Global Security (Notes)
Global Security (Notes)
Global Security
IRO (2022/2023) - Leiden University
Block 3
1
GS João Bazelga
Security: in an objective sense, measures the absence of threats to acquired values, and in a
| subjective sense, the absence of fear that such values will be attacked;
|
|Contested concept
|
|—> Survival model: freedom from life-determining threats (narrow);
|—> Survival-plus model: freedom to have life choices;
Studying security is important because it may help people (even though most analysis refuse the
idea of total security).
SECURITY STUDIES
Security theory: theory that aims at the understanding and/ or management of security issues
(divided more strongly than comparable elds into subsets without mutual recognition).
Security studies: sub eld of academic IR that involves interpreting the past, understanding the
| present and trying to in uence the future.
|
|Involves the interplay of 5 forces
|
|—> Great-power politics;
|—> Technology;
|—> Key events;
|—> Internal dynamics of academic debates;
|—> Institutionalisation.
ORIGIN
Second World War and Cold War —> Technological developments (e.g.: nuclear weapons)
|
|
Need (A) for civilian experts to balance military leadership and (B) coordinate military and non-
military considerations.
|
|—> Emergence of strategic studies.
• The nuclear revolution brought research on deterrence, containment, coercion, escalation and
arms control (with a belief in deductive, rational thinking);
• Work related to systems analysis, a method for solving problems of force structure and resource
allocation that drew on economic theory as well as operations research developed by natural
scientists, engineers, and economists during the Second World War;
• Many of the new developments (notably perceptions and decision making) were reactions to the
di culties that the classical form of security studies ran into.
• Public disinterest in national security (critique of Vietnam War made security studies an
unfashionable subject at universities);
• Highly theoretical and academic scholarship of the earlier period had succumbed to 'hectic
empiricism;
• Moved from interdisciplinary into becoming one of IR's two pillars, paralleling International
Political Economy (IPE) - became a synonym of (neo)realism;
• The institutionalisation of security studies emerged in the US and was exported to Europe (these
two tracks only merged during the 1980s and 1990s);
• New data (more systematic use of historical analysis and more access to archives);
• New methods (structured-focused case comparisons and more diverse social scienti c
approaches to explain historic events);
• New realities (end of Cold War détente; Iranian and Nicaraguan revolution; and Soviet
interventions in Africa states and Afghanistan);
A. Civil wars
- Civilians as targets (as opposed to well-ordered battles between soldiers
in uniforms);
- Criminalisation of violence (as opposed to state-building enterprises);
- Identity-based wars (as opposed to forward-looking f ideological
agendas);
B. International wars:
- Hybrid wars;
- Grey-zone warfare;
• Changes after the 09/11 and the “global war on terror”;
• There were diverging understandings on the role of the security studies eld.
4
fl
ff
fi
fi
fi
GS João Bazelga
NEW SECURITY STUDIES (21ST CENTURY)
• New European security studies does not remain structured by separate ‘schools’;
• Most obvious joint issue for both schools is terror and order and, now, environmental security.
Anarchy: the absence of government over states (whether inter-state relations are violent or non-
| violent is distinct from the presence of anarchy).
|
|—> States exist in a “self help” world.
Uncertainty: the quality of not (being) known beyond doubt (existential condition inherent to all
| human relations - cannot be avoided, but how it is understood can very signi cantly);
|
|It’s a driving force in international (in)security
|
|—> Mission of intelligence agencies - to supply country’s top political leadership with information
about past events, current state of the world, actors’ intentions, and likely future state of the
world.
Types of uncertainty:
A. Unresolvable uncertainty (state decision makers, including military planners and foreign
policy analysts, can never be certain about the current and future intentions of those with
the capability of harming them militarily);
|
created by…
|
|—> Material factors (“ambiguous symbolism” of weapons and their deployment - Can
| o ensive and defensive weapons be distinguished?);
|
|—> Psychological factors (the “other minds” problem - Limited understanding of the
| intentions and motives, hopes and fears, and emotions and feelings on the part of
| the decision makers of one state about their counterparts elsewhere).
|
A serious misjudgement could result in the waste of money and the loss of prestige;
ultimately, defeat in war and foreign occupation might be the outcome.
B. Uncertainty about the future (still possible to make predictions and assumptions) - this is
resolvable because we will gure it out, just not in the present.
5
ff
fl
fl
fi
fi
GS João Bazelga
Types of distribution of power (neorealism): Multipolarity, Bipolarity and unipolarity.
The security dilemma: a two-level strategic predicament in relations between states and other
actors in which the relevant parties confront a dilemma of interpretation,
about the motives, intentions and capabilities of others, and a dilemma of
response, about the most rational way of responding to the former -
actions taken by one state to increase its own security causes reactions
from other states which in turn decreases rather than increases the
security on the original state;
|
|—> Quintessential dilemma in international politics);
|—> Core concept for understanding con ict escalation and arms race;
|—> Produced by anarchy and the resulting “self help” system in which security-seeking states
| exist;
|—> Driven by uncertainty and fear about the intention of others;
|—> Consequences are unintended and “tragic”, but not inevitable;
|—> Irreducible dilemma: inability of one set of decision makers to enter into the counter-fear of
| others;
|
|the “spiral” of competition creates…
Security paradox: two or more actors, seeking only to improve their own security, provoke through
their words or actions an increase in mutual tension, resulting in less security all
round (paradox in studying security is that the more we learn about threats, the
more the world appears to be dangerous).
1. Fatalist logic - de ne the other as a rival and therefore maximize one’s own (military) power
|
|—> Assumes that uncertainty is always there and can’t change (Mearsheimer);
|
|—> May lead to security paradox (a situation in which two or more actors, seeking only to
improve their own security, provoke through their words or actions an increase in
mutual tension, resulting in less security all round);
If the security dilemma is not resolved, then there is usually an escalation to war.
War: the continuation of policy by other means (habit that most human societies have acquired
and become deeply attached to - can be culturally, politically, legally and sociologically
explained);
|
|—> Violent;
|—> Large-scale;
|—> Between organized political entities with political goals;
|—> Generally launched to prevent a frightening future from materialising;
|—> Has been a crucial part of de ning heroism and bravery;
|—> Inevitably related with peace.
Philosophies of war:
- Political philosophy: warfare as ‘an act of violence intended to compel our opponent to ful l
our will’;
- Eschatological philosophy: teleological view of history that would culminate ‘in a “ nal” war
leading to the unfolding of some grand design - divine, natural or human (in the global
variant, the “grand design” is presumed to arise from the chaos of the “ nal war”);
- Cataclysmic philosophy: war as a catastrophe that befalls some portion of humanity or the
entire human race (the global variant sees what as a cataclysm that a ects humanity as a
whole).
Globalization
|
|—> “New” type of warfare: (Kaldor)
- Erosion of the state’s monopoly of legitimate organized violence;
- Struggle between cosmopolitan and exclusivist identity groups;
- Incites “fear and hatred” rather than win “hearts and minds”;
- Financed through a globalised war economy that is decentralised and increasingly
transnational and in which the ghting units are often self-funding through plunder, the
black market or external assistance;
|
Criticism:
• A lot of these trends are not new (e.g.: atrocities);
• Globalization is a much older process that is essentially about circulation, henceforth, not being
separate from war itself;
7
fi
fi
fi
ff
fi
fi
GS João Bazelga
• Emergence of “robot warriors” and development of arti cial intelligence (which raise some
intriguing ethical issues about war and humanity’s place in it);
• Decrease in the human participation;
• Growing use of drones;
• Moving beyond geospaces into cyberspace and outer space;
• Greater accessibility to instruments of war (di use);
• Broad spectrum of means (diverse);
• Con ict parties will presumably seek to disrupt critical infrastructure, societal cohesion and
governance functions of their adversaries rather than simply focus on defeating enemy forces
on the battle eld (disruptive);
• Chinese cyber attacks in pursuit of the trade secrets of US rms (end to Xi-Obama cyber
cease re);
• Trade “war”: US tari s on Chinese imports; China retaliates;
• China asserts control on South China Sea over strategic sea lanes and creates military outposts
on disputed islands;
• Taiwan;
|
If both governments make fatalistic assumptions about each other’s intentions on these various
issues they will feel compelled to seek security at the expense of each other, resulting in strategic
dynamics that will lead to the construction of their relationship as a Cold War narrative.
8
fl
fi
fi
ff
ff
fl
fi
fi
GS João Bazelga
• As a rising power, China threatens US hegemony by seeking to redesign rules of post-WW2
international system and by constructing a security threat to the US.
• However, today’s western order is hard to overturn and easy to join.
Realism
|
|—> China rise has economic, political and security implications for US-China relations;
|—> Current tensions mean that con ict is escalating;
|—> O ensive realism believes that a military confrontation is likely, while defensive realism thinks
that this can be prevented.
Liberalism
|
|—> The risks of an anarchic international system can be overcome;
|—> Trade, international institutions and democratic regimes as important pillars of peace;
|—> China’s integration into the liberal order is possible and likely.
Thucydides Trap: inexorable, structural stress caused by a rapid shift in the balance of power
between two rivals (e.g.: inevitable war between the rising Athenians and the fearful Sparta).
“There is at least one thing worse than ghting with allies, and that is to ght without them” -
Winston Churchill
Alliance: a formal or informal relationship of security cooperation between two or more sovereign
| states (Walt) - intended to enhance the security of their members and external parties
| (what has traditionally distinguished alliances from other security arrangements between
| states, however, is the emphasis that they place on military forms of assistance).
|
|
Wide variety of alliance relationships covered by the de nition:
|
|—> Defensive alliances (tend to last longer);
|—> O ensive alliances;
|—> Non-aggression pacts; Multiple times often mixed together.
|—> Neutrality pacts;
|—> Consultation agreements.
Useful as a part of many kinds of strategies (e.g.: total war, containment, deterrence);
|
|BUT
|
Come with dangers
|—> Chain-ganging: state(s) dragged into war in order to save reckless allies;
|—> Buck-passing: state(s) allow others to bear the burden of halting the rise of a state that
threatens to gain hegemony.
International determinants:
I. Balance of power: states ally to confront a more powerful state and if no possible alliances
exists that can balance a very powerful state, states “bandwagon” by allying with that
powerful state (shifts in the international distribution of power may threaten the existence of
established alliances);
II. Balance of threat: raw power per se does not endanger states’ security, but rather threats
(due to geographic proximity, ideology, etc.) —> therefore, states ally to balance against
threat and not just power (e.g.: Germany and France have similar power but they don’t
endanger instead each other because there is no threat perceived between them);
Domestic determinants:
III. Domestic a nity (cultural, ideological, political/institutional): states will tend to ally with
states whose political orientations are similar to their own (alliances among liberal
democratic states are likely to be especially strong and resilient);
IV. Institutionalisation;
10
ffi
ff
GS João Bazelga
|—> Creation of organizations, bureaucracies, which on their own try to survive into the
| future, lobby, manage change, and facilitate cooperation between members;
|—> Institutional capacity allows alliance to shift to address new threats, when the original
| reason for the alliance is no longer present, and take di erent tasks.
|
Alliances characterised by high levels of institutionalisation will last longer on average.
V. Socialisation
|—> Contact between elites (regular summits, conferences, etc.);
|—> Formal cooperation between personnel from member government (secondment, etc);
|—> Attempt to create sense of community among elites and across the public of alliance;
|—> Engage in trade and exchange of capital, technology, information, ideas and people.
Stability and longevity produced by external factors (e.g.: persistence of threat), domestic factors
(e.g.: regime type), and institutional/social features of the alliance itself.
NATO is one of the longest-lived alliances. Although the treaty does not refer to any particular
adversary, it was clearly a response to the growing threat that appeared to be posed by the
hostile ideology and military power of the Soviet Union and to manage/control a possible
resurgent Germany;
After the disintegration of the Soviet Union, some IR scholars argued that the alliance’s time
would soon be over;
|
|—BUT—> NATO has thrived since 1990 (it has been transformed into a regional collective
security arrangement).
• Residual threat posed by the remnants of the Soviet Union, notably Russia;
• Emergence of new types of threats that were shared to a signi cant extent by NATO members
(Balkans, Libya and Syria);
• Intra-alliance function that it has played in ensuring friendly relations among its members;
• Its acquisition of a substantial organisational structure;
• The substantial movement of goods, investments, ideas and people has created close societal
ties between the two sides of the Atlantic;
• Promote liberal democratic practices and institutions;
• Usefulness as an enforcement arm of UN Security Council;
NATO’s challenges:
11
ff
ff
fi
GS João Bazelga
COERCION
Strategy: ability to produce intended e ects (closely related to the concept of power)
|
|—> It takes strategy to unleash the power inherent in this capacity and to direct it towards
speci c purposes (creative element in any exercise of power).
Coercion: the activity of causing someone to do something against his will, or of bringing about
| his doing what he does against his will (the latent use of force).
|
|
|—> A coercive strategy involves the deliberate and purposive use
of overt threats of force to in uence another’s strategic
choices.
Whether a threat succeeds in in uencing the target’s strategic choices will depend on the target’s
perception of the threat and on the other factors that go into its decision calculus.
A. Deterrence;
|
|—> Aims to persuade an opponent not to initiate action (threats aim to preserve).
|
|—> Involves making clear what the coercer considers undesirable and then waiting, leaving
| the overt act to the adversary (once the threat has been made the coercer would need
| to act only if the adversary makes the for- bidden move);
|
|—> Has no necessary time limit;
|
|—> Compliance is literally a non-event, it doesn’t require any special rationalisation by the
target;
B. Compellence;
|
|—> Aims to persuade an opponent to change (its) behaviour (threats aim to change);
|
|—> Involves initiating an action that stops or becomes harmless only if the target responds
| (might require the coercer to use force until the target acts);
|
|—> Requires a clear deadline;
|
|—> Compliance will be blatant and will carry with it the added repetitional signi cance of
| humiliation (thus being harder to achieve);
|
|—> The behavioural change can be a stop short of completion, undo of an action or a
change in policy (by changing government).
Strategies/Methods
• Denial (take actions that create di culty for target to successfully undertake the action that
you hope to deter);
|
|—>The target is presented with resistance and compliance costs together (coercer
| threatens the target that if its resistance fails compliance costs will automatically follow).
|
|—>The opponent only retains choice over whether or not to engage in battle;
|
Denial is preferable to punishment.
Denial and punishment may not necessarily lead to altogether di erent use of force.
Costs
• Faced by coercer
|
|—> Enforcement costs (costs of punishing the target or implementing denial strategy - the
| target will try to increase the coercer’s enforcement costs).
|
A threat will be credible only if resistance costs for the target exceed enforcement costs for the
coercer.
Coercion in practice
• Di cult to implement since the outcome is not fully in the coercer’s hands (depends on the
target’s perceptions of the threat);
• May involve multiple audiences: target; domestic audiences in target; international audiences;
• In most con icts, mutual coercion, even somewhat one-sided, is much more likely than a wholly
asymmetric relationship;
13
ffi
fl
ff
fl
ffi
fi
ff
ff
fi
GS João Bazelga
• Reputation costs: if compliance is humiliating and requires acknowledging submission, this can
have long-term consequences;
• How one coerces now will have an impact on how much one might have to coerce in the future
(the coercion costs might need to be viewed in short and long term);
Coercive diplomacy: reactive strategy that aims at persuading through threats and not the use of
force based on an endowment e ect (meaning that individuals value objects
they have signi cantly more than objects they do not possess).
|
|—> Many variables can in uence the outcome of this.
Iran has had a civilian nuclear program since 1959, but only in 2002, when it was announced that
the country had started developing a new nuclear enrichment plant and heavy water reactor, did
this become a concern for the rest of the world.
The cumulative pressure through economic sanctions and implicit threats of force in combination
with well-calibrated incentives created the conditions for the success of coercive diplomacy.
|
|—> Iran reached a point where the bene ts of complying with the P5+1 demands and
associated with incentives outweighed any potential bene t that might come from
continuing their nuclear program.
DIPLOMACY
Diplomacy: profession, which traditionally has been learned by practicing the art, by
apprenticeship rather than through science (starts with, but goes beyond diplomats and foreign
ministries).
|
|—> Plays a central role in coercive strategies.
Functions of diplomacy:
• Communication;
• Representation;
• Reproduction of international society.
Diplomacy in action
• Conveys messages (therefore linked to coercion);
• Provides framework for “normal” relationships against which signals cam be better understood;
15
ff
fi
fi
fi
GS João Bazelga
• Creates and maintains relationships between countries/leaders/bureaucracies, etc.
• Face-to-face interaction has qualitatively di erent impact than other forms;
• Form of intelligence collection.
Soft power: when one country gets other countries to want what it wants (in contrast with the
hard or command power of ordering others to do what it wants).
Foreign military intervention: the use of military force to intervene in the domestic a airs of
another state (coercive tactic used to manipulate a country into
taking certain path that would not otherwise have been chosen);
A. Type of military force (air strikes; special operations; arming proxy forces; own ground troops);
16
ff
ff
ff
GS João Bazelga
NATIONAL INTERESTS
• Interests are not simply the result of the structure of the international system;
• States shape the content of structure through the way they act;
• For example, it is possible to transform interstate relationships from security dilemma to security
community (Britain-US and France-Germany);
|
|—> State’s interactions under anarchy create threats and interests (these interests are not
xed, but socially constructed);
Principle of non-intervention (UN Charter): nothing contained in the present Charter shall authorise
the United Nations to intervene in matters which are
essentially the domestic jurisdiction of any state (has
been present in international law since the Treaty of
Westphalia in 1648).
1. To defend against direct attacks on the United States, its citizens, and its allies;
2. To counter aggression [e.g., Iraq’s invasion of Kuwait];
3. To defend our key economic interests, which is where most Americans see their most
immediate stake in our international engagement [e.g., Kuwait];
17
fi
fi
ffi
fi
ff
GS João Bazelga
4. To preserve, promote and defend democracy, which enhances our security and the spread of
our values [e.g., Panama and Haiti];
5. To prevent the spread of weapons of mass destruction, terrorism, international crime and drug
tra cking [e.g., Panama for the last];
6. To maintain our reliability, because when our partnerships are strong and con dence in our
leadership is high, it is easier to get others to work with us, and to share the burdens of
leadership [e.g., Bosnia];
7. And for humanitarian purposes, to combat famines, natural disasters and gross abuses of
human rights with, occasionally, our military forces [e.g., Somalia, Haiti, and Bosnia].
|
|—> These guidelines are vague, which gives the US the freedom to choose whether to use force
or not.
After military intervening in a state, the US/UN are expected to conduct a peace support
operation.
|
|two goals
|
|—> Nation-building;
|—> Democratisation.
Post-WW2
Germany and Japan: testimony that it is possible for outsiders to establish relatively benign
| governments which locals will support for at least half a century.|
|
3 factors facilitated this:
I. Unconditional surrender after WW2 (gave the allies freedom to do
what they wanted);
II. Level of development and education in both countries (both
countries were highly industrialised societies);
III. Serious commitment on behalf of the allies to create democratic
states.
|
|
|—>Germany: assistance in the construction of a democratic political system, that prevents
| the country to become a future threat to international peace; devolution of political
| powers to germans; decentralised political institutions;
|
|—>Japan: autocratic imposer of a democratic political and economical system; hunger forced
the Japanese governments to embrace democracy.
Cold War
- Increase of civil con icts have led the international community – particularly the United States –
to respond to some, but signi cantly not all, situations that would have been overlooked during
the Cold War.
18
ffi
fl
fi
fi
fi
GS João Bazelga
|
|—> In these areas, the Soviet Union intervened to spread communist ideology (and/or counter
US advances), while the Americans did the same, ostensibly to spread democracy (and/or
contain communism) - E.g.: Vietnam War, Invasion of Grenada and the covert activity of
Central America.
Vietnam War
- President John F. Kennedy saw in South Vietnam his opportunity to prove to the international
community that the U.S. could prevent communism and build a democracy in another part of
south-east Asia (after China had fallen to communism);
- Many of the democratisation programmes were overly concentrated in the cities, even though
90 per cent of Vietnamese lived in rural areas.;
- The danger of an external power promoting half-hearted reforms, while ignoring the
undemocratic methods pursued by the US-backed leader, is that it often causes the population
to revolt against that government;
- The US defeat in Vietnam damaged an American psyche that had become arrogant in its belief
that it could change the world.
The defeat on the Vietnam war meant a retreat in intervention overseas (not a full retreat);
|
Attempts at actually building democratic states virtually stopped;
|
BUT
|
|—> Both the US government and the UN bene t enormously by an increase in democratic
governments world-wide.
• Panama (1989): rst attempt to apply the democracy rationale without the corresponding threat
of communism;
• Somalia (1992): intervention in a purely humanitarian crisis that did not a ect the developed
| world (ended up failing);
|
|—> Somalia obliged the US government and the UN to re-evaluate their roles in international
crises.
• Haiti (1994): became the rst case in which the aims of the military intervention and the nation-
building attempt were the same - to establish a democratic state (proximity to the
United States and problems associated with the increase in refugee ows to
Florida);
• Bosnia and Herzegovina (1995): humanitarian grounds, although maintaining the credibility of
NATO and US leadership in Europe was factored in as well.
19
fi
ff
fl
fi
fi
fl
fl
ff
GS João Bazelga
US’ Foreign Policy - “America now solves problems with troops,
not diplomats”
After the terrorist attacks in 9/11/2001, the US decided to attack Al-Qaida and the Taliban
immediately.
|
US Foreign Policy Department tried to asses what went wrong;
|
|—> Intelligence failures? Airline security? Intelligence cooperation with others? Broad policies?
|
They decided to go after regimes that might support terrorism in the future: “Axis of Evil” - Iran,
Iraq, North Korea.
|
|———> Develop doctrine of preventive war (which di ers from preemptive war).
Criteria to consider:
1. Logic of the case;
2. Strength of the link to US national security;
3. Evidence supporting the case;
4. Regional implications of action/inaction based on the case.
Multiple rationales:
- WMD (prevent terrorist groups of acquiring them);
- Terrorism;
- Human rights;
- Democratization;
- Deterrence;
- Oil;
Multiple motivations:
- 9/11 changed everything;
- Regional balance of power;
- Because we can (the “Revolutionary in Military A airs”);
- Because we should (neoconservative theory);
Multiple audiences:
- International coalition partners;
- UN as international legal cover;
- US Congress;
- The American public;
20
ff
ff
GS João Bazelga
Operation Iraqi freedom begins - March 19, 2003
• Reconstruction;
Bargaining theory: directs attention to the inherently strategic nature of all wars and implies that
| war is always a failure due to its an ine ciency to settle disputes (rationalist
| approach);
|
War occurs when…
- Commitments are not credible;
- States possess private
information about their costs of
ghting and incentives to
misrepresent that information;
- States are uncertain over their
probability of victory.
|
|—> Inadequate to explain the Iraq War
Why is the bargaining theory inadequate to explain the Iraq war and war in general?
21
fi
fi
ff
fl
ffi
fi
GS João Bazelga
|—> Domestic politics and political actors are important to study war (countries can be more
or less belligerent depending on their internal characteristics and the pressure of domestic
actors).
D. States act rationally (information problems to lead to war if one side has private information
about how costly war will be for it and an incentive to “intentionally misrepresent” that cost to
its enemy);
|
IW: These were not the types of information problems that led to war, instead…
- US did not correctly assess its own costs of ghting;
- Iraq did not correctly assess the Bush Administration’s resolve and military strategy;
|
|—> Cognitive and decision-making biases a ect governments’ behaviour.
Behavioral theory: integrates human decision making biases into the strategic interactions that,
through bargaining failures, produce war.
|
|—> A marriage of behavioral and bargaining theory promises to be more powerful than either
alone (this theory complements rather than substitute the bargaining theory).
Terrorism is contentious/controversial;
|
|Examples
|
|—> IRA in Northern Ireland: British government —> terrorists; Supporters of Irish unity —>
| freedom ghters;
|
|—> ANC in South Africa: Apartheid governments —> terrorists; Supporters of South African
liberation —> freedom ghters; Nelson Mandela becomes president
of South Africa in 1994.
22
fl
ff
fl
fl
fi
fi
fi
fi
ff
ff
ff
fl
GS João Bazelga
Terrorism: the use of violence against civilians by non state
actors to attain political goals (often de ned popularly or
legally);
|
|—> Term without any legal signi cance - it is merely a
convenient way of alluding to activities, whether of
states or of individuals, widely disapproved of and in
which either the methods used are unlawful, or the
targets protected, or both.
• Political and normative connotations (no di erence made between terror, terrorist, terrorism);
• Many di erent groups (organized/unorganised; durable campaigns/ad-hoc) - only very small
number of groups focused on terrorist activities;
• Many di erent contexts (domestic/transnational);
• Not useful to cover distinct phenomena under the category of terrorism (doesn’t have “causal
coherence” - di erent explanations for di erent types);
Most de nitions agree that instrumental political killing of civilians in peacetime is terrorism;
|
Beyond that, terrorism remains a contested terrain of diverse political and moral opinion;
|
How to move forward?
|—> Terrorism as modus operandi (its a way of operating, a tactic) and not inherently
attached to a group.
Types of terrorism
23
ff
fi
ff
ff
fi
ff
fi
fi
ff
fi
ff
fi
fi
GS João Bazelga
• Domestic terrorism:
|—> Leftist - 1970s Italy, Germany;
|—> Ethno-national - PIRA in Northern Ireland, ETA in Basque region in Spain;
• Islamist ideology;
• Terrorist activity internationally and in main countries of operation;
|
However
|—> Also held territorial control;
|—> Engaged in other forms of political violence (guerrilla warfare, direct battles with armed
groups/armies, disciplining people living under their control);
• Ine ective in achieving “outcome goals” (compared to guerrilla attacks on military targets for
example) - Abrahms;
COUNTERTERRORISM
Incident management (includes anything done, once a terrorist incident occurs, to mitigate its
| e ects).
|
|Employed through…
|
|
|—> Attacks in which hostages are seized and their lives are kept in jeopardy;
|—> Communication with the public and the role of the press;
|—> Possible use of force to rescue the hostages (successful rescue operation avoids the di cult
| choices of whether to make concessions to terrorists, as well as constituting a dramatic blow
| against terrorism and immediate punishment of terrorists);
|
Has acquired a new meaning;
|
|—> In recent years, most major terrorist incidents have involved not the seizure of hostages and
the threat of in icting harm on them but instead the direct and unprovoked killing of innocent
people.
Defensive/Static measures
A. Tools:
- Protection of individual sites that could become a target of terrorist attacks (o ce
buildings, military bases, embassies, etc.);
- f short-term protection provided to high-pro le events;
- Personal security given to governmental leaders or other prominent persons;
- Security provided to entire systems - a breach in one part of the system can a ect the
safety of all of it and its multilayered (aviation security measures);
- Protection of an entire country and its boarders - most general level (US, following the
9/11 attacks focused on homeland security);
B. Advantages:
- May deter terrorists from attacking;
- Complicating terrorists’ planning slows them down, providing more time in which they
might be detected;
- By forcing terrorists to prepare their operation in ways they might not otherwise have
used may increase the chance they will be caught;
C. Disadvantages:
- Expensive;
- Not everything can be protected, even though everything is a potential target (terrorists
always have the advantage of choosing where to attack, which will re ect where security
is weaker);
- Openness of free, Western societies (always will be say to nd crowds in public places);
• Tools:
- Diplomacy - for operations that cross international boundaries;
|—> Multilateral: most useful in creating a worldwide climate that recognises terrorism
| as a shared problem and that is supportive of counterterrorist e orts;
|—> Bilateral: most practical international cooperation on terrorism;
25
ff
fl
ff
ff
fi
fi
ff
fl
ff
ffi
ffi
GS João Bazelga
- Financial control in the form of freezing or seizing of terrorist assets (hardly done since
much of the money associated with terrorism ows through channels that are extremely
hard to detect and intercept and most terrorism is cheap);
A. Advantages:
- Prevents him from committing further attacks;
- Demonstrates governmental resolve;
- Strengthens deterrence of other terrorists apprehensive about getting
caught;
- Impede or restrict their operations;
- Satisfy the public’s appetite for punishment of wrongdoers;
B. Disadvantages:
- A terrorist rst must be caught (the senior leaders who plan and direct the
attacks are less likely to be caught);
- In state-directed terrorism, the leaders most responsible are unlikely ever to
be arrested;
- Deterrence may be ine ective (leaders tend to go free and for suicide
bombers it is irrelevant);
- Accused terrorists may use a public trial as a platform for propaganda;
- Incarceration of convicted terrorists may stimulate further attacks (perhaps
in the form of hostage-taking aimed at bargaining for the prisoners’
release);
- Operating across international boundaries, jurisdictional issues also
complicate the application of criminal justice;
- Disagreements over the death penalty (has complicated extradition and
information sharing cases);
26
ff
fi
fi
ff
ff
fl
GS João Bazelga
Military force
Employed in the US intervention in the civil war in Afghanistan following al-Qaida’s attacks in the
US.
|
|—> This success helped to raise expectations, especially in the US, about how a more
aggressive use of military force might be used e ectively to combat terrorism.
A. Advantages:
- Immediately disrupts or destroys terrorist capabilities;
- May have deterrent e ects not just on terrorist groups, but also on states;
- Doesn’t involve the administrative and legal complications that legal
prosecution does;
B. Disadvantages:
- Most international terrorism simply does not present very many good military
targets;
- A military attack may serve more to provoke than to deter;
- Inherently destructive nature of military force (collateral damage, including the
loss of innocent lives is almost inevitable);
There is unavoidable con ict especially with two values: liberty (absence of restrictions on daily
life) and privacy (avoiding governmental scrutiny of personal matters).
• Make use of information technologies for military e ectiveness (control trough information);
• Publics in US/Europe more risk averse (compared to constrain political leaders and fewer
recruits for militaries);
• Use technology to transfer risk - minimise fatalities by transferring the risk to enemy
combatants: Predator drones; Precision guided munitions; Stealth bombers;
DRONES
Unmanned Aerial Vehicles (UAVs): remotely piloted or self-piloted aircraft that can carry cameras,
| sensors, communications equipment or other payloads.
|
27
ff
fl
ff
ff
ff
GS João Bazelga
|—> Used for intelligence gathering since 1950s;
|—> US rst used weaponised drone in Afghanistan in 2001;
Advantages
Legal framework
|—> Clear in battle zones (e.g.: Afghanistan);
|—> Problematic in Yemen, Pakistan, Somalia (not at war with US);
• Obama vowed to ght terrorism with greater e ectiveness (targeted killing through drones) and
moral rectitude (end of torture by US agencies and close the detention facility at Guantanamo
Bay) than his predecessor.
• Obama has increasingly turned to a more deadly and permanent method of dealing with
individuals suspected of terrorism in the use of unmanned drones for targeted killing.
• The Obama administration did little to publicly acknowledge its policy on targeted killings during
its rst three years in o ce;
• Administration announces that it takes signi cant steps to ensure that all drone attacks are
consistent with ‘law of war principles’;
|
|—> Principle of distinction (requires that attacks be limited to military objectives and that
| civilians or civilian objects shall not be the object of the attack);
|
|—> Principle of proportionality (prohibits attacks that may be expected to cause incidental
| loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof,
| that would be excessive in relation to the concrete and military advantage anticipated);
|
Despite the reassurances of administration o cials that all targeted killings were conducted
within strict legal limits, it was largely unclear who was involved in targeting decisions, what
criteria were being applied and whether the discussions considered the merits of killing rather
than capturing targets.
• The nal decision to carry out the majority of attacks appeared to rest with the CIA’s general
counsel (Obama only has a nal say on complex and risky operations);
• Washington obviously wants to avoid using ground troops in Pakistan due to the political
consequences of violating national sovereignty;
28
fi
fi
fi
fi
ffi
fi
fi
ffi
ff
GS João Bazelga
• Highly criticised:
- Concern about the programme’s lack of transparency has led to criticism
from high-level gures.
- The strikes generate anger about US forces operating in a sovereign
country that it is not at war with, and the human cost of attacks on highly
populated areas (only 12% of Pakistan respondents had a favourable view
on the US);
- Targeted-killing is the least popular Obama policy by the international
community (however, 62% of Americans support it);
- While the targeted-killing programme may be operationally e ective, it
remains a deeply problematic approach to counter-terrorism in that it
prevents intelligence-gathering through the capture and interrogation of
targets and creates more enemies to the US;
• CIA’s mission changed from “watch and wait” to “capture and kill” (even though this was denied
by the White House);
|
|—> By killing rather than capture:
- Eradicate potential terrorist threats in a less risky way;
- Limit or prevent collateral e ects on civilian populations;
- Avoid the di culties associated with where to hold and
how to interrogate captured terrorist suspects;
A. Moral considerations: civilian deaths; “playstation mentality” (the ease and anonymity with
which drone strikes are carried out in which there is a big distance between the killer and the
killed);
|
|—> Drones follow a trend of increasingly remote weapons that distance both their operations
from the physical act of killing and the public from their humans costs;
C. Ine ectiveness:
|
|—> By 2010, only 2% of combatants killed were leaders of militant groups;
|—> Prevents collection of intelligence from captives;
• Brandon Bryant was one of the rst recruits for a new kind of warfare in which men and
machines merge (he commanded drones used for belligerent purposes);
• The use of drones for military means is generally accepted by the American public (61%);
• Over time, he found that the job putted him in “zombie mode” where he killed people casually;
• The drone operators are as close to the deaths they cause as people might think (they are
emotionally disturbed);
29
ff
ffi
fi
ff
fi
ff
GS João Bazelga
Civil War
DEFINITION OF CIVIL WAR
• Popular use of the term “civil war”, or alternatives to it, can have normative undertones.
• Armitage (2017):
- We remain so confused about civil war and refuse to look it in the face;
- Under-theorised;
- Contested meaning (controversial);
- Has political implications (reinterpreted and redeployed in multiple contexts for multiple
purposes);
- Has implication of being backwards looking and destructive (contrary to fertile revolution);
Civil War: armed con ict within the boundaries of a sovereign entity between parties subject to a
| common authority at the outset of the hostilities (Kalyvas);
|
|—> The parties to the con ict: are political and military organized and have publicly stated
| political goals (e.g.: cartels are not a group with political goals);
|
|—> The main organizations recruit locally;
|
|—> Con ict is large-scale (the gravity of the con ict challenges the state’s sovereignty);
|
|—> Violence is sustained (doesn’t include social con icts);
• The Bush Administration is reluctant to call the Iraq con ict a Civil War because it would require
a justi cation for the US intervention in the region and an admission of failure of Iraq policy;
• In many civil wars since 1945, such as the one in Iraq, there are irregular units and militias
ghting the war;
• In the Iraq con ict, the Shia Islam group is highly fractioned and the goals of the groups ghting
the war are clear (which makes it more similar to a Civil War);
• By calling it an insurgency rather than civil war, it downplays the gravity of the incident and
doesn’t highlight the possible big costs that the US will have;
• An analytical de nition of civil war allows us to de ne a meaningful phenomenon, which centres
on large-scale, violent internal challenges to the sovereign authority of governments;
30
fi
fi
fl
fl
fi
fl
fl
fi
fl
fi
fl
fl
fi
GS João Bazelga
TYPES OF CIVIL WAR
Macro-level cleavage: the principal national-level dispute separating the warring parties;
Belligerent war aims: embodied in macro-level cleavage, but potentially distinct from it (questions
of timing, evolution);
The issues that a war is fought over and the organisation of the warring parties are meaningful
ways of distinguishing between an ethnic type of civil war and non-ethnic wars;
Ethnic war: con ict between tow or more contending ethnic groups (characteristics transcend to
| sectarian/religious/ideological wars);
|
|—> Ethnic wars are not caused by deep, popular hatreds - social polarisation is the result of
| violence;
|—> During ethnic wars, violence tends to be perpetrated by “specialists in violence” rather than
| ordinary individuals;
|—> The category is political - foreign leaders use it to justify non-intervention;
|—> Create extremely violent con icts - US decided not to intervene in the Sectarian (religion) war
in Syria because the divisions are to meaningful.
• Con icts between Bosniaks (supported from Muslim countries), Serbs (supported from
Eastern Orthodox countries), and Croats (supported from Catholic countries);
• Ethnic division in Yugoslavia were not that preponderant (support for militant nationalist in
Yugoslavia was not signi cant and 61% answered in a referendum that they do not agree
that every Yugoslav nation should have a national state of their own);
|—> Great divide within Yugoslav society was between rural and urban communities;
• Politicians started the wars, by contracting hooligan groups, gangsters, mobsters, prison
inmates, mercenaries, violent opportunists, etc.;
|—> Paramilitary groups are strongly correlated with the killing of civilians, rape, torture,
destruction of property, looting, detention facilities, and mass graves;
• These war had far less to do with nationalism than with criminal opportunism and sadistic
cruelty;
32
fl
fl
fl
fi
fl
fl
ff
ff
GS João Bazelga
3. Revenge (some that ed with their fellow ethnics, then joined like-minded armed bands
in more hospitable parts of the country to defend their group);
4. Occupation and desertion (thugs stayed in the areas they took and political aims of the
war became hopelessly intertwined on a day-to-day level with pro teering and black
market activities - the protected groups emigrated);
B. Rwanda’s genocide;
• Almost con rms the Hobbesian view due to the amount of casualties;
• Genocidal process had been planned for years by Hutu extremists who were substantially in
charge of the ruling party, the government bureaucracy, and the police;
• The Hutu army recruited militia bands (Interahamwe), poor people, criminals, landless
peasants, the urban unemployed, and foreign drifters who had chie y signed up not for
ideological reasons but for the guaranteed food and drink and the opportunity to loot;
• The massacre was mainly due to the violent participants of the con ict rather than an all
against all situation (more than 90 percent of the over-13 Hutu population did not participate
in killings);
We have entered a “new era,” in which “war will not be waged by armies but by groups whom we
today call terrorists, guerrillas, bandits, and robbers.
The tendency to see fundamental di erences between “new” (criminal) and “old” (political) Civil
Wars is based on an uncritical adoption of categories and labels grounded in a double
mischaracterisation:
|—> Information about recent or ongoing wars is typically incomplete and biased;
|—> Historical research on early wars tends to be disregarded;
I. Its false that new Civil Wars don’t have (collective) purpose;
|
|—> Based on biased and incomplete data that focuses on city-dwellers and members of pro-
| governmental organisations;
|—> Looting is an analytically problematic concept to associate with new Civil Wars (not always
| clear who is doing the looting; linkage between looting and grievance/revenge is uid;
| oversimpli cation of this con icts; do people wage in war to loot or the other way around?);
|—> Rebel motivations are diverse and go beyond mere banditry (their ideological motivations are
just not visible from a perspective based on western patterns on allegiance and discourse -
warlords’ aim is rule, rather than looting);
II. The typical picture of ideologically oriented actors in old Civil Wars is misrepresented;
|—> Such actors have often engaged in criminal activities, large-scale looting, and the
| pronounced coercion of the populations whose grievances they claimed to represent);
|—> The importance of ideological motivations in old civil wars has been greatly overstated
(academics tend to attribute an ideological motivation to actors of a con ict; a lot of the
ideological claims were super cial; local considerations tended to trump ideological ones);
33
fi
fi
fl
fi
fl
ff
fi
fl
fl
fl
fl
GS João Bazelga
Support: Broad Vs. Lack
II. Perception that rebellions in old Civil Wars were based on widespread popular support has
been called into question;
|
|—> Informed by uid, shifting and often locally based cleavages;
|—> Because elites code rebellions on the national level, they erroneously imply that they have
| popular support;
|—> Locally segmented cleavages often aggregate in misleading ways (e.g.: wealthy peasants
| may support one political actor in one region and its rival in a di erent one);
|—> Group interests are often localist;
|
In old Civil Wars, support was shaped, won, and lost during the war, often by means of coercion
and violence and along lines of kinship and locality;
I. Perception that Civil Wars are particularly cruel predates new Civil Wars (violence is in fact the
central component of all kinds of civil war);
Flawed categories and the assumptions derived from them undermine even the most
sophisticated modelling exercises.
34
fl
fi
fl
ff
GS João Bazelga
• In many con icts such as the Iraqi army vs. Islamic State, there are groups called militias that
operate alongside regular security forces or work independently of the state to shield the local
population from insurgents;
• Cases like this one (guerrilla war) need special ghting groups and skills, no regular army can
ght such a war;
• In this region, this civil defense forces often manage to re-establish some form of political
stability with surprising success (leading too a drop of violence);
Militia: military force that is raised from the civil population to supplement a regular army in an
emergency.
➡Even though having many reasons to collaborate with them, states rarely control what
this armed groups are doing;
➡Governments often take advantage of militias by strategically encouraging or
restraining their use of violence against civilians (especially when they are weak
democracies or receive aid from other democracies);
➡Not all governments collude with militias because of purely military incentives (states
sometimes sponsor the militias that support their ideological project);
➡Militias aren’t simply submissive agents fully controlled by the state (there can be
militias formed by the state or militias mobilised by communities and independent of
state forces);
➡How militias recruit and socialise their members has an enormous e ect on how they
behave—as is true for any other armed group in civil wars (combatants who joined the
insurgents for ideological reasons are less likely to side-switch and join paramilitaries
than economically-motivated combatants);
➡Almost every report about militias includes a story about their brutal tactics (it
frequently increases violence on civilians);
➡Studying all types of armed groups alongside each other is the most promising
approach to understanding militias;
GUERRILLA WARFARE
Guerrilla warfare: type of insurgency in which small groups of combatants, such as paramilitary
personnel, armed civilians, or irregulars, use military tactics to ghts a larger
and less-mobile traditional military;
• The people are like water and the army is like sh;
• Stages of warfare:
(1) Organisation, consolidation and preservation (political education,
clandestine action in rural areas);
(2) Progressive expansion (guerrilla warfare, liberated areas, attack on
towns);
(3) Destruction of the enemy (mobile warfare/conventional war, capture
cities).
• Foco theory of guerrilla warfare: small vanguard can replace initial mobilisation of peasants;
|—> Fighting vanguard creates conditions for revolution;
|—> Countryside is the battle ground;
|—> Adapted into urban warfare doctrine by later thinkers/insurgents.
COUNTERINSURGENCY
Counterinsurgents’ strategy:
I. Separate insurgents from civilians;
II. Protect civilians against insurgents;
III. Provide public goods to civilians.
|
“Clear-hold-build” operations: operations aim rst to destroy insurgents’ military capabilities
through o ensive action and to separate them from the population
so that the civilians can feel secure, then to defend population
from insurgents using military means, and nally to assist them in
improving economic and human development and help institute
36
ff
fi
fi
fi
fi
GS João Bazelga
political reforms (all of this without the use of force - improves the
liveability of its success);
|
|2 assumptions
|—> Majority of civilians can be induced to support the government if their security is guaranteed ;
|—> That insurgents and their civilian sympathizers can be “ ipped” if given su cient incentives;
Counterinsurgent goals:
• Eliminate key insurgents and establish population control;
• Then pursue political objectivities;
General challenges
I. Slow and costly process (need to commit massive human and material resources);
II. Success depends on targeted attacks against militants and provision of services to civilians
(indiscriminate violence may create “accidental guerrillas”);
III. Good intelligence necessary (not necessarily available to the counterinsurgency, particularly
when operations begin in a given area).
Additionally, Kilcullen warns of the dangers of applying wholesale lessons from classical
counterinsurgency to contemporary situations as the nature of the insurgents, the complexity of
local environments and the globalization of the international system require a careful adaptation of
counterinsurgency to the contemporary era (one key aspect has not changed however - battle for
the support of the people).
• Goal: ip allegiance and/or build broad-based popular support (only by getting the population to
side with the government can counterinsurgents achieve victory);
• Any identity-based boundary that can plausibly de ne the government and counterinsurgent
forces as belonging to an outgroup in reference to the target population can activate
parochialism;
• Alliances with local armed groups can temporarily overcome the challenge of parochialism, but
may exacerbate other group tensions;
• Conditions, including institutions, which increase the salience of group membership or divisions,
tend to increase parochialism;
• Ethnicity made salient by violent con ict that leads to a vicious cycle in which violence and
parochialism reinforce each other;
• Material incentives alone are unlikely to be su cient to guarantee the support of a population
where ethnic or sectarian identi cation is entrenched and the government is part of the
outgroup (material inducements to key social groups might even be counterproductive);
38
fl
fl
fi
fi
fl
ffi
fi
GS João Bazelga
• Short-term, strategic alliances across group boundaries are no indicator of parochialism’s
absence;
• In the presence of social divisions, COIN as currently practiced can both compound the
di culty of defeating the armed challenge and make nation-building even harder.
Reasons why the US military was fast to return to the traditional mission of preparing for interstate
con ict, after their counterinsurgency attempt:
• COIN is not a mission that the military necessary likes due to its messiness and
inconclusiveness, which can cost a lot of lives and are “post-heroic”;
• Military culture of e ciency, organization, and clear mission is somewhat at odds with what it
takes to do successful COIN (which includes empowering locals, minimally use of force, letting
civilian agencies to take the lead and taking on non-scienti c functions such as economic
development);
• COIN gives the lead to the Army and Marines, rather then the Air Force and the Navy;
• COIN does not require any major advanced weapons platform;
• US record in COIN does not encourage making it a core mission;
• There are also concerns that ghting “wars of choice” in Iraq and Afghanistan has led to the
neglect of more fundamental security problems (such as nuclear proliferation in North Korea and
Iran or Chinese and Russian adventurism).
|
|—> In Afghanistan, there was not a strong insurgency initially;
|—> In Iraq, the Bush Administration had no expectation that they would need to ght insurgents;
Afghan Counterinsurgency: The Runway General - The pro le that brought down McChrystal
• Obama chose McChrystal to lead the Afghan war without knowing much about him;
• COIN calls for sending huge numbers of ground troops to not only destroy the enemy, but to live
among the civilian population and slowly rebuild, or build from scratch, another nation’s
government – a process that even its staunchest advocates admit requires years, if not
decades, to achieve;
|
|—> By publicly saying that Afghanistan requires a counterinsurgency with the deployment of
more troops, McChrystal pisses of and ends up pressuring Obama to send the biggest
number of troops;
• Despite the tragedies and issues, McChrystal has issued some of the strictest directives to
avoid civilian casualties that the U.S. military has ever encountered in a war zone;
39
ffi
fl
ffi
fi
fi
fi
ff
fi
GS João Bazelga
• McChrystal may have sold President Obama on counterinsurgency, but many of his own men
weren’t buying it;
• Even though the outcomes of the counterinsurgency weren’t great, the Obama administration
employed a rather positive rhetoric to not make it seem that the US got run o ;
• There are quite a few reasons why Obama doesn’t use the word “victory” when speaking about
the Afghanistan COIN:
|—> Taliban still remains too strongly entrenched for the US military to openly attack;
|—> The very people that COIN seeks to win over - the Afghan people - do not want them
| there;
|—> Their ally - president Karzai - used his in uence to delay the o ensive;
|—> Massive in ux of aid is likely to make things even worse;
Perspective of the West: President Vladimir Putin annexed Crimea out of a long-standing desire to
resuscitate the Soviet empire, and he may eventually go after the rest of
Ukraine, as well as other countries in eastern Europe (based on the
shared understanding that realism holds little relevance in the 21st
century);
|
|
This is wrong
|
|
Mearsheimer: The United States and its European allies share most of the responsibility for the
crisis - due to their strategy to integrate Ukraine in the Western world (based on the
idea that realpolitik/realist logic still remains relevant);
NATO has been expanding eastward since the Clinton Administration start pushing for it in
mid-1990s:
I. 1999 - Czech Republic, Hungary and Poland;
II. 2004 - Bulgaria, Estonia, Latvia, Lithuania, Romania, Slovakia, and Slovenia;
Academic views:
A. A few realists also favoured the policy because they thought Russia still needed to be
contained;
B. Most realists opposed expansion, in the belief that a declining great power with an aging
population and a one-dimensional economy did not in fact need to be contained;
C. Most liberals favoured enlargement because the end of the Cold War had fundamentally
transformed international politics (view of Clinton administration);
|—> Putin and his compatriots have been thinking and acting ac- cording to realist
dictates, whereas their Western counterparts have been adhering to liberal ideas
about international politics.
40
fl
fl
ff
ff
GS João Bazelga
Cause 2: EU expansion
May 2008 - unveiled its Eastern Partnership initiative, a program to foster prosperity in such
| countries as Ukraine and integrate them into the EU economy;
|
|—> Russian Foreign Minister Sergey Lavrov accused the EU of trying to create a “sphere of
in uence”;
Cause 3: West’s support for the di usion of democratic and liberal values in Ukraine
Russia’s position
• For Putin, the illegal overthrow of Ukraine’s democratically elected and pro-Russian president —
which he rightly labeled a “coup”— was the nal straw (this happened after separatist
movements in Ukraine after the pro-Russia president rejected an economic deal with the EU
and decided to accept a 15$ billion by Russian countero er).
|
|—> He responded by taking Crimea, a peninsula he feared would host a NATO naval base,
and working to destabilise Ukraine until it abandoned its e orts to join the West (this
seemed easy to Russia due to the naval base and the ethnic majority that Russians have
in that region).
• Great powers are always sensitive to potential threats near their home territory (Imagine the
outrage in Washington if China built an impressive military alliance and tried to include Canada
and Mexico in it);
• The argument that this war was cause by Putin’s autocratic and imperialist essence is wrong.
|
|—> There is virtually no evidence that he was bent on taking Crimea, much less any other
| territory in Ukraine, before that date
|—> Even if it wanted to, Russia lacks the capability to easily conquer and annex eastern
Ukraine, much less the entire country
Neither the United States nor its NATO allies are prepared to use force to defend Ukraine, the
West is relying instead on economic sanctions to coerce Russia (history shows that countries will
absorb enormous amounts of punishment in order to protect their core strategic interests);
|
Solution: The United States and its allies should abandon their plan to westernise Ukraine and
| instead aim to make it a neutral bu er between NATO and Russia.
|
|—> Requires the West to think about politics in a fundamentally di erent way;
|—> The US and its allies should publicly rule out NATO’s expansion into both Georgia and
| Ukraine;
|—> The West should also help fashion an economic rescue plan for Ukraine funded jointly by the
| EU, the International Monetary Fund, Russia, and the United States;
|—> West should limit its social-engineering e orts inside Ukraine;
|
US will need Russia in the future to contain China.
41
fl
ff
ff
ff
fi
ff
ff
ff
GS João Bazelga
Realism is the school of taught that gets more pleasure from seeing other theoretical views fall
short to explain new phenomenon, while they can say they were right all along. However, there are
some problems of their explanation of the war.
• Realists claimed that when opening the door for Georgia and Ukraine to join NATO, the US
triggered a security dilemma with Russia that led to the invasions of Georgia in 2008 and
Ukraine in 2014 and 2022;
|
|—> The realist argument rests on the false premise that, in the absence of NATO expansion,
Russia did not aim to expand its sphere of in uence;
• From a realpolitik perspective, the war in Ukraine has gone extremely well for the United States
and extremely poorly for Russia (which undermines Mearsheimer’s argument);
|
|—> This lose-lose situation is worst for Russia than the US.
• This con ict violates the principles of balance of power politics (which expects the US to ally
with Russia to counteract the emerging power of China);
• Realists understate the importance of Europe and overestimate the importance of Russia;
• War is unpredictable;
Even though ignored, Putin meant what he said in an essay he wrote about the historical unity of
Ukraine and Russia (where he states that Russia, Belarus and Ukraine are one);
|
Conventional wisdom was that Putin could win just by threatening to attack, not by attacking;
|
|He invaded because…
|—> Leader’s preferences;
|—> People’s demands;
|
Constructivism (leaders share their goals and actions based not just on balance of power
calculation, but also on their own understandings of who they are and what their goals are)
|
|—> Putin sees himself as the restorer of the Soviet Union and saw that the Western states were
distracted by other bigger worries so decided to strike (China);
Mearsheimer
|—> The person: o ensive realism; approach to research/policy;
|—> The argument: NATO policy pushed Russia to the attack; “liberal delusions”;
|
Mearsheimer’s argument doesn’t have as much rigour as academic articles;
A. Mearsheimer:
- Russia didn’t want conquest or domination;
- No need for heightened support of Ukraine;
B. Problems:
- Policy before 2014;
- Policy 2014-2022;
- Invasion;
42
fl
ff
fl
GS João Bazelga
A. Mearsheimer:
- Illegitimate coup, sponsored by West, including Ukrainian fascists;
B. Problems:
- Yanukovych’s policies;
- Broad, centrist support;
- Elections;
- Western policy.
A. Mearsheimer:
- Needless and avoidable NATO policies render Russian policy strategically sound;
B. Problems:
- Stabilising Eastern Europe;
- Bucharest summit/War vs. Georgia 2008;
- Policy vs. Perception;
• Germany tried to nd a middle-ground between the German elites who didn’t want to be
involved in the con ict and the Ukrainian elites who required support;
Paths to peace
|
|—> Military victory (unlikely);
|—> Moderation of policies (not likely in Ukraine due to the nationalist sentiments);
|—> Both sides need to feel a decrease in their regime support due to the economic impacts;
|—> Long, rocky and a lot of things need to happen at the same time for peace to be achieved.
The workings of security have long been presented as though they are gender-neutral when in
fact international security is infused with gendered assumptions and representations
|
Women have been marginalised in the study of security due to dominance of realist focus on
(male) elites.
43
fl
fi
fl
GS João Bazelga
|
|—> Feminist approaches call for including women and/or deconstructing gender conceptions.
Gender ‘generally refers to the socially learned behaviours, repeated performances, and idealised
expectations that are associated with and distinguish between the proscribed gender roles of
masculinity and femininity’
|—> The ‘power of gender’ is that it shapes individuals as well as social, political and economic
systems and, in turn, those systems shape identities and institutions.
• Privilege notions of equality and have tended to focus on questions of women’s representation
within the public sphere;
• Many liberal feminists focus on the ways in which, within governments and international
institutions, women remain highly under-represented (this needs to be identi ed so it can be
resolved);
• Core argument: the distinction between the international and the domestic relies on gendered
assumptions, tropes and metaphors;
|—> International - strength, power, autonomy, independence and rationality;
|—> Domestic - weakness, naïveté, irrationality;
• Main goals: Include women’s experiences to transform global politics; Understand the history of
exclusion and devalorization of women in global politics;
• Core argument: our viewpoints are never “neutral” and always “gendered” - we always speak
from dominant assumptions about what is masculine or feminine;
• Main goals:
|—> Break down (deconstruct) gender categories - show how gender AND sex are socially
| constructed;
|—> Critically engage with the consequences of gendered global politics (show how “national
security” reproduces hierarchies and structural violence against which it claims to
provide protection);
Radical feminists
• Women and men are essentially quite di erent from one another and essentially quite similar to
one another;
• Tend to agree that men as a group are less able to express emotion, are more aggressive and
more competitive while women as a group are more nurturing, more holistic and less abstract.
“Post-positivist” approaches to feminist theory: focusing on how gender draws our attention to
the prevailing ideas and meanings associated
with masculinity and femininity, how they di er
across time, place and culture, and the ways in
which power operates through gender.
|
|—> Feminist critical theory: examines pre- vailing assumptions about both women and men;
|—> Feminist postmodernists: any de nition or standpoint will necessarily be partial and any
| attempt to posit a single or universal truth needs to be deconstructed;
|—> Postcolonial feminist theories: the partial truths in circulation around gender, imperialism
constitutes one of the crucial moments, or processes, through which modern identities in all
of their guises become established (make colonised voices be heard in the eld);
FEMINISM IN WARFARE
Where some analysts do focus on people a ected by war, the tendency has been to focus on the
experiences of men.
Feminist accounts of armed con ict do not focus only on the ‘impacts’ of war on women (and
men), they also explore the ways in which women are actors in armed con ict.
45
ff
fi
fl
fi
ff
ff
ff
fl
fi
GS João Bazelga
|—> Both women and men can be victims of con ict and political violence;
|—> Both women and men can be active agents in armed con ict;
Some critics point out that the assumption of men as combatants – or at the very least ‘able to
take care of themselves’ – has resulted in their exposure to greater dangers and levels of violence
during armed con ict.
Historically, the Security Council was much less open to engaging with human rights-related
issues and its adoption of resolutions was limited to a very narrow agenda of state-focused
issues.
|
Relevant steps:
1. Growing recognition of the violations of women’s rights in the armed con icts of the
mid-1990s, particularly in the former Yugoslavia and Rwanda
2. Adoption of the human security agenda by the UN system (in essence, malleable yo interests
of women and girls);
3. Security Council began more readily adopting ‘thematic’ resolutions, focused on broader
human rights-related concerns
4. From 1999 the Security Council began holding thematic ‘open debates’;
5. Women’s organizations intensively and successfully lobbied the council for a response to
women’s experiences of con ict and peace- building;
6. Mark the occasion of International Women’s Day, the Security Council;
7. The UN Secretary-General and several rotating presidencies of the UN Security Council have
also called for member states to adopt ‘National Action Plans on women, peace and
security’ (only 32% of states have adopted);
46
fl
fl
fl
fl
fl
fl
GS João Bazelga
Since 2000, the UN Security Council has adopted a
series of resolutions focused on ‘women, peace and
security’ (WPS) that aim to overcome the historical
exclusion of women and women’s rights from
international approaches to peace and security.
Theoretical origins of the agenda: Liberal standpoint feminism; Where are the women?; Improve
representation of women; Women’s experiences can contribute to more peace;
Challenges
47
ff
fl
fl
ff
fl
fl
fl
fl
GS João Bazelga
- The WPS resolutions are considered to be ‘soft-law’, as they are not adopted under the
Security Council’s Chapter VII enforcement provisions;
IV. Post-structuralist critique: By making the resolution about women, and not gender, we
reproduce the sources of inequality, hierarchy, and male dominance.
Violence against civilians in warfare as increased, including sexual violence (which most of the
victims are women).
|
|—>Policy initiatives against sexual violence during
war provide mechanisms to persecute these
crimes and analyse out sexual violence is a
security issue.
All this positions have aws because they don’t take in consideration the points of the other ones.
Why the Nobel Peace Prize went to 2 people ghting sexual violence in war?
• As Islamic State forces swept through northern Iraq in 2014, they captured the city of Mosul and
then attacked the nearby Yazidi people (3000 girls and women were kidnapped and most were
sexually enslaved);
• The 2018 Nobel Peace Prize winners are a survivor of this attack called (Nadia Murray) and a
genycologist that founded the Panzi Hospital which treats and supports girls and women
brutalised by sexual violence in Congo (Denis Mukwege).
• Wartime sexual violence, which includes sexual torture and forced marriage, as well as rape and
sexual slavery, in icts excruciatingly painful, sometimes mortal injuries and su ering on victims,
their families and their communities;
• Armies, rebels and even forces of democratic regimes abuse civilians during war;
• Among those armed organizations that do engage in wartime sexual violence, some victimise
particular ethnic groups and target gender and sexual minorities;
• Rape is a practice (social pressures to conform violent forms of masculinity can drive
combatants to commit these crimes);
• Organizations that do adopt sexual violence as organisational policy may use it as a military
strategy, as in some cases of ethnic cleansing or genocide (for example, the Islamic
49
fl
fl
fl
fl
ff
fi
fl
ff
GS João Bazelga
State authorises its combatants to hold sexual slaves under conditions it outlines in formal
regulations, but does not order them to do so).
When rape is frequent as a practice, liability for the crime of rape goes beyond ordering, planning
or instigating (e.g.: the International Criminal Court can prosecute commanders if such crimes
were a foreseeable consequence of a common criminal purpose);
Peacebuilding: action to identify and support structures which will tend to strengthen and solidify
| peace in order to avoid a relapse into con ict.
|
How can you overall strengthen things that will avoid con ict from returning?
|
Peacebuilding involves a range of measures targeted to reduce the risk of lapsing or relapsing into
con ict by strengthening national capacities at all levels for con ict management, and laying the
foundations for sustainable peace and development.
Varieties of peacebuilding
• Actor-based: single state, coalition, regional international governmental organisation, UN, NGOs
and civil society;
• Intention-based: Biased vs. Impartial;
• Content based: diplomatic, political, economic, military.
Tradition version of peacekeeping missions (during Cold War): typically involved deploying lightly
armed military forces to monitor cease res or patrol neutral bu er zones between former
combatants, in which troops usually stayed out of the domestic politics of the host state of the
mission;
Ambitious new missions (after the Cold War): including some that aimed to help reconstruct the
political, economic, and social foundations of countries that were just emerging from civil wars—a
much more intrusive role than traditional peacekeeping.
|
|—> Rise in the number of peacekeeping operations;
|—> Number and variety of international actors involved in peacebuilding expanded (private
| military companies were also employed);
|—>Emerged as a kind of ‘life support’ to fragile states just emerging from con ict —a
| decentralised (and at times chaotic) system for reconstituting a peaceful civil society, e ective
| governance, and economic life in war-torn states;
|
After 9/11, two overlapping styles of modes of peacebuilding coexisted: post-conquest
peacebuilding in Afghanistan and Iraq, deeply connected to US national security objectives and
managed largely by the United States; and post-settlement peacebuilding, run mainly by the UN
and regional organizations, and deployed with the consent of local parties.
|
Distinction between peacebuilding and war- ghting has blurred recently.
|
Context for peacebuilding is now quite di erent and more complex.
• Many countries emerging from Civil War remain teetering on the brink between war and peace,
with their inhabitants divided by mutual animosities and fears.
50
fl
ff
fi
fi
fl
fl
fl
ff
fl
ff
GS João Bazelga
|—> Peacebuilders should plan for successive missions over an extended period, with a
signi cant initial presence giving way to a series of less intrusive missions, ideally
ending with a monitoring role and ‘normal’ development programming (fragile peace
may be the more realistic outcome).
• Peacebuilding agencies have often been criticised for neglecting local-level peacebuilding.
|—> Peacebuilders have overlooked the local sources of broader societal con icts such as
| disputes over land rights;
|—> They have also failed to recognize the value of peacebuilding in local communities as a
| solution to violence.
|
For peacebuilders to work e ectively at both the national and community levels and with
hybrid forms of governance, they must have extensive knowledge of local dynamics in the host
society, supplementing the technical and thematic expertise that peacebuilding agencies have
tended to prioritise.
• Although studies indicate that the presence of peacekeepers reduces the overall level of
violence against non-combatants, there have also been glaring failures to provide such
protection.
|—> Greater clarity on the relationship between ‘robust peacekeeping’ and the objectives of
peacebuilding would be a useful step forward.
• Higher levels of income and economic growth signi cantly reduce the risk of post-con ict
societies slipping back into war (even with an agreement on priorities, however, international aid
can still work against the goals of peacebuilding);
• There is a di culty in coordinating the activities of the plurality and diversity of international
agencies involved in these operations.
PEACEKEEPING
Robust peacekeeping: involves the use of force at the tactical level with the authorisation of the
Security Council and consent of the host nation and/or the main parties to
the con ict;
Mandates
• Legal framework for peace operation’s activities;
51
fi
fi
ffi
fl
fi
ffi
fl
ff
ffi
fi
fi
fl
fl
GS João Bazelga
• Written in Security Council Resolutions;
• Reported on by the UN Secretary General;
Peace enforcement: comprised more heavily armed missions authorised to use force to achieve
purposes other than self- protection;
Preventive diplomacy: diplomatic e orts to ease tensions before they result in con ict.
The UN was moving in the direction of more complex, multifunctional operations that sometimes
displayed a mixture of all these mission types, leading to persistent de nitional ambiguities.
|
|—> There has been a gap between these expansive statements and the UN’s peacebuilding
programs, which have continued to focus on post-con ict activities;
Mandate 1 (before the genocide): assist in ensuring the security and monitor the cease re
agreement;
Mandate 2: Act as intermediary, assist in the resumption of humanitarian relief operations and
monitor development.
Mandate 3: Contribute to the security and protection of refugees and civilians at risk and provision
of security for relief operations to the degree possible.
UNAMIR Strength:
1. 5 October - 20 April 1994: 2548 military personnel, including 2217 troops and 331 military
observers, and 60 civilian police;
2. 21 April - 16 May personnel: 270 military personnel;
3. 17 May 1994 - 8 June 1995: Some 5500 military personnel, including approximately 5200
troops and military support personnel and 320 military observers, and 90 civilian police (in
February 1995, the authorised strength of the civilian police was increased to 120)-
• The fax, headed “Request for Protection for Informant,” was sent by Major General Roméo
Dallaire, the U.N. force commander in Rwanda, to peacekeeping headquarters in New York, and
it reported in startling detail the preparations that were under way to carry out precisely such an
extermination campaign (advised by the major’s informant);
|
|—> The response from the UN, was to not escalate the peacekeeping mission because the
| mandate imposed by the UNSC didnt allow for ir, but it told Dallaire to share the info with
| the president and the ambassadors of France, Belgium and US;
52
ff
fl
fi
fl
fi
GS João Bazelga
|
How could such a fax not be passed on immediately to the Security Council and all the member state? And possibly not be seen by
the Secretary-General?
|
It was true that the Clinton Administration had lost its appetite for peacekeeping operations
after Somalia.
• The peace that this U.N. blue helmets were in Rwanda to keep was a ction;
• The informant of Major Dallaire discovered that the Habyarimana’s government planned to incite
a civil war to force the withdrawal of Belgian troops in their country;
• Habyarimana was assassinated—a move that created a pretext for the most radical elements of
Hutu Power to seize control of the state and implement their program;
• One day after, Rwandan troops captured, tortured, murdered, and mutilated ten Belgian blue
helmets, which forced the end of this U.N. mission;
• The informant had o ered to assist the U.N. force in raiding interahamwe weapons caches, and
all he asked in return was U.N. protection for himself, his wife, and their four children.
• When the violence in Rwanda was at its peak, Ko Anna said that the peacekeeprs have the
right to defend themselves, and we de ne self-defense in a manner that includes preemptive
military action to remove those armed elements who are preventing you from doing your work;
• Dallaire considers himself the person to blame in the Rwandan mission failure;
• Dallaire shames the international community, concerned primarily about Western states, for not
caring about the Rwandan people.
Operationalising peacebuilding
A. Negative peace - sovereignty (absence of con ict/
violence);
B. Positive peace - participation (sets higher standard,
does the political system allow for participation so
that challenges goes through the political system);
53
fl
fl
ff
fi
fi
fl
fi
fi
GS João Bazelga
this by getting the warning side on the same page;
• Two side do not have incentives to do the same thing - prisoners dilemma;
UN peace operations more likely than non-UN operations to prevent recurrence - capabilities vs.
Impartiality;
|—> Criticism: By only looking at cases where there was a peacebuilding e ort, the results might
be bias;
54
fl
ff
ffi
fi
ff
ff
ff
fl
fl
fl
fl
ff
ff
fl
ff
ff
fl
GS João Bazelga
• Capacity-building programs are more likely to succeed if elites support them for their own
purposes.
• Peacebuilders should also look for ways to reduce their dependence on post-con ict leaders
and include more non-elite sources of authority.
• “I don’t want you to be hopeful. I want you to panic. I want you to feel the fear I feel every day.
And then I want you to act. I want you to act as if you would in a crisis. I want you to act as if
the house was on re. Because it is” - Greta Thunberg.
• “Turning out more solar panels and wind turbines may not sound like warfare, but it’s exactly
what won World War 2” - Bill Mckibben
|
|—> Both of these people, used security discourse to describe the climate change crises.
Human security: provide for essential needs of vulnerable people, it is a concern with human life
and dignity (the idea that not just survival is ensured, but also that people live a
good life) —> Human security is achieved when individuals and/or multiple
actors have the freedom to identify risks and threats to their well-being and
values
|subset
|—> Environmental security: risks from environmental
change (such as armed
c o n i c t ) - re s o u rc e s
m a n a g e m e n t ,
conservation techniques,
pollution prevention.
Throughout the twentieth century, the idea of the state as the sole security actor became
increasingly prevalent, especially during the Cold War. However, attempts to widen and deepen
the concept of security continued throughout this period, with the focus broadening, for example,
to include environmental issues and a vision for society/nation as opposed to solely security for
the state.
|—> States have never been the only ‘security’ providers, particularly where human security is
concerned.
Human security must be used to interrogate and problematise the values and institutions which
currently exist as they relate to human welfare and more thoroughly question the interests that are
served by these institutions.
|— Some criticise it for being nothing more than a tool to further state and international agendas.
• Four developments:
1. Economic growth no longer main indicator of development (“human development” as
empowerment of people);
2. Increase in Civil Wars;
3. Globalization spreading transnational dangers such as terrorism and pandemics;
4. Post-Cold War emphasis on human rights and humanitarian intervention.
56
fl
fl
GS João Bazelga
- Human security as “freedom from fear and freedom from want” (some criticise by being too
vague or too encompassing);
|—> In contrast to the focus on direct, physical violence in the dimensions outlined above,
the categories of food, health, economic and environmental security might be said to
align with ‘freedom from want’.
- State security is not the same as security of citizens;
- Individuals as referent objects, but also security actors.
• The CHS report:
- Claimed that human security included the ‘interrelated building blocks’ of freedom from fear,
freedom from want and ‘the freedom of future generations to inherit a healthy natural
environment’;
- Human security also ‘reinforces human dignity’.
I. Lack of precision (everyone is for it, but few people have a clear idea of what it means);
III. Human security fails to provide a resource for either understanding global security politics or
the processes through which political communities give meaning to security
IV. Securitization of poverty, ill-health, and poor education (in the vast majority of cases,
securitization will not lead to any signi cant improvement in the lives of individuals);
V. Role of the state in human security (viewed from a human security perspective, states are
more often part of the problem than the source of the solution);
VI. From prevention to intervention (R2P risks over-emphasising military means and prioritises a
“top-down”, statist, and interventionist approach to security).
• Rates at which the earth is in decay (carbon emissions, acidic oceans, depletion of the ozone
layer, pollution of land and water, threats to biodiversity and climate change);
57
fi
fi
GS João Bazelga
- Environmental degradation and resource scarcity in the Global South (lead to refugee,
migration, erosion of nation states, empowerment of private armies, security rms and
international drug cartels);
Armed con ict is not an inevitable consequences of climate change —> likelihood of collective
violence depends on the vulnerability to climate-induced changes to livelihoods and government
policies to adapt to and mitigate e ects.
A. Pre-disaster conditions;
|
|—> Livelihoods dependent on agriculture;
|—> Poverty;
|—> Political exclusion of minority groups;
|—> Weakness of state instituions (for con ict resolution);
|
Increase in vulnerability;
B. Post-disaster mechanisms
|
|—> Increase likelihood of collective violence;
- Spikes in food prices;
- Increased competition over scarce resources;
- Reduction in state policing.
|
|—> Decrease likelihood of collective violence;
- Reduction in rebel resources;
- Disaster diplomacy (windows of opportunity for de-escalation);
Case study: Arab uprisings 2011: The Arab Spring protests in 2011 were in part about rising food
prices, caused by international market conditions following the summer droughts in Russia in
2010 in particular, rather than about local shortages.
• Link between climate change and drought (not enough evidence that there was drying trend);
• Link between migration and con ict (mixed evidence of impact of demographic change on
armed con ict).
Syria has become, like Darfur before it, the go-to example of a con ict fueled by climate change.
|
59
fl
fl
fl
fl
ff
fl
fi
fl
fl
fl
GS João Bazelga
Dominant narrative: climate change contributes to a historic drought (2007-2010), which leads to
crop and livestock failure, which leads to rural hardship and migration to
urban centres, which leads to dissatisfaction with the government and
employment prospects, which leads to protest and violent repression, which
leads to dissidents taking up arms.
|
|—> The climate-change-contributing-to-con ict narrative is now being hotly contested:
I. There is no clear and reliable evidence that anthropogenic climate change was a factor
in Syria’s pre-civil war drought;
II. This drought did not cause truly mass migration;
III. There is no solid evidence linking in-migration with the grievances that brought Syrians
into the streets in 2011;
IV. Arguing any particular con ict was “caused” by climate change is exceedingly di cult
V. Climate shocks have probabilistic, rather than deterministic, e ects;
|
|Instead
|—> In the Syrian case, we might look to long-standing issues like authoritarian rule, human rights
abuses, exclusionary patronage networks built around religious identity, proximate “sparks”
like surging food and fuel prices, weak safety nets and employment prospects, and the
demonstration e ect of Arab Spring uprisings in neighbouring countries.
|
Environmental conditions may have exacerbated some of these problems (food prices in
particular), but they did not create them and were not primarily responsible for them.
Case study: The Tsunami and the Aceh Con ict: “All of a sudden the eyes of the world were on
Aceh so the government had to engage with us”;
Preventive measures
Suggest that more than resilience thinking will be needed. Humanity may have no choice but to
experiment with such extreme measures if time is to be gained to allow other innovations to
eventually deal with the climate crisis.
• There is a need for intelligent development strategies that facilitate the ability to adapt to climate
changes in particular as well as other Anthropocene disruptions;
• Another solution is to think more imaginatively about international institutions and the
possibilities of using United Nations agencies in more imaginative ways that build on human
rights and development ideas related explicitly to its mandate of promoting peace;
• Importance of fragile states being aided to improve their governance capacity to deal with risk
compounded by climate change
Cyberwarfare
RUSSIA INFORMATION WAR AND CYBER THREATS
The type of information that countries like Russia try to achieve through warfare are extremely
powerful because it can undermine democratic countries’ governments without using any real
force.
Former UK Defence Secretary Penny Mordaunt: “the soul of the enemy army, the soul of the
enemy people, have become the most
important strategic targets, mobilizing the
spirit of one’s own people became the most
important task of the supreme strategist. To
60
ff
fl
fl
fl
ff
ffi
GS João Bazelga
disintegrate the spirit of the enemy and
protect your spirit from corruption - this is the
meaning of the struggle in the fourth
dimension, which has become more
important than the other three dimensions.”
The idea of a “sticky path” — The Soviet Union was well known for its propaganda campaigns;
|
|—> 1998: Cold War paradigm shift? New Russia?
|—> 2000: Information Security Doctrine;
|—> Russia (or the Putin regime) sees itself under threat and is targeted for a “color revolution”;
|—> The last two decades saw an increase in publications related to information wars (not
“warfare”);
National Security Strategy (approved in July 2021): the need to prevent the use of information and
comms tech from interfering in internal a airs
( S o v e r e i g n t y ? Te r r i t o r i a l i n t e g r i t y ?
International peace?);
|
|—> Strategic aim: create a safe information space and defend Russia population against
informational-psychological in uence;
|
The internet has simply transferred these information wars to a qualitatively
new level of intensity, scale and e ectiveness;
Russia’s use of cyber tools is closely linked to the so-called information warfare and as for
recently “war of consciousness”;
|
Cyber tools o er ideal means for this purpose;
|—> These actions, of course, also strengthen Russia’s own international position (zero-sum
game);
|—> Cyber activity ts into Russian/Soviet traditional psyche of peacetime use of non-kinetic
tools/asymmetric means to weaken adversaries (aktivnost —> “active measures”);
61
ff
fi
fl
ff
ff
ff
GS João Bazelga
|
Russia will use cyber warfare in two operational spheres - cyber-technical and cyber-
psychological (overlap and synergies);
|
The cyber psychological would involve attempts to in uence electoral outcomes, hack-and-leak
activities (kompromat), doxing, encouraging societal divisions, etc. to disorient the adversary and
adversary’s society;
• To weaken adversaries politically and societally (sow division, create “controlled chaos”);
• To gather information/intelligence on adversaries;
• To probe for vulnerabilities that can be taken advantage of later;
• Not necessarily destructive (they can generate a psychological e ect);
• Konyshev and Sergunin: Cyber tools have strategic importance - control of information and
information superiority;
Means
I. GRU, FSB, SVR, Spetssviaz;
II. Internet Research Agency aka the “troll farm”;
III. Wagner?
IV. “Patriotic hackers”;
V. Social media “celebrities”;
VI. Integrating AI (Russian ChatGPT);
VII. RuNET/RuTube;
Example
• Ukraine - after Euromaidan (2014) onwards;
• Cyber-psychological ops vs. Cyber-technical ops;
• Multi-domain coordination?;
Attribution problems
• “Cyber obfuscation” - Moscow can say:
• Could be any state/non-state actor;
• Could be false- ag operation;
• Could be some loose-cannon “patriot hackers”;
• Attribution is thus problematic;
62
fl
fl
ff
fl
GS João Bazelga
THE PERCEPTION OF THE RUSSIAN THREAT
Russia is blamed - “attribution” by a government (but getting international agreement for any
| action the victim might take?);
|
Understanding that Russian cyber attacks have been more “disruptive” than “destructive” but
carry the threat of destruction;
|
For instance, the UK considers it is clear that cyber operations that result in or present an
imminent threat of death and destruction on an equivalent scale to an armed attack will give rise
to an inherent right to take action in self-defence;
|
|—> But how to judge what is an imminent threat?
Deterrence by denial
Issues
|—> Capability to prevent Russian cyber attacks having e ect?
|—> Communication/counteracting disinformation? (Beyond rhetoric);
|—>Credibility? What’s really going to stop Russia from conducting cyber probing/info
| operations/espionage anyway? Where’s the jeopardy?
|—> So, is deterrence-by-denial practical?
Deterrence by punishment
“If you don’t stop doing what you are doing we will take action.”
Issues:
|—> Involves threatened use of o ensive cyber to deter Russia from doing what it is doing;
|—> Usually, deterrence in conventional terms is conducted by sober-rattling or nuclear “rocket-
| rattling” —BUT—How do you “cyber-rattle”? Capability and communication? How do you
| establish credibility?
|—> Give away capabilities?
|—> Escalation dominance?
|—> Is it practical? (interesting US approach - signaling through a credible threat to the Russian
electoral grid);
Legal and ethical issues: Jeremy Hunt as Foreign Secretary accused Russians of operating
without regard to International Law or established norms and of
engaging in cyber activity that is reckless and indiscriminate —> so,
incumbent on UK not to do the same and thereby keep to IL/MLAC
—> But, not easy.
Issues with deterrence by punishment: “without clearly identifying who is responsible for the
hostile cyber activity, it is impossible to take responsible action in response”;
|
|—> Deterrence by punishment cyber activity can only be used to: make attacker desist; convince
| them not to carry out future attacks.
|
63
ff
ff
GS João Bazelga
Example: UK
- UK must also remember that, under the UK’s MLAC (2004), UK cyber cannot be used to
“retaliate” (its illegal according to the MLAC na yet this world is used in o cial UK
documentation, including in parliamentary reports and the National Security Capability Review);
- The word “reprisal” can be used —BUT AGAIN—> Only for deterrence purposes, to make
Russia stop.
- In any cyber “reprisals” designed to deter, the UK cannot target any civilian infrastructure
because it is forbidden by laws of armed con ict;
- Also problem of reciprocity (Russian winter vs. UK winter);
- General problem of “discrimination” with cyber ( rst-order, second-order, n-order e ects);
Problem of proportionality - cannot use weapon “the e ects of which cannot be limited”; —> Can
| cyber attacks be limited?
|
Problem of halting e ects of UK reprisal cyber once/if Russia desists from its own attacks —>
Controllable?
|
Can really use kinetic reprisal for a cyber attack? Starting a “hot” war?
Both options
|—> Require capability, communication and credibility.
|
Is cyber deterrence possible at all? (Cold War/Nuclear Deterrence being outdated concepts).
• Russia is exploiting the asymmetry and operating, as Col. A. Bartosh (2021) would say “in
shadows”;
• The current legal framework not applicable if it comes to disinformation - What options do we
have?
• Russia cyber attacks can bring down the UK’s national infrastructure;
• In the push to deter any such attacks, countries (mostly NATO) will have to move away from
International Law regarding responding to cyber-attacks;
|
|—Already, happening—> Under UK MLAC, acts of reprisal have to be “publicised” beforehand
(but the UK now departs from International Law in that it would not
agree that we are always legally obliged to give prior noti cation to
the hostile state before taking cyber countermeasures against it;
• Here is the thin end of the wedge (International Law and the Law of Armed Con ict were not
designed to cope with the Information War and, by extension, cyber issues - there may need to
be a complete rethink about both as they relate to cyber warfare);
|
|—> This is especially so as cyber warfare increases in scope and intensify - as it surely must
(with AI playing a more signi cant part in its evolution).
Militaries have been greatly empowered by a range of advanced information systems but are so
dependent on them, their disruption would have crippling e ects;
64
ff
fi
fl
fi
ff
ff
fi
ff
fl
ffi
GS João Bazelga
Traditional military strategies, such as the use of overwhelming force and the concentration of
resources, may not be e ective in the realm of cyberwarfare.
|
|—> This is because cyber attacks can be launched from virtually anywhere in the world, and it
| can be di cult to determine the source of the attack.
|—> Traditional military resources, such as aircraft carriers and tanks, are not particularly useful in
the context of cyberwarfare.
The rise of cyberwarfare should impel a reexamination of classical just war ethics, given its
relative ease of use as a rst restore and the tempting prospect of being able to achieve national
aims with less bloody use of force.
Limitations:
|—> Computers are vulnerable to attacks
|—> Maintain a balance between technology warfare and traditional form
|
Key problem for cyber deterrence is that attacking nation may keep their identities secret and not
all attacks emanate from other nations
Discusses how information warfare has evolved over time and how it has converged with other
forms of warfare.
Information warfare: the use of information and information technology to gain an advantage over
| an opponent;
|
65
fl
ffi
ff
fi
fi
GS João Bazelga
|—> Information warfare is no longer a separate category of warfare, but has become integrated
| with other forms of warfare such as cyberwarfare, economic warfare and psychological
| warfare;
|
|—> Information warfare is now a part of almost every aspect of modern warfare and is used to
gain an advantage in areas such as military operations, diplomacy and propaganda;
New technologies, such as social media, have enabled new forms of information warfare, such as
disinformation campaigns;
In conclusion, the article emphasises the need for a better understanding of the nature of
information warfare and the development of new strategies to counter it.
|
|—> This will require collaboration between government, the private sector and civil society.
“WINNING FUTURE WARS: RUSSIAN OFFENSIVE CYBER AND ITS VITAL IMPORTANCE IN
MOSCOW’S STRATEGIC THINKING” - ROD THORNTON AND MARINA MIRON
• Russia sees o ensive cyber operations as a crucial component of its military doctrine and a way
to achieve strategic goals;
|
|—> Russian military planners view cyber operations as a means of achieving tactical
advantages, disrupting enemy decision-making processes, and creating confusion and
chaos on the battle eld;
• Russia has used o ensive cyber capabilities in multiple con icts, including in Ukraine and Syria.
• O ensive cyber capabilities are crucial in Russia’s military planning and this will likely become
more critical in the future;
|—> Countries should pay more attention to this and invest in cyber defense and deterrence.
• Understanding Russia’s o ensive cyber capabilities is crucial for policymakers and military
planners in developing e ective strategies for countering Russian aggression;
66
ff
ffi
ff
ff
ff
ff
ff
fi
ff
ff
ff
fl