Number of results to display per page
Search Results
692. Hybrid Warfare in the Middle East
- Author:
- LSE Ideas
- Publication Date:
- 02-2017
- Content Type:
- Special Report
- Institution:
- LSE IDEAS
- Abstract:
- This report considers the hybrid warfare techniques of Daesh, Al Qaeda, the Taleban, and Iran, and makes specific suggestions on how the UK and other Western countries can better counter this threat. The report is sistilled from discussions with senior British officials, academics, and current practitioners in the media, strategic communications, and cyber security
- Topic:
- Security and International Affairs
- Political Geography:
- Middle East
693. Chinese Investment in Critical U.S. Technology: Risks to U.S. Security Interests
- Author:
- Council on Foreign Relations
- Publication Date:
- 10-2017
- Content Type:
- Working Paper
- Institution:
- Council on Foreign Relations
- Abstract:
- Chinese firms, both private and state-owned, have in recent years invested billions of dollars in the U.S. technology industry, raising concerns that a powerful rival has gained or could soon gain access to sensitive and, in some cases, critical technologies that underpin American military superiority and economic might. At the workshop entitled “Chinese Investment in Critical U.S. Technology: Risks to U.S. Security Interests,” held in San Francisco, on July 18, 2017, CFR convened nearly thirty current and former government officials, academics, bankers, investors, and corporate executives to explore whether the large and growing early-stage Chinese investment in critical U.S. technology poses a threat to U.S. national security, and, if so, to outline policies that mitigate the risks of unbridled Chinese investment and to bolster U.S. competitiveness.
- Topic:
- Security, Science and Technology, Foreign Direct Investment, and Cybersecurity
- Political Geography:
- United States, China, Asia, and North America
694. U.S.-ASEAN-ROK Cooperation on Nontraditional Security
- Author:
- Jaehyon Lee
- Publication Date:
- 12-2017
- Content Type:
- Working Paper
- Institution:
- Council on Foreign Relations
- Abstract:
- Traditional security issues in the Asia-Pacific, such as tensions on the Korean Peninsula or disputes over the South China Sea, consistently attract the attention of policymakers within the region and abroad. But their consequences for ordinary people are often dwarfed by the fallout from nontraditional security (NTS) events, such as climate change, resource scarcity, infectious diseases, natural disasters, irregular migration, famine, people smuggling, drug trafficking, and transnational crime. For countries in the Association of Southeast Asian Nations (ASEAN), the human and economic losses from NTS threats can be staggering. Moreover, economic and social costs from NTS threats consume resources that otherwise could be channeled toward economic growth and social welfare. Historically, there have been bilateral and multilateral attempts at cooperation on NTS in the Asia-Pacific, but they have not been enough. Trilateral cooperation among the United States, ASEAN, and South Korea would benefit not just the participating parties, but also the region as a whole. Such cooperation would allow South Korea to contribute to the region and is consistent with the Moon Jae-in government’s desire to play a greater foreign policy role beyond the Korean Peninsula. It would also advance the U.S.-South Korean alliance and give South Korea experience that could be used in future NTS crises in North Korea such as famines, natural disasters, or pandemics.
- Topic:
- Security, Climate Change, Natural Disasters, Natural Resources, and Drugs
- Political Geography:
- United States, Asia, South Korea, and Southeast Asia
695. Women and the African Peace and Security Architecture
- Author:
- Hussaina J. Abdullah
- Publication Date:
- 05-2017
- Content Type:
- Working Paper
- Institution:
- Social Science Research Council
- Abstract:
- The African Union (AU) has adopted the issues of peace and security and gender equality as part of its social transformation agenda on the continent. Specifically, the organization aims to promote peace, security, and stability on the continent; protect human and peoples’ rights in accordance with the African Charter on Human and Peoples’ Rights and other relevant human rights instruments; and promote sustainable development as well as the integration of African economies.1 The objective of this study is to provide a comprehensive overview and analysis of how women’s rights in situations of armed conflict and post-conflict contexts have been mainstreamed into various mechanisms, structures, and instruments of the AU’s African Peace and Security Architecture (APSA). As part of this exercise, this study conducts a critical examination of the links between APSA’s goal of promoting peace and security and the AU’s Gender Equality Architecture’s (GEA) goal of promoting and protecting the rights of women on the continent.
- Topic:
- Security, Gender Issues, Human Rights, Regional Cooperation, and African Union
- Political Geography:
- Africa
696. In Pursuit of Pragmatism: The Peace and Security Council of the African Union and Regional Peace Support Operations
- Author:
- Jide Martyns Okeke
- Publication Date:
- 06-2017
- Content Type:
- Working Paper
- Institution:
- Social Science Research Council
- Abstract:
- The African Union (AU) Peace and Security Council (PSC) should prioritize pragmatic realism over idealist ambition in mandating and enhancing the operational effectiveness of future peace support operations (PSOs). By pragmatism, the PSC should realistically and routinely match resources with objectives, and understand the limits of PSOs as tools for conflict management. Acting on behalf of the AU, the PSC has become an important regional actor in mandating PSOs, especially high-intensity offensive operations where the United Nations (UN) is unable or unwilling to deploy. The deployment and operation of the African Union Mission in Somalia (AMISOM) since 2007 is the most vivid example of a PSC-mandated mission that has clearly transcended the boundaries of a conventional peacekeeping mission. Various assessments of PSC-mandated missions have exposed critical challenges linked to funding gaps, difficulties in assembling and mobilizing peace intervention forces, issues relating to operational command and control, and the fact that the asymmetric nature of new security threats makes extended missions almost inevitable.1 There is urgent imperative that the conduct of protracted peace enforcement operations be based on one of two models. First, that in which the AU takes the lead with a predefined and dedicated source of flexible and predictable resourcing based on shared responsibility on the part of its member states and the international community (for example, Operation Democracy in Comoros). Alternatively, the AU could authorize a mission—without necessarily leading it—with the goal of providing legitimacy for an effective regional coalition to address the security threat at hand. Examples of this latter arrangement include the Regional Cooperation Initiative for the elimination of the Lord’s Resistance Army (RCI-LRA) and the Multinational Joint Task Force (MNJTF) against the Boko Haram insurgency in northeastern Nigeria and neighboring countries
- Topic:
- Security, Regional Cooperation, Peace, and African Union
- Political Geography:
- Africa
697. The African Union's Peace and Security Partnership with China
- Author:
- Asebe Regassa Debelo
- Publication Date:
- 07-2017
- Content Type:
- Working Paper
- Institution:
- Social Science Research Council
- Abstract:
- The China-African Union (AU) peace and security partnership can be positively harnessed in support of peacebuilding processes on the continent. This policy brief urges African policymakers to look beyond the familiar narratives of Sino- African relations as “resource diplomacy.” It notes some of the challenges facing China’s engagement with peace and security issues in Africa, and considers several options for addressing them. The brief also offers recommendations to the AU and African sub-regional organizations on how to optimize the opportunities presented by China’s engagement with Africa to consolidate sustainable peace on the continent.
- Topic:
- Security, International Cooperation, Peace, and African Union
- Political Geography:
- Africa, China, and Asia
698. Honing Cyber Attribution
- Author:
- Justin Key Canfil
- Publication Date:
- 07-2017
- Content Type:
- Journal Article
- Journal:
- Journal of International Affairs
- Institution:
- School of International and Public Affairs, Columbia University
- Abstract:
- Concerns about state-directed cyber intrusions have grown increasingly prevalent in recent years. The idea that state principals can obfuscate their involvement in such attacks by delegating operational tasks to non-state agents poses a particularly significant challenge to international enforcement and remedies. Gaps in international law, coupled with obstacles to detection in such cases, may make it more difficult to bring sponsoring states to justice. This paper offers a roadmap for assessing the propensity of states to delegate to non-state actors and correct for false positives in standard (typically more technical) cyber attack attribution methods. I conclude that the conditions under which attacks are likely to have been backed by sponsoring states occupy a much narrower window than conventional wisdom suggests, and that the universe of transgressors can be identified when standard indicators overlap with specific conditions.
- Topic:
- Security, Elections, Cybersecurity, and Election Interference
- Political Geography:
- Russia, United States, Europe, and North Am
699. Toward Practical Cyber Counter Deception
- Author:
- Christopher Porter
- Publication Date:
- 02-2017
- Content Type:
- Journal Article
- Journal:
- Journal of International Affairs
- Institution:
- School of International and Public Affairs, Columbia University
- Abstract:
- Nation-states increasingly engage in strategic deception in cyberspace, frustrating traditional counter deception approaches. This paper evaluates and critiques the philosophical underpinnings and practical implications of existing military-political counter deception and computer forensic approaches. Analysts can better detect and expose strategic deception campaigns in cyberspace by focusing on the size and organizational strength threat actors need to conduct the operations.
- Topic:
- Security, Science and Technology, Military Strategy, and Cybersecurity
- Political Geography:
- Global Focus
700. Attribution of Malicious Cyber Incidents: From Soup to Nuts
- Author:
- Herbert Lin
- Publication Date:
- 03-2017
- Content Type:
- Journal Article
- Journal:
- Journal of International Affairs
- Institution:
- School of International and Public Affairs, Columbia University
- Abstract:
- Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. A number of well-researched and executed papers cover one or more of these aspects, but integration of these aspects is usually left as an exercise for the analyst. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific perpetrator (often a human being pressing the keys) initiating that activity, and to an adversary that is deemed ultimately responsible for that activity. Which type of attribution is relevant depends on the goals of the relevant decisionmaker. Further, attribution is a multi-dimensional issue that draws on all sources of information available, including technical forensics, human intelligence, signals intelligence, history, and geopolitics, among others. From the perspective of the victim, some degree of factual uncertainty attaches to any of these types of attribution, although the last type—attribution to an ultimately responsible party—also implicates to a very large degree legal, policy, and political questions. But from the perspective of the adversary, the ability to conceal its identity from the victim with high confidence is also uncertain. It is the very existence of such risk that underpins the possibility of deterring hostile actions in cyberspace.
- Topic:
- Security, Intelligence, Science and Technology, and Cybersecurity
- Political Geography:
- Global Focus