Where is cyber disarmament?

A decade ago, malware Stuxnet took over the control system for uranium enrichment in Iran and caused hardware to malfunction. A virtual entity caused damage in the material world and demonstrated that futuristic cyber weapons are real. This was not, however, the first case when critical infrastructure (CI) was physically destroyed in a cyber attack. More importantly, the attack did not result in human casualties, so the damage was not enough to politically trigger cyber arms control. Even today, after 10 years of accelerating development and innovation, cyber arms exist — while cyber disarmament does not.

By Anna Romanova

In the cyber domain, finding the balance between security and non-proliferation of armaments has been problematic so far. The general debate seems limited to the definition of a cyber weapon, which diverts attention from real threat assessment. There is a belief that “cyber” always stays virtual. Stuxnet showed that this assumption is incorrect. States rely on heavily computerised control systems to operate transportation, communications, power grids, chemical and nuclear plants, medical aid, and water delivery. In 2000, an attack against the Australian company Hunter Watertech caused liters of raw sewage to spill into parks and water bodies [1]. In 2003, safety monitoring systems on a power plant in Ohio were disabled for five hours by a computer worm [2]. In Texas, right before a major storm, warning systems were switched off when an attack caused dozens of false alarms [3]. AURORA, an experiment by the United States Energy Department, successfully simulated a cyber attack that physically damaged elements of the electrical grid [4].

However unprecedented, neither Stuxnet nor the attacks before it harmed any humans, but this was not a guarantee. Spilt sewage puts local communities at health risk, and a destroyed dam can cause a devastating flood. A power shortage can kill patients in hospitals who rely on sophisticated equipment, while airplanes and trains can collide if navigated incorrectly. People can die if unprepared for a tornado, and the Chernobyl catastrophe demonstrated the disaster of a switched-off security systems at a nuclear power plant. In the long run, persistent lack of access to essential supplies and services can result in social unrest, suicide, the spread of diseases, and crime.

Confusion regarding the scope of cyber warfare prevents constructive assessment of the threat. The International Telecommunications Union (ITU) Secretary General Hamadoun Toure called for a cyberspace peace treaty in 2009, which was backed by Russia and China [5]. However, the treaty concerned acts of using information and ideology to undermine other states [6]. The weapon of cyber warfare is technology — not information. The treaty was predictably blocked by liberal democracies, as it entails control over the Internet and the use of censorship, which is unacceptable in some states. Also, such an approach should not make actual cyber weapons seem benign. Between 2016 and 2018 water systems in Yemen were damaged through conflict and caused a cholera outbreak, killing 2,200 people [7].

A non-proliferation treaty would create a dialogue to clarify categories and definitions. All previous attempts, however, faced the same obstacles. Disarmament is linked to overcoming a security dilemma. Considering the lack of clarity and consensus, incentives to enter the treaty look weak at best. The former director of the United Nations Institute for Disarmament Research in Geneva, Theresa Hitchens, claimed that states with more intelligence about cyber vulnerabilities are less likely to share this information with others [8]. So, how can one build trust in cyberspace? In fact, every obstacle is also an opportunity. Critical infrastructure is complex and extremely difficult to protect, therefore static defensive deterrence is not acceptable for a majority of states. The illicit market for cyber weapons is bigger and more difficult to control than for any other weaponry. Finally, the same technology can be used for non-lethal crime and destructive attacks.

Several commitments could be mutually beneficial and simultaneously tighten control over state-on-state offensives. States can agree not to store and create backdoors in manufactured goods and to share knowledge about vulnerabilities. Additionally, they can pledge not to allow their territories to be launch pads for cyber attacks [9]. With efficient information sharing in place, protection against domestic criminals may come from abroad. Lastly, as most of CI is owned by the private sector [10], this is an opportunity for them to step in where states are hesitant. CI operators could collaborate to lobby a treaty aimed to control cyber weapons and ensure business continuity.

In any case, reaching consensus over the treaty is realistic and long overdue. Cyber weapons are meant for targeted destruction, but they will be indiscriminate when it comes to human loss. It is practically impossible to control who drinks from certain water sources, who will be affected by radiation or drowned, or who will be on a specific train or plane. And while indirect civilian casualties are difficult to identify and count, they do not matter less.

Finally, even if development and deployment of cyber weapons takes a long time, destructive retaliatory attacks may happen simply as a proof of capability. This way, the most indiscriminate form of warfare will start, where the military are calling the shots and civilians suffer in masses.

SOURCES

[1] Collins, S. & McCombie, S. 2012, "Stuxnet: the emergence of a new cyber weapon and its implications", Journal of Policing, Intelligence and Counter Terrorism, vol. 7, no. 1, pp. 80-91.

[2] Ibid.

[3] Rosenberg, E. and Salam, M., 2017. Hacking Attack Woke Up Dallas With Emergency Sirens, Officials Say. [online] Nytimes.com. Available at: https://www.nytimes.com/2017/04/08/us/dallas-emergency-sirens-hacking.html [Accessed 25 April 2020].

[4] Carr, J. 2013, "The misunderstood acronym: Why cyber weapons aren't WMD", Bulletin of the Atomic Scientists, vol. 69, no. 5, pp. 32-37.

[5] Gjelten, T. 2010, "SHADOW WARS: Debating Cyber 'Disarmament'", World Affairs, vol. 173, no. 4, pp. 33-42.

[6] Ibid.

[7] Gleick, P.H. 2019, "Water as a Weapon and Casualty of Conflict: Freshwater and International Humanitarian Law", Water Resources Management, vol. 33, no. 5, pp. 1737-1751.

[8] Weber, R. 2018, "Former UN disarmament official offers plan for mediating cyber tensions among major powers", Inside Cybersecurity, [Online].

[9] Gjelten, 2010.

[10] Weber, 2018.

 

Pervitin: how drugs transformed warfare in 1939-45

From 1939 to 1945, the Third Reich astonished Europe with its Blitzkrieg on all battlefronts. Its military efficiency has since then been a leitmotiv of history studies. This has been traditionally attributed to its technological superiority and optimisation, as well as its innovative strategies. Indeed, everything was accurately calculated, from the weight of the firearms to the offensive timings. The Wehrmacht would not leave anything to chance. However, there is one more trick to consider: performance-enhancing drugs [1]. These drugs were used as a strategic tool in both camps throughout the Second World War for their invigorating and exciting effects. This article will address how drugs played a pervasive role in the success and failure of Nazi Germany, from the breakthroughs in Poland to the defeat of the regime [2].

By Fabiana Natale

Brief overview of a modern drug

Throughout the war, the Germans consumed Pervitin [3], a methamphetamine, which produces higher energy, while reducing sleep needs and hunger [4]. While those effects would already represent sufficient tactical reasons to distribute this drug among soldiers, its psychological influence also made it very valuable. Indeed, it is said to spark a great enthusiasm, as well as a feeling of confidence and omnipotence [5].

While methamphetamine in crystalline form was produced for the first time in Japan, Pervitin was developed by Fritz Hauschild [6] and patented in Germany in 1937, by the Temmler group [7]. Considered as an energy-booster, its consumption was perfectly legal until 1941.

Norman Ohler, the author who shed light on Pervitin consumption

As Pervitin was legal, it was broadly advertised in Germany, with billboards strewn throughout the capital from 1938 until its regulation in 1941, when its consumption became more obscure.

Since then, the topic remained overlooked until 2015, when Norman Ohler published Der Totale Rausch, translated in English as Blitzed: Drugs in Nazi Germany. First intending to write a novel on the abuse of drugs in Nazi Germany, he ended up conducting research that would offer a whole new understanding of warfare tactics during Second World War. [8] Based on military archives and interrogations of Theodor Morell, Hitler’s doctor, he revealed how a whole nation became dependent on Pervitin [9].

 

A successful substance in Germany

In 1938 Temmler started commercializing Pervitin and, wishing to compete with Coca-Cola, entrusted Mathes & Son, an advertising agency, with its marketing strategy [10]. In a context of national strain, this advertising resulted in a widespread success. Between the recovery from the First World War and the economic crisis, and the mobilisation for the Second World War, the population welcomed the energising substance with open arms. It was cheap, helped people work, spread euphoria through the country and was not considered a drug. Basically, it only seemed to have beneficial effects [11]. Sometimes even mixed with chocolate, pervitin appeared as harmless [12].

 

Weaponisation of performance enhancers

Furthermore, the drug was not only popular among workers. Adolf Hitler himself was introduced to drugs by Morell [13]. And it was the whole Wehrmacht, the German Army, that was fuelled with Pervitin [14]. 

Indeed, after having performed tests on students, Otto Ranke, director of the Institute for General and Defense Physiology at Berlin's Academy of Military Medicine, suggested that methamphetamine compounds could improve the soldiers’ performance [15]. Introduced in the daily rations and consumed up to twice a day, the drug gave the soldiers supernatural capabilities. Fearless and cheerful, they could spend more than three days without sleeping and walk up to 60 kilometres without interruption. This allowed for the fast invasion of Poland in 1939, the Blitzkrieg through the French Ardennes in 1940, and the Balkan Campaign of 1941, fought without rest for 11 days [16].

“When they started laying in the snow to let themselves die, I decided to give them Pervitin. After half an hour, they spontaneously started telling me they were feeling better” [17]. With such testimonies from military commanders, the archives studied by Ohler reveal how pleased they were with the positive effects of Pervitin and how they asked for more provisions. [18] The drug was distributed to all soldiers, with its manufacture exceeding 35 million doses of three milligrams just in April and May 1940. For tank troops for example, “there was a clear order to use Pervitin”, often in the shape of Panzerschokolade [19]. However, it was in particular the Luftwaffe, the German Air Force, that was the most interested in the increased attention span it ensured for the pilots and named it the “pilot’s salt” [20].

 

A late and approximate regulation

Yet the drug, beside the unbelievable performances it allowed, obviously brought side effects. Indeed, early reports found in the archives mentioned adverse effects such as exhaustion, heart pain, and circulation problems [21]. This instigated further study that led to the identification of Pervitin as an intoxicant by the Reichsgesundheitsführer Leonardo Conti, the Reich’s health top official, and to its prohibition in 1941 [22].

Such a decision falls within the anti-drug rhetoric that Hitler and his party had disseminated since 1933, which had first led to a large national withdrawal, meant to reduce the German economic dependence from pharmaceuticals and to tackle an alarming addiction problem. It seems though, that just a few years after the development of this national no-poison philosophy, the NSDAP had, out of deliberate inconsistency or simply ignorance, led to a new national dependence. 

However, making the new substance illegal in 1941 did not have much consequence. One could no longer purchase it without a prescription; nevertheless, consumption did not decrease much, not even among civilians [23].

In particular among the ranks of the military, the prohibition was totally ignored. As a matter of fact, military officials seemed to find its distribution legitimate, especially due to the short-term benefits it was providing the army [24]. In fact, its consumption actually increased during the Operation Barbarossa from June to December 1941 [25]. At this point, one could even wonder whether the new legislation was actually meant to avoid large scale dependence. Perhaps was it meant to limit civilian consumption in order to ensure the Wehrmacht supply?

 

Physiological and strategic adverse effects

From 1941, the Reich knew that Pervitin brought side effects and risks of addiction. However, even when soldiers were dying because of heart failures or committing suicide due to the psychotic phases, the methamphetamine continued to fuel the country until the end of war. 

The primary concern was related to dependence. Indeed, providing soldiers with daily doses inevitably made them, and their performance, dependent on Pervitin. Heinrich Böll’s written testimonies, for instance, reflect this concern for supply. He was enrolled in the Wehrmacht and during his time on the battlefield, he sent letters to his family back in Germany. In one of them, sent in May 1940, he asked "Perhaps you could obtain some more Pervitin for my supplies? [...] It makes miracles” [26]. He needed it to ensure his physical performance, and benefit from its psychological effects, importantly, maintaining a state of euphoria despite the atrocities of war [27].

And if having a whole population addicted to a drug is, for obvious reasons, not optimal, a major issue appeared with shortage and withdrawal. Indeed, the German population and army experienced the symptoms we know today such as nausea, hallucinations, and diminution of cognitive capacities, anxiety and depression [28].

And despite Conti’s attempt to limit the use of Pervitin, he could do nothing to prevent abuses. The situation escalated over the years and soldiers died increasingly from cardiac failure, suicide, or military miscalculations. The control had just slipped out of their hands. Comparably, Morell’s interrogations reveal how Hitler’s own drug addiction led to poor strategic choices, [29] allowing enemy victories such as the Normandy landings. 

Hence, Germany’s secret weapon, that had allowed the Wehrmacht to shine in the first years of war, backfired and became a reason for the decline and the fall of the Third Reich. [30]



Sources

[1] Gelis, N (2019) “La Pervitin, catalyseur du Blitzkrieg? [½]”, [online] available at https://les-yeux-du-monde.fr/histoires/41384-la-pervitin-catalyseur-du-blitzkrieg-1-2, last accessed March 4th, 2020.

[2] Herzog, D (2017) “Hitler’s Little Helper: A History of Rampant Drug Use Under the Nazis”, [online] available at https://www.nytimes.com/2017/03/27/books/review/blitzed-drugs-third-reich-norman-ohler.html, last accessed March 4th, 2020.

[3] Snelders, S (2011), “Speed in the Third Reich: Metamphetamine (Pervitin) Use and a Drug History From Below” in Social History of Medicine, Vol 24, No 3, pp 689-99

[4] Hurst, F (2013) “The German Granddaddy of Crystal Meth”, [online] available at https://www.spiegel.de/international/germany/crystal-meth-origins-link-back-to-nazi-germany-and-world-war-ii-a-901755.html, last accessed March 4th, 2020.

[5] Ohler, N (2015), Der Totale Rausch : Drogen im Dritten Reich : Kiepenheuer & Witsch.

[6] Meyer, U (2005), “Fritz hauschild (1908-1974) and drug research in the 'German Democratic Republic' (GDR)” Pharmazie, Vol 60, No6, pp. 468-72.

[7] Cooke, R (2016), “High Hitler: how Nazi drug abuse steered the course of history” [online] available at https://www.theguardian.com/books/2016/sep/25/blitzed-norman-ohler-adolf-hitler-nazi-drug-abuse-interview, last accessed March 4th, 2020.

[8] Ibid.

[9]  Ohler, N (2015), Der Totale Rausch : Drogen im Dritten Reich : Kiepenheuer & Witsch.

[10] Ohler, N (2018), Nationalsozialismus in Pillenform: Der Aufstieg des Stimulanzmittels Pervitin im „Dritten Reich“ : Springer, p72

[11] Ohler, N (2015), Der Totale Rausch : Drogen im Dritten Reich : Kiepenheuer & Witsch.

[12] Alemanianazi, Las drogas en la Alemania nazi, [online] available at https://alemanianazi.com/las-drogas-en-la-alemania-nazi/ last accessed March 4th, 2020.

[13] Herzog, D (2017) “Hitler’s Little Helper: A History of Rampant Drug Use Under the Nazis”, [online] available athttps://www.nytimes.com/2017/03/27/books/review/blitzed-drugs-third-reich-norman-ohler.html, last accessed March 4th, 2020.

[14]  Constant, A (2019), “« Alliés et nazis sous amphétamines » : pervitine et benzédrine, drogues de combat”, [online] available at https://www.lemonde.fr/culture/article/2019/08/20/allies-et-nazis-sous-amphetamines-pervitine-et-benzedrine-drogues-de-combat_5501050_3246.html, last accessed March 4th, 2020.

[15] Pruitt, S (2019), “Inside the Drug Use That Fueled Nazi Germany’, [online] available at https://www.history.com/news/inside-the-drug-use-that-fueled-nazi-germany,  last accessed March 4th, 2020.

[16]  Ohler, N (2015), Der Totale Rausch : Drogen im Dritten Reich : Kiepenheuer & Witsch.

[17] Unknown (2013), “Les soldats nazis dopés à la méthamphétamine pour rester concentrés”, [online] available at https://www.huffingtonpost.fr/2013/06/04/soldats-nazis-methamphetamine-drogue-heinrich-boll-hitler_n_3379664.html, last accessed March 4th, 2020.

[18]  Ohler, N (2015), Der Totale Rausch : Drogen im Dritten Reich : Kiepenheuer & Witsch.

[19] Dokoo (2016), “Panzerschokolade - Crystal Meth bei der Wehrmacht | Doku”, [online] available at https://www.youtube.com/watch?v=YNBmbOMdZnE, last accessed March 4th, 2020.

[20] Garber, M (2013) “'Pilot's Salt': The Third Reich Kept Its Soldiers Alert With Meth”, [online] available at https://www.theatlantic.com/technology/archive/2013/05/pilots-salt-the-third-reich-kept-its-soldiers-alert-with-meth/276429/, last accessed March 4th, 2020.

[21] Barba, D (2018), “Les junkies d’Adolf Hitler”, [online] available at https://www.franceinter.fr/emissions/capture-d-ecrans/capture-d-ecrans-15-janvier-2018, last accessed March 4th, 2020.

[22] Andreas, P (2020), “How Methamphetamine Became a Key Part of Nazi Military Strategy”, [online] available at  https://time.com/5752114/nazi-military-drugs/, last accessed March 4th, 2020.

[23] Fuhrer, A (2019), “Ein Volk unter Drogen: Speed-Pralinen für die Frau, Weckamin für den Soldaten”, [online] available at https://www.focus.de/wissen/mensch/geschichte/nationalsozialismus/volksdroge-pervitin-wie-im-rausch-eroberte-die-wehrmacht-polen_id_10101532.html, last accessed March 4th, 2020.

[24] Andreas, P (2020), “How Methamphetamine Became a Key Part of Nazi Military Strategy”, [online] available at  https://time.com/5752114/nazi-military-drugs/, last accessed March 4th, 2020.

[25] Unknown (2018), “Archivi tag: Pervitin”, [online] available at https://team557.wordpress.com/tag/pervitin/, last accessed March 4th, 2020.

[26] Lucchetti, M (2019), Le armi che hanno cambiato la seconda guerra mondiale : Newton Compton Editori.

[27] Mastrobuoni, T (2015) “Oppiacei e anfetamine, le armi segrete di Hitler”, [online] available at https://www.lastampa.it/esteri/2015/09/09/news/oppiacei-e-anfetamine-le-armi-segrete-di-hitler-1.35222009, last accessed March 4th, 2020.

[28] Andreas, P (2020), “How Methamphetamine Became a Key Part of Nazi Military Strategy”, [online] available at  https://time.com/5752114/nazi-military-drugs/, last accessed March 4th, 2020.

[29] Unknown (2018), “Archivi tag: Pervitin”, [online] available at https://team557.wordpress.com/tag/pervitin/, last accessed March 4th, 2020.

[30]  Ohler, N (2015), Der Totale Rausch : Drogen im Dritten Reich : Kiepenheuer & Witsch.

Politics of Planetary Emergency

For decades, organizations like The Climate Mobilization have argued that, ‘entering emergency mode is the critical first step to launching the comprehensive mobilization required to rescue and rebuild civilization’ [1]. By using language historically reserved for war, insurrection, or terrorism, climate activists hope to inspire a sense of urgency in governments that have been dragging their feet on making the necessary policy changes. Prior to the COVID-19 pandemic, many in the world lived in blissful ignorance as to what exactly a state of emergency would entail. Its effects on government, society, and our day-to-day were difficult to imagine in the absence of any lived experience. COVID-19 has changed that entirely: as an international community we have learned a powerful lesson in just how quickly everything can change. Now that we are witnessing the real implications of a global emergency, should we still endorse its use in relation to the climate?

By Margaret Born

Emergencies are urgent threats that demand rapid, sweeping action. They justify a suspension of norms at every level, from behavioural changes in a citizen’s daily routine to otherwise unconstitutional expansions of government control. They demand securitisation, a process by which ‘an actor (governments) claims an existential threat (pandemic) to a valued referent object (citizens’ lives) in order to make the audience (citizens) tolerate extraordinary measures that otherwise would not have been acceptable’ [2].

The great advantage of a state of emergency is the swiftness with which it allows governments to act. The central frustration of climate activists is the refusal of states to commit to the scale and pace of change necessary to curb the effects of climate change and maintain the habitability of Earth. If anthropogenic warming is framed as an existential threat and the state does not take the steps necessary to address that threat, then it is failing to protect its citizens.

As of yet, environmental budgets have been woefully insufficient to the task at hand, and a state of emergency could inspire an immediate windfall. On March 26, 2020, less than two weeks after the US government declared the COVID-19 pandemic a national emergency, Congress approved nearly $2 trillion USD of stimulus funding in order to minimise economic downturn [3]. Based on its current budget of $6.1 billion USD, that kind of commitment could fund the Environmental Protection Agency for over 300 years [4]. The state of emergency instantly rallied the political will necessary to commit massive amounts of funding towards the pandemic and could potentially do the same for climate protection initiatives. Considering the magnitude and ubiquity of its eventual impact, it would stand to reason that states might rally the same resources to combating climate change in a state of emergency.

In the absence of existential threat, most democracies defer to the preferences of citizens and private companies in day-to-day behaviour. Environmentally detrimental habits of overconsumption, pollution, and waste are slow to change because that change is not typically regulated by the government. The COVID-19 pandemic has demanded sweeping behavioural change with increasingly severe consequences for those who refuse to adhere to them. In Italy, non-essential companies that remained open despite lockdown orders were forcibly closed down and had their owners formally charged with fines and/or prison sentences [5]. Enforcing stricter social norms for the environment could bring about the social changes necessary for effective climate change mitigation, as it has for those necessary to minimise the spread of the virus.

The prospect of rapid, sweeping environmental change would make a state of emergency and the securitisation it necessitates appealing -- but, we must ask at what cost are these changes wrought? A video of ten police officers forcibly dragging an unmasked man off of a public bus in Philadelphia, USA recently went viral [6]. The potential physical brutality of law enforcement points to the dangers of the deal we make when we allow securitisation’s implementation of extraordinary measures: are we willing to relinquish our agency in exchange for greater protection from an existential threat?

If the emergency is grave enough, many are willing to sacrifice personal freedoms to address it. Extreme measures can be tolerable as long as they are limited in time. In the case of COVID-19, the end of these enforced limits is in sight: researchers are working at breakneck speed to develop a vaccine [7], and based on the pattern established in China, proper containment could limit the worst of the pandemic to a matter of months [8]. Climate change, on the other hand, would require decades of concerted effort to mitigate. In the words of Mike Hulme, it would be a ‘quasi-permanent state of emergency’ [9].

With the perspective we have gained from the COVID-19 pandemic, these considerations can ultimately be reduced to one fundamental question: are long-term limits on our autonomy an acceptable price to pay for action on climate change?

 

 

Sources

 [1] ‘Climate Emergency – The Climate Mobilization’. Available at: https://www.theclimatemobilization.org/climate-emergency/ (Accessed: 24 April 2020).

[2] Politics, security, theory - Ole Wæver, 2011 (no date). Available at: https://journals-sagepub-com.dcu.idm.oclc.org/doi/10.1177/0967010611418718 (Accessed: 24 April 2020).

[3] Coronavirus Outbreak Timeline Fast Facts - CNN. Available at: https://www.cnn.com/2020/02/06/health/wuhan-coronavirus-timeline-fast-facts/index.html (Accessed: 24 April 2020).

[4] US EPA, O. (2019) EPA FY 2020 Budget Proposal Released, US EPA. Available at: https://www.epa.gov/newsreleases/epa-fy-2020-budget-proposal-released (Accessed: 24 April 2020).

[5] More than 50,000 people in Italy charged with breaking quarantine rules - The Local. Available at: https://www.thelocal.it/20200320/more-than-50000-people-in-italy-charged-with-breaking-quarantine-rules (Accessed: 24 April 2020).

[6] News, A. B. C. (no date) Philadelphia police drag man without mask off public bus, prompting policy change, ABC News. Available at: https://abcnews.go.com/US/philadelphia-police-drag-man-mask-off-public-bus/story?id=70104383 (Accessed: 24 April 2020).

[7] How Will the Coronavirus End? - The Atlantic. Available at: https://www.theatlantic.com/health/archive/2020/03/how-will-coronavirus-end/608719/ (Accessed: 24 April 2020).

[8] Reuters (2020) ‘China reports no new coronavirus deaths as cases decline’, 7 April. Available at: https://www.reuters.com/article/us-health-coronavirus-china-toll-idUSKBN21P034 (Accessed: 24 April 2020).

[9] Hulme, M. (2019) ‘Climate Emergency Politics Is Dangerous | Issues in Science and Technology’, 9 December. Available at: https://issues.org/climate-emergency-politics-is-dangerous/ (Accessed: 24 April 2020).

Germany's intelligence blind eye towards right-wing extremism: the National Socialist Underground terror attacks

By Emma Van Heeswijk

Recent far-right extremist attacks in Germany, like the attacks in Hanau on the 19th of February this year and the attack in Halle in late 2019, have started a new debate [1]. The media regularly reports about new right-wing extremist movements and far-right ideologies that are on the rise. However, others argue that the latest attacks in Germany are not as surprising as they may seem. The case of the National Socialist Underground (NSU) which took place almost ten years ago gives an idea of the German intelligence systems’ struggle to investigate potential violence stemming from right-wing extremism in its early stages.

In May 2013, Munich held the highest-profile trial in Germany for the disclosure of the neo-Nazi terror network, the National Socialist Underground (NSU). They were responsible for ten racially motivated murders, two bomb explosions in Cologne, and several robberies between 1998 and 2011 [2]. These events were a nation-wide shock, but should not have come as any surprise – as multiple NSU commission reports later revealed [3]. It was only after the NSU released video material and claimed responsibility for the ten murders that the security service made the connection between the attacks and the network [4]. Following this, the state established a parliamentary inquiry committee to look into alleged ‘systematic failures’ of the domestic intelligence service of the Federal Republic (the Bundesamt für Verfassungsschutz or BfV), and the federal police (the Bundeskriminalamt or BKA) [5].  The trial questioned the role of the BfV and the causes for its failure to identify the threat, however many questions remain unanswered [6]. This article examines the question ‘to what extent did the terror attacks led by the NSU constitute an intelligence failure by the German intelligence system?’

The manifestation of several interrelated errors within the security system explains how German intelligence failed to connect the dots and stop the NSU attacks. Sandow-Quirks defines intelligence as, ‘a cyclical process by which information, broadly defined, is acquired, processed, evaluated, stored and used as the basis for action [7].’ With multiple failures evident within the intelligence cycle, I argue that the handling of the NSU attacks represents a major intelligence failure on the part of German intelligence

COMMUNICATION CHAIN DYSFUNCTION

The lack of communication within the domestic intelligence service of the Federal Republic of Germany (BfV) contributed to a failure in effectively processing intelligence data. In their report, the commission of inquiry into the NSU attacks observed that the failure was not down to poor or insufficient collection of raw data, but rather bureaucratic dysfunction within the system [8]. The intelligence service was well aware of the existence and violent potential of right-wing terrorists [9], especially  after the discovery of a garage containing high explosives rented by Beate Zschäpe, Uwe Mundlos and Uwe Böhnhardt. The trio had been known to the police as members of the so-called Thuringia Home Guard [10], a militant neo-Nazi collective, since the 1990’s [11].

After the Cold War, the German Federation implemented a separation of powers between the domestic federal intelligence agencies and the federal police [12]. This was a structural control mechanism to protect citizens and prevent excessive personal information sharing between the agencies [13]. It is important to note that Germany has no overarching domestic intelligence agency; the responsibility of intelligence collection is split among the different states within the country. This structural separation inhibits intelligence data sharing. The terrorist trio operated within several German states, however information from investigations into the murders of migrants was not adequately shared [14]. Consequently, the police never drew any connection between the murders even though they were all committed with the same Ceska 83 pistol [15]. The intelligence structure and the restriction of information sharing in Germany both hinder the ability to make proper connections between investigations [16].

SOURCE PROTECTION: INTELLIGENCE AGENTS AND THE NSU NETWORK

The interaction between the domestic intelligence service and the right-wing network offers greater understanding as to why German intelligence did not follow up any investigations regarding the NSU. Whether intelligence agents purposely or unconsciously supported the NSU network is a matter of debate. The commission reports show that information from informants and covert actions had been leaked from the BfV to the NSU network [17]. One murder case in 2006 stands out significantly and sheds dubious light on the role of the intelligence agents. The victim was shot in an internet café in which Andreas Temme, a domestic secret service agent was present [18]. The agent did not notify the police of his presence at the murder scene and later on, after being tracked down by the police, denied having witnessed the murder [19]. If the intelligence system fails in profiling their own informants and agents’ motives and does not properly vet their backgrounds, as in Temme’s case, then information risks being misused, hidden and in some cases falsified [20]. In other words, the problem goes further than communicational errors. The intertwining of the BfV and the radical right network was counterproductive. Alrich and Richterova concluded that the European national accountability bodies, whose role is to ensure the objectivity and accuracy of the intelligence services, have performed poorly during the past decade [21]. The failure of intelligence oversight to sufficiently check the backgrounds of the secret service agents constitutes another error in the cycle of failure regarding the NSU attacks.

FAILURE OF PERCEPTION

The German political agenda in the 21st century resulted in the underestimation of right-wing terrorism and thus ineffective policy formulation. The terrorist attacks of 11 September 2001 led to a shift in the German intelligence structure. Threats were redefined and accordingly prioritised [22]. When it was revealed that the attacks launched by Al-Qaeda were planned  in Hamburg, Germany was put under the spotlight and accused of failing to spot a potential Jihadist terrorist threat [23]. Germany joined the War on Terror after 9/11, publishing several BfV reports that underlined their increased perception of Islamist radicalisation as a serious threat [24]. In 2004 the BKA and BfV established the ‘Common Terrorism Defense Center’. Its main purpose is to collectively investigate and share files regarding Islamic extremism and jihadist terrorism [25]. At that time, there was no corresponding intelligence-sharing mechanism focused on right-wing terrorism. The BfV in 2004 even concluded that, ‘Right now, there are no recognizable far-right terrorist organisations or structures in Germany’ [26].

Investigations into the ten NSU murders were not connected before 2011, when the terrorist trio was discovered. Investigations into the murders had almost exclusively focused on the key characteristic ‘migrants’ and the ‘victims’ alleged ties to organised criminal groups such as the ‘Turkish Mafia’ [27]. As a result of those discriminating misperceptions, the threat of radical right-wing militancy receded into the background. Although it was well known at an early stage that the terrorist trio had significant radical beliefs and access to explosives, it seemed unimaginable that they could become a threat.

CONCLUSION

The first error within the German intelligence system can be found in a lack of coordination between the BfV and the BKA [29].  The second concerns the failure of intelligence accountability and the role of the covert agents within the radical right-wing network. They did not merely hinder investigations, but seemingly contributed to the success of the NSU. The third error appeared at the stage of analysis and the inability of the security service to effectively recognize and prioritize threats.

The secret service can be viewed as a single entity, whereby an error in one aspect does not necessarily cause an entire intelligence failure, if the other parts of the security service are properly functioning. In the case of the NSU terror attack, it would be reasonable to argue that an intelligence failure was unavoidable, but not every failure was rooted in intelligence. Rather, several malfunctions within the security system, including the irresponsibility of policy and decision-makers, came together in time and place and therefore constituted a huge, systemic failure of intelligence.

Sources

[1] Caniglia Mattia, Winkler Linda and Métais Solène (2020) ‘The rise of the right-wing violent extremism threat in Germany and its transnational character,’ ESISC.

[2] McGowan, Lee (2014) ‘Right-Wing Violence in Germany: Assessing the Objectives, Personalities and Terror Trail of the National Socialist Underground and the State's Response to it,’ German Politics Vol. 23 No. 3, pp. 196-212.

[3] Von Der Behrens, Antonia (2018) ‘Lessons from Germany’s NSU Case,’ Race & Class Vol. 59, No. 4, pp. 84–91.

[4] ‘NSU-Bekennervideo’ (2015) YouTube video, posted by ‘ZOB,’ https://www.youtube.com/watch?v=3bLdBWtCzD4

[5] Von Der Behrens, ‘Lessons from Germany’s NSU case’

[6] Hardy, Keiran (2019) ‘Countering right-wing extremism: lessons from Germany and Norway,’ Journal of Policing, Intelligence and Counter Terrorism Vol. 14, No. 3, pp. 262-279.

[7] Sandow-Quirk Mary (2002) ‘A failure of intelligence,’ Prometheus Vol. 20, No. 2, pp.131

[8] Betts, Richard K. (1978) ‘Analysis, War, and Decision: Why Intelligence Failures Are Inevitable, ’ World Politics, vol. 31, no. 1, pp. 61–89; Shulsky, Abram N., and Gary James Schmitt (2002) ‘Silent Warfare: Understanding the World of Intelligence,’ Third, revis ed. Washington, D.C: Potomac Books., pp. 63

[9] Von Der Behrens, Antonia (2017) ‘Summary of Political, Social and Legal Aspects of the Case against the National Socialist Underground (NSU)’.

[10] In German: Thüringer Heimatschutz

[11] Virchow, ‘Der »NSU« Und Der Staatliche Sicherheitsapparat,’ pp. 147.

[12] This is governed by the Federal Office for the Protection of the Constitution in § 2 para. 1 and § 8 para. 3 BVerfSchG.

[13] Virchow, ‘Der »NSU« Und Der Staatliche Sicherheitsapparat,’ pp.145.; Glossar online "Trennungsgebot", Bundesamt für Verfassungsschutz, accessed December 2, 2019, https://www.verfassungsschutz.de/de/service/glossar/_lT

[14] Hillebrand, Claudia (2019) ‘Placebo Scrutiny? Far-Right Extremism and Intelligence Accountability in Germany,’ Intelligence and National Security Vol. 34, No. 1, pp. 38-61.

[15] Von Der Behrens, ‘Lessons from Germany’s NSU case’ 

[16] Schultz, Tanjev. (2018) ‘NSU: Der Terror von rechts und das Versagen des Staates,’ Droemer eBook, pp. 63.

[17] Hillebrand, Placebo Scrutiny? Far-Right Extremism.

[18] Von Der Behrens, ‘Lessons from Germany’s NSU case’  

[19] Schultz, Tanjev, NSU: Der Terror von rechts.

[20] Förster, Andreas, et al. (2014) ‘Geheimsache NSU. Zehn Morde, von Aufklärung keine Spur,’ pp.121.

[21] Aldrich, Richard J. and Daniela Richterova (2018) ‘Ambient Accountability: Intelligence Services in Europe and the Decline of State Secrecy,’ West European Politics 41, no. 4, pp. 1011.

[22] Heuer, Richards J.  (2005) ‘Limits of Intelligence Analysis’ Orbis Vol. 49, No. 1, pp. 80

[23] Schultz, Tanjev. NSU: Der Terror von rechts, pp. 63.

[24] Hillebrand, Placebo Scrutiny? Far-Right Extremism.

[25] Translated from German: Gemeinsames Terrosismusabwehrzentrum (GTAZ). Bundeskriminalamt.  https://www.bka.de/DE/UnsereAufgaben/Kooperationen/GTAZ/gtaz_node.html

[26] Verfassungsschutz, Bundesamt (2004) Radikalisierungsprozesse und extremistische Milieus. Ein Symposium des Bundesamtes für Verfassungsschutz Köln.

[27]Von Der Behrens, Antonia (2017) ‘Summary of Political, Social and Legal Aspects of the Case against the National Socialist Underground (NSU)’; Virchow, ‘Der »NSU« Und Der Staatliche Sicherheitsapparat,’ pp.145.; Glossar online "Trennungsgebot", Bundesamt für Verfassungsschutz, accessed December 2, 2019, https://www.verfassungsschutz.de/de/service/glossar/_lT

[28] Koehler Daniel, edt. (2017) ‘Right-Wing Terrorism in the 21st Century: The National Socialist Underground and the History of Terror from the Far Right in Germany,’ Journal of Terrorism Research Vol. 8, No. 2, pp. 89-91.

Intelligence Oversight: Bringing Accountability to Failure or Dodging Political Blame

Ever since figures such as Snowden and Assange exploded onto our televisions in the early 2010s, we have become increasingly obsessed with the ethics of intelligence. The end of the Cold War ushered in a new age of scepticism towards the practises of intelligence gathering, analysis and execution. Modern discourse on the subject is increasingly distrustful of the state and ever critical whenever intelligence failures occur. To say nothing of the ever pervasive conspiracy theories surrounding events such as 9/11, whenever attacks occur in the West a series of legitimate questions emerge. Could it have been prevented? Who is to blame for failing to prevent such an attack? Is it an uncomfortable truth that intelligence failure is inevitable and will necessarily result in public endangerment from time to time?

By Alasdair Revie

Accountability in the intelligence process is often advanced as an absolute positive force, with those who advocate for it often pointing to evidence which states that, the more accountable an intelligence community is, the more effective its oversight procedures are. However, when the question of accountability is raised, several more questions necessarily follow. For example: to whom should the intelligence services be accountable? In the case of the United Kingdom, the apparatus of intelligence is purportedly accountable to the Intelligence and Security Committee of Parliament (ISC), made up of nine parliamentarians. Yet, an analysis of whether the ISC is an example of true accountability and the effects of increasing the liability of the intelligence community to it, yields interesting results.

The ISC inquiry into the 2002 Bali bombings is illustrative. This inspection concluded that ‘MI5 made a ‘serious misjudgement’ and failed to ‘assess the threat correctly’...,’[1] while simultaneously noting that there had not been enough evidence available to prevent the attack. [2] Thus, the government responded by redefining threat level assessments in order to ‘make them more informative to customers’. [3] This reassessment was the suggestion of the Security Service review rather than the ISC, with “customers”, meaning the public, being a revealing choice of words. Hence, we have a case wherein the observations of the ISC, the proper mechanism of intelligence oversight, have been overshadowed by a solution which opts to pander to the “customer”. It may have been the case that the alternative solution was more agreeable to the government than attempting to address fundamental concerns with MI5's ability to correctly appraise threats and gather intelligence. However, this outcome has serious consequences for the accountability process, and lends itself towards the concept that British intelligence oversight procedures may be more of a political apparatus than a performance enhancing procedure.

Furthermore, when parliamentarians are presented with the opportunity to address the role and performance of the ISC through its annual report, it is rare to find a demand for an increase in accountability. Mark Phythian notes that during the 2006-7 debate on the ISC's annual report ‘...just nine MPs were called to speak, six of whom were members of the ISC. An additional six MPs, one of them an ISC member, made interventions during those speeches.’ [4] This is despite the fact that in 2000, and again in 2007, the ISC was denied access to the annual report of the Intelligence Services Commissioner on the grounds that the information within was too sensitive for parliamentarians. [5] Thus, there appears to be a lack of will on the part of parliament to empower themselves, where their role in intelligence oversight is concerned. This once again implies that without public - and therefore political - demand for accountability reform, the measures designed to prevent lapses in the intelligence process will not adapt of their own accord.

So, perhaps one can rely on the public to hold the intelligence consortium to account given that the principles of many Western democracies already assume this role of the electorate regarding government as a whole. Hastedt's analysis of this topic identifies two key circumstances which he claims must occur in order for the voter to play a role in intelligence oversight. Firstly, the notoriously clandestine activity of intelligence agencies and which inconspicuous figure is responsible for said activity must be evident to the public. Further, the public must prioritise voting on the basis of something being done about it. [6] The short answer as to whether or not this is a reliable and effective method for ensuring robust oversight procedures is no, [7] however it would be recommended to read further into the work of Hastedt in order to receive his long-form and rather more nuanced response. Accordingly, what can one possibly conclude from these observations?

It is easy, when addressing intelligence oversight, to leaf through mistake after mistake, ignoring the silent victories of every unrecorded terror attack or cyber breach. However, it is also important to bear in mind that it took a scandal on the scale of the Iran-Contra affair in order to see the creation of an independent inspector general to oversee the intelligence community in the United States. Thus, we must acknowledge that any organic evolution in the procedures of intelligence oversight remains unlikely. So too is an outcome in which government responds to intelligence failure in an apolitical manner. After all, both governance and intelligence are highly political animals; an unsatisfying and somewhat cynical conclusion perhaps. However, the question of what can be done about this remains open and, as in many things, identifying and exposing such issues can be the first step in finding a solution to them.

Sources

 

[1] Phythian, Mark. “The British Experience with Intelligence Accountability.” Intelligence and National Security 22, no. 1 (2007): 75–99. https://doi.org/10.1080/02684520701200822.

[2] Ibid.

[3] Government Response to the Intelligence and Security Committee Inquiry into Intelligence, Assessments and Advice prior to the Terrorist Bombings on Bali 12 October 2002, Cm 5765, February 2003, para.10 in Ibid.

[4] Phythian, Mark. “‘A Very British Institution’: The Intelligence and Security Committee and Intelligence Accountability in the United Kingdom.” The Oxford Handbook of National Security Intelligence, December 2010, 698–718. https://doi.org/10.1093/oxfordhb/9780195375886.003.0042. 

[5] Ibid.

[6] Hastedt, Glenn. “The Politics of Intelligence Accountability.” The Oxford Handbook of National Security Intelligence, December 2010, 718–34. https://doi.org/10.1093/oxfordhb/9780195375886.003.0043.

[7] Ibid.

Why Torture is Ethically Unjustifiable (II)

Part 2

In 2014, the US Senate Select Committee on Intelligence (SSCI) published a report on the Central Intelligence Agency’s (CIA’s) Detainee and Interrogation Program (DIP)[1] The report presents ‘overwhelming’ and ‘incontrovertible’ evidence of torture used against CIA detainees between 2001 and 2009.[2] This, however, should come as no surprise knowing that the CIA’s Enhanced Interrogation Techniques (EITs) include simulated drowning (waterboarding), sleep deprivation up to 180 hours, debilitating stress positions, and threats to rape family members among other methods.[3] Although EITs merely amount to a euphemism for torture, proponents claim that such methods are simply ‘enhancing interrogation’ and crucial to obtain information from uncooperative detainees in order to prevent imminent terror attacks.[4] The following questions thus remain: What is considered torture? and Does torture work?  As consequentialists take an opposing stance to an absolute ban on torture, it is important to emphasize that they only do so on the condition of its efficacy. After all, as stated in part one of this essay, torture would not increase the collective utility if it does not deliver the required results. The answer to both questions lies in the field of neuroscience. 

 By Maarten Visser

What is Considered Torture?

An authoritative point of reference is the 1984 United Nations Convention Against Torture (CAT),[5] which forms the design of numerous national legislations. The CAT defines torture as ‘an act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person.[6]  Although this definition offers a valid starting point, it contains shortcomings – especially with regards to torture for intelligence purposes (interrogational torture). To begin with, it fails to identify the unique relation between captive and tormentor, in which the former must have total inability to protect himself or fight back against the latter. Hereby, Michael Davis suggests that the torturer often knows much more about the victim than the other way around and, therefore, usually also has intellectual or psychological dominance.[7] However, this sense of control is neither necessary nor sufficient. Another inadequacy of this definition is its limitation to acts, while ‘not acting,’ such as the withholding of medical treatment, can also constitute torture.[8] Furthermore, it overlooks the fact that interrogational torture requires total absence of consent of the victim.[9] In order to address these shortcomings from the CAT definition, I will  define interrogational torture as the intentional infliction, by act or omission, of severe pain or suffering, whether mental or physical, on a defenceless and non-consenting person over whom a state actor as physcological influence, in order to obtain information.[10] 

Nonetheless, the fundamental question of torture’s continuum remains: how severe must physical and mental pain or suffering be in order to qualify as torture? After all, torture once constituted an aggravated form of cruel, inhuman, or degrading treatment.[11] Evidently, the answer to this question is complicated. It can be argued, however, that the judgements found in the 2002 Torture Memos, which tend to justify the DIP seem highly inaccurate: they are narrowing the scope of torture to pain and suffering that result in long-term psychological harm, organ failure, impairment of bodily function or death.[12] This is not to say, however, that EITs are not capable of resulting in these long-term consequences. The repeated waterboarding of Abu Zubaydah offers a striking example. Aside from the convulsions and vomiting caused by his treatment, following one of the sessions, Abu Zubaydah became completely unresponsive with bubbles rising out of his mouth.[13] George W. Bush stated in 2010 that “medical experts” had assured the CIA that EITs could not cause any “lasting harm”.[14] These “medical experts,” though, have yet to be identified.

Although pain and suffering are complex phenomena, they are not impossible to measure. Ronald Melzack and Warren Torgerson made significant claims that pain is more than purely a physical sensation.[15] More specifically, pain is a highly subjective multidimensional experience whereby affective dimensions (such as fear, anxiety, and distress) and sensory dimensions (aching, stinging, burning, etc.) are interdependent and equally essential components.[16] Furthermore, according to Paul Kenny, there is an incorrect utilitarian assumption that pain and suffering not only differ qualitatively, but also quantitatively.[17] There is strong evidence that suffering from sleep deprivation, exposure to extreme temperatures, certain stress positions, or humiliating treatment, does not differ substantially from physical torture in terms of the underlying mechanism of traumatic stressors and their long-term psychological outcomes.[18] This ultimately means that pain and suffering require a broader and more refined interpretation than the implications from the 2002 Torture Memos. 

Does torture work?

Most of us have experienced a jetlag or other kinds of intense fatigue. It would then not be the easiest task to focus and pay attention, let alone reproduce exact information from several years ago; the only desire is to sleep. We all have some sense of how it would be if people keep you awake for 180 hours. Alongside the fact that sleep deprivation can severely damage brain function, experience shows that people will say anything the torturer wants to hear if subjected to such extreme conditions.[19] 

Scholars make the distinction between interviews and interrogations, the latter demonstrating a more coercive nature.[20] Through coercion, captives are more likely to be presumed guilty or given misleading evidence.[21] EITs primarily consist of harsh confrontation alternated with prolonged isolation of the captive. Psychological studies have shown that the desire to escape isolation and agonising guilt-presumptive interrogation techniques are common factors in the provision of false statements.[22] Accordingly, the SSCI findings conclude that EITs largely produced false and fabricated information.[23] For example, Khalid Sheik Mohammed (KSM), who was waterboarded at least 183 times, provided predominantly false information which ultimately caused the imprisonment of two innocent individuals.[24] Moreover, intelligence that led to Abu Ahmed al Kuwaiti (an Al Qaeda member who gave information leading to the killing of Usama Bin Laden) did not come from any of the three detainees who were waterboarded.[25] In fact, KSM told the CIA that Abu Ahmed al Kuwaiti had moved away and completely ceased his involvement in Al Qaeda, neither of which were true.[26]

It is an all-too-common mistake to believe that telling the truth will ultimately stop torture; in fact, just talking does. To address this claim, it is important to emphasise the asymmetrical power relationship between interrogator and captive, and, more specifically, the distinct motivations of each. Shane O’Mara illustrates these motivations with reference to the Pavlovian condition.[27] The captive who desperately wants to escape extreme stress recognises stimuli in the brain that signal periods of safety during these events. In a torture situation, the safety signal for the captive in a torture situation would be the act of speaking: when the captive speaks, the torturer stops torturing, whether the captive is telling the truth or not.[28] Therefore, it is evident that torture does not reliably produce truthful information. 

Another argument for the ineffectiveness of torture is that extreme stress and pain affect memory and manipulate the brain. The parts of the brain that regulate memory and stress are highly interdependent and reciprocal.[29] As previously stated, pain and suffering are multidimensional experiences which invoke prolonged and extreme stress. These stressors have a damaging effect on the frontal lobe, the area of the brain that controls cognitive functions such as communication and memory. In this respect, O’Mara argues that frontal lobe disorders frequently result in confabulation.[30] Furthermore, it has been suggested that the use of misleading or false information by the interrogator as part of EITs can lead to memory distortion of the captive.[31] In this essence, Misty C. Duke and Damien Van Puyvelde emphasise the distinction between suggesting accurate and truthful evidence to a captive on the one hand and deceitful or inaccurate information on the other. The former might contribute to detecting deception and building a productive relationship with the captive, whereas the latter may lead to faulty intelligence and consequently, leave interrogators astray.[32]

Conclusion

Torture is demeaning and violates the fundamental existence of human beings as bearers of dignity with the utmost unimaginable cruelty. For this reason alone, as mentioned in part 1 of this article, torture is ethically unjustifiable. Even a threshold deontological approach is completely unwarranted because “ticking bomb” scenarios are more myth than reality. Once torture is permitted it will have a corrupting effect on governmental institutions, as the vast amount of evidence of deceit and the covering of tracks contained within the SSCI report attests. Above all, torture is not proven to work as a reliable source of accurate intelligence. The CIA’s EITs provide a striking example of this. The techniques used, have proven to be deleterious, and their heuristic nature is extremely obstructive to the captive’s cognitive and neurobiological functioning. These techniques that supposedly enhance intelligence collection do exactly the opposite – they hinder interrogation. 

Sources

[1] U.S. Senate Select Committee on Intelligence, Committee Study of the CIA’s Detention and Interrogation Program, S. Rpt. 113–288, at http://www.intelligence.senaat.gov/publications  

[2] Ibid., 4 and 160-161.

[3] Ibid., 4 and 12.

[4] Alan M. Dershowitz, Why Terrorism Works: Understanding the Threat Responding to the challenge (London: Yale University Press, 2002).

[5] Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, adopted by the U.N. General Assembly. 10 December 1984.

[6] Ibid., article 1, paragraph 1. 

[7] Michael Davis, “The Moral Justifiability of Torture and other Cruel, Inhuman, or Degrading Treatment,” The International Journal of Applied Philosophy 19 no. 2 (January 2005): 164.

[8] Mathew H. Kramer, Torture and Moral Integrity: A philosophical enquiry. (Oxford: Oxford University Press, 2014), 32-33.

[9] Ibid., 51-53. Kramer’s criticism is not directed to interrogational torture. 

[10] I used the VAT definition as starting point.

[11] Declaration on the Protection of All Persons from Being Subjected to Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment. Article 1, paragraph 2. Adopted by General Assembly. 9 December 1975. 

[12] U.S. Department of Justice. Memorandum from Jay S. Bybee to Alberto R. Gonzales, Standards of Conduct for Interrogation under 18 U.S.C.§§ 2340-2340A, 1 August 2002 at www.washingtonpost.com/wpsrv/nation/documents/dojinterrogationmemo20020801.pdf

[13] SSCI Report, xii and 44.

[14] George W. Bush, Decision Points (New York: Random House, 2010), 169.

[15] Ronald Melzack and Warren R. Torgerson, “On the Language of Pain,” Anaesthesiology 34, no. 1 (1971): 58 and Donald D. Price “Psychological and Neural Mechanisms of the Affective Dimension of Pain,” Science 288 (2000). 

[16] Ibid., 1770. 

[17] Paul D. Kenny, “The Meaning of Torture.” Polity 42, no. 2 (2009): 149.

[18] Metin Basoglu, Maria Livanou, and Cvetana Crnobaric, "Torture vs Other Cruel, Inhuman, and Degrading Treatment: Is the Distinction Real or Apparent?" Archives of General Psychiatry 64 (2007): 283. 

[19] Shane O’Mara Why Torture Doesn’t Work: The Neuroscience of Interrogation (London: Harvard University Press, 2015), 149.

[20] Elizabeth F. Loftus, “Intelligence Gathering Post 9/11,” American Psychologist, 66 no. 6 (2011): 533.

[21] Ibid.

[22] Duke and Puyvelde, “What Science Can Teach,” 316-317.

[23] SSCI Report, xi.

[24] Ibid., 83.

[25] O’Mara Why Torture Doesn’t Work, 101.

[26] Ibid. 

[27] Ibid. 

[28] Ibid., 103.

[29] Ibid., 51.

[30] Ibid., 104.

[31] Duke and Puyvelde, “What Science Can Teach,” 323.

[32] Ibid.

Why Torture is Ethically Unjustifiable (I)

Part 1

On several accounts, US President Donald J. Trump announced his desire to reinforce the so-called Enhanced Interrogation Techniques (EITs)[1] on detainees suspected of terrorist offences. He requested to "fight fire with fire" when it comes to countering terrorism, because ‘he absolutely believes that torture works’[2], and said: “I’d bring back waterboarding and I’d bring back a hell of a lot worse than waterboarding”.[3] Similarly, Brazilian President, Jair Messias Bolsonaro portrays torture as a useful instrument  (“Eu sou favorável à tortura”), and told the Brazilian people: “We shouldn’t just torture. We should torture and kill” (“Nós não devíamos só torturar. Devíamos torturar e matar”).[4] These notions on torture, from the most powerful, are not just astonishing; they are also incorrect. Divided in two interdependent essays, I will demonstrate not only that torture is in complete opposition to the moral liberal vision in which human beings possess an inherent dignity, but also that in-depth psychological and neuroscientific evidence successfully rejects the idea that torture works. In this first part of the essay, I will discuss the philosophical concepts that form the foundation for the contemporary debate on the use of torture. 

By Maarten Visser

Suppose you have a terrorist in custody who planted a bomb in your city, set to detonate in twenty-four hours. There will be disastrous consequences, killing thousands of innocent people, unless you find the location of the bomb. Should it be morally permissible for you to torture the terrorist in order to obtain the needed information? 

This invariably applied imaginary scenario is known as the “ticking bomb dilemma” and forms the basis for the torture debate in normative ethics between consequentialism and the theory of deontology. In short, consequentialists hold the view that the morality of an action is completely determined by its consequences. The purpose is to choose the action with the overall happiest ‘or least unhappy’ net outcome. In contrast, deontologists expect an ethical person to act out of a profound moral duty (deon is the Greek word for duty). This responsibility recognises factors which make it morally unacceptable to perform a certain act, notwithstanding the overall consequences.

The ticking bomb dilemma seems to support the consequentialists side of the argument. There appears to be a solid moral justification to torture the terrorist, because it would contribute to the overall security of the city’s population utility. Torturing one terrorist for the sake of thousands of innocent people – at least, that is what Jeremy Bentham thought. Bentham, one of the founders of the doctrine of utilitarianism,[5] argued that torture under these extreme circumstances is ethically permissible, because it would result in a greater quantity of happiness: “[...] the public has so great an interest in his doing that the danger of what may ensue from his not doing it is a greater danger even that of an innocent person’s suffering the greatest degree of pain that can be suffered by Torture.”[6]  In this particular context, Bentham also emphasised the aspect that victims have it within their power to stop the torturous act simply by complying with the torturer’s demands.[7]

To all of this, Immanuel Kant might make the following reply: ‘There are certain moral duties so fundamental that they rise above any calculated outcome in any given ticking bomb scenario.’[8] Kant’s absolutist deontological theory argues that it is morally wrong to treat a person as a mere means to the overall happiness of the collective. In other words, there are certain categorical and universally shared rights and duties that prevail utilitarian considerations.[9] After all, torture infringes upon the intrinsic dignity of human beings in a manner that a moral agent could not reasonably condone. But does this really disregard the utilitarian notion of counting the numbers? It can be argued that the utilitarian still has a strong case, because violating one’s dignity, that of a terrorist, could potentially save thousands. 

It is important to keep in mind, however, that the described scenario is a hypothetical one. The dilemma's “disastrous consequences” argument is as strong as its absurdity: Several scholars defend either degree of permissibility of torture with the utmost creativity and imagination. Scenarios in which terrorists threaten entire cities and nations with ticking nuclear devices are common practice.[10] In contrast, Ron E. Hasner makes significant claims that such scenarios are not just unlikely, but rather unrealistic and, above all, have never actually occurred.[11] Although proponents of the CIA’s Detainee and Interrogation Program claim otherwise, there is no evidence that any of the 39 Guantanamo Bay and Abu Ghraib detainees subjected to the EITs came anywhere close to being an actor in a ticking bomb scenario.[12]

Nonetheless, numerous scholars and policymakers use these examples to justify the use of torture in a milder form (‘torture light’) or in exceptional cases. Professor Sir David Oman, for example, describes a situation in which a parent sits in front of their child’s kidnapper. Time is running out and the silent and ‘smug’ perpetrator is the only one to know about the child’s whereabouts. Oman claims that the parent might have the moral duty to torture the kidnapper. Because, as John Stuart Mill (Bentham’s protégé) would say, “not acting has also consequences”.[13] It would certainly be fairly easy to sympathise with the parent’s actions, but can they therefore be considered as moral? Kant would think not, and many with him. Article 1 of the German Constitution, for instance, states: “human dignity shall be inviolable”.

Another important deontologist argument against torture is that of the ‘slippery slope’. In addition to the desired results, the permissibility of torture inevitably brings other undesirable consequences. These can include the use of progressively more extreme techniques and the torture of the innocent. The Khaled el-Masri case provides a clear example hereof. On 31 December 2003, Khaled el-Masri, a German citizen was wrongfully abducted while on vacation in Macedonia, having been mistaken for a suspected member of Al Qaeda named Khalid al-Masri. He was interrogated for twenty-three days and then brought to a secret CIA prison in Afghanistan where he was interrogated further and subjected to EIT’s – el-Masri was drugged, shackled, stripped naked, beaten, and sodomized – for nearly five months.[14]

The scenario of the ticking bomb is misleading for another reason. The debate often neglects a third indispensable ethical theory, known as ‘virtue ethics’. This Aristotelian philosophy claims that justice gives people what they deserve.[15] Michael Sandel argues that the utilitarian ticking bomb scenario depends on a non-utilitarian notion that the terrorist is a cruel person and deserves to be punished.[16] Sandel makes an essential point here. After all, the given utilitarian scenario completely overlooks the possibility that saving thousands of lives could also justify torturing an innocent person.[17] What if not torturing the terrorist but beating and sodomizing the terrorist’s five-year-old daughter is the means to obtaining the required information. It is suspected that even the hardened ‘utilitarian’ would now consider the use of torture to be ethically unjustifiable. 

Despite an international ban, torture is common practice and easily vindicated worldwide, within both democratic and non-democratic societies. Perhaps we need to take a closer look at Kant's emphasis on human dignity and consider Kantian norms as guidance to stop people from thinking they can use other people as a means. In the second part of this essay, I will demonstrate that the consequentialist justification of torture is based on the false assumption that torture is an effective method to gather information. 

Sources

[1] In the second part of this essay I will demonstrate that EITs fall within the scope of torture.

[2] Dan Merica, "Trump on waterboarding: ‘We have to fight fire with fire’." CNN (2017). https://edition.cnn.com/2017/01/25/politics/donald-trump-waterboarding-torture

[3] Tom McCarthy, "Donald Trump: I'd bring back 'a hell of a lot worse than waterboarding'." The Guardian 7 (2016). https://www.theguardian.com/us-news/2016/feb/06/donald-trump-waterboarding-republican-debate-torture

[4] Augusto de Franco, “Por que podemos afirmar que Bolsonaro é um autocrata” Dagobah Inteligência Democrática http://dagobah.com.br/por-que-podemos-afirmar-que-bolsonaro-e-um-autocrata/

[5] Utilitarianism is a form of consequentialism and both terms will be used interchangeably throughout this essay.

[6] Jeremy Bentham (University College, London), cited in Warren L. Twinning and P.E. Twining, “Bentham on Torture,” Northern Ireland Legal Quarterly 24, no. 3. (1973): 313.

[7] Ibid.

[8] Michael J. Sandel, Liberalism and the Limits of Justice (Cambridge: Cambridge university press, 1982), 1-14.

[9] Ibid.

[10] See in this context: Michael J. Sandel, Justice: What’s the Right Thing to Do? (London: Penguin Books, 2009), 38 and Ginbar, Why Not Torture Terrorists? 26.

[11] Ron E. Hasner, “The Myth of the Ticking Bomb.” The Washington Quarterly 41, no. 1 (2018): 88-89.

[12] Ibid., 91.

[13] David Omand and Mark Phythian, Principled spying: The ethics of secret intelligence (Oxford: Oxford University Press, 2018), 66-67.

[14] U.S. Senate Select Committee on Intelligence, Committee Study of the CIA’s Detention and Interrogation Program, S. Rpt. 113–288, 128 and James P. Pfiffner, Torture, As Public Policy: Restoring U.S. Credibility on the World Stage (London: Paradigm Publishers, 2010), 107.

[15] Sandel, Justice, 9.

[16] Ibid., 39-40.

[17] Ibid.

Men, machines, and beliefs: immutable tenets of Strategy

Strategy-making is a process that encompasses a wide range of interdependent variables, from cultural to technological factors. It reflects the way a polity imagines itself and its opponents. It is true that historical contexts are unique; thus, Strategies have varied – in terms of objectives, means, and enemies. Nonetheless, it is worth investigating if immutable tenets shape the Strategy function. Indeed, this inquiry constitutes an insightful analysis to unveil patterns in the way societies, given limited resources, think and use force for political aims. The cases of early theories of air power, the annihilation logics of Germany’s colonial policy in Southwest Africa, and US drone warfare against terrorists provide rich observations to test the existence of recurrent features in Strategy.

By Jacopo Grande

1. The function of Strategy: searching for immutable tenets

Polities interact within a geometry of cooperation and conflicts, whose underpinning function is that of Strategy. This is the process of thinking and using organised force for political aims [1], given limited resources [2]. But it is also the way in which polities imagine themselves, their threats, and enemies.        
When observing the War on Terror and its recent long-distance decapitation drone warfare, the securitisation of Southern European borders against migrants, or the Syrian government’s strikes targeting its own population, the mechanics of strategy-making prove to be vital in exposing recurrent patterns in terms of men, machines, and beliefs that contribute to choices. Hence, unpacking the function of Strategy constitutes a valuable analytical process. It is key, in fact, to uncover the complexity of international relations and security, since its variables, all intertwined and reciprocally dependent, capture single fragments of the logics of war-making and statecraft [3].
Strategy-making has ancient origins [4], whereas circumstances constantly evolve and wars are always fought. Therefore, it is worth assessing strategy’s immutable features, elements which are not subject to change despite transforming societies, technologies, and conflicts. This assessment will be conducted through three case studies: early air strategies of the 20th century (A), German colonial practices in 20th century Southwest Africa (B), and American drone warfare (C), to demonstrate that time, mutual interactions, and the culture-technology continuum are immutable factors of strategy-making.

2. CASE STUDY (A)
Machines, prophecies, and civilians: selecting targets

The first case exposes the intimate connection between culture, technology, and target selection, drawing on early air power strategies. H. G. Wells [5] envisioned the splintering of New York by a German bombing fleet of airships in 1908 and a few years later, the world witnessed Wright brothers’ first motorised flight [6]. As soon as the airplane had been imagined, even before its actual use, there was much speculation about its potential military use and prophecies of destruction in the next war were asserted in public debates and tabloids [7]. The conquest of the air has opened a new dimension of warfare, [8] erasing the boundaries of traditional battlefields, since aircrafts can easily pass behind armed forces on the ground and aim directly at the heart of the enemy: industrial capability, or civilians’ morale [9]. Therefore, the line between soldiers and non-combatants has been expunged in the new totalised warfare [10], and civilians reduced to ‘machines behind the machines’ [11] in the ruins of Guernica, Dresden, and Tokyo [12]. Despite weaponry reaching the nuclear stage, this evolutionary pattern is not alien to the function of technological advance for military use – the longbow prevailing over the sword, or the breech-loaded rifle over the musket [13]. Yet, what has truly changed with airpower is the identification of enemies. They are no longer embodied solely in the armed forces, but also in the unarmed people; those, as considered supporters of the war effort, are now turned into targets [14]. Under air raids, rushed preparations for the next strike took place in Britain and likewise in Germany during World War II, which have shaped fears and architectures [15], making conflict part of a domesticized war-peace continuum [16]. This suggests that considerations about targets are central to Strategy and that such targets are defined within the parameters of culture and technology. Furthermore –  as examined through the second case study – those categories are senseless if Strategy falls short of its temporal dimension.

3. CASE STUDY (B)
Automated scripts for victory surrogates: mass killings and concentration camps

The second case study aims at acknowledging the dimension of time in Strategy. Namely, time plays a core role in terms of planning and then employing a strategy; indeed, time affects the way wars are waged. Yet, the temporal factor is often overlooked in the conclusive phases of conflicts: when Strategy proves unable to address the aftermath of war, it is certainly defective.

German colonial policy at the beginning of the 20th century constitutes an interesting case for examining time and Strategy. Here, the relationship between organisational, cultural, and tactical aspects of Strategy [17] proves to be central in explaining the victory, but helpless in understanding its consequences.
Southwest Africa was confronted with uprisings of the local Herero population between 1904 and 1907, and the Reich responded assertively. The Germans started killing rebels and civilians through mass starvation, and then via a mechanised process of annihilation enabled by concentration camps [18]. The imagined equivalence between national pride and state security – and an innate sense of inferiority resulting from an uncomfortable geography [19] – combined unavoidably with the Bismarckian structure of governance [20] based on the unchecked power of the executive branch and the military. The organisational military doctrine, easily paired with the Clausewitzian obsession with decisive victory [21]. When classical European battles proved to be useless to defeat local warriors, German soldiers resorted to a victory surrogate – the actual disappearance of the enemy [22]. The Strategy adopted in that scenario resulted from cultural assumptions, historical experiences, and the shock of an asymmetric confrontation with the opponent: concentration camps functioned as lethal bureaucratic devices of disappearance and mechanised annihilation, and eventually ensured victory [23]. Yet, the validity of such a triumph should be tested against its consequences: in strategy-making, planning the aftermath of conflict should represent the measure of a victory because victory is a complex negotiation, not a single event [24]. Destruction, occupation, and the end of hostilities alone are insufficient to claim that victory, since it results from various actors’ mutual interactions, like any phase of Strategy. Hence, the last case study focuses on the interactive dimension of Strategy.

4. CASE STUDY (C)
Altar of technology: roots of the US drone warfare

The third case study is US strategic evolution and aims at highlighting how Strategy is an interactive and history-driven process. Indeed, various actors, cultures, and beliefs, contribute to the process. Since 2001, the US has conducted operations in Somalia through the Pentagon’s Joint Special Operations Command (JSOC). In 2011, the US implemented a targeted-killing strategy employing drones to hit al-Shabaab camps and militants; the same pattern has been repeated in Yemen, Afghanistan, and Pakistan [25]. Strategic bombing and decapitation techniques [26] appear to be merged in the new American way of war [27]. This has been framed as the risk-transfer approach [28], based on technological superiority and massive fire power such as substitutes for manpower [29].

Past experiences and beliefs are the main factors in shaping this Strategy: the trauma of Vietnam, resulting in the increasing aversion for human casualties on the ground, has contributed to a distance-striking mentality. This mindset has been reinforced by the success gained through superior air power in the Gulf War. Moreover, the societal background built on the ideals of the American War of Independence mixed with its capitalist path, namely wealth accumulation and the pursuit of happiness as the paramount common good [30], have combined with the assemblage of Congress, the American public, and the industrial-military complex [31]. Hence, piloted Predators flying over the Middle Eastern sands are the embodiment of a tormented effort to reduce the human component in war [32], demonstrating how the US strategy-making process has been heavily affected through interactive beliefs and legacies.

5.  Architecture of Strategy, and its immutable tenets

Strategy is a complex function whose variables range from technology to geography, from history to cultural assumptions, ideologies, and resources [33]. Those factors are interdependent and operate within evolving historical contexts, but immutable tenets do exist in strategy-making processes.

Firstly, Strategy requires interactions which occur amongst different categories of actors. Group A and B may decide to wage war against each other or to settle an agreement, or both; at the same time, one group could experience internal disunity. This suggests that the process of thinking and making Strategy is a land of negotiated meanings [34], objectives, sub-interests, and marginal gains [35]. As a result, the elaboration of strategies is a fight per se, for no monolithic polities exist.

Secondly, there is a culture-technology continuum that implicitly affects the way wars are fought, against who, and by what means. There are minds behind machine guns [36], but simultaneously the available weaponry enables the belligerent parties to prefer certain solutions to others, such as surgically targeting a militant, or hiding an improvised explosive device (IED) near a road. Past traumas (such as the trenches in France, or historical legacies of colonialism) and imagined mythologies [37] (like the narratives of pride and power of the German Reich) all contribute to precise strategic postures, which are learnt and automated into the polity of reference, independently from evolving killing technologies.

Thirdly, there is no Strategy without time: when deciding which resources allocate for what aims, any consideration refers to a precise time-frame and has consequences behind the execution phase. Therefore, questions about success and the aftermath should be raised. The ruins and scars following the conflict are crucial to measure a victory and to assess if it is just a zero-sum game, a further unbalanced form of violence, or, if a long-lasting peace is the utmost good, the only one to be worth fighting for [38].

Strategy is a complex function, whose variables are interdependent and dimensions various. Nonetheless, this study, through the examination of historical cases diverse in time, context, and culture, seeks to isolate eternal tenets in strategy-making processes. Such an analysis is extremely valuable to unveil recurrent patterns in the ways societies think, plan, and wage war. Understanding the interplay between culture, technology, targeting, competing beliefs, and time, in fact, is the only guidance we have to navigate uncertain times and unpack the depth of today’s security challenges.

 

Methodology note

Due to the various facets of historical scenarios, an investigation directed at identifying immutable elements of Strategy must be conducted through a qualitative research approach. Namely, it is worth comparing thick-description cases [a] in space and time to highlight subtle differences, recurrent patterns [b], and imperfect categories that simplify reality. According to this methodological necessity, the prophecies of early air power at the beginning of the 20th century, Germany’s colonial practices in Southwest Africa (194-1907), and the distance-fighting strategy of US drone warfare against terrorist organisations (2003-2019) have been purposively selected as suitable units of observation [c]. Therefore, this research design is useful to avoid quantitative thin theories [d], while providing analytical leverage [e] and reinforcing the explanatory model [f].

[a] Denzin, N. K. (2001), ‘Thick Description’. in Applied Social Research Methods: Interpretive interactionism. Thousands Oaks, CA: Sage Publications.

[b] Heuser, B. (2010), The Evolution of Strategy. Thinking war from Antiquity to Present. Cambridge: Cambridge University Press.

[c] Bryman, A. (2016), Social Research Methods. Oxford: Oxford University Press.

[d] Coppedge, M. (1999), ‘Thickening Thin Concepts and Theories: Combining Large N and Small in Comparative Politics’. Comparative Politics, Vol. 31, Issue 4, pp. 465-476.

[e] Gschwend, T. and F. Schimmelfenning (2007), Research Design in Political Science. How to Practice What They Preach. Basingstoke: Palgrave.

[f] King, G., Kehoane, R., and Verba, S. (1994), Designing Social Inquiry: Scientific Inference in Qualitative Research. Princeton: Princeton University Press, p. 205.

Sources

[1] Heuser, B. (2010), The Evolution of Strategy. Thinking war from Antiquity to Present. Cambridge: Cambridge University Press, p. 3

[2] Kagan, K. (2006), ‘Redefining Roman Grand Strategy’, The Journal of Military History, Vol. 70, No. 2, p. 333.

[3] Gat, A. (2006), War in Human Civilization. Oxford: Oxford University Press, pp. 36 ss.

[4] Heuser, Evolution.

[5] Wells, H. G. (1940 [1907]), The War in the Air. London: Odham Press Limited.

[6] Hingham, R. (1972), Air Power: A Concise History. London: Macdonald & Co. Publ.; and also, Collier, B. (1974), A History of Air Power. London: Weidenfeld and Nicolson.

[7] Seed, D. (2012), Future Wars. The Anticipations and the Fears. Liverpool: Liverpool University Press; Kennet, L. (1991), The First Air War, 1914-1918. New York: Mcmillan.

[8] Douhet, G. (1983 [1921]), The Command of The Air, [Ferrari, D. (trs.), Il Dominio dell’Aria]. Washington, DC: Air Force History and Museums Program.

[9] Hart, B. L. (1925), Paris, or the Future of War. London: Chatam.

[10] Gilbert, F. (1971), The End of the European Era: 1890 to Present. London: Weidenfeld and Nicolson.

[11] Spaight, J. M. (1930), Air Power and the Cities, London: Longmans, Green and Co., pp. 138-139, quoted in Page, A. (2019) Architectures of Survival. Air War and Urbanism in Britain, 1935-52. Manchester: Manchester University Press, p. 210.

[12] Heuser, B. (1998), Nuclear Mentalities? Strategies and Beliefs in Britain, France and the FRG London: McMillan; Heuser, Evolution.

[13] Howard, M. (1961), The Franco-Prussian War: the German invasion of France, 1870-1871. London: Hart Davis; and also, Showalter, D. E. (2004), The wars of German unification. London: Arnold.

[14] Pimlott, J. (1988), ‘The Theory and Practice of Strategic Bombing’, in Colin McInnes and G. D. Sheffield (eds.), Warfare in the Twentieth Century. London and Boston: Unwin Hyman.

[15] Grayzel, S. R. (2012), At home and under fire: Air raids and culture in Britain from the Great War to the Blitz. Cambridge: Cambridge University Press.

[16] Page, Architectures of Survival.

[17] Howes, P. (1998) The catalytic wars: a study of the development of warfare 1860-1870. London: Minerva.

[18] Hull, I. V. (2005), ‘The Military Campaign in German Southwest Africa, 1904-1907’, GHI Bulletin, No. 37, pp. 39-44; Hull, I. V. (2011), ‘German military culture and the colonial war in Southwest Africa, 1904-1907’, in Wayne E. Lee (ed.), Warfare and Culture in World History. New York, NY: New York University Press.

[19] Boemeke, M., Chickering, R., and Förster, S. (eds.) (1999), Anticipating Total War: The German and American Experiences, 1871-1814. Cambridge: Cambridge University Press.

[20] Jones, M. (2011), ‘Strategy as character: Bismarck and the Prusso-German question, 1862-1878’, in Sinnreich, R. H., and Lacey, J. (eds.), The shaping of grand strategy: policy, diplomacy, and war. Cambridge: Cambridge University Press.

[21] Bond, B. J. (1996), The Pursuit of Victory: from Napoleon to Saddam Hussein. Oxford: Oxford University Press; and also, Heuser, Evolution.

[22] Hull, ‘German military culture’.

[23] Ibid.; Boemeke et al., Anticipating Total War.

[24] Martel, W. C. (2011), Victory in war: foundations of modern strategy. Cambridge: Cambridge University Press; Ikenberry, G. J. (2001), After victory: institution, strategic restraint, and the rebuilding of order after major wars. Princeton: Princeton University Press; Bragança, M., and Tame, P. D. (2016), The Long Aftermath: Cultural Legacies of Europe at War, 1936-2016. New York: Berghahn Books.

[25] Bergen, P., and Rowland, J. (2013), ‘Drone Wars’, The Washington Quarterly, Vol. 36, No. 3, pp. 7-26; and also, Serle, J., and Purkiss, J. (2017), ‘Drone Wars: The Full Data’, [online] available from https://www.thebureauinvestigates.com/stories/2017-01-01/drone-wars-the-full-data, accessed on 6th March 2020.

[26] Gardner, L. C. (2013), Killing Machine: The American Presidency in the Age of Drone Warfare. New York: New Press.

[27] Walker, D. M. (2018), ‘American Military Culture and the Strategic Seduction of Remote Warfare’, Journal of War and Culture Studies, Vol. 11, No. 1, pp. 5-21.

[28] Shaw, M. (2005), The New Western Way of War. Risk-Transfer War and its Crisis in Iraq. Cambridge: Polity.

[29] Parker, G. (1998), The Military Revolution: Military Innovation and the Rise of the West, 1500-1800. Cambridge: Cambridge University Press.

[30] Lewis, A. R. (2011), ‘The American Culture of War in the Age of Artificial Limited War, in Wayne E. Lee (ed.), Warfare and Culture in World History. New York: New York University Press, p. 195.

[31] Ibid., p. 191; also, McNeill, J. R., and McNeill, W. (2003), The Human Web. A bird’s-eye view of Human History. New York & London: W. W. Norton & Co., pp. 288-289.

[32] Gregory, D. (2011), ‘From a View to a Kill. Drones and Late Modern War’, Theory, Culture & Society, Vol. 28, No. 7-8, pp. 188-215; Miller, Greg (2012), ‘Drone wars. Are remotely piloted aircraft changing the nature of war?’, Science, Vol. 336, No. 6083, pp. 842-843; Miller, Grace (2017), ‘Boom/[S]he is not: drone wars and the vanishing pilot’, War, Literature, and Arts, Vol. 29, pp. 1-17; Holmqvist, C. (2013), ‘Undoing War: War Ontologies and the Materiality of Drone Warfare’, Millennium: Journal of International Studies,  Vol. 41, No. 3, pp. 535-552.

[33] Lee, W. E. (2015), Waging War. Conflict, Culture, and Innovation in World History. Oxford: Oxford University Press.

[34] Geertz, C. (1973), The Interpretation of Cultures: Selected Essay. New York: Basic Books.

[35] Heuser, Evolution, p. 492 ss.

[36] Lee, W. E. (ed.) (2011), Warfare and Culture in World History. New York: New York University Press, p. 1.

[37] Ehrenreich, B. (1997), Blood Rites. Origins and History of the Passions of War. London: Virago Press.

[38] Heuser, Evolution, p. 505.

 

How to deradicalise an extremist: challenges and limitations

On November 30th, 2019, 28-year-old Usman Khan stabbed five people at the north end of London Bridge. While this is one of multiple attacks Londoners have suffered, something about this attack sets it apart from others, grabbing the attention of the media [1]. The attacker, Usman Khan, had previously been convicted of terrorism-related offences and had undergone two deradicalisation programmes during the 8 years he spent in prison [2]. This placed deradicalisation under the spotlight, reminding the international community of the importance of understanding the challenges and limitations of these programmes. This new Security Distillery piece will provide an insight into the adversity these programmes face through the example of the Pontourny Centre, a French deradicalisation centre that has generally been regarded as a failure [3]. Only by understanding what went wrong in previous deradicalisation efforts, it is possible to enhance the effectiveness of the newer programmes.

By Cecilia de Diego Manrique

The term deradicalisation has been considered a problematic concept. This is because, in contrast with disengagement, it involves an attempt to transform not only an individual's behaviour, but also his or her beliefs [4]. Hence, underlying the concept of deradicalisation is the assumption that there are wrong and, consequently, right systems of thoughts.

Given the subjectivity of the concept of right and wrong, the broad diversity found within deradicalisation discourse is understandable.  Indeed, the only aspect that allows us to refer to deradicalisation programmes as a category is their similarity of objectives. Thus, it is possible to distinguish two main general goals of these programmes: to ‘create the circumstances under which individuals become more open to alternative viewpoints; and (...) to externally bring the radicalized individual to more moderate viewpoints’[5].

Inside this broad category is our subject of study, the Pountourny Centre (officially called “Centre for Prevention, Integration, and Citizenship”), created by the French government in September 2016 in a rural castle near the Loire Valley. It consisted of a ten-month deradicalisation programme designated for French citizens between the ages of 18 and 30. 

Before the establishment of the Centre, the French government had already encountered the first challenge of deradicalisation programmes: how to measure success. In the French case, an independent team of psychologists came up with a  “psychometric test” aimed to determine the extent to which the participants´way of thinking was evolving [6]. The Centre never got the chance to yield final results, since after only 5 months of the experiment the nine participants decided to abandon the programme (presumably as a result of the continued protests against the Centre that were being held by the citizens of the village), which marks the largest failure of the programme. Not much is known about what happened with the participants because, as tends to occur with deradicalisation programmes, only short-term results are available. In this case, all we know is that after leaving the programme three of them started calling themselves “the rigorist Salafist gang” and another one was arrested for the crime of “apology for terrorism” [7]. The lack of access to long-term information on the life of previous participants prevents a better understanding of the effects that deradicalisation programmes have over time.

Furthermore, taking part in the programme was completely voluntary. This raised concerns at the outset, since it implies that the French government assumed that an individual could recognize that he or she was submerged in a radicalisation process and would react to it by searching for help, which is a large assumption to make. Its voluntary character contrasts with similar programmes, such as the British Chanel Project, which relied on police, local authorities, or local communities to identify those individuals who were exhibiting alarming behaviours and enlist them into the programme [8]. Whether the deradicalisation programmes should adopt an active role in the enrolment of participants is subject to debate. However, it is important to acknowledge how the decision can limit the scope of the programme.  From the twenty-five spots that were available at the Pountourny Centre, only nine of them were filled.

To deal with the subjectivity issue that characterizes the concept of deradicalisation, the French government decided to emphasize disengagement instead of deradicalisation [9]. As a social worker of the Pountourny Centre stated: “You can’t tell someone, ‘What you think is bad, here’s good information’” [10].  Trying to focus on 'disengagement from violence… rather than denying the validity of the grievance'[11] is usual in these programmes. The British Chanel Project followed the same path, clarifying among the objectives of the programme that the intention was not to prevent individuals or groups from expressing extreme opinions [12]. While the debate between disengagement and deradicalization continues,  the Pountourny Centre serves as an example of the difficulty that entails translating concepts into actions.

Each part of the programme promoted French nationalist elements that could have been interpreted by the participants as propaganda and the imposition of a secular counter-truth [13]. The daily life of the participants was based on therapy, group conversations on democracy, religion and laïcité (secularism), and lessons on French history, philosophy or literature. Apart from these activities, they were expected to wear uniforms and sing La Marseillaise, France's national anthem, every morning.

One could attribute part of the programme´s failure to France's underestimation, as a secular country, of the theological component of radicalisation. This follows the theory of Angel Rabasa, a Senior Policy Analyst at the RAND Corporation, that sustains the existence of a distinction between the deradicalisation programmes in Muslim-majority countries (centered on the interpretation of Islam) and the ones carried out by Europeans governments, which tend to see radicalisation in terms of a social problem of integration of Muslim communities [14].  France dealt with the theological element indirectly by introducing a Muslim Chaplain into the programme, who had individual conversations with the residents. Nonetheless, as has occurred in other programmes, the participants regarded the Chaplain as untrustworthy due to his affiliation with the government. The distrust participants have towards the government is a reason that some countries, such as the United States, have decided to maintain a political distance by providing deradicalisation grants to selected organisations, rather than setting up their own programmes [15].  

Then who should have a role if there is distrust? Apart from the Chaplain, the Pountourny Centre enlisted a team of  25 social workers, psychologists  and special educators.[16]  The employee make-up contrasts with other, more successful programmes, in which ex-members of radical groups played an important role. A unique example is the Indonesian initiative of introducing former JI (Jemaah Islamiyah) personnel as central figures of a deradicalisation programme. Thanks to their past experiences inside JI, these individuals were regarded as authority figures by the participants, increasing the effectiveness of the conversations. Additionally, the involvement of ex-terrorists in the programme afforded the Indonesian government a level of insight they would probably not have been able to reach through other avenues [17]. Hence, the inclusion of individuals with whom the participants can relate might be a potential solution.

While the Pountourny Centre failed to accomplish its objective, it constitutes an example of how not to deradicalise an extremist. Therefore, it provides us with an opportunity to learn from the mistakes, as well as recognise the limits of deradicalisation programmes. Furthermore, it highlights the importance of gaining long-term information on previous participants of these programmes to enhance research on deradicalisation results. It is not the time to lose faith in deradicalisation measures, but to work to improve them.

Sources

[1]The Guardian (2019) ‘London Bridge attack: victim named as Jack Merritt – as it happened’, 30th November. [online] available from:

https://www.theguardian.com/uk-news/live/2019/nov/30/london-bridge-attack-police-search-property-in-stafford-latest-updates, accessed on 20th February 2020.

[2] Lewis, Helen (2020) ‘Why Extremists Need Therapy’. The Atlantic, 11th February.

[online] available from:  https://accounts.theatlantic.com/products/?source=nav,  accessed on  15th February 2020.

[3] Crowell, Mady. (2017). ‘What Went Wrong With France's deradicalisation Program’, The Atlantic, 28th September. [online] available from: https://www.theatlantic.com/international/archive/2017/09/france-jihad-deradicalisation-macron/540699/, accessed on 10th February 2020.

[4]  Daugherty, CE (2019), 'deradicalisation and Disengagement: Exit Programs in Norway and Sweden and Addressing Neo-Nazi Extremism', Journal for deradicalisation, vol. Winter, no. 21, pp. 219-260.

[5] Dechesne, Mark (2011). ‘deradicalisation: Not Soft, but Strategic,’ Crime, Law and Social Change Vol. 55 No.4, pp. 287-292.

[6] Crowell, Mady. (2017). ‘What Went Wrong With France's deradicalisation Program?’, The Atlantic, 28th September. [online] available from: https://www.theatlantic.com/international/archive/2017/09/france-jihad-deradicalisation-macron/540699/ accessed on 10th February 2020.

[7] Souris, Elena and Spandana Singh (2018) ‘Want to Deradicalize Terrorists? Treat Them Like Everyone Else’ Foreign Policy, 23 th November. [online] available from:

https://foreignpolicy.com/2018/11/23/want-to-deradicalize-terrorists-treat-them-like-everyone-else-counterterrorism-deradicalisation-france-sri-lanka-pontourny-cve/ , accessed on 13th February 2020.

[8] Rabasa, Angel, et al. (2010). Deradicalizing Islamist Extremists, RAND Corporation.

[9] Crowell, Mady. (2017). ‘What Went Wrong With France's deradicalisation Program?’ The Atlantic, 28th September. [online] available from: https://www.theatlantic.com/international/archive/2017/09/france-jihad-deradicalisation-macron/540699/, accessed on 10th February 2020.

[10]  Ibid.

[11] Kruglanski et al. (2011). ‘Aspects of deradicalisation,’ Institute for the Study of Asymmetric Conflict. 12 January.  [online] available from: http://www.asymmetricconflict.org/articles/aspects-of-deradicalisation/, accessed on 25th February 2020.

[12]  Rabasa, Angel, et al (2010). Deradicalizing Islamist Extremists, RAND Corporation.

[13] Souris, Elena and Spandana Singh (2018) ‘Want to Deradicalize Terrorists? Treat Them Like Everyone Else’ Foreign Policy, 23 th November. [online] available from:

https://foreignpolicy.com/2018/11/23/want-to-deradicalize-terrorists-treat-them-like-everyone-else-counterterrorism-deradicalisation-france-sri-lanka-pontourny-cve/ , accessed on 13th February 2020

[14] Rabasa, Angel, et al (2010). Deradicalizing Islamist Extremists, RAND Corporation.

[15] Crowell, Mady. (2017). ‘What Went Wrong With France's deradicalisation Program?’, The Atlantic, 28th September. [online] available from: https://www.theatlantic.com/international/archive/2017/09/france-jihad-deradicalisation-macron/540699/ accessed on 10th February 2020.

[16] Ibid.

[17] Horgan, J. & Braddock, K. (2010). ‘Rehabilitating the Terrorists?: Challenges in Assessing the Effectiveness of De-radicalization Programs’, Terrorism and Political Violence, vol. 22, no. 2, pp. 267-291.

On the Rhetorical Construction of the War on Terror (II)

Part 2

The second article in this two-part series seeks to build on the assertion that declaring “war” on terrorism is a flawed strategy in the struggle against terrorism, and explores one explanation for the use of such rhetoric, rooted in securitisation theory. It argues that rhetorically constructing the struggle against terrorism as a war is a useful strategy if one wishes to legitimate the use of extrajudicial force. By adapting legal precedent set during past exceptional circumstances to place detainees both beyond the US criminal justice system and the protections of the Third Geneva Convention, the United States demonstrated how to successfully securitise terrorism. Whether this was the conscious purpose of the declaration of the War on Terror is open to debate.

By Oisin O’Reilly

My previous article explored the pitfalls of rhetorically constructing the struggle against terrorism in terms of conventional warfare.[1] As a strategy for actually dealing with terrorism, it leaves much to be desired. However, in this article, I wish to show that “defeating terrorism” is not necessarily the only possible object of such a rhetorical move. This is because constructing a rhetorical war-footing is a sensible strategy if one’s aim is to sanction or legitimise the use of extrajudicial force by state security forces. Specifically, when a government has a policy of classifying terrorists not as criminals, but as “enemy combatants”, then that policy has the effect of allowing the use of military force (as opposed to the justice system) in dealing with them. In the case of the “War on Terror”, as declared by President George W. Bush following the September 11 2001 attacks (9/11), B.M. Leiser plainly states the rationale behind this reclassification:

 
 

...the detainees being held at Guantanamo [Sic.] are not awaiting criminal trials. They are considered to be enemy combatants. Consequently, the rules of criminal procedure simply do not apply to them. [2]

 
 

There is more than one legal distinction being made here. In a US Department of Defense Memorandum William J. Hynes II defines “enemy combatant” as: ‘an individual who, under the laws and customs of war, may be detained for the duration of an armed conflict.’ [3] This category is then split further into “lawful” and “unlawful” combatants. The former, when captured, become prisoners-of-war (POWs) and are protected by the Third Geneva Convention. The convention states that POWs ‘must at all times be humanely treated’, must be protected ‘particularly against acts of violence and intimidation’, and all ‘measures of reprisal’ against them are prohibited. [4] Unlawful combatants however, do not receive those protections and are instead under the jurisdiction of military law. Each of these conclusions derives from observations by the US Supreme Court in Ex Parte Quirin (1942), a case dealing with German saboteurs during the Second World War, and which now constitutes the principal legal foundation for the treatment of Guantanamo detainees and other suspected terrorists [5]. This established that, in addition to their capture and detention, unlawful combatants were ‘subject to trial and punishment by military tribunals for acts which render their belligerency unlawful’. [6] Following 9/11, the distinction between enemy and unlawful combatant all but disappeared in US military and legal discourse. A key consequence of this was that it allowed the Bush Administration the legal leeway both to detain prisoners indefinitely, and to subject them to treatment far below the standard of human dignity that the Geneva Conventions demand for even those who are not officially prisoners-of-war [7].

            We have here a specific case of war-language used with the intention of sanctioning extrajudicial means of dealing with terrorism. Other commentators have picked up on how war-language is used more generally to restrict rights and liberties. In her address to the American Bar Association, former President of Ireland Mary Robinson spoke on the effect of war-language on politics:

 
 

European leaders believe that the language of war inflates those who are in fact terrible criminals, through committing acts of terrorism that deliberately kill civilians, and that the context of being ‘at war’ makes it more acceptable to erode standards of civil liberties and human rights. [8]

 
 

Although Robinson agrees with and even justifies the war-footing the US set itself upon in response to 9/11, she goes on to warn:

 
 

...there are costs to using war terminology in countering terrorism, and those costs can be severe - particularly to credibility and legitimacy in trying to foster democracy and freedom in the world. [9]

 
 

Robinson makes sure not to imply that the erosion of civil liberties had been the purpose of the ‘war on terror’ rhetoric, and it is, of course, difficult if not impossible to tell whether these effects were an intended or unintended effect of US policy. For the purposes of this article however, it is not necessary to prove intent. The declaration of the “war'' on terror legitimised the reclassification of terrorist suspects as “enemy combatants” rather than criminals. By doing so, the Bush administration demonstrated how to use language to legitimise the use of extrajudicial force in a Western democracy. Regardless of whether or not this was the administration’s intention, the important thing to note is it worked and could conceivably work for any other state willing to do it. Although there has been no shortage of criticism of the war on terror from nearly every corner of civil society both in the US and the rest of the world, the fact of the matter is that, 18 years and two US presidencies on, there are still at least 40 people being held beyond the reach of the US and international legal system in Guantanamo Bay [10].

In conclusion, if one does not mean to defeat terrorism but instead to use the threat of terrorism to sanction granting extraordinary and extrajudicial powers to government, then the use of ‘war-terminology’ is a sound strategy to legitimise such a move. It is worth pointing out here that the case outlined above is a textbook example of securitisation. If we re-analyse the rhetorical move from criminal to enemy combatant in this theoretical framework, it is clear that the US has been remarkably successful in framing the issue of terrorism as a security threat, therefore ‘requiring emergency measures and justifying actions outside the normal bounds of political procedure.’ [11] By justifying such extraordinary measures in response, the US has effectively taken the issue of terrorism out of the realm of normal politics - a key feature of securitisation theory. This article has demonstrated how easily securitisation can occur even through a simple legal interpretation.

Sources

[1] https://thesecuritydistillery.org/all-articles/on-the-rhetorical-construction-of-the-war-on-terror [Accessed: 16/03/2020]

[2] Leiser, B.M. 'The Catastrophe of September 11 and its Aftermath' in Primoratz, I. (ed.) (2004) Terrorism: The Philosophical Issues. New York: Palgrave Macmillan.

[3] Sciullo, N.J. (2012), "On the Language of (Counter)Terrorism and the Legal Geography of Terror" in Willamette Law Review 48(3) : 317-342.

[4] Third Geneva Convention, Article 14. (1949) Available at: https://www.un.org/en/genocideprevention/documents/atrocity-crimes/Doc.32_GC-III-EN.pdf [Accessed: 16/03/2020]

[5] Sciullo, 2012

[6] Ex Parte Quirin, 317 U.S. 1, 30 (1942) Available at: https://supreme.justia.com/cases/federal/us/317/1/ [Accessed: 16/03/2020]

[7] Halliday, F. (2010), Shocked and awed : how the war on terror and Jihad have changed the English language. London: I.B. Tauris. 67

[8] Robinson, M. (2006), "Law, Language and Principle in the 'War on Terror'" in Human Rights 33(1). 18

[9] Ibid, 22

[10] Savage, C. (2018), 'U.S. Transfers First Guantánamo Detainee Under Trump, Who Vowed to Fill It', The New York Times, May 2nd 2018. Available at: https://www.nytimes.com/2018/05/02/us/politics/guantanamo-detainee-transferred-trump-al-darbi.html [Accessed: 16/03/2020]

[11] Buzan, B., Waever, O. & Wilde, J.d. (1998), Security: a new framework for analysis, Lynne Rienner Pub, Boulder, Colo;London. 24

On the Rhetorical Construction of the War on Terror (I)

Part 1

This article aims to problematise the notion of declaring a “war on terror” from a linguistic perspective. While terrorism as a tactic is broadly understood and may be countered in specific instances, the rhetorical act of declaring a global war on terrorism and subsequently viewing terrorism through the prism of conventional war throw up a host of issues which are here explored. Above all this article shows that, as a counter-terrorism strategy, the construction of the struggle against terrorism as a conventional war is deeply flawed and essentially counterproductive.

By Oisín O’Reilly

At the time of publication it has been approximately 18-and-a-half years since the United States declared the “Global War on Terrorism,” and hence there are currently young people in that country’s armed forces fighting a war that began before they were born. This realisation begs the question, what exactly are they fighting for? The natural answer, and the one given by US President George W. Bush all those years ago, is that the objective of the “war on terror” is to defeat terrorism [1]. The aim of this article is to problematise the notion of “defeating terrorism” and to question the strategic value of declaring the war on terror.

Defining terrorism is an essentially political problem. If “terrorist” as a label is to have unequivocally negative connotations, then any group or individual at risk of acquiring that label has an incentive to avoid this by tweaking the definition. This issue is best exemplified by the struggle in the United Nations to create an acceptable definition:

 
 

The United Nations has been trying to define terrorism for some thirty years, and has given up in its quest for a definition that everybody can agree upon. A major problem is that Western governments wanted to make sure that state agents could never be considered terrorist, while Islamic countries wanted to make sure that national liberation movements in the Middle East and Kashmir could never be considered terrorist. [2]

 
 

The lack of definition is enough to make the object of a “war on terror” questionable. Isaac Taylor does not attempt to strictly define terrorism, yet he remarks that, somehow, we seem to know it when we see it [3]. While there is no “ideal type” terrorist organisation upon which to base a definition, all such groups are non-state actors who adopt tactics based on committing acts of violence against civilians in a way that spreads fear. As Jenny Teichman put it succinctly, ‘we will look pretty silly if we do not mention terror in our account of terrorism’ [4]. There is a divergence among terrorist organisations when it comes to the purpose of this fear: to extract political concessions, to seek revenge, for theological purposes, etc. We are thus limited to stating that terrorism amounts to attacks on civilians by non-state actors for the purposes of spreading terror, usually in order to extract political concessions from a state.

Terrorism, thus construed, is really more of a tactic than any other type of phenomenon - one which can be used or not used depending on the situation. If we now re-analyse the proposition to “defeat” terrorism in this sense then it is clear that such a proposition is, in a way, semantically clumsy. Terrorism is not the type of thing capable of being defeated like, for instance, an opposing combatant, army, or state. If terrorism is a tactic to be discretionarily used, then it makes sense to speak of adopting a counter-tactic in order to “defeat” it in the particular instance in which it is employed. For comparison, if laying mines at sea is a tactic then a counter-tactic might be minesweeping or degaussing the hulls of ships. What does it mean to defeat terrorism in the general sense, however? The question is pressing given that such a thing necessarily must be the objective of a general “war on terror”.

We can look at this question in two ways. In the first case, conditions are such that no one is motivated to commit any further acts of terrorism, making it obsolete. In the second, terrorism is successfully countered in every instance or stopped before it can happen, making it impossible.

Paul Pillar in Terrorism and US Foreign Policy argued that it is naive to think that we can create a world where grievance, alienation, and every other motivation for terrorism is absent [5]. A more optimistic stance would see the structural causes of grievance and alienation systematically addressed. However, such an approach is unlikely to be implemented so long as the world remains on a rhetorically constructed warpath against terrorism. Jingoistic policy towards terrorism all-too-easily leads to what is normally referred to in counterterrorism literature as “the kinetic approach”: ‘aggressive, offensive measures to eliminate or capture’ the members of terrorist organisations and their supporters [6]. Mark Malan argues that in the case of Islamist terrorism in Nigeria this kinetic approach has been ‘consistently brutal and counterproductive’, succeeding only in mobilising sentiment against the security forces as people come to fear the police and army more than Boko Haram [7].

In the second case, we must consider the effect on society were we to create the conditions wherein terrorism is impossible. Given that many governments around the world have reacted to Islamist terrorism by legislating reduced freedoms, increasing the size and scope of security apparatuses, and sanctioning the extrajudicial use of force, it is likely that a world where terrorism is simply impossible would simultaneously be a world with few or none of the freedoms we take for granted in a liberal democracy. Even if such a world were desirable, it remains that fully eliminating terrorism is beyond our present capabilities and failure to recognise this can have counter-productive effects. If the goal of counterterrorism is set at “eliminating terrorism for good,” then every successful terrorist attack becomes a demoralising setback. If a terrorist’s goal is to damage public morale, then setting our aspirations unreasonably high has the effect of amplifying the morale-damage a terrorist can inflict [8]. In reality, this is not the actual aim of the “war on terror”. Rather than actually seeking to end all terrorism forever, the war declared in the aftermath of 9/11 was specifically against Al-Qaeda, their affiliate groups, and those who sheltered them. This dissonance only heightens the absurdity of the rhetorical war-footing. Given that there are groups of actors whom the war actually targets, it was unnecessary in the first place to rhetorically escalate to a general war on terrorism. We can conclude from this analysis that seeking to outright “defeat” terrorism is an ill-thought-out strategy, the end of which is neither desirable nor reasonably attainable.

I have sought to problematise the discourse surrounding the War on Terror here in order to make clear what much of the world has learned the hard way over the past two decades: that neither the metaphor nor the strategies of conventional interstate warfare are suitable to the struggle against terrorism. As the conflict nears its third decade it would be prudent for policymakers and their speech-writers to remember this lesson.

 

Sources

[1] Cable News Network (2001) ‘Transcript of President Bush's address’, CNN.com, 21st September 2001. Available at: http://edition.cnn.com/2001/US/09/20/gen.bush.transcript/ Accessed 01/03/2020

[2] Govier, T. (2002), A Delicate Balance: what philosophy can tell us about terrorism.  Boulder: Westview Press.

[3] Taylor, I. (2017), "Just war theory and the military response to terrorism" in Social Theory & Practice 43(4) : 717-740.

[4] Teichman, J. (1989), ‘How to define terrorism’ in Philosophy 64 (250) : 511

[5] Pillar, P. (2003), Terrorism and US Foreign Policy. Washington, D.C.: Brookings Institution Press.

[6] Roberts, N. and Everton, S.F. (2011), "Strategies for combating dark networks" in Journal of Social Structure 12 (2), p3

[7] Malan, M. (2017), "Kinetic responses to global terrorism: Lessons from Africa" in African Security Review 26(4), p349-350

[8] Pillar, 2003.

 

Why is the US negotiating with the world’s deadliest terror organization?

Data presented in the Global Terrorism Index 2019 shows that Afghanistan replaced Iraq in 2018 as the country most impacted by terrorism, and that the (Afghan) Taliban now holds the title of the world’s deadliest terror group. This information is significant as Iraq has been the country most impacted by terrorism for the past 15 years, and the so-called Islamic State of Iraq and al-Sham (ISIS) has been the deadliest terror organization since 2014. However, in 2018 alone there has been a 70% decrease in deaths caused by ISIS terror attacks, while conversely we have seen the same increase of deaths attributed to the Taliban. The Taliban also executed what are by far the two deadliest attacks in 2018 with 466 and 330 casualties respectively. The third most deadly terror attack on the other hand was claimed by an ISIS related branch: “only” killing 150 people in Pakistan. With the exception of the Pakistan attack, the top ten deadliest attacks in 2018 were all executed in Afghanistan with the Taliban claiming responsibility for seven of them. [1] Still, at the time of writing, the US is negotiating with the Taliban trying to reach a peace agreement. This article, thus, seeks to address the situation in Afghanistan and the little-discussed absurdity that the US now is bargaining with the world’s deadliest terror organisation. 

By Frida Ekren

The Afghan Taliban is a fundamentalist Sunni Islamist militant organization established in Afghanistan in 1994 as a response to the civil war that started two years earlier. Mullah Mohammad Omar led the group largely consisting of fighters from the mujahideen (“holy warriors”) who had been fighting against the Soviet Union in Afghanistan just a few years earlier (1979-89). The group’s aim was to govern Afghanistan on the basis of Sharia law, a goal they accomplished in 1996 after popular growth led them to finally capture the capital. The Taliban thus governed Afghanistan in accordance with Sharia law until a coalition led by the North Atlantic Treaty Organisation (NATO) overthrew them from power when they refused to extradite Osama bin Laden in the aftermath of the September 11th 2001 attacks. Despite controlling  90% of Afghan territory, only three states (Pakistan, Saudi Arabia and the United Arab Emirates) actually acknowledged the Taliban government at this time. [2]

After losing power in 2001, the Taliban reorganized and started an insurgency from Pakistan to fight and delegitimize the new Afghan government, the United States (US), and NATO forces. Pakistan has supported the Taliban economically, militarily and with recruits since the latter’s creation, and played an important role in the re-emergence of the Taliban after 2001 by providing them with safe havens in Pakistan [3]. This insurgency developed into an 18-year-long civil war which still rages.The death toll of the war is difficult to determine because no comprehensive account of the death toll from the war existed until the United Nations Assistance Mission in Afghanistan (UNAMA) began counting in 2008. According to estimates made by the “Costs of War Project” at Brown University, however, about 157,000 people have been killed as a direct result of the war,  43,000 of whom were civilians. Many more have been injured. [4] In 2006 the Taliban-led insurgency escalated drastically [5], and thus after 2007 insurgent or militant forces have been responsible for the majority of civilian casualties [6]. Today, the Taliban has de facto control of approximately 15% of the country, and well over half of the remaining territory is contested. Moreover, about half of the Afghan population― around 15 million people― live in areas that are controlled or actively operated by the Taliban. [7]

The drastic increase in the number of attacks by the Taliban in 2018 is arguably due to the US-Taliban peace talks which are now taking place. This strategy seems, at the time of writing this piece, to have given the Taliban leverage in the negotiations ― possibly pushing the US to accept terms that they otherwise would have not. Even though terrorism can seem random and unplanned, it is a means for the weaker party in a conflict to convey a political message. In this case, the Taliban utilises terrorism to target what they see as an illegitimate government and its allies. Highlighting this observation is the fact that the Taliban seek to target mainly military and police personnel, in order to undermine and destabilise the current government. Thus, deaths of Afghan security forces constitute 59% of all deaths in 2018. Through this deadly campaign, the Taliban have managed to seize control over several strategic cities leading to territorial expansion beyond their traditional stronghold in the South. [8]

Approaching the Taliban to begin a peace process has been the number one priority for Afghanistan’s President Ashraf Ghani in recent years. [9] Moreover, a survey conducted by the Asia Foundation shows that 88.5% of Afghans support peace talks with the Taliban [10]. At the time of writing, the US and Taliban have reached an agreement regarding a seven day partial ceasefire. US President Donald Trump is thus accepting the Taliban’s offer to reduce the level of violence in Afghanistan for a week, and in return, the US and Afghan security forces will do the same. [11] If successful, this agreement is meant to be a first step towards broader peace talks that would include an arrangement where the US pulls out large parts of its troops, and in exchange the Taliban would make guarantees regarding security and eventually talks with the Afghan government. [12]

President Trump initiated talks with the Taliban in 2018, and there is now cautious optimism regarding a peace agreement. However, this is not the first time that there have been attempted ceasefires and peace negotiations with the Taliban. The Trump administration held talks with the Taliban as recently as 2019, but Trump called them off after a suicide attack in Afghanistan killed a US service member. [13]

There is no doubt that a peace agreement would be warmly welcomed by most parties after 18 years of war in Afghanistan. Nevertheless, it does raise some questions: what happened to the (official) American principle that, ‘we don’t negotiate with terrorists’? [14] Furthermore, if it is a change of US policy that we are witnessing, why were peace negotiations not an option with ISIS? Both the Taliban and ISIS are Sunni Islamist militant groups which seek to create a state governed by Sharia law, and both groups use terrorism as a way to convey their message, thus killing thousands of innocent people. Why are the terrorist acts conducted by the Taliban seemingly more acceptable than those of ISIS?

Policy makers and scholars within the field of counter-terrorism have for decades ‘pledged never to talk to terrorists’. [15] In the US context, then-President George W. Bush set the bar in 2003 as he declared that, ‘The only way to deal with these people is to bring them to justice. You can’t talk to them. You can’t negotiate with them.’ [16] This principle is further backed by academia, with many scholars arguing that, ‘Negotiations on the underlying political demands of terrorists are unlikely to resolve the conflict and may simply incite more terrorism’. [17] The reasoning for this argument is that entering talks with terrorists will legitimize terrorist groups, their goals and the means they apply to achieve them. Still, we have seen former terrorist organisations, or organisations allegedly linked to them, legitimised as political organisations and integrated into the political state structures. Examples of this are seen with Sinn Féin (allegedly linked to the Irish Republican Army (IRA)) in Ireland, the Revolutionary Armed forces of Columbia (FARC) in Colombia, the Kurdish Peoples’ Democratic Party (HDP) (allegedly linked to the Kurdistan Workers’ Party (PKK) ) in Turkey and Bildu (allegedly linked to Basque Country and Freedom (ETA)) in Spain. Even though some scholars argue that negotiations are useful because it gives “terrorists” non-violent means of communication, we are still left with the question of why the US wants to negotiate with the Taliban and not with other groups, such as ISIS and al-Qaeda, for instance. [18]

As Kate Clark, the co-director of the Afghanistan Analysts Network, points out, a withdrawal of US troops might tip the military balance in the Taliban’s favour. [19] Thus, we an Islamic state which applies Sharia law can potentially be established, suppressing womens’ rights and other human rights such as freedom of speech and girls’ right to education. These are values that the West holds dear and have spent time and resources to ensure across the globe. Why is the West seemingly willing to accept such a situation in Afghanistan and not in Syria or Iraq? Has the level of violence in Afghanistan pushed the US into a corner with no other choice than to talk with the Taliban? The numbers do not imply that this is the case however, as ISIS still killed more people at its height in 2016 [19], than the Taliban did at their peak in 2018. Could it then be that President Trump is agreeing to terms not profitable for the US to gain a short-term victory in the re-election year?

There is no simple answer to these questions, which moreover, would undoubtedly require a much longer article. However, I think one key aspect to answering these questions is the international orientation of ISIS terrorist activities. Despite threatening to attack western countries, and indeed attacking western targets in Afghanistan [21], the Taliban have never encouraged or executed terror attacks in the West or the US. [22] ISIS on the other hand encourages Muslims around the world to join their state-building project and to execute  attacks in the West. Naturally, this strategy directly affects Western security and interests. The Taliban on the other hand, aims to establish a Sharia-governed state within Afghanistan and thus they do not affect Western interests to the same degree that ISIS does or did. This distinction calls to attention several questions: Is the West willing to accept terrorism executed by the Taliban because it does not affect “us”, and thus, we can leave it to be “their” problem? Is Afghanistan too distant for us to care? Have almost two decades of war created a feeling of apathy in the West towards the humanitarian situation in Afghanistan? At the same time, what are the prospects of peace in Afghanistan if we are not willing to negotiate with “terrorists”? And lastly, at the very baseline of this issue lies again the question of how useful it is to designate a group as terrorists – is it a helpful term or only a tool for policy-makers to legitimize the use of extraordinary measures? This article does not aim to answer these questions, but to point out the fact that the Taliban´s heightened violence is not being addressed in Western media and that it may be time to bring them to light once more.

Sources

[1] The Institute for Economics and Peace (2019). “Global Terrorism Index 2019: Measuring the Impact of Terrorism”, Sydney, November 2019. Available from: http://visionofhumanity.org/app/uploads/2019/11/GTI-2019web.pdf , accessed 03.02.2020.

[2] Stenersen, Anne, Gunhild Gursli-Berg, Gunnar Filseth & Bjørn Johannessen (2018). “Taliban” in Det Store norske leksikon. Available from: https://snl.no/Taliban , accessed 03.02.2020.

Center for International Security and Cooperation (2018). “Afghan Taliban” in Mapping Militant Organizations, Stanford University. Available from: https://cisac.fsi.stanford.edu/mappingmilitants/profiles/afghan-taliban#text_block_16833 , accessed 03.02.2020.

[3] Ibid.

[4] Crawford, Neta C. (2016). “Update on the Human Costs of War for Afghanistan and Pakistan, 2001 to mid-2016”, Watson Institute at Brown University. Available from: https://watson.brown.edu/costsofwar/files/cow/imce/papers/2016/War%20in%20Afghanistan%20and%20Pakistan%20UPDATE_FINAL_corrected%20date.pdf , accessed 06.02.2020.

— “Afghan civilians”, https://watson.brown.edu/costsofwar/costs/human/civilians/afghan , accessed 06.02.2020.

[5] Stenersen et. al.

[6] Crawford

[7] The Institute for Economics and Peace (2019). “Global Terrorism Index 2019: Measuring the Impact of Terrorism”, Sydney, November 2019. Available from: http://visionofhumanity.org/app/uploads/2019/11/GTI-2019web.pdf , accessed 03.02.2020.

[8] Ibid.

[9] Center for International Security and Cooperation (2018). “Afghan Taliban” in Mapping Militant Organizations, Stanford University. Available from: https://cisac.fsi.stanford.edu/mappingmilitants/profiles/afghan-taliban#text_block_16833 , accessed 03.02.2020.

[10] Akseer, Tabasum, et.al. (2019). “Afghanistan in 2019 a Survey of the Afghan People” by The Asia Foundation. Available from: https://asiafoundation.org/wp-content/uploads/2019/12/2019_Afghan_Survey_Full-Report.pdf , accessed 05.02.2020.

[11] Qazi, Shereena (2020). “US-Taliban truce begins, raising hopes of peace deal”, Aljazeera, 22.02.2020. Available from: https://www.aljazeera.com/news/2020/02/pact-taliban-reducing-violence-start-saturday-200221094340829.html

[12] Aljazeera (2020). “Afghan war: US, Taliban close to 'reduction in violence' deal”, 13.02.2020. Available from: https://www.aljazeera.com/news/2020/02/afghan-war-taliban-close-reduction-violence-deal-200212103425423.html

[13] Romero, Dennis, Dan De Luce, Mushtaq Yusufzai & Ahmed Mengli (2019). “Trump says he's canceling Afghan peace talks, secret meeting with Taliban leaders” in NBC News, 08.09.2019. Available from: https://www.nbcnews.com/news/world/trump-says-he-s-canceling-afghanistan-peace-talks-secret-meeting-n1051141

[14] Toros, Harmonie (2008). “ ‘We Don’t Negotiate with Terrorists!’: Legitimacy and Complexity in Terrorist Conflicts”, Security Dialogue vol. 39, no. 4, August 2008. Available from: https://www.researchgate.net/publication/237967555_We_Don't_Negotiate_with_Terrorists'_Legitimacy_and_Complexity_in_Terrorist_Conflicts

[15] Ibid.

[16] Ibid.

[17] Ibid.

[18] Ibid.

[19] Borger, Julian (2020). “Pompeo touts partial ceasefire with Taliban in push for election-year troop reduction”, the Guardian, 13.02.2020. Available from: https://www.theguardian.com/world/2020/feb/12/afghanistan-taliban-partial-ceasefire-us

[20] The Institute for Economics and Peace (2018). “Global Terrorism Index 2018: Measuring the Impact of Terrorism”, Sydney, November 2018. Available from: http://visionofhumanity.org/app/uploads/2018/12/Global-Terrorism-Index-2018-1.pdf , accessed 05.02.2020.

[21] Stenersen, Anne (2009). “Are the Afghan Taliban Involved in International Terrorism?”, in Combating Terrorism Center vol. 2, no. 9, September 2009. Available from: https://ctc.usma.edu/are-the-afghan-taliban-involved-in-international-terrorism-3/

[22] Pape, Robert (2019). “How to Partner With the Taliban”, Foreign Policy, 26.08.2019. Available from: https://foreignpolicy.com/2019/08/26/how-to-partner-with-the-taliban/

State of Art Computational Propaganda

Disinformation is a rapidly evolving process, and it is becoming more sophisticated with advances in and successful integration of Machine Learning (ML) and Artificial Intelligence (AI) technology. Where AI represents machine intelligence as compared to human intelligence, ML is the subset of AI which represents algorithms that perform specific tasks without explicit instructions, as they rely instead on inference and patterns. This article examines the ways ML/AI have transformed the art of disinformation campaigning, and to what extent this development will effectively shape public opinion and political discourse. ML/AI technologies are increasingly sophisticated in manipulation of both the rate and nature of information production. It is subsequently more crucial than ever to strike a balance between countering disinformation with user freedoms and overall credibility.

By Rana Al-Nusair

People have always used the term “seeing is believing” and technology professionals now speculate whether this term may have become obsolete due to progressively sophisticated iterations of ML/AI technology. Deepfake technology is a current challenge to the aforementioned points in its use of ML.[1] This software alters audio and video, to the extent that an individual with enough skill, understanding, and technological tools can create personally-targeted content which can make the subject appear as if he/she has said or done something which has not been said or done.[2] This software is particularly dangerous in the political sphere and can result in the undermining of leaders. [3]

Disinformation campaigns are currently occurring both at unprecedented quantitative and qualitative rates. It would certainly be difficult to argue that people are not experiencing a never-achieved-before state-of-the-art information war. Can the same tools that are used to create highly sophisticated false content be the same tools used to reliably counter that very content as well? With ML/AI, a rogue actor can create false content that is uniquely and intelligently tailored to the unsuspecting target audience. ML/AI introduces techniques which can easily and cost-effectively penetrate many more layers than ever experienced before in the realm of disinformation campaigns, mainly the cognitive, sociological, and political spheres. With ML, algorithms learn more information at a faster rate about any given individual or a group; this advancement stems from the vast amount of data that is readily available to the algorithms’ training sets.[4] In addition, an actor can acquire tailored information without necessarily having to engage in a physical or any kind of compromising interaction with the targeted person or audience.

OpenAI, a leading AI research company, has created software known as the GPT-2, a disinformation detection tool which spots potential bot accounts on social media based on analysis of linguistic patterns, in addition to evaluation of the spread of bot-generated disinformation content over time. In February 2019, OpenAI’s research lab stated it would not release the full code for the GPT-2, as it might be used by adversaries to generate spam and false content. In November 2019, however, OpenAI decided to release the full GPT-2 software.[5] The GPT-2 had initially trained on eight million web pages, which were not disclosed to the public. After full disclosure of the software, OpenAI revealed that the software now had trained on one and a half billion parameters.[6]  Google has expressed the same concerns over misuse of their software when they released a paper revealing that they had put constraints on research software previously shared.[7] As machines become better at mimicking their training data and thereby generating higher quality content, which could be indistinguishable from reality, malign actors –if equipped with the same level of algorithmic sophistication– could  increase the quality of their fake content in such a way as the GPT-2 by itself might not be able to reveal said content as either fake or real.

Disinformation detection software is also becoming more sophisticated, using tools such as topic detection, viewpoint clustering, narrative identification, and topic/viewpoint/narrative user interface.[8] What makes disinformation detection software, such as the GPT-2 or Grover, so effective at spotting fake content, is that the software itself is also highly adept at creating fake content, using sophisticated techniques such as signal processing analysis, physics-level analysis, semantic and physiological signals.[9] Cybersecurity professionals regularly penetrate their own software to discover their weaknesses in order to improve upon them and decrease the possibility of real adversarial attacks. As Yejin Choi, a researcher at AI2 says, “the best models for detecting disinformation are the best models at generating it”.[10]

Regarding the quantitative dimension, a study in 2017 estimated that about 15% of Twitter user accounts are bots, and this grew from approximately 8.5% based on an earlier 2014 study.[11] In 2104, this percentage represented 48 million Twitter bot accounts from the entire demographic  of Twitter users, a conservative percentage at best. Computational propaganda can be produced with  virtually no effort, minimal-to-no cost and is effective and quick. Dissemination of Deepfake videos, for example, is growing exponentially alongside the software’s’ low cost distribution. Arguably, producing these videos is easier than doing something similar on Photoshop, due to the fact that these Deepfake videos rely on machine learning rather than manual design. Deepfake videos are usually produced by combining an already existing video with new audio and image, using a class of machine learning that is called generative adversarial networks (GAN).[12]

ML/AI technology transforms the current cyber races between states, groups and individuals on multiple fronts. ML/AI achieves this change from both its fundamental qualitative and quantitative intrinsic nature. This technology transforms the quantitative aspect of competition as well by advancing autonomous machine-driven propagation, incentivizing, and multiplying adversaries with the democratization of technology in which the costs of acquiring and using the technology rapidly decrease. This ability enables virtually anyone to radicalize or sensationalize an event that could be detrimental, not only to a few targeted individuals but to masses. Additionally, considering the accountability aspect primarily through the notions of plausible deniability, it is an integral part of the transformative aspect to computational propaganda.  Transparency from the most powerful social media companies is likely a step towards countering computational propaganda; however, this step has proven difficult to establish, especially for private companies which strongly oppose criticism and are overly protective of their algorithms.

 

Sources

[1] Simonite, Tom. “Will ‘Deepfakes’ Disrupt the Midterm Election?” WIRED, 2018. https://www.wired.com/story/will-deepfakes-disrupt-the-midterm-election/

[2] Kertysova, Katerina. Artificial Intelligence and Disinformation: How AI changes the way disinformation is produced, disseminated, and can be countered”, Security and Human Rights in Monitor. Pp. 11. https://www.shrmonitor.org/assets/uploads/2019/11/SHRM-Kertysova.pdf

[3] BuzzFeedVideo, “You Won’t Believe What Obama Says in This Video!”, April 18, 2017 https://www.youtube.com/watch?v=cQ54GDm1eL0

[4] Funk, McKenzie. “The Secret Agenda of a Facebook Quiz,” New York Times, 2016, https://www.nytimes.com/2016/11/20/opinion/cambridge-analytica-facebook-quiz.html

[5] Simonite, Tom. “To See the Future of Disinformation, You Build Robo-Trolls”. WIRED, 2019. https://www.wired.com/story/to-see-the-future-of-disinformation-you-build-robo-trolls/

[6] See tweet by OpenAI at https://twitter.com/OpenAI/status/1191764001434173440

[7] Simonite, Tom. “The Text-Generator that’s too Dangerous to Make Public.” WIRED, 2019. https://www.wired.com/story/ai-text-generator-too-dangerous-to-make-public/

[8] BUSSINESS WIRE. “Datametrex Introduces World Class Bot Detection and Fake News Filter”. MARTECH SERIES, 2019. https://martechseries.com/technology/datametrex-introduces-world-class-bot-detection-fake-news-filter/

[9] Lorica, Ben. “How AI Can Help to Prevent the Spread of Disinformation”. Information Age, 2019. Accessed December 3rd 2019. https://www.information-age.com/ai-prevent-disinformation-123479466/

[10] Kalim, Faisal. “Turning fake news against itself: AI tool can detect disinformation with 92% accuracy”. WNIP, 2019. https://whatsnewinpublishing.com/turning-fake-news-against-itself-ai-tool-can-detect-disinformation-with-92-accuracy

[11] Onur Varol, et. al. “Human-Bot Interactions: Detection, Estimation, and Characterization.” (2017).

[12] Goodfellow, Ian. et. Al. (2014). “Generative Adversarial Networks”. Proceedings of the International Conference on Neural Information Processing Systems (NIPS 2014). pp. 2672–2680.

The (De-)Securitisation of Brazilian Borders: A Descriptive Framework to Draw Normative Conclusions

Brazil is amongst the most unequal countries in the world, as the nation’s social-economic inequality in particular has reached extreme levels.[1] Despite country-wide campaigns to eradicate poverty there are still roughly 24 million Brazilians who live on less than $2 per day, and 56% of the population earns less than the minimum wage.[2] Although inequality is one of Brazil’s most pressing matters, as a source for violence and instability, it has never been truly securitised. In contrast, Brazil did consider the issue of drug trafficking at its borders to be an existential threat that required the mobilisation of scarce resources and extraordinary measures. This security issue recently reached the phase of de-securitisation, not as a result of its success, but because of financial and political pressures. It was simply too costly and not feasible to protect the roughly 17,000 kilometres of remote land, water, and air that separate the country from Bolivia, Peru and Colombia, South America’s coca sources, and Paraguay, the continent’s main producer of marijuana. In this brief article, I will demonstrate that Securitisation Theory, as defined by the Copenhagen School, offers the analytical framework to display the process behind Brazil’s adoption of security threats, and that, in turn, allows us to critically assess these political decisions.

By Maarten Visser

The Theory of Securitisation provides a systematic attempt to answer possibly the most fundamental and contemplated question in the field of Security Studies: What is security? According to its theorists, ‘‘security’ is what actors make it’.[3] Securitisation is about existential threats to security, those whose severity would allow disregard for all ordinary matters and tolerate extreme measures.[4] The aim is to portray the process in which an issue of security evolves out of the realm of normal politics and becomes hierarchised. In a nutshell, the securitisation theory functions as follows: A referent actor designates a security issue as an existential threat, and convinces a relevant audience (through a speech act) of the utter emergency to act and to justify extraordinary measures. Ultimately, the theory is intended to critically assess the outcome of the securitisation process: why do certain issues get securitised, and why other perhaps far more pressing matters are not.

Similar questions could, and perhaps should be asked about security practices in Brazil. In 2016, Caroline Cordeiro Viana e Silva and Alexsandro Eugenio Pereira, scholars connected to the Federal University of Parana (Universidade Federal do Paraná - UFPR), conducted thought-provoking empirical research on the securitisation process of drug trafficking at Brazilian borders.[5] In Brazil, drug trafficking became a politicised matter during the mid-1970s, as the issue entered the political debate in which public policies and the allocation of resources were first discussed. Accordingly, the Brazilian government adopted the 1976 Law n° 6368, which provided the first authorised definition of drug trafficking. Subsequently, in 1990, the act of illicit drug trafficking was placed under Law n° 8072 ― the so-called Heinous Crimes Law. The actual process of securitisation emerged under the presidential administrations of Luiz Inácio Lula da Silva (2003-2010) and Dilma Vana Rousseff (2011-2016), with the adoption of a new range of anti-drug trafficking laws.[6] Moreover, these legal initiatives were substantiated by speech acts from both referent actors, which brought the issue from politicised to securitised. They proclaimed drug trafficking as the utmost threat to the Brazilian people that had to be dealt with urgently. Cordeiro Viana e Silva and Pereira illustrate this with the terminology used during public appearances and speeches of both Lula and Rousseff. The terms ‘drugs’ (drogas), ‘trafficking’ (tráfico) and ‘security’ (segurança), were persistently connected to strong rhetoric such as: ‘this is the most important matter’ (essa e coisa mais importante), ‘especially at our borders’ (especialmente nas fronteiras), ‘we pledge to fight’ (comprometemos a lutar contra) and ‘end the war’ (acabar com a guerra), inter alia.[7]

The securitisation of this issue reached its peak in 2011 with the adoption of the Strategic Border Plan (SBP), a multi-billion dollar project that aimed to intensify border control and improve measures to deter and combat cross-border crime, and resulted in the deployment of many thousands of federal, state and municipal police officers as well as military forces.  The SBP consisted of two separate pillars, ‘Sentinel’ and ‘Ágata’. The former, led by the Ministry of Justice, aimed to gather  permanent intelligence, while the latter was under the control of the Ministry of Defence and had a temporary, impact focused character.[8] Single Ágata operations were region specific and utilised up to 33,000 army, navy and air force personnel, together with 12 ministries and 20 government agencies.[9] Although the drug seizures had significantly increased, the extraordinary measures under the SBP were halted in 2016. After severe criticism from The Federal Court of Audit, especially in relation to issues around corruption and the exorbitant amount of money invested in the plan, the government of Michel Miguel Elias Temer Lulia (2016-2018) was compelled to revoke the SBP. Consequently, the security issue entered the stage of de-securitisation, as the extraordinary measures were replaced by less significant routine border security and the security issue was politically deprived of the emergency label. 

It can be stated that the focus on closing borders does not address the country’s fundamental domestic security issues. Therefore, the following question remains: Why does Brazil prioritise illicit drug trafficking over the threat of ever-growing inequality and corresponding poverty concerns? After all, Brazil has long acknowledged the latter as one of the nation’s most pressing matters.[10] The answer could lie in the fact that any approach to address this matter would inevitably require various unpopular fiscal and economic reform policies. Brazil has experienced a long-lasting public debate on the reform of its highly unequal tax system and intricate network of bureaucracy and regulations, which are, arguably, highly attributable to the country’s inequality levels. Brazil’s indirect taxes (ICMS and IPI) are high and it has a mildly progressive income tax. Moreover, there is virtually no tax levy on wealth, inheritances and dividends. Furthermore, the public sector benefits from extraordinary salaries along with abundant privileges, such as early retirements,[11] and public officials are often appointed for life. According to Carlos Kawall, chief economist at Banco Safra and former Treasury Secretary, pension and tax reforms are essential for the country’s future economy.[12]

As the Copenhagen School asserts, security is all about politics. Brazil’s (de-)securitisation process of illicit drug trafficking clearly evidences this. In terms of Brazilian domestic security, it is unclear what the future will bring. Noteworthy in this context, however, is that current President Jair Messias Bolsonaro seems to have won the administrative and pension-reform battle and has proclaimed to have similar ambitions for the country’s tax and judicial systems.[13] Although partly pressured by the magnitude of the after-effects of the financial crisis that struck Brazil in 2014, Bolsonaro’s reforming politics appear, at least to some extent, to be a welcome turn of events. Nonetheless, Brazil’s future success seems to necessitate a more fundamental transformation of attitude, concentrating on the country’s inequality in the broadest sense of the word together with the structural revision of its institutions and governance.

* I am grateful to Caroline Cordeiro Viana e Silva and her colleagues for their extensive help in the maze of the Brazilian systems and translations of the Portuguese language.

Sources

[1] Pedro Henrique Soares Leivas an Anderson Moreira Aristides dos Santos, “Horizontal Inequality and Ethnic Diversity in Brazil: Patterns, Trends, and their Impacts on Institutions.” Oxford Development Studies 46, no. 3 (2018): 348-362.

[2] OECD Economic Surveys, Brazil 2018 (Paris: OECD Publishers, 2018): 25-26.

[3] Barry G. Buzan, Ole Waever, Regions and powers: the structure of international security (Cambridge: Cambridge University Press, 2003), 48-49.

[4] Barry G. Buzan, Ole Wæver, and Jaap De Wilde. Security: A new framework for analysis. (London: Lynne Rienner Publishers, 1998), 21.

[5] Caroline Cordeiro Viana e Silva and Alexsandro Eugenio Pereira, International Security and New Threats: Securitisation and Desecuritisation of Drug Trafficking at the Brazilian Borders. Contexto Internacional, 41, no.1 (2016): 209-234.

[6] The in 2004 adopted Decree n° 5514 (shoot-down law) which allowed Brazil to shoot-down of smuggling-suspected aircraft and the 2006 Law n° 11343 which established new anti-drug legislation are examples hereof.

[7] Cordeiro Viana e Silva and Pereira, International Security and New Threats, 217-219.

[8] Ibid., 224.

[9]  Ibid., 226.

[10] Defense White Paper: Livro Branco de Defesa Nacional 2012, 16.

[11] Indiana Tomazelli, “55% dos militares se aposentam com menos de 50 anos.” economia.estadao.com.br. https://economia.estadao.com.br/noticias/geral,55-dos-militares-se-aposentam-com-menos-de-50-anos,70001827530(accessed June 6, 2017)

[12] Rachel Gamarski, “Brazil’s Lost Fiscal Decade Is Timebomb Awaiting Next President.” bnnbloomberg.ca https://www.bnnbloomberg.ca/brazil-s-lost-fiscal-decade-is-timebomb-awaiting-next-president-1.1068867 (accessed April 30, 2018) 

[13] Globo, “Reforma administrativa: Bolsonaro diz que ainda precisa dar 'polimento' à proposta.” g1.globo.com https://g1.globo.com/politica/noticia/2020/01/03/reforma-administrativa-bolsonaro-diz-que-ainda-precisa-dar-polimento-na-proposta.ghtml (accessed January 3, 2020)

Securitising people movements in Europe: Political divergence on migration management

Securitising people movements in Europe: Political divergence on migration management

The history of humankind is a history of people movements, with new perceptions of space as a triggering factor for major historical breaks. [1] Migration, defined as ‘the process of people travelling to a new place to live’ [2], has, indeed, always been a common feature of human societies. [3] But, while migrations have significantly enriched European societies in the era of mass movement [4], a shift seems to have occurred in our understanding of national borders.

Kenya and the Securitization of Refugees

By Emma Hurlbert

I. The current situation: Influx of refugees, violence, and terrorism

The circumstances of refugees in Kenya are defined by the protracted crises in neighboring countries. The ongoing Somali Civil War, conflict in South Sudan, the Rwandan Genocide, the Congo Wars, and violence in eastern part of the Democratic Republic of Congo have caused hundreds of thousands of people to flee to Kenya.[1] As of May 2019, the refugee population in Kenya is estimated at 476,695 people, the majority of whom are housed in Dadaab Refugee Complex close to the border with Somalia, and Kakuma Refugee Settlement close to South Sudan.[2]

Violence in and around the camps is a significant threat to the refugees themselves and the local populations in proximity.[3] Tension and aggression exist between the refugees and local populations adjacent to the camps.[4] Near Kakuma, the indigenous Turkana people live in tension with the refugees, especially as the camp expands into Turkana grazing areas.[5] Furthermore, violence is common among refugee identity populations. Violent or traditional justice is also common within refugee communities, as consequences according to indigenous justice systems.[6]

Armed robbery is a notable problem near Dadaab, which targets refugees, aid agencies and staff, traveling vehicles, and drug traders at night. They steal cash and low-value items that can be sold.[7] Lastly, sexual abuse and violence is an immediate and acute threat to many women and children in the camps. Rape is commonplace in deserted areas around the camps.[8]  Female Genital Mutilation is also common within the Somali communities in Dadaab.[9] The amount of violence in and around Dadaab and Kakuma is a major security concern for the refugees, aid workers, and the local populations, which the government should address.

Furthermore, as refugee flows increased into Kenya due to neighboring conflicts, so too did violence and terrorism, especially attacks orchestrated by al-Shabaab and al-Qaeda. Attacks in the last few decades have included the 1998 US Embassy bombing in Nairobi and mass shootings in 2013 at Westgate Mall and in 2015 at Garissa University, both conducted by al-Shabaab.[10] Following terrorist attacks, there have been backlashes and increasing xenophobia within local Kenyan populations against refugee populations, particularly Somalis.[11]

II. Securitization: Linking the refugees with terrorism

The Kenyan government has experienced domestic pressure to protect the country against terrorism, and xenophobia has grown against refugees.[12] Therefore they use securitizing rhetoric to link the refugee populations with terrorism and al-Shabaab, making them into an existential threat to Kenyan society, the audience of the securitizing rhetoric.[13] Therefore, the refugees themselves, rather than the violence affecting both them and local populations, become the threat perceived by the audience. This action justifies extraordinary measures, which would otherwise be unacceptable, in order to exert control over refugee populations and satisfy the concerns of the local population.[14]

Since 2012, the Encampment Policy has required refugees to live exclusively within their assigned camps and they can only travel with a Movement Pass.[15] The Policy remains strictly enforced; refugees may receive six months of jail time for leaving the camp without a permit.[16] Furthermore, refugees require a work permit obtained in Nairobi,[17] in order to legally join the labour market because they are treated as foreigners.[18] It is documented that Kenya has only granted work permits in a few isolated cases since 2004.[19] These institutional limitations make it unrealistic for refugees to obtain legal working status.

Furthermore, it is almost impossible for refugees to attain naturalized citizenship. According to the Constitution, refugees are eligible for citizenship, if they ‘have entered Kenya legally’, which has been used to deny citizenship to refugees. In practice, ‘Kenya does not appear to grant citizenship to refugees’. [20] Through these policies, refugees remain aid reliant because they cannot legally provide for themselves.

Moreover, the government has attempted to limit the refugee population to 150,000 or close the camps altogether, which would require refugees to return to a dangerous home country. These threats mark a departure from the 1951 UN Convention on Refugees principle of non-refoulement, or not returning refugees their country of origin if it remains unsafe.[21] However, national courts have blocked these attempts to limit the refugee population.

Kenya has also engaged in both explicit and encouraged refoulement of refugees.[22] In 2007 the government forcibly refouled about 400 refugees from Somalia.[23] Furthermore, there have been extensive attempts to refoule refugees using softer language, so as to mask the extraordinary measures taken. In 2013 Kenya, Somalia, and the UNHCR agreed to facilitate ‘the voluntary repatriation of Somali refugees’ over three years. [24] Though this policy hides behind the language of freedom and voluntary choice, it is a continuation of previous refoulement operations, which break the international law and norm of non-refoulement.

Notably, none of these policies directly address the violence facing the refugees, neighboring Kenyan populations, nor the workers that serve them in the camps. This absence of action demonstrates that the government does not consider the refugees as part of the population which they are responsible to protect, echoing the idea that the refugees themselves are the threat.

III. Limitations: Consequences of this approach

The policies which the Kenyan government has created through the securitization of refugees are limiting and problematic. They violate the rights of refugees, forcing them to remain aid-dependent, negate their potential to contribute to Kenyan society, break the international law and norm of non-refoulement, and foster animosity and radicalization. Additionally, the policies do not address the security threats facing the refugees themselves. The human rights of refugees are abused by their captivity within the camps and their inability to work legally, although they legally reside within the country. The refugees are therefore forced to remain aid-dependent, and they remain a drain on UNHCR resources, as well as the Kenyan economy. These effects directly undermine the goals of the UNHCR for the self-reliance of refugees.[25]

Furthermore, through the process of securitization, the government invokes extraordinary measures, which would otherwise be considered unacceptable in the international community. All of the policies outlined in the previous section break international norms, many of which have been codified into law. Perhaps most notably, refoulement is a glaring exploitation of refugee rights, breaks the agreement of the 1951 UN Convention on Refugees, and should not be acceptable.

In conclusion, these measures negatively impact Kenya’s goal of increased security. By labeling the refugees as an existential threat, the government fosters further tension and animosity between the local population and the refugees. Moreover, perhaps through their dire and unfair conditions, the camps could actually become the havens for radicalization which the government seeks to protect against. Kenyan policies pursued through the securitization of refugees are, in fact, counterproductive and harmful to both refugee and local communities.

 

Sources

[1] “Somali Civil War.” In New World Encyclopedia, 2015. https://www.newworldencyclopedia.org/entry/Somali_Civil_War.

United Nations High Commissioner for Refugees “Somalia.” January 2018. https://www.unhcr.org/somalia.html.

“South Sudan Profile - Timeline.” British Broadcasting Corporation, August 6, 2018. https://www.bbc.co.uk/news/world-africa-14019202.

“Q&A: DR Congo Conflict.” British Broadcasting Corporation, November 20, 2012. https://www.bbc.co.uk/news/world-africa-11108589.

[2] United Nations High Commissioner for Refugees: Kenya. “Figures at a Glance.”, n.d. https://www.unhcr.org/ke/figures-at-a-glance.

[3] Jeff Crisp. "A State of Insecurity: The Political Economy of Violence in Kenya's Refugee Camps." African Affairs 99, no. 397 (2000): 601-632.

[4] Ibid., 610-611.

[5] Ibid., 610-611.

[6] Ibid., 603-604.

[7] Ibid., 607.

[8] Ibid., 604-607.

[9] Ibid., 604.

[10] Federation of American Scientists. “Report of the Accountability Review Boards Bombing of the US Embassies in Nairobi, Kenya and Dar es Salaam, Tanzania on August 7, 1998: Nairobi: Discussion and Findings.” January 1999. https://fas.org/irp/threat/arb/board_nairobi.html

“Foreign travel advice: Kenya: Terrorism.” UK Government. https://www.gov.uk/foreign-travel-advice/kenya/terrorism

[11] “New Encampment Policy Fuels Xenophobia in Kenya.” Human Rights First, February 8, 2013. https://www.humanrightsfirst.org/2013/02/08/new-encampment-policy-fuels-xenophobia-in-kenya.

[12] Oscar Gakuo Mwangi. "Securitisation, Non-Refoulement and the Rule of Law in Kenya: The Case of Somali Refugees." The International Journal of Human Rights 22, no. 10 (2018): 1321.

[13] Nienke Voppen "The securitization of Somali refugees in Kenya: The plan to close Dadaab refugee camp,” Utrecht University. 2017: 18-19.

[14] Columba Peoples, Nick Vaughan-Williams, and Askews & Holts Library Services. Critical Security Studies: An Introduction. Second ed. London: Routledge, Taylor and Francis, 2015: 92-106.

[15] Goitom, Refugee Law and Policy.

[16] Andrew Maina. “Development of Refugee Law in Kenya.” World Policy, March 29, 2016. https://worldpolicy.org/2016/03/29/development-of-refugee-law-in-kenya/.

[17] Maina,“Development of Refugee Law in Kenya.”

[18] Republic of Kenya Laws of Kenya, Refugees Act No. 12 of 2006. National Council for Law Reporting. http://kenyalaw.org/kl/fileadmin/pdfdownloads/Acts/RefugeeAct_No13of2006.pdf:12.

[19] Refugee Consortium of Kenya. “Asylum Under Threat.” June 2012. https://reliefweb.int/sites/reliefweb.int/files/resources/Asylum_Under_Threat.pdf

[20] Ibid.

Anna Lindley. "Between a Protracted and a Crisis Situation: Policy Responses to Somali Refugees in Kenya." Refugee Survey Quarterly 30, no. 4 (2011): 36.

Goitom, Refugee Law and Policy: Kenya.

[21] Ibid.

[22] United Nations High Commissioner for Refugees. “Convention and Protocol Relating to the Status of Refugees.” 1951. https://www.unhcr.org/uk/3b66c2aa10.

[23] Mwangi, "Securitisation, Non-Refoulement and the Rule of Law”, 1320-1321.

[24] Ibid., 1321.

[25] United Nations High Commissioner for Refugees. “Promoting Livelihoods and Self Reliance.” 2011. https://www.unhcr.org/uk/publications/operations/4eeb19f49/promoting-livelihoods-self-reliance-operational-guidance-refugee-protection.html

 

Achieving 100% Renewable Energy: Political Challenges, Strategic Independence, and the Armed Forces

Achieving 100% renewable energy can not only reduce the effects of climate change, but also increase states’ strategic independence and their armed forces’ effectiveness. How can a society feasibly achieve 100% renewable energy, why are these ambitions important, and what impact would this have on armed forces?

By Marijn Pronk, Hendrik A. Pasligh & Javier Martínez Mendoza

Achieving 100% renewable energy

From a technological perspective, previous research has predominantly focused on the electricity sector. But in order to achieve the goal of complete energy renewability, a more holistic and cross-sectoral approach is necessary[1]. Technologies and industries from the supply side, i.e. energy storage and system efficiency, need to be connected to the demand side, i.e. reducing the need for energy supply through energy efficient technologies. These approaches are vital for transitioning into a 100% renewable energy system, whilst remaining in the limits that sustainable resources could offer[2,3]. Other contingencies that need to be considered are the different energy dependencies and demographics of particular countries. Brazil, with its massive Amazonian rainforest, will need different policies with regards to energy autonomy compared to Norway, which can derive almost all its electricity from hydro-power. All countries will need to forge a uniquely tailored path to deal with the effects of climate change. 

Political concerns are the main culprits preventing renewable energy policies from being implemented. Key barriers include climate science denial, the power of fossil fuel lobbies, political paralysis, outdated infrastructures, and financial and governmental constraints[4]. It is critical to overcome these obstacles in order to create a feasible plan to achieve a state in which society can depend on 100% renewable energy. Transparency, accountability, and close co-operation with public and private spheres will be paramount[5}. Country-specific action plans are necessary to equally divide the resource burdens. 

Strategic independence through renewables?

The interactions between producers, transit, and consumer countries condition the balance of power between states. Moreover, the availability of energy resources has been associated with a state’s capacity not only to increase its security and prosperity, but also to exert power in global affairs[6, 7, 8]. Achieving 100% renewable energy has the potential to challenge these dynamics. With that in mind, energy independence comes to play an important role on the assertiveness of states’ foreign policies. Asymmetric interdependence can explain the complex relationship between Russia and the European Union members. For instance, the fact that Germany is the single largest consumer of Russian gas influences its position on Russia’s hostile behaviour in Eastern Europe[9]. Germany’s position demonstrates that dependence on foreign energy supplies can limit states’ policy options.

Policy-makers have sought to achieve strategic independence through conventional fuels instead of renewables. However, a reflection on the U.S. efforts towards self-sufficiency through shale fuels, can prove this alternative as ill-fated. Due to the nature of oil and gas as commodities that bind their price to the dynamics of global trade, American consumers will remain susceptible to price hikes caused by energy supply disruptions abroad[10, 11]. The United States will not be able to disengage from the Middle East and rely less on Persian Gulf monarchies without transitioning to renewable energy. States’ willingness to undertake forceful military policies to protect strategic infrastructure of the energy supply chain can be illustrated by international considerations to spend a significant amount of resources[12] to deploy maritime forces and secure the Strait of Hormuz.

Contrary to fossil fuels, renewables represent less centralised and more locally driven energy sources. An energy transition would push the international landscape towards a more multipolar world, where net energy importers have better chances of energy independence, while alignments and dependencies currently based on conventional fuels will rearrange. Moreover, if renewables become mainstream, co-operation on climate change would strengthen and conflicts based on energy resources would eventually be less common[13, 14]. Nonetheless, this transition would not be exempt of shortcomings. For instance, political support of renewables tends to be cyclical, not constant, and a sudden shift from other energy sources might bring societal disruptions. Also, the consolidation of renewables could spark new conflicts and dependencies over newly exploited resources. Hence, a long-term approach that seeks diversification and sectoral transition first might be more beneficial than a full-scale shift to renewables[15, 16].

Renewables and the armed forces

The military represents a strong option among the sectors that could embrace the transformation. This potential arises both from the military’s massive consumption of energy[17] and its ability to promote new technologies as an early adopter. Arguments suggesting that armed forces should focus on their mission rather than saving the environment overlook the fact that renewable energy can actually significantly improve combat effectiveness and readiness. This holds true for domestic and forward bases as well as military vehicles and ships. "These technologies are a way to become more effective in combat'' said Col. Brian Magnuson, the head of the U.S. Marines’ expeditionary energy office: "this is about war-fighting capability”[18].

Domestic bases are vulnerable to power blackouts because they are connected to large power grids[19]. The advantage of renewable energy is that it can be cost-efficiently deployed in smaller units, thus allowing for decentralisation of power production[20]. The issue of energy security is even more critical in forward bases, both on the operational and strategic level. The many fuel convoys which supplied ISAF troops in Afghanistan, for example, were frequently attacked and suffered casualties[21]. There are several technologies already being developed and tested in the field. Among these are bullet-proof solar panels[22] and variations of mobile containers for power production, including hybrid energy production and storage systems. The latter are mainly based on solar power but can intelligently switch between multiple sources[23] and a “mini hydroelectric power station”[24].

A more difficult task is to fuel military vehicles, ships, and planes. Disruptions in global oil supply or even just small price fluctuations pose significant risks. Here, the U.S. Navy is at the forefront of creating a market for biofuels[25]. Ships and aircraft using blends including biofuel have been tested successfully[26]. While it will most likely not be possible in the foreseeable future to run tanks[27] and combat aircraft[28] on electricity, hybrid-electric ground vehicles[29] can reduce noise and dependency on resupply and thus decrease detectability[30] and increase the endurance of operations.

Sources

[1] Hansen, K / Breyer, C, & Lund, H (2019) ‘Status and perspectives on 100% renewable energy systems’, Energy, pp. 471-480, p. 471.

[2] Mathiesen, B / Lund, H / Hansen, K / Ridjan, I / Djørup, S, & Nielsen, S (2015). ‘IDA's Energy Vision 2050: A Smart Energy System strategy for 100% renewable Denmark’, Department of Development and Planning, Denmark, Aalborg University.

[3] Connolly, D / Lund, H, & Mathiesen, B (2016) ‘Smart Energy Europe: the technical and economic impact of one potential 100% renewable energy scenario for the European Union’, Renewable and Sustainable Energy Reviews, pp.1634-1653.

[4] Wiseman, J / Edwards, T, & Luckins, K (2013), ‘Post Carbon Pathways: Towards a Just and Resilient Post Carbon Future’, Melbourne Sustainable Society Institute, Melbourne, Centre for Policy Development, October 10, 2019, p. 5.

[5] Climate Transparency (2018) ‘Brown To Green: The G20 Transition To A Low-Carbon Economy’, Climate Transparency. Accessed September 10, 2019.

[6] Cunningham, T. (06.07.2016) ‘The Foreign Policy of New Energy,’ Atlantic Council, [online] available from https://www.atlanticcouncil.org/blogs/new-atlanticist/the-foreign-policy-of-new-energy/.

[7] Criekemans, D. (2018) ‘Geopolitics of the Renewable Energy Game and Its Potential Impact upon Global Power Relations,’ in: Scholten D. (eds) The Geopolitics of Renewables. Lecture Notes in Energy, vol 61. Springer.

[8] Dreyer, I. (2013) ‘Renewables: do they matter for foreign policy?,’ European Union Institute for Security Studies.

[9] Keating, D. (07.19.2018) ‘How Dependent is Germany on Russian Gas?,’ Forbes, [online] available from https://www.forbes.com/sites/davekeating/2018/07/19/how-dependent-is-germany-on-russian-gas/#6eb049643b48

[10] Cunningham, T. (2016).

[11] Bordoff, J. (09.18.2019) ‘The Myth of U.S. Energy Independence Has Gone Up In Smoke,’ Foreign Policy, [online] available from https://foreignpolicy.com/2019/09/18/the-myth-of-u-s-energy-independence-has-gone-up-in-smoke/.

[12] Masala, Carlo / Mölling, Christian / Schütz, Torben (2019) ‘Ein Schiff wird kommen? Deutsche Maritime Optionen in der Straße von Hormus,’ DGAPkompakt, Vol. 15.

[13] Criekemans, D. (2018).

[14] Global Commission on the Geopolitics of Energy Transformation (2019) ‘A New World: The Geopolitics of the Energy Transformation,’ IRENA, [online] available from https://geopoliticsofrenewables.org/assets/geopolitics/Reports/wp-content/uploads/2019/01/Global_commission_renewable_energy_2019.pdf.

[15] Dreyer, I. (2013).

[16] Global Commission on the Geopolitics of Energy Transformation. (2019).

[17] Center for International Policy (2019) ‘Sustainable Defense: More Security, Less Spending,’ [online] available from https://static.wixstatic.com/ugd/fb6c59_59a295c780634ce88d077c391066db9a.pdf , accessed on 22nd December 2019, pp. 22, 54.

[18] Gardner, T (2017) ‘ U.S. military marches forward on green energy, despite Trump,’ [online] available from https://www.reuters.com/article/us-usa-military-green-energy-insight/u-s-military-marches-forward-on-green-energy-despite-trump-idUSKBN1683BL , accessed on 7th November 2019.

[19] Greilich, T (2019) ’Blackout: Zu den Auswirkungen eines Blackouts auf die Bundeswehr,‘ wehrtechnik III/2019, p. 68-69.

[20] American Council on Renewable Energy (2018) The Role of Renewable Energy in National Security Issue Brief, p. 5.

[21] Kosowatz, J (2018) ‘Military Looks to Renewables in Battle Zones,’ [online] available from https://www.asme.org/topics-resources/content/military-looks-renewables-battle-zones , accessed on 7th November 2019.

[22] TNO (n.d.) ‘DEFENCE AND ENERGY,’ [online] available from https://www.tno.nl/en/focus-areas/defence-safety-security/roadmaps/protection-munitions-weapons/protection-and-survivability-of-infrastructure/defence-and-energy/ , accessed on 7th November 2019.

[23] Kosowatz

[24] Khurshid, S (2019) ‘The Green Future of NATO and the Procurement of Environmentally Friendly Defence Merchandise,’ [online] available from http://natoassociation.ca/the-green-future-of-nato-and-the-procurement-of-environmentally-friendly-defense-merchandise/ , accessed on 7th November 2019.

[25] Matthews, W (2012) ‘Bio Fleet,’ [online] available from https://www.govexec.com/magazine/features/2012/01/bio-fleet/35739/ , accessed on 9th November 2019.

[26] Whitlock, R (2016) ‘Defense goes renewable: The adoption of renewable energy by the military,’ [online] available from https://interestingengineering.com/defense-goes-renewable-adoption-renewable-energy-military , accessed on 7th November 2019.

[27] Kohlhoff, J / Müller, S (2014) ‘Technische Implikationen für eine „Postfossile Bundeswehr“,‘ Fraunhofer-Institut, p. 32.

[28] Nätzker, W (2014) ‘All Electric Aircraft,’ Europäische Sicherheit & Technik, June, p. 77.

[29] Union of Concerned Scientists (2014) ‘The US Military and Oil’ [online] available from https://www.ucsusa.org/resources/us-military-and-oil , accessed on 7th November 2019.

[30] Berdikeeva, S (2017) ‘The US Military: Winning the renewable war,’ [online] available from https://www.energydigital.com/renewable-energy/us-military-winning-renewable-war , accessed on 7th November 2019.

[31] Illustration: María Gómez 2019

Climate Change Impact on Natural Resources and Migration Across the Regions of Africa

When asked to identify trends that shape the world today, most commonly listed issues were climate change, the rise of China as a global power, the surge of nationalism, and the potential implications of artificial intelligence1. The World Economic Forum’s Global Shapers found that ‘nearly half (48.8%) of the survey participants chose climate change as their top concern, and 78.1% said they would be willing to change their lifestyle to protect the environment’2. The impact of Climate Change on the environment can be felt in many areas including the intensification of natural disasters, the increasing number of endangered species, arctic ice  melting, and the expansion of the Sahara3. When attempting to comprehend the security implications as a result of climate conditions, it is important to refer to aspects that have the potential to affect everyday life for communities. This piece presents the impact of Climate Change on the Global South and focuses on Sub-Saharan regions in regard to accessibility to natural resources and its relation with intra-regional migration.

By Sawsan Khalife

What makes a country vulnerable to climate change? 

The changing climate is a global phenomenon expected to be felt across all regions. Many countries in the Middle East are already experiencing increasing droughts in wintertime, research by the Journal of Climate points out that 12 of the world’s 15 most water-scarce countries are placed in the Middle East4. The impact of changing climate conditions is too complex to place in one category, the same goes for the reason that one country is impacted more than another. In trying to make sense of the scope and shape of its influence, Niall Smith, an expert who analyses regions’ vulnerability to Climate Change, argues that the countries with the lowest levels of economic development will face greater climate challenges as a result of a combination of socio-economic, governmental, and geographical factors rendering them less equipped to deal with the current and future threats5. Smith further identifies six places in the Global South that will be especially vulnerable to climate changing conditions. In addition to Haiti, due to hurricane frequency and intensity, Lagos in Nigeria is impacted due to the population’s rapid expansion and its strain on infrastructure and resources, especially as it is located on the Gulf of Guinea that is subject to sea levels rise. Furthermore, Yemen is highly vulnerable due to its ineffective government and weak institutions. Having been embroiled in a civil war since 2015, millions are suffering malnutrition, shortage of water, and famine. Wealthy countries can also be at risk from climate conditions, as in the case of United Arab Emirates, due to its geographic location, faces extreme water stress and temperature rise, with tremendous inequality levels6. Even though it has the technology and economic advantages to face climate conditions, it remains unclear whether distribution will be equal amongst the whole population. Finally, Manila in the Philippines and Kiribati in the central Pacific Ocean are also on the list of most vulnerable countries in the Global South. When looking at North and Sub-Saharan Africa regions, though the collective 54 countries’ contribution to greenhouse emissions is only around 2-3% globally, most of the vulnerable regions to the climate conditions are positioned on the African continent. The Climate Change Vulnerability Index 20157 found that seven out of ten countries that are at extreme risk from the temperature conditions are positioned across the regions of Sub Saharan Africa, namely Sierra Leone and Nigeria in West Africa, Chad and Central African Republic in Central Africa and South Sudan, Ethiopia and Eritrea in East Africa. Furthermore, the United Nations (UN) Climate Change conference in Nairobi8 revealed that this region’s countries are most vulnerable to and least prepared for the impact of climate change, already experiencing 0.7C increase in temperature. This is especially crucial because African nations are facing a prolonged drought mainly across three regions in southern, eastern, and the Horn of Africa, driving up the aid needs to approximately 45 million people in 14 countries9. New research warns that there will be many extreme outbreaks of intense rainfall which will hit the continent in coming years leading to floods10. 

Food and Water Security 

The Intergovernmental Panel on Climate Change (IPCC) research found that the projected changes in Africa’s regions is the critical impact on water security11. As one of the most critical issues facing the continent, climate change imposes pressure on availability and accessibility of water. The research found that current projections place 75-250 million people at risk of increased water stress in the next decade. Furthermore, a UN report predicts that water availability will be the main cause of national conflict in the next 25 years12. Water resources are declining as a result of drying-up rivers, flooding, drought, and inconsistencies in rainfall. This is a severe problem as most nations are heavily dependent on rain for agriculture and food distribution. Unbalanced distribution of rain will lead to reduction in crop yields and livestock productivity, causing significant changes in the landscape across the region13.

 

According to the IPCC, the Western Sahel region will experience the strongest drought. The area experiences a population growth rate of 2.8% annually which will expedite shrinking land and water resources, and primary dependence on rain-fed agriculture14. Findings show that in addition to the drought conditions, the Sahel has also been challenged with around five million people being displaced in 2019 as a result of armed conflict and 24 million in need of humanitarian assistance, making the resource scarcity even more crucial. The West Africa region will have to adjust to a reduced crop production and risk its food security prospects as a result, and Southern Africa will go through droughts and heat waves in the coming decades. Afrobarometer15 conducted a cross-regional survey between 2016 and 2018 consisting of 45 thousand respondents in 34 countries to observe how climate conditions affect the livelihood of farmers. Respondents16 answered that climate conditions for agriculture production have worsened over the past decade for the participants from 30 of the 34 countries with North Africans less likely to report a negative impact on crops. This negative impact of climate change reaches all dimensions of food security, in relation to availability, economic and physical accessibility, utilisation, and stability over time17.

 

The Migration-Climate nexus 

The aforementioned impacts on food and water security have direct relation to the internal migration across the regions, they will serve as a significant push factor in internal migration18. Intra-regional migration flows in West Africa can be explained by a well-entrenched tradition shaped by kinship and religious networks, demographic factors, security and livelihood, and a fear of terrorist attacks19. However, strong evidence shows that the climate conditions are compounding migration in West Africa20. The flow of people is shown to arrive mostly from the Sahel (Mali, Burkina Faso, Niger and Chad) as a coping strategy to fight the scarce resources of a dry and deteriorating landscape, to better prospects in the West Africa region in countries with more plantations, mining and coastal activities such as Cote d’Ivorie, Nigeria, Senegal, Ghana and Gambia21. Northwest Africa is facing rising sea levels, desertification, and drought, which will likely add to the number of seasonal migrants22. These migration conditions will intensify if global emissions increase. A Groundswell report by the World Bank on Internal Climate Migration in Sub-Saharan Africa23 reveals that by 2050 the expected number of internal migrants could reach 85 million, around 4% of the total population of the region, if CO2 emissions increase. East Africa, which is highly dependent on rainfed agriculture, could see an average of 10 million climate migrants by 2050 under similar conditions. However, the report also shows that internal migration will increase regardless of the changes in global greenhouse gas emissions. This is mainly due to lower water availability and crop productivity, combined with rising sea levels and storm surges. 

Climate Change is a challenging phenomenon and we are yet to understand its full scope and influence. It is affecting various places in the world, especially the regions in Africa. This piece attempted to map those impacts on the continent by referring to recent findings and analyses. In the future research is needed into how Climate Change impacts are going to shape the national security of countries, and how the regional security is affected as a result.

Sources

1.  https://www.ft.com/content/dc49d2f8-9fe3-11e8-85da-eeb7a9ce36e4

2.  https://www.businessinsider.com/world-economic-forum-world-biggest-problems-concerning-millennials-2016-8

3.  https://www.ft.com/content/72e1092b-1611-3413-8c19-56a43f0661ae

4.  https://www.nytimes.com/2012/04/08/opinion/sunday/friedman-the-other-arab-spring.html

5.  https://time.com/5687470/cities-countries-most-affected-by-climate-change/

6.  https://yaleglobal.yale.edu/content/uaes-unsustainable-nation-building

7. https://reliefweb.int/sites/reliefweb.int/files/resources/Climate_Change_2015_Press_Countries_V01.pdf

8.  https://unfccc.int/files/press/backgrounders/application/pdf/factsheet_africa.pdf

9.  https://www.thenewhumanitarian.org/analysis/2019/06/10/drought-africa-2019-45-million-in-need

10. https://www.theguardian.com/science/2019/jun/14/africa-global-heating-more-droughts-and-flooding-threat

11.  https://www.ipcc.ch/site/assets/uploads/2018/03/climate-change-water-en.pdf

12.  https://350africa.org/8-ways-climate-change-is-already-affecting-africa/

13.  Ibid

14. https://www.un.org/africarenewal/magazine/december-2018-march-2019/global-warming-severe-consequences-africa

15.  http://www.afrobarometer.org/

16. https://www.washingtonpost.com/politics/2019/09/23/african-nations-are-among-those-most-vulnerable-climate-change-new-survey-suggests-they-are-also-least-prepared/

17. http://www.fao.org/climate-smart-agriculture-sourcebook/concept/module-a1-introducing-csa/chapter-a1-1/en/

18.  https://www.brookings.edu/research/the-climate-crisis-migration-and-refugees/

19. https://www.brookings.edu/blog/africa-in-focus/2019/09/20/africas-climate-crisis-conflict-and-migration-challenges/

20.  ibid

21.  ibid

22.  https://www.brookings.edu/research/the-climate-crisis-migration-and-refugees/#footnote-3

23.  https://openknowledge.worldbank.org/bitstream/handle/10986/29461/GroundswellPN1.pdf?sequence=6&isAllowed=y

Welcome to the Security Distillery 3.0

As we enter a new year, the baton is passed on once more to a new cohort of young and energetic hopefuls who will take over this third year of the Security Distillery. We are full of excitement around this handover as we plan out new posts and additional forms of media content, whilst continuing with the hard work put in by past cohorts. However, it is also a time of great uncertainty in global politics and we have much to follow: the Iran crisis, US President Trump’s impeachment trial, intensifying terrorist violence in West Africa and climate change, to name a few. It may be redundant to say at this point but, globalisation, and all things that go under this umbrella term, is making international security analysis increasingly complex and nebulous.

In order to have as much clarity as one can with security issues, it is important to take a step back and ask oneself the basic questions, as with every subject matter. For the Distillery, these questions are: security of what, from what, for whom and by what means? Why has President Trump proposed to spend a further $7.2 billion on building the wall with Mexico? [1], or why did the European Union spend €98.7 million more to counter terrorism rather than tobacco addiction when in 2016 alone 700,000 Europeans died from tobacco consumption whilst 142 were killed in terrorist attacks [2, 3, 4, 5,]?

By Maria Patricia Bejarano

Securitisation theory

We have chosen to organize our articles by theme, in order to add some continuity to the reader’s experience. Our first theme of the Security Distillery this year is to be case studies of securitisation, as this theory aims to answer the core questions by subverting traditional security studies assumptions, and arguing that security issues are socially constructed and not universally given. This entry will be a short introduction to the theory, and case studies in the next month will delve in to applications of the theory, looking at the securitisation of sex work, refugees, immigration and the case of Brazil.

Securitisation is a theory which focuses on the process of making something a security issue, unlike traditional security theories which focus on the subjects of security themselves (ie. Realists would say that the subject of security is the nation-state and its territorial integrity, while Liberalists would argue for human security). Securitisation, which is closely associated to the Copenhagen School of thought (See: Ole Wæver, Barry Buzan and Jaap de Wilde), was developed in the 1990s and is seen as a constructivist approach to security. Unlike previously mentioned traditional theories, securitisation argues that anything can be a security issue as long as it passes through a specific process whereby a subject is securitised.

The process of securitisation is as follows: a securitising actor identifies an issue they believe is a threat to a referent object, and conveys this as a spoken message to an audience through a speech act, which advocates that extraordinary measures must be taken in order to protect the referent object from this existential threat. In other words, a security issue becomes a security issue because somebody says so. Oft cited examples of securitisation are terrorism and migration, as mentioned above. These phenomena, although statistically-speaking pose much less of a threat than automobile incidents, for example, are considered issues of high security importance and prioritisation. Authors within the Copenhagen School argue that it is precisely because terrorism and migration have become securitised that they are considered more important and more threatening than other potential security issues. From this idea stems the notion of (de)securitisation, which looks at the process of returning a securitised issue back to its normal non-urgent state. There are, of course, criticisms and shortcomings to the theory of securitisation (See: Bill McSweeney). The dependency of speech acts on the securitisation process does not consider other forms of communication, the static nature of the securitisation process does not take into account the fact that language and communication are fluid and constantly evolving processes, and furthermore, the need for a securitising actor to have legitimacy in order to convey their speech act implies that those outside of the elite cannot securitise an issue. However, in spite of these criticisms, it is still important to consider the real-world examples of securitised issues as they have far-reaching consequences in politics, economy and security worldwide. Over the next four weeks we will see examples of these consequences as we publish one case study of securitisation every week. We hope that you find them as compelling as we did and look forward to publishing more series like this one over the coming year at the Security Distillery.


SOURCES

1. The Washington Post, (2020). Lawmakers from both parties criticize White House plan to take $7.2 billion in Pentagon funding for Trump’s border wall. Available at: https://www.washingtonpost.com/immigration/lawmakers-from-both-parties-criticize-white-house-plan-to-take-72-billion-in-pentagon-funding-for-trumps-border-wall/2020/01/14/675838d4-36ed-11ea-bf30-ad313e4ec754_story.html [Accessed 14 January. 2020].

2. European Parliamentary Research Service, Europol, (2016). Terrorism. How Parliament is addressing the threat. Available at: http://www.europarl.europa.eu/infographic/europe-and-terrorism/index_en.html [Accessed 9 January. 2020].

3. European Parliament, (2017). EU budget 2018 approved: support for youth, growth, security. Available at: https://www.europarl.europa.eu/news/en/press-room/20171127IPR88936/eu-budget-2018-approved-support-for-youth-growth-security [Accessed 9 January. 2020].

4. European Commission, (2004). "Feel free to say no" anti-smoking campaign hits the road again. Available at: https://ec.europa.eu/commission/presscorner/detail/en/IP_04_323 [Accessed 9 January. 2020].

5. European Parliament, (2016). 700,000 deaths a year: tackling smoking in the EU. Available at: https://www.europarl.europa.eu/news/en/headlines/society/20160518STO27901/700-000-deaths-a-year-tackling-smoking-in-the-eu [Accessed 9 January. 2020].

The Rohingya Crisis and the Challenges of Implementing R2P Principles

Rohingya refugees are among the most persecuted ethnic groups in the world. Over the last two decades, the Rohingya people have been systematically persecuted by Myanmar's military and the local Buddhist monks.  Due to the influence of Russia and China, The UN Security Council has thus far failed to take decisive action against Myanmar’s consistent human rights violations in the Rakhine State against the Rohingya people. If the international community continues to ignore the Rohingya crisis on the basis of individual states’ internal affairs, then the situation risks devolving into a crisis on the scale of Rwanda.  

By Md Badrul Islam

Preventing mass atrocities was the founding objective of the United Nations (UN). Since its establishment, the UN has enacted various international humanitarian laws aimed to  protect civilians from genocide, war crimes, ethnic cleansing, and crimes against humanity[1].  The UN also passed laws like ‘Universal Declaration of Human Rights’, and established political commitments such as ‘Responsibility to Protect’ (R2P), which establishes a code of rights directing states to protect individuals within and beyond their borders. It is the responsibility of individual states as well as the international community to uphold these laws to prevent mass atrocities. Nevertheless, at the time of implementation, participants in the assembly refrained from incorporating the word ‘genocide’ in the humanitarian crisis legislation in order to avoid moral and legal condemnation against states who fail to intervene[2]. When a crisis does not serve strategic interests, foreign states are usually reluctant to interfere in the internal matters of another country. Human rights abuses typically result in nothing beyond states formally condemning the perpetrators and distributing humanitarian aid to the victims[3]. A meaningful intervention requires financial support, troops, and military resources. States, both individually and as a collective, typically decide against deploying such resources absent any major perceived benefit from intervention. 

American statesman, George Kennan, argued that diplomatic and political support are employed only when they serve the states’ own interest, without considering the moral implications[4]. The difference in the international response towards the Rwandan genocide and the Bosnian genocide is a good example of this. NATO conducted airstrikes in concert with United Nations Protection Force (UNPROFOR) under the mandate of United Nations in 1994 and 1995 to stop massacres in Bosnia and Herzegovina[5]. However, at the same time in 1994, the United States, Belgium, France, and others ignored the Rwandan genocide where 800,000 people were slaughtered within 100 days[6][7]. Additionally, it is difficult to evaluate the full extent of atrocities due to restricted access to affected areas. International laws and established norms are very important for the protection of human beings, but states are rarely obliged to follow them. Moreover, the principle of the R2P has not yet been fully actioned since R2P is neither a law nor a legally binding framework.  UN member states remain at odds regarding under which cases this principle should be applied. The division between great powers in the Security Council underlies this gridlock.  

The United States, United Kingdom, and France see mass atrocities as a threat to international stability. On the other hand, Russia and China continue to  promote absolute state sovereignty above R2P, though they vocalize their agreement with the R2P principles[8]. The Myanmar government has ignored the calls of the international community and continue to receive political and military support from countries like China and Russia. In 2007, China and Russia vetoed the first ever Burma resolution to stop attacks on ethnic minorities, to release political prisoners including Nobel Peace Laureate Aung San Suu Kyi and to allow humanitarian organizations into the country. It was the first multiple state veto since 1989[9]. China and Russia argued that the situation in Myanmar was not a threat to peace and security. In addition, they argued that the Security Council is not an appropriate venue for discussing other state’s internal affairs. China and Russia have consistently used their veto power against the UN Security Council and General Assembly initiatives in order to prevent intervention in Myanmar. In March 2017, China and Russia blocked a Security Council meeting to discuss the situation in Rakhine State[10]. Moreover, the UN resolution on Myanmar to permit aid workers, safeguard the return of all refugees, and grant full citizenship to the Rohingya was also opposed by China, Russia, Cambodia, Laos, the Philippines, Vietnam,  Belarus, Syria, and Zimbabwe[11]. Experts predict that China and Russia will veto the draft resolution on Myanmar which requires nine votes without any vetoes by the United States, United Kingdom, France, Russia, and China in order to pass. China, however, failed to stop the Security Council briefing that accused Myanmar’s military of genocide against Rohingya Muslims and urged pressuring Myanmar to put an end to human rights abuses[12].

Presently, China and Russia continue to provide political support to Myanmar. For instance, both countries recently voted against the UN Third Committee’s draft resolution on the human rights situation in Myanmar[13]. China is interested in increasing its presence in Myanmar to constrain Western influence because of its economic and strategic objectives and Beijing’s long term strategic interests in the Indian Ocean. Therefore, China is seeking to increase its presence in the Bay of Bengal by building ports in territorial waters of countries in the South Asian coastal region. China is the biggest investor in Myanmar, and is looking to build a seaport in Kyaukphyu, Rakhine State[14]. Moreover, China wants to develop its southwestern region, which shares a common border with Myanmar. It is easier and more cost effective for China to use Myanmar’s port and territory to develop this region. In 2007, Reuters reported that China was looking to take a stake of up to 85% of strategically important seaports in Myanmar for its One Belt, One Road initiative[15].

Russian interest in Myanmar is related to arms sales, and, more importantly, as a potential source of gas reserves, a resource for which Russia is also a major producer.  The Russian oil company Bashneft has invested US $38.3 millions in a central Myanmar oil field[16]. Moscow is one of the main sources of arms for the Myanmar military, particularly advanced weapons[17]. Myanmar signed a contract with Russia in 2018 for the purchase of six Sukhoi Su-30 SM multirole advanced fighter jets worth $38.3 million[18]. Moreover, Russia views Myanmar as its entry point in a pivot to Asia and a gateway to expanding Moscow’s presence in Southeast Asia[19]. Southeast Asia is becoming a strategically important region for economic and military power, while Myanmar’s geographical location offers land connectivity with East Asia, South Asia and Southeast Asia. The rise of China in this region challenges the security of ASEAN countries and the US military presence. Therefore, Russia seeks to serve as a potential counterweight through its relations with countries like Myanmar, Vietnam, Indonesia[20]. Furthermore, Western economic sanctions on Russia due to the annexation of Ukraine intensify Russian focus on Southeast Asian countries like Myanmar as a means to balance its economic and political partners. In a geopolitical context, Russia and China support each other and are seeking to create a bloc against US-led Western initiatives. On the other hand, as a regional and neighboring power, India also supports Myanmar because it shares a large eastern border. In this way, India shares a strategic interest with China because Myanmar is a good source of natural resources, and geopolitical connection for India. 

Finally, Myanmar’s constitutional reform in 2008 remodeled the state into an “eye wash democracy”, a governmental system appearing democratic on the surface that is actually undemocratic. Myanmar remains under strong military rule wherein the military maintains complete autonomy in matters of defense, security, and foreign relations[21]. In addition, prior to 2011, during the five decades of the authoritarian regime and the implementation of the current democratic facade, Myanmar’s military controlled its economy, resources, political system and foreign relations. Therefore, the military remains a prominent political actor in the minds of Myanmar’s civilian population. For that reason, military action against minority groups tends to be supported by most Buddhists citizens. Moreover, Buddhist monks, including the civilian leadership in the government, consistently spread propaganda against Rohingya Muslims[22]. As a result, most of  Myanmar’s citizens support the attack on the Rohingya. Nevertheless, it is imperative to view the Rohingya case in terms of the international community’s, especially the UN Security Council’s, R2P. If the R2P was applicable in the cases of Kosovo and Darfur, then it should be invoked in the case of Myanmar. In Kosovo, NATO commissioned airstrikes without a Security Council mandate nor the UNSC resolution 1769 for the deployment of UN and AMIS troops to end violence and mass killings in Darfur[23][24]. The international division within the council may hamper the process, but if the Security Council continues to ignore this genocide on the grounds of state sovereignty, then the it is likely to result in  a crisis on the scale of Rwanda.     

Sources


 1. United Nations General Assembly, (2009), Implementing Responsibility to Protect, Available at http://responsibilitytoprotect.org/implementing%20the%20rtop.pdf [Accessed 16 November. 2019].

2. Ibrahim, A., (2016). The Rohingyas: inside Myanmar’s hidden genocide. London, Hurst.

3. Li, X. (2018). Rohingya Crisis: What the International Community Should and Can Do. Availableat:http://dukeundergraduatelawmagazine.org/2017/10/30/rohingya-crisis-what-the-international-community-should-and-can-do/ [Accessed 16 November. 2019].

4. Kennan, G.F., (1985). ‘Morality and foreign policy’. Foreign Aff., 64, p.205.

5. Daalder, I., H., (1998). ‘Decision to Intervene: How the War in Bosnia Ended’, Brookings, Available at: https://www.brookings.edu/articles/decision-to-intervene-how-the-war-in-bosnia-ended/ [Accessed 7 January. 2020].

6. Human Rights Watch Report, (1999), Ignoring Genocide, Available at: https://www.hrw.org/reports/1999/rwanda/Geno15-8-01.htm [Accessed 7 January. 2020].

7. BBC, (2019). ‘Rwanda genocide: 100 days of slaughter’. 4 April, Available at https://www.bbc.com/news/world-africa-26875506. [Accessed 7 January. 2020].

8. Baranovsky, V. and Mateiko, A., (2016). Responsibility to Protect: Russia’s approaches. The International Spectator, 51(2), pp.49-69.

9. Steinberg, D.I., (2007). The United States and its allies: the problem of Burma/Myanmar policy. Contemporary Southeast Asia, pp.219-237.

10. The Irrawaddy. (2017). Analysis: China Backs Myanmar at the UN Security Council. Available at:https://www.irrawaddy.com/news/burma/analysis-china-backs-myanmar-un-security-council.html [Accessed 13 November. 2019].

11. The Guardian, (2018). China and Russia oppose UN resolution on Rohingya. Available at: https://www.theguardian.com/world/2017/dec/24/china-russia-oppose-un-resolution-myanmar-rohingya-muslims [Accessed 10 Apr. 2019].

12. Nichols, M. (2018). China fails to stop U.N. Security Council Myanmar briefing. Available at https://www.reuters.com/article/us-myanmar-rohingya-un/china-fails-to-stop-un-security-council-myanmar-briefing-idUSKCN1MY2QU [Accessed 16 November. 2019].

13. UN General Assembly Third Committee Seventy Fourth Session, (2019). Third Committee Approves 5 Draft Resolutions on Situations in Iran, Myanmar, Syria, amid Outcry over Targeting of Certain Countries. Available at: https://www.un.org/press/en/2019/gashc4282.doc.htm [Accessed 4 January. 2020].

14. Chau, T. (2019). China-led port project inches ahead in Myanmar. Available at https://www.asiatimes.com/2019/07/article/china-led-port-project-inches-ahead-in-myanmar/ [Accessed 4 January. 2020].

15. Lee, Y. & Myint, S.Y.S. (2017). Exclusive: China seeks up to 85 percent stake in strategic port in Myanmar. Available at: https://www.reuters.com/article/us-china-silkroad-myanmar-port-exclusive/exclusive-china-seeks-up-to-85-percent-stake-in-strategic-port-in-myanmar-idUSKBN1811DF [Accessed 4 January. 2020].

16. Myanmar Times, (2017), Myanmar-Russia ties reviewed, Available at https://www.mmtimes.com/national-news/25467-myanmar-russia-ties-reviewed.html [Accessed 4 January. 2020].

17. Asrar, S., (2017). ‘Who is selling weapons to Myanmar?’AL Jazeera, Available at https://www.aljazeera.com/indepth/interactive/2017/09/selling-myanmar-military-weapons-170914151902162.html. [Accessed 4 January. 2020].

18. Myint, M., (2019). ‘Myanmar Military Chief Inspects Airliner Assembly in Russia’. The Irrawaddy, Available at: https://www.irrawaddy.com/news/burma/myanmar-military-chief-inspects-airliner-assembly-in-russia.html [Accessed 4 January. 2020].

19. Lutz-Auras, L., (2015). Russia and Myanmar–Friends in Need? Journal of Current Southeast Asian Affairs, 34(2), pp.165-198.

20. Gorenburg, D., & Schwartz, P., (2019). ‘Russia’s Strategy in Southeast Asia’. Ponars Erasia, Available at: http://www.ponarseurasia.org/memo/russias-strategy-southeast-asia [Accessed 4 January. 2020].

21. Yi, T. S. (2018). ‘Myanmar: Under the name of democracy, the military rules’. CIVICUS. Available at: https://www.civicus.org/index.php/who-we-are/about-civicus, [Accessed 4 January. 2020].

22. Ibrahim, A., (2016), op. cit.

23. Gholiagha, S., (2013). From Kosovo to Syria – Why R2P is of no use if the UN Security Council is unable to act together. Available at https://verfassungsblog.de/from-kosovo-to-syria-why-r2p-is-of-no-use-if-the-un-security-council-is-unable-to-act-together/, [Accessed 7 January. 2020].

24. UN Security Council Resolution 1769, (2007). Reports of the Secretary-General on the Sudan, Available at http://unscr.com/en/resolutions/1769, [Accessed 4 January. 2020].