International Security Global Security - PowerPoint PPT Presentation

1 / 67
About This Presentation
Title:

International Security Global Security

Description:

International Security Global Security Websites http://english.aljazeera.net www.economist.com www.cfr.org http://home.kku.ac.th/petmas/ readings podcasts – PowerPoint PPT presentation

Number of Views:2670
Avg rating:3.0/5.0
Slides: 68
Provided by: KhonKaenU5
Category:

less

Transcript and Presenter's Notes

Title: International Security Global Security


1
International SecurityGlobal Security
  • Websites
  • http//english.aljazeera.net
  • www.economist.com
  • www.cfr.org
  • http//home.kku.ac.th/petmas/
  • readings
  • podcasts
  • videos

2
Class structure and assessment
  • gt 80 attendance required
  • gt 20 minutes late absent
  • No computers
  • Phones quick quiet
  • If you do not understand, ask me
  • If I cannot help, I will ask someone to help
    explain
  • Mutual Respect

3
Class structure and assessment
  • Each week
  • First class
  • Introduce topic
  • Lecture
  • Videos and podcasts
  • Readings
  • Provide tutorial assignment
  • Second Class
  • Students present tutorial assignment
  • Questions and discussion
  • Prepare for next week
  • Videos and podcasts
  • Readings

4
Class structure and assessment
  • Tutorial presentations
  • 5 - 10 minutes
  • Each member to speak
  • Power Point (basic)
  • Handouts
  • Answer questions

5
Class structure and assessment
  • Exam will be based on tutorial topics
  • Midterm
  • major presentation or
  • 3 out of 6
  • Final - choose 5 out of 12 questions

6
Class structure and assessment
Criteria
Midterm examination (questions concerning weekly tutorial topics) 20
Final examination (questions concerning weekly tutorial topics) 20
Weekly Tutorial Exercises for class discussion I will provide feedback each week 30
Participation and attendance Definition of participation To join in, to take part, to involve oneself 30
Total 100
7
Myth/fear I will ask a stupid question and
everyone will find out that I am dumb.
  • Fact 98.7 of questions are not dumb
  • Fact 99.3 of questions motivated by curiosity
    are not dumb
  •  Fact Most other students will be thinking
    thank goodness someone asked that question
    because they didn't understand it either (you
    will be a hero)
  •  Fact Most people fear that they will be found
    out to be dumb

8
  • Myth/fear I will interrupt the lecture by asking
    a question.
  •  Fact it's true, but so what?
  • Fact if I ask questions, I am participating so
    I have a very good chance of understanding and
    getting an A

9
Weekly Tutorial
  • Power Point
  • KIS principle
  • All group members must present and answer
    questions
  • Handouts should provide details for classmates
  • Bring to me before at least 1 hour before class
    and I will print
  • Classmates must participate by listening, note
    taking and asking questions
  • Remember Exam questions come from tutorial topic
    presentations

10
What is International Security?
International security consists of the measures
taken by nations and international organisations,
such as the United Nations, to ensure mutual
survival and safety These measures include
military action and diplomatic agreements such as
treaties and conventions
11
Rule of Law
  • Rule of Law is a principle under which all
    persons, institutions, and entities, public and
    private, including the state itself, are
    accountable to laws that are publicly
    promulgated, equally enforced, and independently
    adjudicated, and which are consistent with
    international human
  • rights law. Rule of Law and Human Rights,
    U.S. Department of State, 2007

12
(No Transcript)
13

Security Studies is threats to survival but those
threats are far reaching


14
Defining Traditional Security
  • Traditional security dominated by realist theory
    of international politics
  • It is about geo-politics, deterrence, power
    balancing and military strategy
  • The state and its defence from external military
    attacks is the exclusive focus of security
    policy
  • Security confined to deliberate threats
    (primarily of a military nature) to physical
    security of state

15
What is Non-Traditional Security (NTS)?
  • It focuses primarily on non-military challenges
    to security
  • Post cold war era, reduced justification for huge
    expenditure for ensuring state security
  • NTS incorporates the state as a primary referent
    object of security but also moves beyond it by
    including other issues like human security

16
What is Referent Object?
  • The traditional policy of national security,
    where the referent object of security is the
    state, is now accompanied by a new policy of
    human security, which emphasizes the individual
    as the referent object of security.

17
Traditional Coercive diplomacy The Role Of Intelligence Weapons of Mass Destruction Terrorism Humanitarian intervention Energy security The Defence Trade
Non-Traditional Health and security food water Transnational Crime Child soldiers
18
What do these NTS issues have in common?
  • They are all trans-national in character and
    defined in political and socio-economic terms and
    not in military terms
  • Not new security concerns but intensified and
    spread by forces of globalization

19
6 Sectors of Security
20
Military Security
  • State perceiving security through military power
  • against external threats
  • What about the USA after 9/11?

21
Regime Security
  • A security sector configured to protect a regime
    rather than human security

22
Societal Security
  • Societal security can be defined as the
    maintenance of distinct ethno-national and
    religious identities
  • Societies are units formed by a sense of
    collective identity
  • Where collective identity is defined it enables
    the word we to be used

23
Environmental Security
  • Environmental security maybe defined as the
    ability of individuals to avoid or adapt to
    environmental change so that things that are
    important to their well-being are not
    substantially negatively affected.

24
(No Transcript)
25
Who are the Actors in IR?
  • Actors are the main participants/decision makers
    in IR
  • But it depends on IR theory who these
    areClassical IR theory
  • States are main actors
  • No central government or control base
  • Current negotiations re statehood?
  • Israel and Palestine

26
Non States
  • Large NGOs
  • United Nations NATO
  • MNCs
  • google News Corp
  • Terrorist groups
  • Al Qaida

27
Violent Non-State Actors
  • Non-state actors can effectively challenge a
    state when the state lacks
  • Legitimacy and authority
  • Capacity to provide public/collective goods
  • Sound economic management
  • A sense of collective interest and inclusiveness
  • VNSA Types
  • Warlords
  • Militias
  • Paramilitary Forces
  • Insurgencies
  • Terrorist Organizations
  • Criminal Organizations/Youth Gangs

27
Violent Non-State Actors and National and
International Security Phil Williams,
International Relations and Security Network
(ISN), Nov 2008
28
Leveraging of Proxy Forces
  • (US/UK) French partisans vs. Germany/Vichy
    (France)
  • (US) Sicilian Mafia vs. Germany (WWII Sicily)
  • (US) Hmong in SE Asia vs. N. Vietnamese
    operations (Laos)
  • (US) Contras vs. Sandinista Junta (Nicaragua)
  • (US) Mujahideen vs. Soviets (Afghanistan)
  • (Iran/Syria) Hezbollah vs. Israel (Lebanon)
  • (KSA/Iran/Egypt(?)) Hamas vs. Israel (Gaza)
  • (Russia) Criminal actors/separatists vs. Georgia
    (S. Ossetia/ Abkhazia)

29
What is securitization?Copenhagen School A new
framework for analysis, (Buzan, Waever and de
Wilde)
  • Securitization Representation of an issue as an
    existential threat in which the sheer utterance
    of threat constitutes the action that
    establishes something as a security Issue and
    hence justifies all actions outside the normal
    bounds of politics to deal with it.

30
Who and How
  • Who are securitizing actors?
  • Governments, political elites, military, and
    civil societythose actors who securitize an
    issue by articulating the existence of threat(s)
    to the survival of specific referent objects
  • How is a process of securitization completed?
  • Securitizing actors use the language of security
    (to convince a specific audience of the
    existential nature of the threat. The act of
    securitization is complete once the relevant
    audience is convinced of the existential threat
    to the referent object

31
Recent examples?
32
Power in International Relations
  • Power as a goal of states or leaders
  • Power as a measure of influence or control over
    outcomes, events, actors and issues
  • Power as reflecting victory in conflict and the
    attainment of security
  • Power as control over resources and capabilities

33
Power as a goal
  • Who is the only Super Power in the world?
  • Economic growth
  • Military growth
  • Cultural spread
  • Religious spread

34
Power as influence
  • An actor's ability to exercise influence over
    other actors within the international system
  • coercive
  • attractive
  • cooperative
  • competitive
  • Mechanisms of influence can include the threat
    or use of force, economic interaction or
    pressure, diplomacy, and cultural exchange

35
Soft versus Hard power
  • Instruments of soft power
  • debates on cultural values,
  • dialogues on ideology,
  • influence through good example,
  • appeal to commonly accepted human values.
  • Means of exercising soft power
  • diplomacy
  • dissemination of information
  • propaganda and cultural programming to achieve
    political ends.

36
  • Hard power refers to coercive tactics
  • threat or use of armed forces
  • economic pressure or sanctions
  • assassination and subterfuge
  • other forms of intimidation
  • Hard power is generally associated to the
    stronger of nations, as the ability to change the
    domestic affairs of other nations through
    military threats.

37
Tutorial Assignments
  • Video Hamas Wins Palestinian Election
  • Which do you think is more important in the
    current era, promoting democracy or keeping
    terrorist groups from increasing their power?
  • Video The Cold War
  • What was the Cold War? Was it really a war?
  • Invasion of Iraq 2002 and North Koreas nuclear
    capabilities are recent examples of hard power
    and soft power, tell us about these issues.

38

Security Studies is threats to survival but those
threats are far reaching


39
Defining Traditional Security
  • Traditional security dominated by realist theory
    of international politics
  • It is about geo-politics, deterrence, power
    balancing and military strategy
  • The state and its defence from external military
    attacks is the exclusive focus of security
    policy
  • Security confined to deliberate threats
    (primarily of a military nature) to physical
    security of state

40
What is Non-Traditional Security (NTS)?
  • It focuses primarily on non-military challenges
    to security
  • Post cold war era, reduced justification for huge
    expenditure for ensuring state security
  • NTS incorporates the state as a primary referent
    object of security but also moves beyond it by
    including other issues like human security

41
What is Referent Object?
  • The traditional policy of national security,
    where the referent object of security is the
    state, is now accompanied by a new policy of
    human security, which emphasizes the individual
    as the referent object of security.

42
Traditional Coercive diplomacy The Role Of Intelligence Weapons of Mass Destruction Terrorism Humanitarian intervention Energy security The Defence Trade
Non-Traditional Health and security food water Transnational Crime Child soldiers
43
What do these NTS issues have in common?
  • They are all trans-national in character and
    defined in political and socio-economic terms and
    not in military terms
  • Not new security concerns but intensified and
    spread by forces of globalization

44
6 Sectors of Security
45
Military Security
  • State perceiving security through military power
  • against external threats
  • What about the USA after 9/11?

46
Regime Security
  • A security sector configured to protect a regime
    rather than human security

47
Societal Security
  • Societal security can be defined as the
    maintenance of distinct ethno-national and
    religious identities
  • Societies are units formed by a sense of
    collective identity
  • Where collective identity is defined it enables
    the word we to be used

48
Environmental Security
  • Environmental security maybe defined as the
    ability of individuals to avoid or adapt to
    environmental change so that things that are
    important to their well-being are not
    substantially negatively affected.

49
What is securitization?Copenhagen School A new
framework for analysis, (Buzan, Waever and de
Wilde)
  • Securitization Representation of an issue as an
    existential threat in which the sheer utterance
    of threat constitutes the action that
    establishes something as a security Issue and
    hence justifies all actions outside the normal
    bounds of politics to deal with it.

50
Who and How
  • Who are securitizing actors?
  • Governments, political elites, military, and
    civil societythose actors who securitize an
    issue by articulating the existence of threat(s)
    to the survival of specific referent objects
  • How is a process of securitization completed?
  • Securitizing actors use the language of security
    (to convince a specific audience of the
    existential nature of the threat. The act of
    securitization is complete once the relevant
    audience is convinced of the existential threat
    to the referent object

51
Recent examples?
52
In the case of the 2003 Invasion of Iraq, one
could say that the conflict was securitized
militarily, weapons of mass destruction was one
reason used for the invasion. However, the war
was also securitized as a societal problem, human
rights in Saddam's Iraq was mentioned to gain
public support.
53
Cohesive Diplomacy
  • Use of threats and limited force to influence the
    adversary to stop or undo something it has
    already embarked upon

54
  • Iraq
  • North Korea
  • Military threats are not effective
  • Iran
  • Military threats are not effective

55
Deterrence StrategyCold War
  • Military strategy whereby one power uses the
    threat of reprisal to preclude an attack from an
    adversary
  • It relies on two basic conditions
  • the ability to retaliate after a surprise attack
    must be perceived as credible
  • retaliation must be perceived as a possibility,
    if not a certainty

56
(No Transcript)
57
Global Interdependences Conflict
  • During the past 50 years global interdependencies
    have increased tremendously driven by
  • Technological advances (for example,
    communications)
  • Increase in the volume and scale of economic
    activities
  • Resource scarcity
  • International migration
  • Greater interdependencies have created the
    potential for greater conflict as well

58
The Nature of Global Conflict
  • Economic Conflict
  • Conflict over resources
  • Conflict over trade
  • Conflict over externalities

59
The Nature of Global Conflict
  • Non-Economic Conflict
  • Ideological conflict
  • Religious Conflict
  • Conflict over spheres of political influence

60
Types of Global Conflict
  • Violent Conflict
  • Full-scale wars
  • Low-intensity armed conflict
  • Violent revolts, separatist and independence
    movements
  • Terrorism

61
Types of Global Conflict
  • Non-violent conflict
  • Non-violent economic conflict
  • (trade wars, patent disputes, etc.)
  • Environmental disputes and disputes over
    resources
  • Non-violent protests
    (political
    in nature or against the policies of any
    government)
  • Non-violent independence and separatist movements

62
Tutorial Discussion Papers
  • What was the Cold War?
  • Who
  • When
  • Where
  • What
  • Why
  • How

63
Tutorial Discussion Papers
  • International Relations Theories
  • Realism
  • Liberalism
  • Idealism
  • Constructivism

64
Tutorial Discussion Papers
  • What is Globalisation?
  • Who
  • When
  • Where
  • What
  • Why
  • How

65
Tutorial Discussion Papers
  • Securitization The case of Iraq
  • Who
  • When
  • Where
  • What
  • Why
  • How

66
Readings
  • Definitions of security and security studies
  • International and global security in the
    post-cold war era.
  • The Globalization of World Politics - An
    Introduction to International Relations, Fourth
    Edition, Edited by John Baylis, Steve Smith, and
    Patricia Owens
  • Securitization in international relations
  • The Renaissance of Security Studies, Stephen M.
    Walt International Studies Quarterly, Vol. 35,
    No. 2. (Jun., 1991), pp. 211- 39.

67
Videos
  • The Cold War http//www.youtube.com/watch?vEKexf1
    66TKk
  • A New Global Security P.2 Iraq and Iran -
    04.2010_at_Harvard Uni
  • www.youtube.com/watch?vQPGMhT3PuKA
Write a Comment
User Comments (0)
About PowerShow.com