security challenges presentation (2010)
TRANSCRIPT
![Page 1: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/1.jpg)
Security Challengesin the
Current World Order
Sebastian Kautz
![Page 2: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/2.jpg)
Security Challengesin the
Current World Order
Security, Politics, the International Community...
… what are we talking about?
How did we get to the current world order?
Is it possible to create a logically coherent theoretical framework for
International Security?
![Page 3: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/3.jpg)
Security Studies and Critical Analysis
● Actors
● Goals
● Instruments
● Distinction between politicization and securitization
● Existential threats and emergency measures
● Subjective nature of assessment
● “Existential threat can only be understood in relation to the particular character of the referent object in question.” (Buzan, 1998, p.21)
![Page 4: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/4.jpg)
Hiroshima/Nagasaki
Cuban Missile Crisis
Berlin WallCollapse of USSR
CopenhagenClimate Summit9/11
The second half of the 20The second half of the 20thth century century
● Post World War II – Nuclear Deterrence
● Ideological split – Communism/Capitalism
● United Nations succeed League of Nations
● Decolonization and Democratisation
● Green Movement & Environmentalism 1945 1960 1975 1990 1995 2010
0
20
40
60
80
100
120
140
160
180
200
UN Membership Countries
![Page 5: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/5.jpg)
Hiroshima/Nagasaki
Cuban Missile Crisis
Berlin WallCollapse of USSR
CopenhagenClimate Summit9/11
The End of the Cold War?
1945 1960 1975 1990 1995 2010
0
20
40
60
80
100
120
140
160
180
200
UN Membership Countries
1945 1960 1975 1990 1995 2004
0
500
1000
1500
2000
2500
1945 1960 1975 1990 1995 2005
0
20
40
60
80
100
120
140
160
180
TotalInterstateIntrastate
Growth of NGOsInter / Intrastate Conflict
![Page 6: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/6.jpg)
● End of state sponsored terrorism ?
● Privatisation of the military market
● Singer: 6 million soldiers unemployed
● Former Soviet states found democracies and open up for the market economy
● Global reorientation
The End of the Cold War? The End of the Cold War?
● Unpredicted
● Security agenda evaporated
● Introduction of new actors:
NGOsTNCsTCOs
+Private Military Actors
Hiroshima/Nagasaki
Cuban Missile Crisis
Berlin WallCollapse of USSR
CopenhagenClimate Summit9/11
![Page 7: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/7.jpg)
Hans Rosling
Youtube -Hans Rosling: Debunking third-world myths with the best stats you've ever seen!
Youtube - New insights on poverty and life around the world
gapminder.org
worldmapper.org
The Changing World Order
![Page 8: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/8.jpg)
The Mayflower took 3 months to cross the Atlantic, the Concord could do it in 3 hours
and a Ballistic Missile can do it in 30 minutes.
Hiroshima/Nagasaki
Cuban Missile Crisis
Berlin WallCollapse of USSR
CopenhagenClimate Summit9/11
![Page 9: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/9.jpg)
Hiroshima/Nagasaki
Cuban Missile Crisis
Berlin WallCollapse of USSR
CopenhagenClimate Summit9/11
ETA RAF IRA
From National to International Terrorism
7/7
![Page 10: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/10.jpg)
Hiroshima/Nagasaki
Cuban Missile Crisis
Berlin WallCollapse of USSR
CopenhagenClimate Summit9/11
ETA RAF IRA 7/7
The Empowerment of the Individual
![Page 11: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/11.jpg)
So... What is the problem?
● Back to basics:
Hobbes' Leviathan
Locke's Treatises on Government
→ People need protection, either way
So, in light of what has been said so far, who has a duty of care in the current world order?
What are the repercussions for the field of security studies?
![Page 12: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/12.jpg)
Military - Political - Economical - Environmental - Societal
Widening the scope of security studies?
Traditionalists Wideners CSS
Realist view on IR
Military Monopoly
Only includes Military Political and in cases Societal factors
Taking security out of the box
Logic of security
Objective & Subjective threats
Include all of the above in order to assess security on all levels
Power Politics
Reproduction of traditionalist and objectivity conceptions of security
check references
![Page 13: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/13.jpg)
Are any of these approaches meaningfulfor explaining the security situation post 9/11?
Military
Private Military Firms
Outsourcing of traditional militaryor governmental services to privateIndustry.
“Thales ID document production and control solutions are in operation in over 25 countries and have issued more than 200 million identity documents and captured more than 150 million digital fingerprints to date.”
(Thales Annual Report 2008: 152)
![Page 14: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/14.jpg)
Are any of these approaches meaningfulfor explaining the security situation post 9/11?
Criminal
Traditionally operating without boarders
Exploitation of niches and adoption to new “business models”
Cyberspace
![Page 15: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/15.jpg)
Is Cyberspace the battlefield of the 21st century?
Meet Stuxnet
● New form of computer virus targeting industrial mainframes
● Not only programmed to spy on systems but also to reprogram
● Unprecedented level of sophistication
→ Zombie machines and unsuspecting users
![Page 16: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/16.jpg)
Instruments & Goals
National and International Law
United Nations Security Council
EU Battle group
Sanctions
Are they adequate given the nature of new Threats?
Do they allow a global response?
How are we going to define global goals?
What did the Climate Summit 2009 tell us?
![Page 17: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/17.jpg)
In conclusion...
… a holistic approach to Security Studies seems to be more striking than the outdated Traditionalist view and CSS
However, the Copenhagen School has been heavily criticised for being to swift, and too 'broad' in their approach... one central criticism is that any theoretical framework needs a real world problem that can not be solved by existing theories.
A new framework for analysis lacks purpose and adequacy 12 years after it was initially published.
Still, the Copenhagen School contributed to the field of SS in that they created a pro pluralist theory, which is also concerned with the language of security.
![Page 18: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/18.jpg)
References
Baylis, J., Smith, S., 2001 (2006), The globalisation of World Politics, Oxford: Oxford University Press.
Buxton, J., 2006, The Political Economy of Narcotics: Production, Consumption & Global Markets, London: Zedbooks.
Dorling, D., Newmann, M., Badford, A., 2008, The Atlas of the Real World: Mapping the way we live, London: Thames and Hudson.
Nye, J. S., Welch, D. A., 2011, Understanding Global Conflict and Cooperation, London: Pearson/Longman.
Walzer, M., 1977, Just and Unjust Wars, New York: Basic Books.
![Page 19: Security Challenges Presentation (2010)](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed1bbe1a28ab93478b46a3/html5/thumbnails/19.jpg)
References
Skidmore, D., 1999, Reviewed work(s): Security: A New Framework for Analysis by Barry Buzan; Ole Weaver; Jaap de Wilde The American Politiacal Science Review
Vol. 93, No. 4 (Dec., 1999), pp. 1010-1011.
Barry Buzan et al. Security: A New Framework for Analysis (1998, Lynne Rienner Publishers)
Barry Buzan, “Rethinking Security After the Cold War” Cooperation and Conflict (March 1997): 32:1, pp. 5-28.
R.T. Naylor, “From Cold War to Crime War” Transnational Organised Crime (Winter 1995).
Xavier Raufer, “New World Disorder, New Terrorism: New Threats for Europe and the Western World” Terrorism and Political Violence (Winter 1999), 11:4, pp. 30-51.