misconception is that ethnic conflicts are merely economic: while economic grievances are usually present, in ethnic conflicts they are expressed in ethnic terms. What are the causes of violent ethnic conflicts? Violent ethnic conflicts fell into two broad categories: riots with and armed conflicts/civil wars: - Ethnic riots: they have occurred all over the world. They typically begin suddenly after seemingly minor triggering incident. Once they begin they mushroom in size, yielding widespread violence across a city or even a country. They usually involve little or no planning and specific selection of the victims. Usually age or sex does not matter after the killing is done there is usually no remorse on the part of the killers or their co-ethnics – “they had it coming”. There are three major factors that lead to deadly ethnic riots: a hostile relationship between the groups; authoritative social support, which usually extends to the security forces; a stimulus, some specific event that provokes fear, anger or hatred in the rioting group or even a political change - Ethnic civil wars: explanations about them divide along similar lines: social psychology, social mobilization and instrumentalist approaches. Instrumentalist approaches start with what creates the opportunity for rebels to act: weak governments, large populations and inaccessible terrain create the opening extremists need to act. Also, extremists leaders, seeking to grab or hold onto power, and extremist media are essential factors. These two facts work together: extremist leaders provide heroes for the extremist media to promote, while one-sided media portrayals seem to validate the extremist leaders claims that their group must unite against the “enemy”. Social mobilization approaches consider both opportunity and leadership but are they also interested in how ethnic group mobilize? According to them people use social mobilization and networks that already exist, such as political parties and religious sects. People mobilize as ethnic groups because people’s social networks tend to be mostly within their ethnic group; barriers of language or religion typically separate them from members of other groups. Social psychological approaches focus on different puzzle: why do followers follow these extremist leaders? Especially, why do they follow who wants violence instead of following moderate leaders who will work for peace? Remembering that a group is defined by its myth-symbol complex, symbolic political theory suggests that, when the group’s mythsymbol complex points to the other group as an enemy, prejudice is a likely result and group members will for that reason be predisposed to be hostile to the other group. If the group believe that they are in danger, they will be likely to use extreme measures which they justify as self-defense. Case Study I: Sudan Sudan was one of the less sensible results of map-making by colonial powers in Africa. Northern Sudan is characterized by Muslim in religion and led by an Arab elite while Southern Sudan is a mixture of Christian and animist ethnic groups of which the largest are the Dinka and the Nuer. The only contact made between north and south was when the northerners raided southern’ lands to capture slaves. In colonial times, 1899-1955, the British ruled the two regions separately, with the north under a form of Islamic law. Instrumentalists would note that Sudan had the preconditions for ethnic war from every perspective: its large population, huge land area, hostile neighbors and weak government. Symbolists point out that northerners’ myth symbol complex glorifies the Mahdiyya as a basis for an Islamic identity in Sudan, and that provided racial prejudice for South Sudan. Conversely, Southerners saw Islamic rule as a disaster for themselves and they feared northerners’ efforts to spread Islam as a threat to their own identities. Sudan gain its independence in 1955. Northern Elites attempted to impose Muslim and Arab identities on the south, swiftly sparking violent resistance that escalated to full-scale civil war in early 1960s. They signed a peace treaty in 1972 thanks to a military coup in 1960 by Numayri. By late 1970s, he was losing his power, and in 1983 he revoked south’s autonomy and imposed Islamic law throughout the country. They felt like their identities were threatened by this Programme of forced Islamization and rebelled again. He was overthrown in 1985. When a new military dictatorship took power in 1989 it maintained Islamic law and the coalition with the Islamists and continued the war in the south for another 16 years. A Comprehensive Peace Agreement was signed in 2005 leading to the independence of South Sudan in 2011. However, in Sudan’s western region of Darfur, a new civil war began even before the Comprehensive Peace Agreement. South Sudan, which was never united even in the war with the North, faced a civil war between Dinka and Nuer- the deadliest war in Africa. Case Study II: Yugoslavia It was a multi-ethnic state with no majority group. The three largest groups all spoke the same language, Serbo-Croatian, but differed in their religious tradition: Serbs- Orthodox Christians; Croats- Catholics; Bosnian Muslims; Slovenes- Catholics; Albanians- Muslims. Before WWII, Yugoslavia was ruled by the Serbians. However, during WWII, the Germans conquered the country and placed Croatian fascists in power in Croatia and Bosnia and Herzegovina, where they engaged in genocidal violence against the Serbs. When the war ended, Josip Broz Tito recreated Yugoslavia as a nominal federation of six republics: Serbia, Croatia, Bosnia and Herzegovina, Slovenia, Macedonia, Montenegro. He died in 1980 leaving a weak state that instrumentalists will associate with the civil war’s main cause. Tensions where everywhere: Serbs began talking about the menace of the Albanians while labelling Croatian with fascism. The leader of Serbia’s League of Communism exploited the fear and ethnic myths and attempted to impose Serbian control on the whole Yugoslavia, repressing also Albanians. In response, Bosnia, Slovenia and Croatia turned to their nationalist leaders. Slovenia declared independence in 1991. The Croats faced a war with Yugoslavia. Bosnia and Herzegovina’s situations was even worse: Serbs wanted to remain in Yugoslavia, the Muslims feared the Serbian domination and wanted an independent Bosnian state Croats wanted their areas to join Croatia. In 1992 Bosnia was declared independent and the three-side war started: Serbia and Croatia provided military assistance to their co-ethics in Bosnia and the Muslims were the principal victims of the civil war. Serbs started the “ethnic cleansing” of their enemies justifying the action because of the threat of their identity. In 1995, a Croatian military counteroffensive backed by NATO air power prompted the Serbian side to agree to stop fighting. International security dimension of ethnic conflicts: Ethnic conflicts have important international effect. The Bosnian case illustrates a wide range of such effects: the politics of ethnic conflicts transcends national boundaries with ethnic diasporas often playing an important role; they produce large numbers of refugees because such wars are often about which group will control disputed lands so massacres and evictions are frequently used weapons; they often become a major issue for international diplomacy, resulting in diplomatic intervention sometimes effective while sometimes tragically unsuccessful. Moreover, peacekeepers are sometimes send to resolve ethnic conflicts when diplomacy is not enough. Because international interest in ethnic conflicts is often intense and because peacekeepers are not always effective, international actors often resort to violent intervention. Also, indirect intervention is common: foreign counties frequently provide supplies, weapons and military training to the side they favor. In many cases, international aid is also ethnically motivated with countries backing the side more related to them. Sometimes these interventional are purely opportunistic rather than ethnically based. When direct military intervention is not enough and interests are strong, foreign powers sometimes send in their own troops. For example, the Syrian civil war attracted a wide range of external attention, including military aid to the rebels from a wide array of countries as well as direct Russian military intervention starting in 2015. Ethnic civil war are dangerous in part because they often grow to involve other countries in this way. Because of the danger that ethnic civil war may spread, international intervention is not always violent, it is often aimed at stopping the fighting or at resolving the underlying disputes. Some argue that the best way to stop an ethnic conflict is to arrange a compromise settlements while other argue that ethnic conflicts only end when one rebel minority is repressed by military force or granted its own separate state by partitioning the existing country. Hence, ethnic civil wars end only when one side wins: usually the government but occasionally the rebel ethnic group. Sometimes they may end with a power-sharing deal such as in the case of South Africa 1994 apartheid or the case of Northern Ireland. Sometimes power-sharing can also go wrong as in the case of the 1994 Rwanda genocide. International involvement is sometimes driven by selfish motives and even when they are trying to help, international actors’ good intentions do not guarantee that their efforts will improve the situation. TERRORISM The global war on terror was elevated in the early 2000s in the principal challenge to security. Three regimes were terminated, partly on claims of sponsoring terrorism (Afghanistan, Iraq and Libya), the US military budget rose to the level of the peak years of the Cold War and the term war on terror was for some years transformed into the long war against Islamo-fascism. This war was understood as the “Fourth World War”. There are three elements that together offer some degree of explanation for this concentration: the 9\11 attacks deeply shocked the US; the Bush Administration in mid-2001 was beginning to pursue itrs vision of a New American Century with some success; the inevitable focus of state-centered security. The end of the result of these factors is a situation that, in the absence of fundamental changes in policy, is likely to remain a major future of international security for some years to come. Yet, terrorism is still a minor issue in terms of global human security. According to Wardlaw, terrorism can be defined as “the use, threat of use, of violence by an individual or a group whether acting for or in opposition to established authority, when such actions is designed to create extreme anxiety and\or fear-inducing effects in a target group larger than the immediate victims with the purpose of coercing that group into acceding to the political demands of the perpetrators”. Conversely, the US government defined terrorism as “premeditated, politically motivated violence perpetrated against non-combatants targets by subnational groups or clandestine agents, usually intended to influence an audience”. Both definitions are concerned with the intention to influence an audience that is larger than the group targeted. Hence, terrorism works through fear: the element of inducing fear in a larger population than that targeted is a key aspect of terrorism and is one explanation why its attacks so much attention compared with the many other forms of violence as well as suffering due to natural disasters or poverty and underdevelopment. The main difference between the two definitions is that the US’s definition is concerned with sub-state actors while the other one embraces the actions of states against their own population (Stalin’s Soviet Union purges 1930s \ Mao’s China purges in the 1950s). State recently used a wide range of actions: from detention without trial to torture, execution and disappearances (Latin America 1960s-1970s). Sub-state terrorism can originate in very different societies and with highly variable motivations un underlying drivers. Terrorism can be loosely divided into 2 orientations: terrorism that seeks fundamental change in a state or society, such as revolutionary terrorism which can be based on a political ideology of a radical persuasion and it aims for fundamental change, such as the Brigate Rosse; terrorism that seeks particular change for an identifiable community, they may link with similar groups elsewhere and often arise in response to substantial political change that has damaged the prospects of the community from which they arise. There are 3 broad approaches to responding sub-states terrorism: - Traditional counterterrorism: rooted principally in policing, intelligence and security; - Direct military action against paramilitary organizations; - Focusing on the underlying motivations of terrorists’ groups and the environment from which they draw support; hence it recognizes that there are conditions in which negotiations with paramilitary leaders may become possible, often with the utilization of mediators acceptable by both parties; Most responses to terrorist campaigns utilize a combination of these methods, but the balance may vary widely. Indeed, between 1968 and 1972 there was a widespread activity by several radical Palestinian groups: Israeli security force sought to kill some of those responsible, Western states invested in security measures in air travel to avoid aircraft hijacking. The 9\11: The response to 9\11 atrocities was unusual in that it placed for greater emphasis on military action compared with other forms of counterterrorism. Al-Qa’ida movement had several aims: the eviction of Western “crudarer” military forces from Saudi Arabia, the replacement of the House of Saud and other Middle Eastern autocracies by more pure Islamist regimes, bitter anti-Zionism, support for radical Islamist groups in southern Thailand and Indonesia and the creation of what would be a true Islamist caliphate, initially in the Middle East e poi worldwide. It was notable for its “eschatological dimension” to their world view: timescales for action stretching over many decades if not a century or more. In general, the two aims for the 9\11 attacks were both to demonstrate the capacities of Al-Qa’ida but also to trap the US in a protractive guerrilla in Afghanistan. The US saw an apparent success in Afghanistan in early 2002 against the “axis of evil” which were Iraq, Iran and North Korea. (…) By 2009 the US and its coalition partners had achieved sufficient control in Iraq for the incoming Obama administration to announce a withdrawal of combat forces, the Al-Qa’ida movement which had dispersed principally to northwest Pakistan was much diminished and Osama bin Laden was killed in a US raid early in 2011. In 2011, NATO forces helped rebels terminate the Gaddafi regime in Libya but the result was a deeply insecure and failing state with a plethora of competing militias, including many with strong Islamist tendencies. Moreover, following the US withdrawal from Iraq, the previous Al-Qa’ida elements in the country reformed and linked with other groups in Syria to form the now known “Islamic State in Iraq and Syria (ISIS)”. The latter made astonishing progress in 2012 and 2013 and by mi-2014 could claim the creation of a “caliphate” centered o the Iraqi city of Raqqa, controlling a population of 6 million people. In August 2014, Obama’s decision was reversed to defeat ISIS by using air power. By early 2017 coalition assault against ISIS had killed 50,000 of its supporters. Nevertheless, ISIS lost much of its territory and appeared to be defeated but with the possibility of being reinforced by others. Movements such as Al-Qa’ida, ISIS and even the neo- Maoist Naxalite rebels in India might all be signs not so much of a future “clash of civilizations” as an “age of insurgencies” rooted in revolts from the margins. Trends in terrorism: - Terrorism and insurgency: The practice of employing regime termination as a major response to terrorism produced complex reaction that effectively mixes terrorism and insurgency. - Internationalism: to carry attacks elsewhere (used by both Al-Qa’ida and ISIS) - Suicide terrorism: usually combined with internationalism - Speed of learning: most paramilitary groups in the past have been relatively conservative in their operations, however the intensive environments in Afghanistan and Iraq forced paramilitary groups to learn fast to survive and thrive. Combined with internationalism to allow the far more rapid spread of tactics than in the past. - Media developments: have increased the ability of paramilitary groups to promote their causes - Economic targeting: still in early stages COUNTERTERRORISM One basic element of counterterrorism is to reduce the motivation for individuals to join terrorist groups or to focus on decisions by groups on whether to conduct terrorism and push for peaceful actions of protests. Elements of counterterrorism are: - Incident management: It includes anything done once terrorist incidents occur and the mitigation of its effects. The concept first arose in response to attacks in which hostages are sized and their lives are kept in jeopardy as the terrorists’ voice demands. Management includes communications or negotiations with the terrorists. Expertise has been developed over the years on how to best deal with hostage-takers. The principal objectives usually are to weaken the will of the terrorists while avoiding any move that could stimulate rash action and harm to the hostage. The outcome of such incidents depends heavily on the policy of the authorities involved towards making concessions under duress to terrorists. Some governments, such as Italy, have been willing to make concessions in the interests of securing safe release of hostages. Others, such as the US, are opposed to such concessions on grounds that they encourage further terrorism. Another aspect of managing is the communication with the public and the role of the press. An objective of terrorists in staging such incidents is to gain attention for their cause. Some counterterrorist officials consider it important to restrict the release of information on such incidents and to limit public attention to them, others believe that it is a limit to the freedom of press. A third aspect of managing is the possible use of force to rescue hostages. A successful rescue operation avoids the difficult choices of whether to make concessions to terrorists as well as constituting a dramatic blow against terrorism and immediate punishment of terrorists. - Curb the ability of terrorists to conduct attacks: These include defensive security measures designed to protect potential targets from attack and a variety of offensive measures to reduce terrorist capabilities. Defensive security measures are applied at several different levels. Most specific is the protection of individual sites, all the facilities that could become a target of terrorist attacks. The next level of defensive measures is security provided to entire systems. The system-level security that has played the greatest role in counterterrorism is that surrounding civil aviation. The protection given to commercial aviation today demonstrates two principles of systems-level security: a chink in the armor everywhere can provide an opening for attacks; security must be multilayered. The most general level of defensive security measures in the protection of an entire country. This includes not only a substantial increase in expenditures but also the creation of a Department of Homeland Security. The geographic and other circumstances of each country however make the homeland security task different for each. For most EU countries, free cross borders movement within the EU has made it more difficult for individual states to approach homeland security in the same way as the US for example. The consequence has been restrictive measures for immigration: on both side of the Atlantic, keeping terrorists out has been a major argument and the entire subject have remained controversial, partly in view of the commission of terrorist attacks by citizens and legal residents of those countries. Defensive security measures work in several ways. The first one is “direct foiling” of an attempted terrorist attack. However, they have some limitations: they are expensive; not everything can be protected and terrorists will always have the advantage of choosing where to attack; inherent openness of free, it will always be easy to find crowds in public places accessible to terrorists just as they are accessible to anyone else (Nice, 2016- London 2017). Offensive counterterrorist operations have the attraction of not surrounding the initiative to terrorists and not trying to guess where and how they will strike next. A successful security countermeasure saves from attack whatever target or potential target is being protected. This does not mean that they are an alternative to defensive counterterrorism but rather they are complementary parts of a comprehensive counterterrorist program. It involves the use of different tools: diplomacy, financial control, intelligence. Diplomacy is based on enlisting cooperation of other governments to countering terrorist operation that cross international boundaries. It can also help to drive and guide cooperation more generally between military, security and intelligence services. It provides important support to all the other counterterrorist tools. It can be either multilateral, most useful in creating a worldwide climate that recognizes terrorism as a shared problem and that is supportive of counterterrorist efforts; or bilateral which is most practical since usually terrorist case involve only two or three states at a time and the handling of secret material becomes more difficult the more states that are involved Financial control in the form of freezing or seizing of terrorist assets. However, it is limited because most of the money associated with terrorist flows through channels that are extremely hard to detect and intercepts and because most terrorism is cheap. Intelligence is hoped to uncover enough details of the next major terrorist plot to enable authorities to roll the plot up before it can be executed. Although, terrorists’ plots are of course hard to target for the intelligence, the latter performs other three functions that make larger contributions to counterterrorism. The first one is to provide a more strategic sense of terrorist threats; a second one is to provide detailed support to the other tools; and the third one is the collection and analysis of information on terrorist organizations and infrastructures, enabling them to be disrupted. The information is non-plot specific but regards names and biographic data of suspected terrorists, the location and strength of terrorist cells etc etc. The information they provide enables police or internal security services to conduct raids, arrest suspects and confiscate material. Law enforcement and military force: In general, some of the principal attractions of military force for the purpose of counterterrorism are stronger version of the attractions of using criminal justice system. A military strike can be an even more dramatic demonstration of resolve than a prosecution. It can immediately disrupt or destroy terrorist capabilities such as training camps and possible kill key terrorists. And it can do all this without the administrative, evidentiary and other legal complications that often impede criminal prosecutions. The principal limitation is that most international terrorism simply does not present vey many good military targets. Furthermore, collateral damage including the loss of innocent lives, is inevitable. Some also argue that the use of military force as excessive, making it at least as prone to controversy as any other counterterrorist instrument. The expansion of counterterrorist powers and functions, even when not involving military actions, frequently stars a public debate. The treatment of suspected terrorists has been one focus of controversy: it comes from concerns over HR and the principle that even the guilty should be treated humanely. Especially, torture became a prominent issue (enhanced interrogations’ techniques under Bush administration). Beyond torture is the issue of assassinating individual terrorist leaders, often referred to as “targeted killings”. Some argue that it should be treated as any other military operations others emphasize the possible collateral damage including the possible mistakes. Moreover, such assassination may constitute a stooping to the same level as terrorists, by using a procedure that is some contexts can be considered terrorism itself. Two values are also contested to have been limited In the fight for terrorism: liberty in the sense that denied access to public places may occur and privacy when government agencies collect information on individuals in the interest of identifying possible terrorists (USA). There is no single optimum formula for resolving these conflicts. Counterterrorism is not only objective in public policy nor it should be. It is up to each counties’ citizens to decide where they wish to strike a balance between safety from terrorism and other interests and values. COUNTERINSURGENCY: Counterinsurgency is response to an insurgent threat is an old strategy that has come and gone from the military limelight. In more recent times insurgencies against colonial rule were often met by counterinsurgency strategies such as in the case of French operations in Algeria and Vietnam. The most recent cycle of interest in counterinsurgency began with the United Nations’ authorization of intervention in Afghanistan after the 9\11 attacks against the US homeland, followed in 2013 by the US-led intervention in Iraq. Writings about counterinsurgency differ from most of the writings in the field of security because a much higher percentage of writers are both scholars and practitioners and therefore they have a deep understanding of military practice. However, they primarily write for military audience and tend to assume that what worked for their country will work for the others. Insurgency is a form of violent opposition to rule by a stronger force. Examples of insurgency are the American colonies in the 18th century faced by the British, the French resistance to the Nazi during WWII and the anti-colonial insurgencies of the 1950s and 1960s in Africa and Asia. According to David Kilcullen, which served in the counterinsurgency in East Timor, contemporary insurgencies are different as compared to “classical” ones in the understanding of counterinsurgency. Classical insurgencies were based on expelling foreign forces from their territories and establishing their own sovereign states. Indeed, in Latin America, Che Guevara both practiced and wrote about guerrilla warfare, the emphasis was on deposing local elites and replacing them with a socially just system of government. Thus, insurgents wanted to gain control of the state, prove they were fit to rule by providing an alternative governance structure to that of the colonists\oligarchs. Therefore, in classical insurgencies the insurgents were the revolutionaries wanting change. Conversely, today insurgents are often protecting the status quo from the changes brought by outside invaders, for example in Afghanistan, Iraq, Pakistan. According to Kilcullen, contemporary insurgencies do not seek to take over and establish their own states. Rather, insurgency today follows state failure, and is not directed at raking over functioning body politic but at dismembering or scavenging its carcass, or contesting an ungoverned space. Moreover, some religiously motivated insurgencies may not have a political aim; the very act of insurgency may be earning God’s favor (ISIS). The tactics employed by insurgents are necessitated by their military weaknesses: they could not confront the opposing power directly, hence attacked vulnerable points and the retreated among the local population. These insurgents’ tactics were hard to counter. Attempt of mass punishment of populations in response to insurgencies had the counterproductive effect of alienating the local population from the authority trying to maintain its power and legitimacy. How to best deal with these insurgent tactics? In the classical model, the insurgents live off the population so a key aim of counterinsurgency is to isolate the insurgents from these sources of support. If in the past it was relatively simple, today this would need to encompass economic sanctions. Insurgents sometimes provide resources to the local population in exchange for services such as planting roadside bombs and providing intelligence. Nevertheless, the local population remains an important source of camouflage. The classical counterinsurgency was primarily rural affairs but today the insurgencies of Iraq and Afghanistan are also fought in urban areas. Classical insurgencies were usually confined to one state or region and involved on insurgent group and one government. By contrast, In Iraq the array of forces was complex and the relationship of local groups to one another was fluid and shifting. Indeed, a feature of Iraq was that local groups were just fighting against the external occupiers but also fighting among themselves. The positive side is that there were opportunities for counterinsurgents to ally with local forces. Today, is no longer a traditional military handling all aspects of the counterinsurgency mission. Actors involved are several: civilian government agencies, private security companies, aid agencies, non-governmental organizations, the media. The success of counterinsurgency involves winning “the hearts and minds” of the local population. It has come to be thought as achieving local popularity, rather than winning legitimacy, which should be the aim. However, many counterinsurgencies lose valuable psychological ground by initially focusing on the use of force and failing to listen and respond to the local population. Many insurgent groups triumphed because counterinsurgents lack the will to carry on, having lost the “hearts and minds” of their home constituents. According to Robert Thompson there are 5 principles of counterinsurgency: the government must have a clear political aim; it must function in accordance with the law; it must have an overall plan; it must give priority to defeating the political subversion, not the guerrilla; in the guerrilla phase of insurgency, the government must secure its base areas first. In terms of tactics, an important part of counterinsurgency is not using force. According to David Galula, 80% must be political and 20% must be military. Given the centrality of “the hearts and minds” a counterinsurgency campaign should involve politics, economics, psychology and if necessary military force. Clearly, in situations in which authorities are trying to win the support of the local population, the heavy-handed use of military power is likely to be counterproductive. According to Kilcullen, the nature of counterinsurgency is not fixed but shifting. Hence, it evolves in response to changes in insurgency. Given the centrality of “hearts and minds” of the local and the home populations, the media is an essential sinew of a counterinsurgency campaign. The former, has become a vital arena of competition between insurgents and counterinsurgents. Much contemporary counterinsurgency practice is about spin control: attempting to influence how events are reported, both locally and at home. The increasing democratization of the media led to the creation of a theatre for anyone: this can be macabre as for the case of ISIS video, they recognized the power of the media and attempted to ban all mobile phones from the caliphate; it can also work in the opposite way, indeed brave citizens created the podcast “Life inside Islamic State”. There are a number of comparisons to draw between counterinsurgency operations and peacekeeping operations, they share similar strategies and tactics: in both situations, the ideal ratio between force and non-violent activities is the same (20%-80%); both operations are aimed at standing up an supporting weak governments; in both counterinsurgency and peacebuilding operations there is a lot of knowledge at the tactical\operational level, but less at the strategic level, leading to a tendency to apply standard models with very mixed results; in both peacebuilding and counterinsurgency operations there are similar mixes of actors involved: NGOs, international organizations, private firms, military and civilian authorities etc… etc.. this leads to parallel problems of coordination and the difficulty of ensuring that all actors are pursuing the same agenda; finally, the disarmament, demobilization and reintegration campaigns that are important parts of peacekeeping operations face the same problem as counterinsurgency: how to drain away the uncommitted supporters from the fanatics who will not be swayed by alternative and economic opportunities. INTELLIGENCE: Recent debates over intelligence have taken two forms: what we might call an old-fashioned “value for money” argument about intelligence failures, meaning that most observers agree that the current benefits do not appear to be commensurate with the scale of spending; and a second debate characterized by moral outrage. Intelligence is not an end in itself. It is an essential aid to policymaking and military planning and should ideally provide timely warning of events which we would wish to anticipate and the intelligence background for policy decisions. Mark Lowenthal argues that intelligence is used in 3 different ways: it is defined as a process through which intelligence is requested by policymakers or operational commanders, then collected, analyzed and fed to the consumers- intelligence cycle; it’s a product distributed through multilevel secure electronic databases; it is an institution. Conversely, Michael Herman defines intelligence as a form of power and especially a crucial part of “hyperpowerness”, allowing them to project military force on a global basis. Regional and international organizations have also embraced intelligence. The EU has its own satellite and sees intelligence as an essential component of its external policy. Why do surprise attacks succeed so often, despite the existence of elaborate intelligence communities? Richard Betts argues that weak collection or raw data was rarely the cause of failure. Instead, the main culprits fell into 3 categories: bureaucratic dysfunction; psychological perception issues; excessive political interference by policymakers. Arguments over the sources of strategic intelligence failure have been intensified after the 9\11 attack and the Iraqi WMD program. Governments now expect more of intelligence, since they spend breathtaking amounts of money in this area. Intelligence agencies have frequently advanced the claim that the transparency and the ability of intelligence help removes uncertainty and improves stability. While the intelligence activity of each country is conducted in a competitive environment, the collective results that accrues can operate as a public good or an international good. Intelligence has made a major contribution to stability by providing verification for arms control. The importance of intelligence agencies for international security becomes greater once all its activity is taken under consideration: they not only report on world affairs but also seek to intervene covertly to shape events, this mode of activity is called “covert action”. It can take many forms from noisy paramilitary activity to the discrete covert funding of political parties or propaganda. Covert action allows premiers to undertake foreign policies that are unaccountable, undemocratic and often questionable. Unsurprisingly, this issue connects with democratic peace theory, which suggests that democracy has a dual effect: restraining effect and non-violent norms. The global revolution in information and communications technologies has ushered in an era of surveillance capitalism in which Tesco, Amazon and Google may hold more data on us the tour governments. This has increased the importance of the private actor in the security world and data from the most mundane sources is now capable of producing remarkable intelligence. Oddly, this sort of intelligence looks less like spying and more like ambitious behavioral social science. TRANSNATIONAL ORGANIZED CRIME (TOCs) Organized crime is one of the oldest professions. After the end of the Cold War it emerged as a news security threat. The emergence of organized crime as a growing threat to security was acknowledged by the United Nations in 1994. Threats at the individual level to “citizens” or “public” security are most obvious in Latin America or Mexico. Organized crime is particularly common where the state suffers from capacity gaps and an inability to fulfil normal state functions. Weak or fragile states are ideal environments to the TOCs because they offer high levels of impunity and opportunities for the corruption of and even collusion with state authorities. TOCs can also be understood as a threat to regional stability and global norms. However, because this threat differs from traditional geopolitical threats, it has caught states remarkably unprepared. Indeed, challenges that arise from “sovereignty-free” actors cannot easily be dealt with through the normal instruments of power and influence. TOCs are particularly malevolent type of sovereignty-free actor as they undermine national sovereignty, the integrity of financial and commercial institutions, the property of public institutions and the fabric of societies. While they pose many challenges, have real victims and cause great social and economic harm, they are not considered pure evil: they flourish among populations that are impoverished, alienated and marginalized. Consequently, some observers have highlighted the “social contradictions” of organized crime, noting that it can bring benefits too, especially to the people for which it acts as a safety net, bring employment to marginalized and alienated people and provide economic benefits. In many countries, TOC is emerging as an alternative form of governance, offering protection, paternalism and service provision to populations that are socially, politically and economically excluded. TOCs are usually pragmatic not ideological, they attempt to influence politics only to protect their illegal activities and generally use violence in ruthless but more discriminate ways than do terrorists. TOCs refers to criminal organizations or activities that cross national borders and therefore involve the territories and laws of at least two states: borders can be crossed by the perpetrators, the products or the proceeds. Globalization has contributed to the rise of organized crime in several ways: it has been empowering for organized crime as for legitimate business, encouraging it to go transnational; it has also provided plenty of recruits; Moreover, also states contributes to the rise of TOCs in three ways: - States that are weak, autocratic or authoritarian provide fertile breeding grounds. Indeed, they are characterized by low level of state legitimacy, weak border controls, poorly articulated and\or ineffective norms and rules, the subordination of the collective interests to individual interests, lack of provision for the citizenry, absence of legal regulation and protection for business. TOCs develop in response to a combination of opportunities, fed by weak states - The state is important to organized crime not for what it fails to do but for what it does. State enacts laws, outlaw or regulate certain products, impose taxation and tariffs etcetc… thereby, providing opportunities for organized crime. The continues authority of the state incentives organized crime to circumvent laws and regulations. - States contribute to TOC and smuggling simply because of the differences among them. Nikos Passas calls these differences “criminogenic asymmetries” which can be legal, administrative, economic or financial in character. For instance, States that have high levels of bank secrecy are a natural attraction for money launderers seeking to hide criminal proceeds. Ironically, even if states have strong border control and effective law enforcement system, organized crime will still seek access to markets accepting the high risk because the higher the risk the higher the profit. TOC in the first two decades of the 21st century is diverse in terms of their location and reach, organizational structures, portfolios of activities, bonding mechanisms, degrees of power and influence, use of corruption and violence and balance between cooperation and conflict in their relationships with one another. In some cases, criminal organizations are centered on family, ethnic networks, while others are cosmopolitan. Some operate through top-down hierarchical structures, others can best be understood as horizontal structures, or they can be hybrid. Just as organizational structures vary, so do portfolios of criminal activities, with some groups specializing and others involved in a variety of different crimes. The other area where criminal organizations differ is in terms of conflict and cooperation. TOC operate in a competitive environment where they cannot use the legal system for redress, where the potential for violence is ever-present, and competition to establish either monopolies or market dominance is endemic. In general, though, criminal organizations work with one another (still, they usually have fragile relationships). The UN states that these activities are based on the organizing principle of the invisible hand of the market, not the master designs of criminal organizations. Looking at the world through this broader definition, it is often the groups that come and go, while the market remains constant. The most important illicit goods are drugs: according to the 2016 UN World Drug Report, about a quarter of a billion people use illicit drugs. The largest of the markets is cannabis (183 million people worldwide); the second market in terms of prevalence of use is amphetamine-type stimulants, which are synthetic and do not depend on cultivation; the third market, and the one that is most violent, is cocaine, which is supplied by Colombia, Peru and Bolivia and has large markets in both US and Europe. One of the characteristics of drug markets is that they are typically populated by both large and small criminal organizations. Large organizations receive most attention, but the markets also allows smaller players. This is also true for illicit markets such as those of human trafficking and smuggling. The migration crisis of 2015 in Europe was facilitated by the emergence of multiple criminal organizations that ranged from small, informal travel agents and transportation companies to large criminal networks. According to Wainwright, head of Europol, as many as 30,000 people could be involved. Illegal arms trafficking represents another major illicit market. The large-scale market that fueled wars in Africa was organized largely by key brokers and transporters suck as Viktor Bout and Leonid Minin, both of whom have since been arrested. To the extent that the organizations are successful and the illicit markets are lucrative, It is necessary to launder criminal proceeds. The essence is to hide criminal source of wealth and to make the proceeds appear legitimate. This is often due through several stages: usually termed placement, layering and integration. Assessing a response to TOCs is very hard. Gaps in knowledge, lack of baseline and difficulty in identifying trends make it difficult to know how well the criminals are doing and even more difficult to determine how governments are doing in response. The problem for governments is that organized crime operates in the borderless world, whereas law enforcement agencies still operate under the constraints of sovereignty. After September 2001, US failed to pay attention to TOC expect where they were believed to be working with terrorists. In July 2011 the US issued a new strategy to combat TOC. Even though it is a large step beyond anything done before, and it is a well-coordinated strategy, yet gaps remain. For instance, little attention is given to the need to attack both organizations and markets. A lot depends on the US ability to mobilize support among other countries and create an effective multilateral response to TOC. The difficulty is that the US will not provide the necessary global leadership. Trump’s wall between the US and Mexico to keep out illegal immigrants and drugs is a simplistic response to a complex problem set. Indeed, the new nationalism and anti-globalism in the US and Europe might lead to renewal emphasis on border control, but it could also undermine the multilateralism essential to dealing with transnational challenge. In many parts of the world, organized crime represents fundamental failures of governance and limited opportunities in the licit economy. In the next few decades, rapid uncontrolled urbanization, severe and unpredictable changes in climate will accentuate these failures and construct lucrative opportunities for organized crime. The organized crimes will become central to societies and economies, providing not only illicit good but also licit ones, especially those needed. In these circumstances, in some countries at least, it will go from an alternative from of governance to the preferred form of governance. INTERNATIONAL ARMS TRADE The international arms trade is intimately linked to issues of peace and security, justice and injustice and development and underdevelopment. Arms sales can fuel regional and local conflicts or help create balances of power. They provide repressive regimes with the tools they need to suppress democratic movements and commit human rights abuses. They can be used to facilitate terrorist acts or support oppressed populations in fighting off genocide and ethnic cleansing. The global arms trade is composed of three different elements: the trade in major systems such as combat aircraft, tanks and warships; the trade in small arms and light weapons; the trade in “dualuse” items with both civilian and military applications, including everything from shotguns and unarmed helicopters to equipment that can be used to manufacture nuclear, chemical and biological weapons. - Major arms manufacturing states such as the US, Russia, UK, France and China generally control between two-thirds and three-quarters of all global weapons sales in a given year. The US alone accounted for 45% of arms transfer agreement worldwide in the period from 2008 to 2015. There are clear economic incentives for pursuing these deals. Sales of major combat systems not only generate revenues and profits for military firms; they also contribute to the balance of trade and provide jobs in key regions and localities of the exporting state. While economics is one drive of the trade in major conventional weapons, politics and security often have an even more important role to play. - The second major channel of arms transfers is the supply of dual-use items. In the 1980s, the sale to Iraq of equipment and materials useful in the development of everything from medium-range Scud missiles to nuclear, chemical and biological weapons was a classic case of the “boomerang effect”; since dual-use transfers generally include arms-making technology rather than finished weapons systems, they are generally harder to track, even when exporting states put their minds to the job. - The third channel of arms flows is the trade in small arms and light weapons(SALW) . The vast majority of combat deaths in the world’s armed conflicts are inflicted with these systems, which are loosely regulated and were largely ignored as a proliferation problem until the late 1990s. SALW are easy to maintain and transport, cheap to purchase and hard to track. They are the weapons of choice of terrorists, separatists’ movements, militias, warlords and other non-state groups that are central players in the wars of the post-Cold War period. Arms sales take off – the 1970s and the 1980s Arms sales and military aid have been tools of warfare in diplomacy from the outset of Cold War. The increase in arms sales was drive by two major factors: the geopolitical side and the rise in oil prices fostered by the formation of Organization of the Petroleum Exporting Countries. The first factor was based on the Nixon Doctrine: Washington would arm regional allies to protect its security interests rather than sending US troops to confront those threats directly, in some cases involving transfers of weapons or training packages and the knowledge of technology. The Jimmy Carter administration tried to change later the dynamics of the global trade by promoting a policy of arms sales restraint. The Carter initiative built on the actions of the post-Vietnam, post-Watergate Congress which passed the Arms Export Control Act in 1976 in response to runaway US arms sales. The administration offered arms packages to a wide range of states in the Persian Gulf and the Horn of Africa in exchange for access to military facilities that could be used by the newly forming Rapid Deployment Force, designed to ensure that there would be “not more Irans” and “no more Afghanistans” in the Persian Gulf Region. In short, Carter was seduced by the short-term believes of arms transfers in securing political and military support, and allowed them to trump concerns about human rights, democracy and the fueling of regional conflicts. Ronald Reagan was a major promoter of arms sales from the outset of his administration. The most important aspect of the Reagan arms sales policy was his support for covert arms sales to movements in Afghanistan, Angola, Cambodia and Nicaragua, all of whom he described as “freedom fighters” regardless of their actual ideologies and practices. Post- Cold War dynamics: With the end of the Cold War, economic motives moved to the forefront in the Clinton administration’s arms sales policy which explicitly cited the importance of weapons exports in supporting the US defense industrial base. Bill Clinton showed a support for major arms deals as a way of currying favor in key states. While the Bush administration went through the motions of presenting strategic rationales for each of these deals, the real motives were made clear when candidate Bush announced the deals at major rallies in front of cheering workers in St. Louis. It came up the US and its allies were the major suppliers in the Iraqi war. (questa parte è scritta malissimo secondo me, semmai vedetevela su internet) Post-9\11 arms exports: The September 11,2001 terror attacks created yet another shift in arms sales policy. In the name of fighting the “global war on terrorism” the Bush administration lifted human rights and nonproliferation restrictions on sales to countries such as Pakistan and Yemen and increased military aid to Georgia, Philippines and other states viewed as potential allies in fighting terrorist networks. The number of states receiving US military aid doubled from 2001 through 2005 and nearly threequarters of US arms recipients were either undemocratic regimes or major human rights abusers. The Obama years were then marked by a boom in global arms exports, with the US firms leading the way. Most of the sales were in Middle East, especially in Saudi Arabia. Moreover, an important development that began after 9\11 and accelerated during the Bush and Obama years was the creation of dozens of new arms and training programs at the Pentagon. The trade in small arms and light weapons: The SALW is a major focus analysis and activity related to the global arms trade due to its centrality in enabling current conflicts and its potential and actual role in arming terrorist groups. The Small Arms Survey estimates that there are 875 million small arms in the world, and the 75% of them are owned by the civilians. In addition to guns in civilian’s hands, about 25% are controlled by traditional military forces. Some of these weapons also end up in the hands of terrorists or insurgents through capture, theft or corruption. Another major source of SALW are black markets. Which operates in large scale, taking advantage of state-of-the-art communication, transportation, banking and brokering services. The A.Q Khan Network: https://www.youtube.com/watch?v=2SKxLtH2lJE MIGRATION AND REFUGEEES: Migration has always played a crucial role in shaping our world. Recently, it has gained prominence on the international agenda because of its increasing scale and the consequences such movements have for international affairs, including the security concerns of the state. The International population movement can be attributed to several factors: the universal nature of state control that makes any international movement a matter of concern to at least two and sometimes more states; the world’s population is still growing; globalization has brought about a revolution in communications and transportation that has made people aware of vastly differing conditions and opportunities in other parts of the world, as well as making travel to those areas easier; the world is a turbulent and unstable place, and turmoil and uncertainty can encourage people to move, escape and search for a better life. Displacement triggering migration constitutes a threat to the human security of those people and populations affected. Migration can be economically beneficial to both sending and receiving countries and for the migrant. Sending countries can benefit hugely from remittances that migrants send home and from the easing of pressure on employment, housing and other social facilities. The receiving county benefits from availability of labor at reasonable cost, increasing national productivity and economic growth. Migrants can also contribute to building bridges between communities at home and strengthening ties with their countries of origin abroad. Since the end of the Cold War and the 9\11 attacks on the US, the study of migration has become firmly embedded in international relations. The 9\11 attacks dramatically reaffirmed the role that international migration can play in international relations generally, and in security issues in particular. In short, migration can pose a threat to people and governments on both sending and receiving states and to relations between these two countries. It can turn civil wars into international conflicts and it can cause the spread internationally of ethnic conflict and civil unrest. Migration can also play a role in facilitating terrorism. Population movements can become a cause of economic hardship and the increase in competition for scarce resources of various kinds from jobs to social housing, and can even weaken existing power structures and institutions within countries as well as threatening cultural identities and social cohesion. All international migrations can be divided into two categories: involuntary\forced and voluntary\free. The first one refers essentially to refugee flows while the second one can be further subdivided into 3 main categories: legal permanent, legal temporary and voluntary migration. Legal permanent settler migration is the one that populated US or created Asia and Afro-Caribbean minorities in Britain. Legal temporary migration includes the most of voluntary migrations: movement of people for education, business, tourism and employment. The last one is the illegal or irregular migration of people from one country to another, which may be temporary or permanent. One aspect of the exercise of sovereignty has always been a state’s inviolable right to control who will enter and exit its territory, usually through border controls. Regarding free or voluntary migration, states have authority to decide which individuals to accept as entrants or immigrants. Conversely, when it comes to refugees or involuntary migrations there are some limited constraints on a state’s authority in the form of obligations imposed on them by the 1951 Convention on the Status of Refugees. The latter obliges states to extend asylum and protection to those facing prosecution on grounds of religion, race, nationality or political opinion. In practice the convention commits states to ensure that no asylum is sent back to any country where they are likely to face danger to life or liberty without their application for refugee status being given due considerations. According to Art 14 of the Universal Declaration of Human Rights everyone has the rights to seek and enjoy asylum from persecution in other countries. However, none of these agreements guarantees the right to refugee status, only the one to seek it. This is because in practice there is total acceptance in international society of the right of every sovereign state to decide for itself who should be allowed entry to its territory. Nevertheless, these institutions form an important part of the international consensus on the treatment of refugees and they lay down an important universal principle that most states have come to endorse, namely that people with a well-founded fear of persecution have a right to exit from their own country, cannot be returned to their country of origin and have international status. Sometimes different streams of migration can mix and merge over time. One result of this kind of convergence of different types of migrations is that receiving state governments and more significantly their people are increasingly like to treat all immigrants alike once they are in the territory of the receiving state. The one inevitable long-term consequence of international population movement is the creation of ethnic minority communities in the receiving countries. Once migrations take place, it invariably results in at least some immigrants becoming citizens of the host country and creating a cultural, linguistic, religious and possibly a racially distinct minority within the state. The existing of these communities has a substantial impact on security as well as on the relationships of host states with the countries from where these communities originate. Large-scale international refugee migration usually raises serious security concerns. Since by their nature they are the results of conflict, social and political upheaval and turmoil, they sometimes carry the instability with them to the host country. In such circumstances, refugees are both a consequence of some sort of conflict, violence or repression as well as themselves becoming the cause of conflict between their country of origin and the host country. When a government comes unwilling to be host to a large refugee population, it is likely to take steps to ensure that the stay of the refugees is temporary and, in this case, there is potential for conflict between sending and receiving countries. Often the receiving state get involved in the conflict in the sending state, threatening to arm or arming the refugees and sometimes deploying their own armed forces. For instance, in the case of the British Muslim youth and Mohammed, Hamza, who converted Finsbury Park Mosque into a heaven for Islamists and a recruitment center for Al-Qa’ida of Quatada, stipiritual leader in Europe, they and their associates must be responsible for the radicalization that ultimately resulted in four young British Muslim men blowing themselves up to London’s transport network on 7 July 2005. The relationship between migration and terrorism is complex: a major fear is that among the thousands of Syrians, Iraqi and Afghan refugees arriving on European shores were members of the so called Islamic state group, coming with the express purpose of carrying out terrorist attacks on soft civilian targets in the open societies in Europe. Migrant communities tenst to maintain a strong connection with their home countries, and turbulence or instability in those societies can find expression within the migrant community. When this happens, these communities will become involved in a range of political activities targeted at their home country. They will use all means at their disposal to influence events at home. They take advantage of being outside their country to take those action that people living in their country cannot, because of fear or prosecution. They are critical or their home government actions, and becomes the voice of suppressed opposition, they try to draw attention to the problem or raise funds. Home country governments respond to all this offshore activity by putting pressure o the host state government to restrict them and not allow minorities voices to come up. But if the migrant communities are activing within the laws of the host state, there may be little the host government can easily and legally do to restrict their activities. The consequence is deterioration in the relationship between the host and the home states. The success of migrants to recruit their host governments and populations to their cause in their home country depend to a large extend on the nature of the political system in the host country. The more open the system and the more susceptible to lobbying it is, the more likely it is that minority communities will succeed in getting their concerns on the agenda. Migrant communities can also be used by their home countries to pursue its aims vis-à-vis the host country government. Admitting migrants has long-term effects on receiving states: it can turn homogenous societies into multicultural ones. Migrants raise also social concerns because they potentially threaten to undermine the popularity and strength of the nation state. As citizens of one state, moving to live and work in another, migrants clearly challenge notions of nationalism, citizenship and the rights and duties of citizens towards their state and vice versa. As discussed, migrants or minority communities can be seen as bringing violence and instability to peaceful host societies, but they can also become a threat to social cohesion and stability if they are perceived as an economic burden. Sometimes they are perceived to be criminals and carriers of infectious diseases. Many European countries have seen a resurgence of the extreme right in politics because of this public unease about immigration and asylum. EU states have tried to harmonize their refugee and immigration policies. The 1990 Dublin Convention provided an asylum seeker who has his application denied in a EU country as a rejection by all EU states. In the last few years, much of the EU’s energies have often been concentrated on trying to make agreements with states on the shores of the Mediterranean to get them to stop inflows into Europe and with establishing systems of policing and patrolling of the Mediterranean. In general, migrants are perceived with hostility if they are perceived as a threat to the culture and way of life of the people in the receiving country. This tends to happen when large numbers arrive in a short period of time or when migrants are seen as holding themselves apart and being reluctant to make any efforts to integrate into the host country’s way of life. Large long-term refugee populations can bring about significant changes in the social cohesion and stability of the host country. Further, migrants can affect political and social conditions and even in rare instances fundamentally alter the nature of society in receiving countries, many years after the actual movement of people has ceased. The extent and nature of integration of a migrant community and the impact this has on “societal security” has recently come under the microscope, particularly in European countries including Britain, France and Denmark. The substantial long-established Muslim community in these European countries in light of the concern with Islamist terrorism, is seen as a threat (France- head scarves in state institutions\ full face veil). ENERGY SECURITY The world’s three most important current sources of energy are oil, coal and natural gas, which are all finite sources. Many analysts worry that insufficient energy will be available at critical moments in the future to satisfy vital national needs. Hence, energy security constitutes the “reliable and affordable supply of energy on a continuing, uninterrupted basis”. In practice, it is understood to encompass the dual functions of ensuring the procurement of sufficient supplies of energy to meet a society’s fundamental needs as well as ensuring their unhindered delivery from point of production to ultimate consumer. Energy security is also understood as related to the dilemma of states that are higly dependent on suppliers for their energy requirements but are in a weak position with respect to theme and so vulnerable to political pressure or blackmail. An example of this dilemma is Soviet republics that rely on Russia. For this reason, the EU has adopted an energy security scheme aimed at reducing that dependency, largely by promoting increased gas imports from non-Russian sources. As concerned over climate change has increased, many policymakers have sought to ensure that their countries will possess sufficient energy to meet future requirements while at the same time reducing emissions of the greenhouse gases responsible for global warming. Other analyst suggest that the concept of energy security has yet another meaning for petroleum-rich nations that rely on oil exports for their economic well-being. For these countries, such as Algeria, Libya, Nigeria, Saudi Arabia and Venezuela, energy security entails access to a stable international marketplace. When global demand is insufficient to soak up the available supplies, their economy suffers and social unrest may occur. In most countries, the task of producing and delivering energy to industry and individual consumers I performed by private companies, which do so in the pursuit of profit. But because acquisition and delivery of adequate supplies of energy are considered so essential to the economic health of industrial societies, governments also play a significant role in key aspects of the energy procurement process (through activities of state-owned or state-controlled companies). The intervention of institutions is usually justified in terms of “energy security”, therefore ensuring that appropriate incentives and policy instruments are in place to impel private firms to meet the nation’s requirements. In its final report, National Energy Policy, concluded that the United States was becoming excessively dependent on unreliable foreign suppliers for its energy needs, thereby exposing the country to the threat of recurring supply interruptions; In response it called for increased emphasis on the development of domestic sources of supply, including oil derived from protected wilderness areas, such as the Arctic National Wildlife Refuge in Alaska. In 2008, the government created the National Energy Administration to act as the key energy regulator: together with the NDRC it is charged with approving new energy projects in China, setting domestic wholesale energy prices and implementing the central government’s energy policies. For the US and China, as for other industrialized countries that rely on imported supply of energy, energy security thus entails as conspicuous foreign policy dimension, in that principal objective of its overseas diplomacy is to establish and sustain friendly ties with key providers of oil, gas and other fuels, thereby facilitating the procurement of these fuels by companies linked to the home country. In many cases, energy has acquired a military dimension , because the senior officials have the need to protect overseas energy supply routes and help defend key foreign suppliers against rebel forces and hostile states that might seek to sabotage oil deliveries or impose less favourable terms over its supply. The military dimension of energy security was first accorded high level attention in Washington in late 1979, when Islamic insurgents overthrew the US-backed Shah of Iran and Soviet forces intervened in Afghanistan, in both instances threatening the safety of oil deliveries from the Persian Gulf to the United States and its allies. Indeed, for many, ensuring the safety of the global oil flow remains security priority. The major energy consumers will continue to rely on a combination of domestic and imported supplies to satisfy their growing needs in the years to come. Some of them, are endowed with substantial domestic sources of energy and so can minimize their reliance on imports, but most will rely to a considerable extent on foreign sources of supply. This is the case of older industrial powers but will increasingly prove a challenge for new industrializing countries such as China and India. Climate change will also complicate the delivery of energy, in that many of these supply networks are highly vulnerable to hurricanes, typhoons and other extreme weather events. As the worldwide demand for energy expand and reliance on these far-flung networks grows along with it, energy security will inevitably entail increase emphasis on the protection of global delivery systems. Also complicating the task of procuring sufficient energy to meet future needs is the commitment most states have made to reduce their greenhouse gas emissions in accordance with the Paris Climate Agreement of 2015. For now, the promotion of “energy security” will largely entail efforts to reduce dependence on imported supplies and to expand domestic sources of supply. However, as global awareness of the detrimental effects of climate change spreads, policymakers will come under increasing pressure to limit the consumption of fossil fuels and to increase reliance on climate-friendly alternatives. WOMEN, PEACE AND SECURITY Feminist scholars have identified that the arena of international relations, politics and security are highly gendered activities. Using gender as a lens, feminist scholars and activities have explored the meaning and power attributed to masculinities and femminities within international relations, and in respect to women’s lives and rights have identified how those meaning determine where women are and what they think about being there. Since 2000, the UN Security Council has adopted a series of resolutions focused on “women, peace and security” (WPS). The WPS agenda aimed to garner acknowledgement of these realities and to generate understanding and prompt responses to the gendered ways that women and men experience insecurity, war and its aftermath. Our societies attribute specific traits, values and meanings to male and female identities, constructing social differences based on stereotyped ideas of masculinity and femininity. These ideals are assumed to be the natural behaviors expected of men and women, refined by their intersection with other identity makers such as race, ethnicity, age and class. Gender does not determine our lives on an individual basis, but it is a way of categorizing, ordering and symbolizing power, of hierarchically structuring relationships between different categories of people, and different human activities symbolically associated with masculinity and femininity. Hence, it shapes individuals as well as social, political and economic systems which in turn shape identities and institutions. Gender will determine our access to privilege and power, and condition experiences of disadvantage and discrimination. The WPS agenda establishes policy responses that aim to redress the ways that the power and privilege attached to masculinity has historically excluded women’s experiences of war and their participation in policy processes. The WPS agenda evidences the need for gendered understanding and response to all aspects of security and peace. For women, these include responses to the rights violations that affect them during conflict, such as sexual violence; to the barriers that prevent women’s participation in post-war elections; and to the ways that post-war economic opportunities need to be tailored to both men and women’s shared. Through the lens of gender and gendered power relations, WPS agenda responds to the historical exclusions and invisibility of women and their interests within international peace and security policies and processes to date. Several successive and interlinked developments, prompting the Security Council’s openness to women’s concerns and interests, were crucial to the eventual adoption of the WPS agenda. First, changes to international relations in the post-Cold War era freed some of the paralysis the Security Council had experienced during that period. Secondly, a growing recognition of the violations of women’s rights in the armed conflicts of the mid-1990s, particularly in the former Yugoslavia and Rwanda. Thirdly, a third arena of development, the adoption of the human security agenda in the UN system. Fourthly, the Security Council was experiencing a rapid expansion in its adoption of resolutions. Fifthly, from 1999 the Security Council began holding thematic “open debates”, which include the broader membership of the UN system and are now a regular feature of the council’s work as well as “Arria Formula” meeting, which are informal, confidential meeting between the Security Council and an invited constituency, primarily used as a vehicle to hear from civil society. The provisions of the eight resolutions that make up the WPS agenda may be summarily framed as addressing four critical areas: - Prevention: ensuring that women are involved in conflict prevention and resolution process, and that women’s micro and macro-level prevention and mediation work is recognized; - Participation: ensuring the full participation of women in decision-making processes that impact them, their family and their communities, including peace processes and broader political, social and economic realms; - Protections: ensuring that women and girls’ human rights are protected in times of conflict and peacebuilding with specific attention to protection from gendered violence; - Relief and recovery: ensuring that women and girls’ rights and needs are addressed within humanitarian operations, transition, reconstruction and peacebuilding activities. The WPS resolutions generally recognize the “continuing need to increase women’s participation and the consideration of gender-related issues in all discussions pertinent to the prevention and resolution of armed conflict. Women’s participation on the basis of their right to participate and be heard remains a challenge as women are only “allowed in” if it is seen as advantageous to the existing order. Women’s rights are therefore in their essence compromised for the sake of gaining entry to security institutions; with the popularity of the WPS agenda, many are skeptical that “adding women” to the security system may serve to legitimize those institutions, rather than transform the ways that they do business; the original intent of engagement with the Security Council for women’s organizations, which was an end to militarism, is compromised when the argument for gendered approaches is instrumentalized and used to further approaches to security based on militarism; there is the very real risk of harm to women and girls when their work to promote gender equality through peace and security-related initiatives as perceived as being co-opted by state security actors and thereby seen to advance the approaches of the state. Since its adoption, the WPS agenda has been characterized by glacial progress on implementation of the provisions it sets out. For example, of 10 billion dollars invested in fragile states, only 2% was spend on promoting gender equality as a specific objective of that work. The reasons behind these gaps are complex: it may be argued that they stem from the resolutions themselves. Indeed, the WPS resolutions are characterized by relatively weak compliancepromoting language where the Security Council “recommend” and “requests” rather than compels actions. The WPS resolutions are considered to be “soft-law” as they are not adopted under the Security Council’s Chapter VII enforcement provisions. To address the implementation deficit, multiple accountability strategies have been proposed. Among these measures are the requests by the Security Council for annual reports from the UN Secretary General; the adoption of a Comprehensive Set of Indicators” that measure compliance to the resolutions by the UN agencies and member states and are reported against in the SecretaryGeneral’s reports; and the adoption of a seven-point action plan on women’s participation in peacebuilding, which attempts to enforce compliance of the UN system with the WPS agenda. The range of harms that women may experience in armed conflict are usually associated with sexual violence. The latter is evidenced to occur on a systematic and strategic basis. Wartime rape is used as a “weapon of war” by some armed groups in some conflicts, primarily because of the gendered meanings attached to sexual violence. It occurs in a range of different forms and ways and by different actors. The Security Council engagement with sexual violence through the adoption of four WPS resolutions ENVIRONMENTAL CHANGE: The period before the Anthropocene was called Holocene and it was a stable period that facilitate it the flourishing of humanity. However, the latter is coming to an end and we are accelerating towards global warming. In order to arrest this, we need a “safe operating space for humanity”. Climate change is the first reason for this change along with the extermination of many species, the destruction of many biodiverse systems, the reduction of clean water, the rapid change in land use and the appropriation of fresh water for human use. The planet should be maintained as it was during the period of the Holocene in order for it to flourish. Therefore, maintaining this condition is a priority for the global environmental society. Since the middle of the 21st century, climate change has been an issue of International Security. Some believe that climate change is a “threat multiplier”, meaning that in future crisis it could make violence more likely. Some of the consequences could be international economic disruptions, food price spikes and social unrest. Climate is thus understood as a matter of sustainable development, and the role of military is still unclear. Fears and concerns about the future are growing and the 2015 Paris Climate Agreement was a first step in thinking more seriously about the long-term consequences of their actions. Climate change was therefore integrated into the discussion of the Sustainable Development Goals. However, the problem of the discussion on the Anthropocene concerns not only the importance of not doing harm but also do more. That is why scholars are discussing better ways to make and the transition to more ecologically benign modes of wing. On the other hand, climate change policies can be threats to national security because they might lead to a diplomatic strategies to slow international agreements to deal with climate change period but the Anthropocene makes it clear that humans are much more interconnected with each other and with the natural world than ever expected and security measures must not only deal with the complications of climate change and the rapid changing of circumstances but also to the marginalized groups that are more vulnerable and insecure to the crisis. Fragile states must be aided to improve their capacity to deal with possible risks led by climate change such as insecurity or migration as well as extreme weather events or food degradations. Ch. 38: Outer space Outer space should be considered “res communis”, hence it should be treated as province of all mankind. The UN's outer space treaty ban any state or nation from appropriating outer space bodies and prohibits the weaponizing of outer space, allowing for only peaceful actions there. The exploitation of outer space shall be carried out only for the benefit and in the interests of all countries. Indeed, there are negative duties and positive duties that benefit all mankind. The News Space entrepreneurs proposed to reach outer space to extract resources from other planets and create off world settlements. With regards to Security, this availability of resources and territories may spark conflicts and the weaponizing of outer space. In the absence of an authoritative body that can effectively govern outer space, it is unclear how questions of off earth territorial claims of jurisdiction could be settled. Also, since the jurisdiction of international law is designed to end at the boundaries of the planet, it is unclear whether or not states will respect claims to sovereignty made on outer space bodies. In 2015, the USA passed the Space Act, allowing citizens to engage in the commercial exploitation of space resources. This act undermines the idea of the UN's idea of outer space as the common heritage of all mankind and scholars are concerned that this situation might produce armed conflict. While international law phrase is outer space as a global common, the emerging New Space sector is challenging these norms among with key assumptions about sovereignty and security. Even though new space actors are instrumentalizing space exploitation as the only means to solve earth issues, they also cause various threats on their own, both in obvious and potential. Chapter 36, Health Over the past decade, health issues have begun to appear on the security agenda. With the spread of Ebola in 2014 it was proven that the security of the majority of people is at risk especially regarding health. The current pandemic has for sure confirmed the statement. For many years their relationship between health and national security has been limited and unidirectional: conflicts cause health problems. However, in more recent times and especially now, the term “health security” has been further developed. The latter refers to biosecurity relating to any health issue that can be a threat to a community, to health threats that have become global in nature requiring a global response, to health threats to the functioning of a state. The end of the Cold War saw security analysts shift their focus away from military threats to more diffuse risks . Also, the human agency highly attributed to the consideration of health and its place on the foreign and security policy agenda. Three issues contributed to the emergence of health as a security issue: HIV, the spread of the new and existing infectious diseases and bioterrorism. In particular, HIV pandemic has not only led to widespread humanitarian concerns but has been defined as a security issue by the UN Security Council because of its effects on the state stability. Indeed, it causes severe economic problems leading to an increase of income inequalities. HIV has also a severe impact on peacekeeping. Conversely, bioterrorism is the idea of using biological agents to cause disease as a weapon of war. 3 problems have emerged with the risk of bioterrorism: tensions between internationally versus domestically focused strategies; the doubt whether it is better to try to prevent such attacks from happening or whether the priority should be on defense; and whether the risk has been overstated. But the major powers refer to the new spread and possible pandemic. 3 reasons why the classification of infectious diseases as security threats: the spread could cause a direct threat to the well-being of people; a pandemic may cause social disruption and threatened the effective functioning of the state; a large-scale pandemic may also contribute to economic decline, and the macroeconomic effects of a major epidemic may therefore be very significant. Now we know that threats to people survival, likelihood and dignity brought by COVID-19 illustrate how the pandemic is much more than a health crisis. It has also resulted in an increase of unemployment and an economic and institutional crisis. It has exposed the weaknesses in the delivery of social services as well as system of social protection and precarious and therefore states it has brought additional shock. As COVID-19 accelerates globally, we must place health security at the forefront of our efforts to stop the spread of the pandemic and build a more inclusive and resilient future. Cybersecurity Cyber security has become a key issue and global security as attacks and intrusions have had a broad impact and because cyber capabilities and weapons are now widely utilized by non-state actors. In general, cyber security is the defense of computers and servers, mobile devices, electronic systems, networks and data from malicious attacks. There are three macro categories of activity namely computer network attack, computer network defense and computer network exploitation. It is important to note the difference between cyber-attack, which is destructive and cyber exploitation, which is non-destructive and aims at gaining confidential information. Since cyber operations are difficult to attribute and stop, there is considerable discussion about deterrence as a way to be to ensure security of network and data. In essence, deterrence theory holds that maintaining incredible disciplinary retaliatory capability can prevent opponents from attacking, since they know that if they attack, they will be destroyed. Even if it works for nuclear activity it is difficult to be applied on the cyber field. The actors involved are several more and difficult to trace and hence attribution can be difficult. In 2004 the Budapest Convention on Cybercrime entered into force as well as the Tallinn Manual that applies general cyber norms and more specific rules of law to the international law. In particular, the Tallinn Manual on the international law applicable to cyber operations provides an extremely detailed legislation on the application of international law and norms to the cyber domain. However, it is not a formal treaty but a guide. The manual is built around the premise that cyber warfare is governed by existing international law, specifically by the laws of armed conflict and international humanitarian law such as the Geneva Conventions. Some important norms are: Prohibition of the use of force states are responsible for cyber-attacks in their borders A cyber operation becomes an act of war if it causes harm to individuals or damages in convenience of minor disruptions are not acts of War to use of for Estonia case Study 2007, Estonian state institutions subject to a sustained attack by a skilled cyber adversary. These attacks were politically motivated and lasted for three weeks. Estonia developed and implemented a national cybersecurity strategy, reflecting an emphasis on privatepublic partnerships and readiness of safeguard critical networks and critical data. THEORETICAL APPROACHES Realism The realist tradition has exercised a major influence over the field of security studies. Although realist approaches all share the same common idea that relations among states occur in repetitive patterns. According to them, states behavior is driven by their leaders’ human nature or by the anarchic international system, also wars and conflicts are explained by selfish human appetites for power and accumulation. We can distinguish six variations of realism: classical realism, neorealism, defense structural realism, offensive realism, rise and fall realism, neoclassical. Classical realism: it can be dated back to 1939 with the publication of “The Twenty Years’ Crisis” by Edward Carr. However, Morgenthau’s “politics Among Nations: the struggle for power and peace” became the standard text for political realism. According to Morgenthau, because the desire for more power is rooted in the nature of humanity, states are engaged in a struggle to increase their capabilities. Therefore, classical realism explains conflicts with reference to human failing: wars are the result of aggressive statemen. International politics is evil, bad things happen because the people who make foreign policies are evil. Is Donald Trump a realist? Trump’s foreign policy appears to be aligning with the views od offensive structural realism. However, the administration’s actions have not aligned with his declarations. Indeed, the US involvement in Iraq and Syria are violating the principles of sophisticated power maximization at the base of offensive structural realism. Neorealism: at the heart of neorealism is the “Theory of International Politics” by Waltz. According to him, political structures are characterized by 3 elements: - and ordering principle (anarchic or hierarchical). - The character of the units (when could be functionally/differentiated). - The distribution of capabilities. For what concerns the international system, it is characterized by and anarchic ordering principle, units of states that remain functionally alike and distributions of capabilities that could be bipolar or multipolar. Differently from classical realist, Waltz’s theory is not based on leaders’ motivations and state characteristics as causal variables for international actions except for the minimal assumption that state seek to survive. Moreover, if classical realism suggests that state divisions are taken rationally, Waltz believes that state behavior can be a product of competition or a product of socialization. Waltz also noted that in international politics the same issues occur over and over with the same outcomes. Systems are generative and the international pollical systems is characterized by complex non-linear relationships and unintended consequences. Outcomes are influenced by something more than simply the aggregation of individual states’ behavior. Neorealists see international politic as tragic rather than as driven by the aggressive behavior of revisionist states. According to Waltz multipolar systems are less stable than bipolar ones because interdependence is lower in bipolarity, than in multiple already, and in any case, single hegemony is indeed impossible. Neorealism declined in 1990s because of international events that seem to provide strong support for alternative approaches. However, there are four contemporary streams of political realism, which are rise and fall realism, neoclassical, defensive structural, offensive structural, they all believe that international relations are characterized by an endless and inescapable succession of wars, and they agree that rational calculation is the micro foundation, that translates those preferences into behavior, they differ on the preferences. Defensive structural realism: It shares neorealism’s minimal assumptions about state motivation, suggesting that states seek security in an anarchic international system, and that the main threat to their well-being comes from other states. Three main differences with neorealism: - first one allows several multiple micro-foundations to explain state behavior, defensive realism relies only on rational choice. - Defensive realism adds the offense-defense balance as a variable. Rationality plus offense provoke defense balance = states should support the status quo balancing is the appropriate response to threatening concentrations of powers. The balance of threat theory by Waltz: states estimate threats posed by other states by their relative powers, proximity and intentions and the offense-defense balance. Defensive realism has some difficulties in relying on security dilemma dynamics. Offensive structural realism: states take an uncertain international environment in which any state might use its power to harm others. In these cases, security requires acquiring as much power compared to other states as possible MEARSHEIMER theory of offensive structural realism says that. - the international system is anarchic - great powers possess some offensive military capability and therefore can damage each other - states cannot be certain about other states intentions. - Survival is the primary goal of great powers, - great powers are rational act, actors hence the great powers fear each other and can rely only on themselves for their security, the best strategy for states is to ensure their survival by maximizing the relative power. Safety comes only from being the most powerful state in the system, or wherever that Germany is impossible. Therefore, the second best option is to attain regional hegemony, even in the absence of each type of Germany states strive to maximize both their wealth and their military capabilities, we're fighting battles in order to gain resources states resort to war against each other. Mearsheimer, also analyze the state behavior depending on where it is located continental great powers will seek regional hegemony, But in the case of its failure, it will maximize its relative power insular states will balance against rising states, not try to be original hegemony, regional head demands. On the other hand, seek to defend the current favorable distribution of capabilities. The main causes of war are located in the architecture of the international system. What matters is the number of great powers and how much power, each one controls grid power. Worse, our allies are least likely in bipolar systems, while more likely in multipolar ones because they are unbalanced. Rise and Fall realism: war between major powers is least likely when the international system is dominated by a single state, and when there are not rising challengers. Stability is a product of a hegemonic order because states that are dissatisfied lack capabilities to change it, while the risk of war increases when a rising challenger attempts to capture the top spot, and the declining hegemon, wants to preserve it. In contrast with Neo realism, rising and falling realism believes that growth is a internal process to state, and since the dynamics like industrialization or technological innovation, do not occur in each state, at the same time, states tend to rise and fall in relation to one another. Neoclassical realism: it suggests that what states do depends on the influences located at the domestic level of analysis. Transmission approach to foreign policysystematic pressure is filtered through variables at the international level, to produce specific foreign policy decisions. hence, although distribution of capabilities is a good starting point. International systems are hard to read when talking about foreign policy dimensions and variables at the international level is the medium point between systematic pressures and state behavior that determine the precise nature and direction of a state's foreign economic and military policy. Sheller’s theory of “under balancing” states that, for example, talking about UK and France before World War Two. Unified states find it easier to recognize threats and carry out appropriate balancing strategies to assess them. Realism and the rise of China. - Offensive structural realism predicts a future of intense security competition and global insecurity. If China as power continues to grow. It is likely to assert greater control in Asia, because given the required capabilities, states will pursue regional hegemony, to stay safe. China may use capabilities to dictate neighbors on how to behave, or wherever the US and its neighbors will align to create a balancing coalition to contest, China's rise. The US will likely pursue aggressive policies in the attempt of remain the world's only regional hegemon - Defensive structural realism. They expect China's rise to be more devoted to resources of military technology and capabilities, it could start a security dilemma scenario, if China does not express them to be only devoted to security alone. They believe that the US should accommodate China's growth and promote peaceful relations. - Rise and fall realism. Instead, they believe that relations between the US and China will become increasingly agonistic. The US will not give up its part. And as China's power increases, they're likely to demand more influence in international politics. And if these conditions are not met, they could try to dethrone the US by launching and her demonic or for this to happen, June, China must not only rise but rise in relation to the US. Even if Chinese growth continues, It will depend on China's ability to establish the status quo and articulate for a new international order that inspires collaboration. A number of in inter wearing factors could moderate security competition between China and the US and provide for a peaceful transition. For example, nuclear weapons for both, and political liberalization. Liberalism Kant's perpetual peace may be understood as the first liberal theory. However, liberal security has been elaborated by many scholars, Moravcsik distinguished between ideational, commercial and republican liberalism, Doyle between international commercial and ideological, Zacher and Matthews identified four different implications for security planning. Kantian liberalism: the only justified form of government is the republican government, where everything is ruled by law, because also rules are subject to categorical imperatives, Republican states are seen as peace producers because they have the habit of consultation and because of the legal foundations. A state built on laws will be less likely to endorse in unlawful behavior in international relations. However, that was not sufficient to ensure world peace because the international system is lawless. And therefore, republican states at the duty to push for laws that can regulate international relations. He criticizes the concept of balance of power and refused the idea that the balance of power is a peacekeeper. Kant’s peace program is constructed in two parts: - The first one is the abolition of instruments that could create the conditions of the war of all against all, such as standing army, or assassination as an instrument of diplomacy. - Once the first phase is concluded by all states, liberal and non-liberal, three articles to provide the actual foundation for peace 1. First, the civil constitution of every state should be Republican. 2. Second, the law of nations shall be founded on federation of states. 3. Third, universe so stuck out so at the base of world citizenship to create a sense of cosmopolitan community. According to Moravcsik, commercial liberalism focuses on uncertainties created by opportunities for trans-border economic transactions. According to him, trade is better than war in accumulating wealth. He genuinely believes that giving up mercantilism and allowing freedom to trade would civilize the citizens of a nation facilitating a peaceful coexistence among fellow citizens and guaranteeing the rule of law. International Trade would therefore incline nations to peace. Liberal trade doctrine of “douce commerce” holds that trade amongst states, like trade among individuals, is mutually beneficial. The market was civil society and peace; economic power in the hands of government is conflict and war. The Democratic peace thesis: it is the argument that liberal states do not fight wars against other liberal states. Doyle argued that there was a difference between relations among liberal societies and liberal societies and between liberal ones and non-liberal societies. He observed that almost no liberal states had fought wars against other states. And if that was the case, it was because liberalism was just established. He included free trade In the three preconditions of Kant. There are 2 theories: - liberal institutions: liberal state and the need to ensure that broad popular support, the division of powers in democratic states which produces checks and balances, the electoral cycle which makes liberal leadership cautious and prone to avoid risks, liberal institutions tend to inhibit all wars. - liberal culture: liberal states tend to trust other liberal states and to expect to reduce conflict through discussion and compromise. But equally they distrust other liberal states. Therefore, following the study of Doyle some say that the most democracies are more peaceful than non-democracies, and they are generally more Pacific; others believe that states are not necessarily peaceful but avoid the use of force in relation to other democracies. And finally, others argue that democracies are generally stronger in the use of force. Neoliberal institutionalism: focus on the ability of institutions, to redefine state order and act as arbitrators in state disputes. They can change the character of the international environment by influencing state preferences and state behavior, international institutions do this by a variety of methods that either create strong incentives for cooperation, such as favorable trade status or powerful disincentives, such as trade sanctions. According to Axelrod theory of “shadows of the future” cooperation was not going to be abandoned by states once institutionalized. Once agents return good for good. This initiates a potential spiral of cooperation behavior. Transaction cost theory: institutions are desirable because despite the constraints they impose to state, they reduce transaction costs associated with rulemaking negotiating and enforcing information gathering and conflict resolutions, they are also durable. Constructivist institutionalism: conceptualizes institutions as a collection of norms, rules, and routines, rather than a formal structure. Individuals actions are guided by social expectations, rather than utility maximization calculations. Neoliberal institutionalism VS realism: states create institutions to maximize shared interests VS states create institutions to realize and maintain domination. Constructivism argues that the world is constituted socially through inter subjective interactions that agents and structures are mutually constituted, and that ideational factors such as norms and identity, are central to the constitution and dynamics of world politics. They share a belief that security is a social construction, meaning different things in different contexts. Security is also seen as a side of negotiation in which actors compete to define the identity and values of a particular group, in order to provide a foundation for political action, identity and norms are central to the study of security, because they provide the limits for feasible and legitimate political action. Constructivists believe that their role is needed to really understandand some traditional security dynamics. They can give us a deeper insight on how security works in world politics, and how particular ideas about security and threat come into being in particular contexts, and in a particular timing. Critical Theory Critical Theory originated from the Marxist tradition, which, during the Cold War, formed the basis of dependency and world system theory. In the years before and after the Cold War, critical theory became part of a larger post positivist challenge to the discipline, and development of critical security studies. At the heart of contestation within the arena of critical security is the concept of emancipation, developed by several members of the Frankfurt School in particular critical security analysts have addressed the question of how given the range of threats or rules that exist in the world, some threats come to have priority, and others become the focus of discourses of security. For what concerns critical theory and security. It all started in the political world of the Cold War. In the post- World War Two, the proccupation, with force structures and social science, created a distance from the politics of security in a critical debate developed with Cox, he argued that problem solving theory takes the world as it is, and attempts to find solutions to problems within it. While Critical Theory raises questions about the historical location of both theories and the theory in general critical security studies is distinguished from a longer tradition of security studies by the adoption of a critical approach. The construction of threats: traditional security studies, asked the question about how to respond to objective threats, while critical security analysts have begun with a different question about how given the range of threats or risks that exist in the world. Some threats are prioritized, respect toothers, conventional approaches to security start with an objective threat, which is assumed to exist independently of the routines procedures discourses and knowledge brought to bear it by security agencies. Conversely, more critical approaches emphasize that threats are a product of a politics of representation, a potential threat is not an external phenomenon, but a security question measurement of the scope and seriousness of threats are shaped by social, cultural and political processes that produce some phenomena as security threats, while largely ignoring others. Emancipation: according to Booth, security means the absence of threats and emancipation is the freeing of people from those physical inhuman constraints which stopped them carrying out what they could freely choose to do. He understands security and emancipation as two sides of the same coin. Feminism Since there is no best way to start international relations, and peace are different from feminism, it is important to analyze different perspectives. Indeed, each feminist perspective, draws our attention to different ways of thinking about gender and conceptualizing the gendered nature of international security and different ways of responding to the problems of global politics. Liberal feminists: privilege notions of equality and have tended to focus on questions of women's representation within the public space. Many scholars focus on the ways in which within governments and international institutions, we men remain highly underrepresented. They want to remove the barriers posed a woman's participation. For the sake of permitting to those women were interested, an equal opportunity to take on the challenges of political and public life. Radical feminists: they focus less on notions of numerical equality and more on notions of difference for them. Women and men are essentially quite different from one another, and essentially quite similar to one another. Patriarchy influences the ways in which the world operates and the ways in which we think about the world, they differ from liberal feminists, in the fact that they view the patriarchal as existing everywhere. Patriarchy impacts every way of life, in their opinion political representation is necessary not because of liberals’ values but rather because they bring a new insight to politics, which could lead to peace and cooperation. Feminist’s critical theory: focus on prevailing assumptions about both men and women. They argued that prevailing norms associated with masculinity must be examined and may have an enormous impact on men themselves. According to them, the concepts of masculinity, as well as femininity are not just part of a discourse, but are indeed based on real living conditions of men and women, and include, but it's not limited to the conditions of race, class, sexuality, ethnicity, culture and religion. Feminist’s postmodernist: they argue that any definition or standpoint, will necessarily be partial. In any attempt to pose it a single or universal through needs to be deconstructed. Post-colonial feminist theorists: argue that of the partial truth about gender, imperialism constitutes one of the crucial movements through which modern identities, become established. they attempt to. Women gender and security Gender neutral analysis of armed conflicts regularly does not focus on people at all, but rather on states or other armed groups, and on the resources gained or lost. Men are assumed to be more impacted by war than women who are assumed to be only indirectly impacted by it. Therefore, although not generally contemplated in the analysis of what may be considered security or insecurity, early feminists disrupted these assumptions. Women usually do invisible jobs associated with supporting fighting forces, and are therefore regular, regularly impacted by the violence of armed conflict. During the Cold War era, it became increasingly obvious. In the new conflicts, women emerged as targets of sexual violence, prostitution, sexual slavery, mutilation and sexual trafficking. However, sexual violence sometimes excludes other important aspects, such as being targeted or active are indeed women are also victims in terms of economic losses. They lack access to health care or educational facilities. First, focusing strictly on the sexual violence perpetrated against women and girls during armed conflicts, directs our attention away from the many others. effect so armed conflict on their lives Also Eat directs our attention away from sex through violence towards boys and men, usually used to attack their sense of manhood. Feminists do not focus only on the impacts of war on women and men but also they explore the ways in which women are actors in armed conflict. If they can be victims, they can be active agents. Women are also extremely active and informal peace processes such as manifestation. But rarely invited to formal peace tables and excluded from disarmament demobilization and reintegration. Men on the other hand pressure to held power and decision making authority prior to the emergence of conflict and to have been combatants and investigators throughout the conflict. Therefore, they are assumed to be directly right targets even though they are not directly involved in the conflict. Women and men can both be active in wars and armed conflicts in a variety of ways, either as perpetrators or violence or as participants in peace processes. However, the prevailing understandings and assumptions about women and men in conflict can significantly shape and limit those experiences in both positive and negative ways. Furthermore, many feminists focus on the way in which gender is constructed, through security, and on the ways in which security is constructed through gender. Some feminist scholars have examined the practices of national security, think tanks, nuclear strategy, foreign policy decisions and even studying weapons of mass destruction in the way in which assumptions around gender impact and are impacted by these processes. Therefore, feminists made several interventions in international security: they analyzed the differential impact of armed conflict on women and men. The impact on women and men of naturalized assumptions about their behavior and actions and the ways in which assumptions around masculinity and femininity figure into conflict and decision making and the continuum of militarization. The ways in which gender’s implicated in questions of international security are multifaced, but it all shows how international security is a gender-neutral set of practices. Post structuralism Post structuralism includes various scholars who are contributing to new strands of critical research on war and security. They are interested in the discourse on knowledge and the idea of security as a logic informing war as practice. They challenge what security itself might be, but also questions where and how security is practiced. Sights of post structuralism explore how security is seen when viewed through post structuralist lenses. States are necessary to prove that when security is analyzed as a logic informing war, the states in which a politics of security is prioritized are only limited by imagination. Insights demonstrate that security is a logic forming war as practice. Post structuralist critiques have challenged where and how security operates and propose a more sociologically oriented approach to security. Post structuralism critique can demonstrate how the discursive logic of security has real life effects. Securitization In the 90s, a group of scholars developed a securitization theory to try to understand the changing dynamics of threats. After the cold war they issues considers considered as threats increased. But some are still ignored and considered security issues only. In specific times, or parts of the world. It is usually associated with the Copenhagen School, which argued that security threats are created when authors actors label something a security threat and relevant audiences accept this designation. Therefore, under the right conditions. Labeling something as a security issue makes it a security issue, leading to particular political consequences. securitization is the process by which issues become part of the security agenda. securitization theory responded to changes in the international system that occurred with the end of the Cold War, developing a framework of analysis that would satisfy both the traditionalists who believe that an expansion of the concept of security would lead to its potential loss of meaning. And the others who wanted to expand the concept of security beyond military political threats. Indeed, according to Buzan, security is a particular type of politics that occurs not just in the traditional military sector, but also in other sectors like political, economic, environmental, and say, social and in society. They opened up the possibility that a range of issues could potentially be a concern of security, while retaining a core focus on issues of survival and the role of powerful political actors such as national leaders in addressing these issues. The key to this approach was to understand our issues become security threats. The CS argued that security as a special quality and therefore security is a speech act. Hence it is not descriptive, but performative. Moreover the Copenhagen School approach argued that threats can be both real or perceived however according to them what matters is not if it is real or not but rather than the fact that securitize an issue it is a political fact that has consequences because the operation is particular and specific thus something can be defined as a security problem when the elites say so for the Copenhagen school security is equated with survival when an actor defines an issue as a threat and the audience accepts that is ignition securitization occurs it is all dependent on the external context and all leads to a successful securitization a range of factors affect the potential success of securitization internal and external the first concerns this beach act itself and the extent to which it follows the logic and grammar of secure security creating a narrative that designates a threat and the 2nd 1 concerns the general circumstances of the act. Paris School securitization is a process that happens through routine and everyday practices. When analyzing the relationship between security and securitization we have a: - realist approach: security is states condition that they want to achieve in an anarchic international system - human security approach: security seen as a condition of a state of being add individual level security equal welfare of human beings - constructivists approach: does not see it as a state of being but as a process or practice (also post structuralist and securitization theories). The important distinction between the Copenhagen school and more traditional approaches to security is that for the Copenhagen school it does not matter if there is an actual threat only if the issue is represented and thought of as such they recognized that threats can be the real or perceived but argued that trying to define real security outside of the world of politics want help political analysis much the critics are dead by theorizing security as a speech actor the Copenhagen school neglects other kinds of acts that might bring security into being speech is not the only way to communicate secondly they fail to theorize these eating any depth the emphasis remains on the speech act as a moment of intervention securitization puts the spotlight on the process by which issues are added to the security agenda and what happens afterwards. SECURITIZATION THEORY - 1990s - Constructivist analysis from Copenhagen peace research institute - Security threats are created when actors (elites) label something a security threat and relevant audiences accept this designation - “securitization” = process by which issues become part of the security agenda Many examples: es during Bush presidency, he decided to insert in western minds he had to fight a JUST war against terror, the elite decide war on terror could be in Iraq Afghanistan ecc. The audience accepted it. But how can I make an idea accepted by audience? Propaganda, tv shows, movies, newspapers ecc. Another ex: If I think that there is a coupe in Uganda and I am the British gov, I (Boris Johnson) decide that this is a security threat for the UK (starting to say it on tv ecc) but now another coup happens in Rwanda even if they are the same thing. I decide Uganda’s coup is a threat because it is an interest for the UK. Barry Buzan (1998) security: a new framework for analysis After cold war a debate originated between “wideners” (expansion of security beyond militarypolitical threats, es environmental security, human security) and “traditionalists” (only phenomenon of war stricto sensus). After 1990, security was linked to political, economic, environmental, social sectors. Security as survival. The Copenhagen school synthetizes between wideners and traditionalists. The process of securitization is what in language theory is called a speech act. By saying the words, something is done (Buzan et al. 1998:26) security as “speech act”. Threats can be real or perceived, when states securitize an issue it is a political pact that has consequences since this securitization will cause the actor to operate in a different mode that would have otherwise. Thus, something is a security problem when the elites declare it to be so. Security = survival Securitization: process by which issues become part of security agenda Speech act: utterance that is also an act De-securitizing: issues removed from security agenda Sectors of security: at least 5 (Buzan) Facilitating conditions: conditions that affect likelihood a securitization will be successful Audience: whichever group the securitizing move tries to convince Main debates: - Limits of speech act - Logic of security/politics - Audience vs power - Ethics of de-securitization - Propaganda, fake news, psychological manipulation REALIST PATH TO SECURITY: -re-armament -alliances -arms control negotiations LIBERAL PATH TO SECURITY -int law -Int organizations -Integration (political and economic) -Democratization Global peace index: list countries to most to least peaceful Variables: - Number and duration of internal conflicts - N of deaths from external organized conflicts - Ecc - Societal safety - Militarization Post-colonialism Post-colonialism is not only a theory but an approach or orientation. There is no postcolonial school of security studies but tit provides important insights for students of security. Postcolonialism is concerned with the enduring legacy of colonisation across the globe. It seems to analyze, explain and center the ways in which empire and imperialism continue to structure interactions between the ‘east’ and the ‘west’ (or Global North and Global South). It is particularly sensitive to the relationship between imperialism and culture especially in the practices of representation though which the colonisers produces knowledge about the colonised. Rather than viewing the colonisers as positive objects of knowledge, post-colonialism aims tot elevate the experiences of those in the Global South as legitimate subjects of academic inquiry. Postcolonial security studies: most people agree that continental approaches to security studies are based on a problematic ontology of world views, one within privileges —> the West over the rest. Resulting in a a field based on the experience a small proportion of the world states sand peoples. Pag. 123: we can see this in the vocabulary used, as it is structured around white privilege; key historical moments in dominant IR narratives are often based on the interests and experiences of western subjects. Smaller states and countries in the Third World are neglected because they are seen as largely irrelevant players in the international realm. Moreover, the security concerns of the Third World are either completely marginalised or interpreted as extensions of a greater power concerns on a smaller scale (Cold War: Third-World-related security issues tended to be read through the lens of superpower rivalry). Finally, postcolonial theorists of IR agree that the way in which conventional security studies deal with these important questions of power, agency and hierarchy makes it an ethnocentric field of study. Postcolonial scholars challenge what they believe to be the Eurocentric and radicalised nature of dominant narratives in IR. Most agree that the study and practice of security continue to privilege the Western subjects as the primary site of experimental and source of knowledge, systematically sidelining the world views, perspectives and lived realities of those in the Global South. While the recommendations differ, they agree thwart the colonial experience is fundamental to the project of modernity. Postcolonial writing, given its diversity of perspectives and experimental bases, considerably enriches and challenges conventional understandings of power, violence, and security.