security challenges presentation (2010)

19
Security Challenges in the Current World Order Sebastian Kautz

Upload: abakus-eistanz

Post on 12-Apr-2017

539 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Security Challenges Presentation (2010)

Security Challengesin the

Current World Order

Sebastian Kautz

Page 2: Security Challenges Presentation (2010)

Security Challengesin the

Current World Order

Security, Politics, the International Community...

… what are we talking about?

How did we get to the current world order?

Is it possible to create a logically coherent theoretical framework for

International Security?

Page 3: Security Challenges Presentation (2010)

Security Studies and Critical Analysis

● Actors

● Goals

● Instruments

● Distinction between politicization and securitization

● Existential threats and emergency measures

● Subjective nature of assessment

● “Existential threat can only be understood in relation to the particular character of the referent object in question.” (Buzan, 1998, p.21)

Page 4: Security Challenges Presentation (2010)

Hiroshima/Nagasaki

Cuban Missile Crisis

Berlin WallCollapse of USSR

CopenhagenClimate Summit9/11

The second half of the 20The second half of the 20thth century century

● Post World War II – Nuclear Deterrence

● Ideological split – Communism/Capitalism

● United Nations succeed League of Nations

● Decolonization and Democratisation

● Green Movement & Environmentalism 1945 1960 1975 1990 1995 2010

0

20

40

60

80

100

120

140

160

180

200

UN Membership Countries

Page 5: Security Challenges Presentation (2010)

Hiroshima/Nagasaki

Cuban Missile Crisis

Berlin WallCollapse of USSR

CopenhagenClimate Summit9/11

The End of the Cold War?

1945 1960 1975 1990 1995 2010

0

20

40

60

80

100

120

140

160

180

200

UN Membership Countries

1945 1960 1975 1990 1995 2004

0

500

1000

1500

2000

2500

1945 1960 1975 1990 1995 2005

0

20

40

60

80

100

120

140

160

180

TotalInterstateIntrastate

Growth of NGOsInter / Intrastate Conflict

Page 6: Security Challenges Presentation (2010)

● End of state sponsored terrorism ?

● Privatisation of the military market

● Singer: 6 million soldiers unemployed

● Former Soviet states found democracies and open up for the market economy

● Global reorientation

The End of the Cold War? The End of the Cold War?

● Unpredicted

● Security agenda evaporated

● Introduction of new actors:

NGOsTNCsTCOs

+Private Military Actors

Hiroshima/Nagasaki

Cuban Missile Crisis

Berlin WallCollapse of USSR

CopenhagenClimate Summit9/11

Page 7: Security Challenges Presentation (2010)

Hans Rosling

Youtube -Hans Rosling: Debunking third-world myths with the best stats you've ever seen!

Youtube - New insights on poverty and life around the world

gapminder.org

worldmapper.org

The Changing World Order

Page 8: Security Challenges Presentation (2010)

The Mayflower took 3 months to cross the Atlantic, the Concord could do it in 3 hours

and a Ballistic Missile can do it in 30 minutes.

Hiroshima/Nagasaki

Cuban Missile Crisis

Berlin WallCollapse of USSR

CopenhagenClimate Summit9/11

Page 9: Security Challenges Presentation (2010)

Hiroshima/Nagasaki

Cuban Missile Crisis

Berlin WallCollapse of USSR

CopenhagenClimate Summit9/11

ETA RAF IRA

From National to International Terrorism

7/7

Page 10: Security Challenges Presentation (2010)

Hiroshima/Nagasaki

Cuban Missile Crisis

Berlin WallCollapse of USSR

CopenhagenClimate Summit9/11

ETA RAF IRA 7/7

The Empowerment of the Individual

Page 11: Security Challenges Presentation (2010)

So... What is the problem?

● Back to basics:

Hobbes' Leviathan

Locke's Treatises on Government

→ People need protection, either way

So, in light of what has been said so far, who has a duty of care in the current world order?

What are the repercussions for the field of security studies?

Page 12: Security Challenges Presentation (2010)

Military - Political - Economical - Environmental - Societal

Widening the scope of security studies?

Traditionalists Wideners CSS

Realist view on IR

Military Monopoly

Only includes Military Political and in cases Societal factors

Taking security out of the box

Logic of security

Objective & Subjective threats

Include all of the above in order to assess security on all levels

Power Politics

Reproduction of traditionalist and objectivity conceptions of security

check references

Page 13: Security Challenges Presentation (2010)

Are any of these approaches meaningfulfor explaining the security situation post 9/11?

Military

Private Military Firms

Outsourcing of traditional militaryor governmental services to privateIndustry.

“Thales ID document production and control solutions are in operation in over 25 countries and have issued more than 200 million identity documents and captured more than 150 million digital fingerprints to date.”

(Thales Annual Report 2008: 152)

Page 14: Security Challenges Presentation (2010)

Are any of these approaches meaningfulfor explaining the security situation post 9/11?

Criminal

Traditionally operating without boarders

Exploitation of niches and adoption to new “business models”

Cyberspace

Page 15: Security Challenges Presentation (2010)

Is Cyberspace the battlefield of the 21st century?

Meet Stuxnet

● New form of computer virus targeting industrial mainframes

● Not only programmed to spy on systems but also to reprogram

● Unprecedented level of sophistication

→ Zombie machines and unsuspecting users

Page 16: Security Challenges Presentation (2010)

Instruments & Goals

National and International Law

United Nations Security Council

EU Battle group

Sanctions

Are they adequate given the nature of new Threats?

Do they allow a global response?

How are we going to define global goals?

What did the Climate Summit 2009 tell us?

Page 17: Security Challenges Presentation (2010)

In conclusion...

… a holistic approach to Security Studies seems to be more striking than the outdated Traditionalist view and CSS

However, the Copenhagen School has been heavily criticised for being to swift, and too 'broad' in their approach... one central criticism is that any theoretical framework needs a real world problem that can not be solved by existing theories.

A new framework for analysis lacks purpose and adequacy 12 years after it was initially published.

Still, the Copenhagen School contributed to the field of SS in that they created a pro pluralist theory, which is also concerned with the language of security.

Page 18: Security Challenges Presentation (2010)

References

Baylis, J., Smith, S., 2001 (2006), The globalisation of World Politics, Oxford: Oxford University Press.

Buxton, J., 2006, The Political Economy of Narcotics: Production, Consumption & Global Markets, London: Zedbooks.

Dorling, D., Newmann, M., Badford, A., 2008, The Atlas of the Real World: Mapping the way we live, London: Thames and Hudson.

Nye, J. S., Welch, D. A., 2011, Understanding Global Conflict and Cooperation, London: Pearson/Longman.

Walzer, M., 1977, Just and Unjust Wars, New York: Basic Books.

Page 19: Security Challenges Presentation (2010)

References

Skidmore, D., 1999, Reviewed work(s): Security: A New Framework for Analysis by Barry Buzan; Ole Weaver; Jaap de Wilde The American Politiacal Science Review

Vol. 93, No. 4 (Dec., 1999), pp. 1010-1011.

Barry Buzan et al. Security: A New Framework for Analysis (1998, Lynne Rienner Publishers)

Barry Buzan, “Rethinking Security After the Cold War” Cooperation and Conflict (March 1997): 32:1, pp. 5-28.

R.T. Naylor, “From Cold War to Crime War” Transnational Organised Crime (Winter 1995).

Xavier Raufer, “New World Disorder, New Terrorism: New Threats for Europe and the Western World” Terrorism and Political Violence (Winter 1999), 11:4, pp. 30-51.