Title: International Security Global Security
1International SecurityGlobal Security
- Websites
- http//english.aljazeera.net
- www.economist.com
- www.cfr.org
- http//home.kku.ac.th/petmas/
- readings
- podcasts
- videos
2Class structure and assessment
- gt 80 attendance required
- gt 20 minutes late absent
- No computers
- Phones quick quiet
- If you do not understand, ask me
- If I cannot help, I will ask someone to help
explain - Mutual Respect
3Class structure and assessment
- Each week
- First class
- Introduce topic
- Lecture
- Videos and podcasts
- Readings
- Provide tutorial assignment
- Second Class
- Students present tutorial assignment
- Questions and discussion
- Prepare for next week
- Videos and podcasts
- Readings
4Class structure and assessment
- Tutorial presentations
- 5 - 10 minutes
- Each member to speak
- Power Point (basic)
- Handouts
- Answer questions
5Class structure and assessment
- Exam will be based on tutorial topics
- Midterm
- major presentation or
- 3 out of 6
- Final - choose 5 out of 12 questions
6Class structure and assessment
Criteria
Midterm examination (questions concerning weekly tutorial topics) 20
Final examination (questions concerning weekly tutorial topics) 20
Weekly Tutorial Exercises for class discussion I will provide feedback each week 30
Participation and attendance Definition of participation To join in, to take part, to involve oneself 30
Total 100
7Myth/fear I will ask a stupid question and
everyone will find out that I am dumb.
- Fact 98.7 of questions are not dumb
- Fact 99.3 of questions motivated by curiosity
are not dumb - Fact Most other students will be thinking
thank goodness someone asked that question
because they didn't understand it either (you
will be a hero) - Fact Most people fear that they will be found
out to be dumb
8- Myth/fear I will interrupt the lecture by asking
a question. - Fact it's true, but so what?
- Fact if I ask questions, I am participating so
I have a very good chance of understanding and
getting an A
9Weekly Tutorial
- Power Point
- KIS principle
- All group members must present and answer
questions - Handouts should provide details for classmates
- Bring to me before at least 1 hour before class
and I will print - Classmates must participate by listening, note
taking and asking questions - Remember Exam questions come from tutorial topic
presentations
10What is International Security?
International security consists of the measures
taken by nations and international organisations,
such as the United Nations, to ensure mutual
survival and safety These measures include
military action and diplomatic agreements such as
treaties and conventions
11Rule of Law
- Rule of Law is a principle under which all
persons, institutions, and entities, public and
private, including the state itself, are
accountable to laws that are publicly
promulgated, equally enforced, and independently
adjudicated, and which are consistent with
international human - rights law. Rule of Law and Human Rights,
U.S. Department of State, 2007
12(No Transcript)
13Security Studies is threats to survival but those
threats are far reaching
14Defining Traditional Security
- Traditional security dominated by realist theory
of international politics - It is about geo-politics, deterrence, power
balancing and military strategy - The state and its defence from external military
attacks is the exclusive focus of security
policy - Security confined to deliberate threats
(primarily of a military nature) to physical
security of state
15What is Non-Traditional Security (NTS)?
- It focuses primarily on non-military challenges
to security - Post cold war era, reduced justification for huge
expenditure for ensuring state security - NTS incorporates the state as a primary referent
object of security but also moves beyond it by
including other issues like human security
16What is Referent Object?
- The traditional policy of national security,
where the referent object of security is the
state, is now accompanied by a new policy of
human security, which emphasizes the individual
as the referent object of security.
17Traditional Coercive diplomacy The Role Of Intelligence Weapons of Mass Destruction Terrorism Humanitarian intervention Energy security The Defence Trade
Non-Traditional Health and security food water Transnational Crime Child soldiers
18What do these NTS issues have in common?
- They are all trans-national in character and
defined in political and socio-economic terms and
not in military terms - Not new security concerns but intensified and
spread by forces of globalization
196 Sectors of Security
20Military Security
- State perceiving security through military power
- against external threats
- What about the USA after 9/11?
21Regime Security
- A security sector configured to protect a regime
rather than human security
22Societal Security
- Societal security can be defined as the
maintenance of distinct ethno-national and
religious identities - Societies are units formed by a sense of
collective identity -
- Where collective identity is defined it enables
the word we to be used
23Environmental Security
- Environmental security maybe defined as the
ability of individuals to avoid or adapt to
environmental change so that things that are
important to their well-being are not
substantially negatively affected.
24(No Transcript)
25Who are the Actors in IR?
- Actors are the main participants/decision makers
in IR - But it depends on IR theory who these
areClassical IR theory - States are main actors
- No central government or control base
- Current negotiations re statehood?
- Israel and Palestine
26Non States
- Large NGOs
- United Nations NATO
- MNCs
- google News Corp
- Terrorist groups
- Al Qaida
27Violent Non-State Actors
- Non-state actors can effectively challenge a
state when the state lacks - Legitimacy and authority
- Capacity to provide public/collective goods
- Sound economic management
- A sense of collective interest and inclusiveness
- VNSA Types
- Warlords
- Militias
- Paramilitary Forces
- Insurgencies
- Terrorist Organizations
- Criminal Organizations/Youth Gangs
27
Violent Non-State Actors and National and
International Security Phil Williams,
International Relations and Security Network
(ISN), Nov 2008
28Leveraging of Proxy Forces
- (US/UK) French partisans vs. Germany/Vichy
(France) - (US) Sicilian Mafia vs. Germany (WWII Sicily)
- (US) Hmong in SE Asia vs. N. Vietnamese
operations (Laos) - (US) Contras vs. Sandinista Junta (Nicaragua)
- (US) Mujahideen vs. Soviets (Afghanistan)
- (Iran/Syria) Hezbollah vs. Israel (Lebanon)
- (KSA/Iran/Egypt(?)) Hamas vs. Israel (Gaza)
- (Russia) Criminal actors/separatists vs. Georgia
(S. Ossetia/ Abkhazia)
29What is securitization?Copenhagen School A new
framework for analysis, (Buzan, Waever and de
Wilde)
- Securitization Representation of an issue as an
existential threat in which the sheer utterance
of threat constitutes the action that
establishes something as a security Issue and
hence justifies all actions outside the normal
bounds of politics to deal with it.
30Who and How
- Who are securitizing actors?
- Governments, political elites, military, and
civil societythose actors who securitize an
issue by articulating the existence of threat(s)
to the survival of specific referent objects - How is a process of securitization completed?
- Securitizing actors use the language of security
(to convince a specific audience of the
existential nature of the threat. The act of
securitization is complete once the relevant
audience is convinced of the existential threat
to the referent object
31Recent examples?
32Power in International Relations
- Power as a goal of states or leaders
- Power as a measure of influence or control over
outcomes, events, actors and issues - Power as reflecting victory in conflict and the
attainment of security - Power as control over resources and capabilities
33Power as a goal
- Who is the only Super Power in the world?
- Economic growth
- Military growth
- Cultural spread
- Religious spread
34Power as influence
- An actor's ability to exercise influence over
other actors within the international system - coercive
- attractive
- cooperative
- competitive
- Mechanisms of influence can include the threat
or use of force, economic interaction or
pressure, diplomacy, and cultural exchange
35Soft versus Hard power
- Instruments of soft power
- debates on cultural values,
- dialogues on ideology,
- influence through good example,
- appeal to commonly accepted human values.
- Means of exercising soft power
- diplomacy
- dissemination of information
- propaganda and cultural programming to achieve
political ends.
36- Hard power refers to coercive tactics
- threat or use of armed forces
- economic pressure or sanctions
- assassination and subterfuge
- other forms of intimidation
- Hard power is generally associated to the
stronger of nations, as the ability to change the
domestic affairs of other nations through
military threats.
37Tutorial Assignments
- Video Hamas Wins Palestinian Election
- Which do you think is more important in the
current era, promoting democracy or keeping
terrorist groups from increasing their power? - Video The Cold War
- What was the Cold War? Was it really a war?
- Invasion of Iraq 2002 and North Koreas nuclear
capabilities are recent examples of hard power
and soft power, tell us about these issues.
38Security Studies is threats to survival but those
threats are far reaching
39Defining Traditional Security
- Traditional security dominated by realist theory
of international politics - It is about geo-politics, deterrence, power
balancing and military strategy - The state and its defence from external military
attacks is the exclusive focus of security
policy - Security confined to deliberate threats
(primarily of a military nature) to physical
security of state
40What is Non-Traditional Security (NTS)?
- It focuses primarily on non-military challenges
to security - Post cold war era, reduced justification for huge
expenditure for ensuring state security - NTS incorporates the state as a primary referent
object of security but also moves beyond it by
including other issues like human security
41What is Referent Object?
- The traditional policy of national security,
where the referent object of security is the
state, is now accompanied by a new policy of
human security, which emphasizes the individual
as the referent object of security.
42Traditional Coercive diplomacy The Role Of Intelligence Weapons of Mass Destruction Terrorism Humanitarian intervention Energy security The Defence Trade
Non-Traditional Health and security food water Transnational Crime Child soldiers
43What do these NTS issues have in common?
- They are all trans-national in character and
defined in political and socio-economic terms and
not in military terms - Not new security concerns but intensified and
spread by forces of globalization
446 Sectors of Security
45Military Security
- State perceiving security through military power
- against external threats
- What about the USA after 9/11?
46Regime Security
- A security sector configured to protect a regime
rather than human security
47Societal Security
- Societal security can be defined as the
maintenance of distinct ethno-national and
religious identities - Societies are units formed by a sense of
collective identity -
- Where collective identity is defined it enables
the word we to be used
48Environmental Security
- Environmental security maybe defined as the
ability of individuals to avoid or adapt to
environmental change so that things that are
important to their well-being are not
substantially negatively affected.
49What is securitization?Copenhagen School A new
framework for analysis, (Buzan, Waever and de
Wilde)
- Securitization Representation of an issue as an
existential threat in which the sheer utterance
of threat constitutes the action that
establishes something as a security Issue and
hence justifies all actions outside the normal
bounds of politics to deal with it.
50Who and How
- Who are securitizing actors?
- Governments, political elites, military, and
civil societythose actors who securitize an
issue by articulating the existence of threat(s)
to the survival of specific referent objects - How is a process of securitization completed?
- Securitizing actors use the language of security
(to convince a specific audience of the
existential nature of the threat. The act of
securitization is complete once the relevant
audience is convinced of the existential threat
to the referent object
51Recent examples?
52In the case of the 2003 Invasion of Iraq, one
could say that the conflict was securitized
militarily, weapons of mass destruction was one
reason used for the invasion. However, the war
was also securitized as a societal problem, human
rights in Saddam's Iraq was mentioned to gain
public support.
53Cohesive Diplomacy
- Use of threats and limited force to influence the
adversary to stop or undo something it has
already embarked upon
54- Iraq
- North Korea
- Military threats are not effective
- Iran
- Military threats are not effective
55Deterrence StrategyCold War
- Military strategy whereby one power uses the
threat of reprisal to preclude an attack from an
adversary - It relies on two basic conditions
- the ability to retaliate after a surprise attack
must be perceived as credible - retaliation must be perceived as a possibility,
if not a certainty
56(No Transcript)
57Global Interdependences Conflict
- During the past 50 years global interdependencies
have increased tremendously driven by - Technological advances (for example,
communications) - Increase in the volume and scale of economic
activities - Resource scarcity
- International migration
-
- Greater interdependencies have created the
potential for greater conflict as well
58The Nature of Global Conflict
- Economic Conflict
- Conflict over resources
- Conflict over trade
- Conflict over externalities
59The Nature of Global Conflict
- Non-Economic Conflict
- Ideological conflict
- Religious Conflict
- Conflict over spheres of political influence
60Types of Global Conflict
- Violent Conflict
- Full-scale wars
- Low-intensity armed conflict
- Violent revolts, separatist and independence
movements - Terrorism
61Types of Global Conflict
- Non-violent conflict
- Non-violent economic conflict
- (trade wars, patent disputes, etc.)
- Environmental disputes and disputes over
resources - Non-violent protests
(political
in nature or against the policies of any
government) - Non-violent independence and separatist movements
62Tutorial Discussion Papers
- What was the Cold War?
- Who
- When
- Where
- What
- Why
- How
63Tutorial Discussion Papers
- International Relations Theories
- Realism
- Liberalism
- Idealism
- Constructivism
64Tutorial Discussion Papers
- What is Globalisation?
- Who
- When
- Where
- What
- Why
- How
65Tutorial Discussion Papers
- Securitization The case of Iraq
- Who
- When
- Where
- What
- Why
- How
66Readings
- Definitions of security and security studies
- International and global security in the
post-cold war era. - The Globalization of World Politics - An
Introduction to International Relations, Fourth
Edition, Edited by John Baylis, Steve Smith, and
Patricia Owens - Securitization in international relations
- The Renaissance of Security Studies, Stephen M.
Walt International Studies Quarterly, Vol. 35,
No. 2. (Jun., 1991), pp. 211- 39.
67Videos
- The Cold War http//www.youtube.com/watch?vEKexf1
66TKk - A New Global Security P.2 Iraq and Iran -
04.2010_at_Harvard Uni - www.youtube.com/watch?vQPGMhT3PuKA