Number of results to display per page
Search Results
142. On Cyberwarfare
- Author:
- Fred Schreier
- Publication Date:
- 01-2015
- Content Type:
- Working Paper
- Institution:
- Geneva Centre for Security Sector Governance (DCAF)
- Abstract:
- The digital world has brought about a new type of clear and present danger: cyberwar. Since information technology and the internet have developed to such an extent that they have become a major element of national power, cyberwar has become the drumbeat of the day as nation-states are arming themselves for the cyber battlespace. Many states are not only conducting cyber espionage, cyber reconnaissance and probing missions; they are creating offensive cyberwar capabilities, developing national strategies, and engaging in cyber attacks with alarming frequency. Increasingly, there are reports of cyber attacks and network infiltrations that can be linked to nation-states and political goals. What is blatantly apparent is that more financial and intellectual capital is being spent figuring out how to conduct cyberwarfare than for endeavors aiming at how to prevent it.1In fact, there is a stunning lack of international dialogue and activity with respect to the containment of cyberwar. This is unfortunate, because the cyber domain is an area in which technological innovation and operational art have far outstripped policy and strategy, and because in principle, cyberwarfare is a phenomenon which in the end must be politically constrained.
- Topic:
- Intelligence, Science and Technology, International Security, and Communications
- Political Geography:
- Geneva
143. International Coherence in Security Sector Reform
- Author:
- Alan Bryden
- Publication Date:
- 01-2015
- Content Type:
- Working Paper
- Institution:
- Geneva Centre for Security Sector Governance (DCAF)
- Abstract:
- Calls for greater coherence in the international community's support for security sector reform (SSR) have become commonplace. This reflects frustration at the stovepiped contributions that frequently seem to characterise international SSR engagement. Perhaps more damaging, incoherent approaches may only be the visible symptom of a more profound problem – the inability or unwillingness of the international community to engage collectively with complex political dynamics when designing and implementing SSR programmes. The nexus between difficult SSR politics and incoherent SSR support has multiple dimensions. On the one hand, an SSR process may challenge (or reinforce) inequities in power relations that exclude certain groups and interests. Competing interests therefore provide a sub-text to any reform process. On the other hand, SSR assistance from external actors is itself highly political (and is certainly viewed as such by 'recipients'). This tension is reflected in harmful accusations that SSR represents a Trojan horse for the imposition of foreign values and influence. By failing to acknowledge these political sensitivities in SSR policies and programmes, external interventions can at best have a marginal impact on national security dynamics. This Horizon Paper therefore attempts to provide additional clarity to the concept of coherence and its utility in supporting more effective SSR.
- Topic:
- Conflict Prevention, Security, Intelligence, Peacekeeping, and Reform
144. Armed Non-State Actors: Current Trends Future Challenges
- Publication Date:
- 01-2015
- Content Type:
- Working Paper
- Institution:
- Geneva Centre for Security Sector Governance (DCAF)
- Abstract:
- Most of today's armed conflicts take place within states and are waged by at least one NSA fighting state forces and/or other NSAs. In these conflicts, frequent violations of humanitarian norms are committed by both state and non-state parties. NSAs also frequently control or heavily influence areas where civilians live. Consequently, efforts to protect civilian populations should address not only the behaviour of states, but also that of NSA.
- Topic:
- Security, Intelligence, Armed Struggle, and Non State Actors
- Political Geography:
- Geneva
145. Cyber Security: The Road Ahead
- Author:
- Theodor H. Winkler, Fred Schreier, and Barbara Weekes
- Publication Date:
- 01-2015
- Content Type:
- Working Paper
- Institution:
- Geneva Centre for Security Sector Governance (DCAF)
- Abstract:
- The open Internet has been a boon for humanity. It has not only allowed scientists, companies and entities of all sorts to become more effective and efficient. It has also enabled an unprecedented exchange of ideas, information, and culture amongst previously unconnected individuals and groups. It has completely revolutionized on a global scale how we do business, interact and communicate.
- Topic:
- Security, Intelligence, Science and Technology, and Communications
- Political Geography:
- Geneva
146. Public Private Cooperation: Challenges and Opportunities in Security Governance
- Author:
- Theodor H. Winkler and Benjamin S. Buckland
- Publication Date:
- 01-2015
- Content Type:
- Working Paper
- Institution:
- Geneva Centre for Security Sector Governance (DCAF)
- Abstract:
- When faced with both traditional and non-traditional security challenges, states, acting alone, are poorly-equipped. Ad hoc security governance networks have increasingly been the response. Such networks involve cooperation between governments, the private sector, non-governmental and international organisations and enable actors to take advantage of geographical, technological, and knowledge resources they would be unable to muster alone. However, there are many as yet unanswered questions about the oversight and accountability of new governance networks, as well as about ways in which, on the positive side, they can better contribute to improved security. This paper looks at both the challenges and some potential solutions to the democratic governance challenges posed by public private cooperation in the security domain.
- Topic:
- Intelligence, Science and Technology, International Security, Communications, and Governance
- Political Geography:
- Geneva
147. Democratic Governance Challenges of Cyber Security
- Author:
- Theodor H. Winkler, Fred Schreier, and Benjamin S. Buckland
- Publication Date:
- 01-2015
- Content Type:
- Working Paper
- Institution:
- Geneva Centre for Security Sector Governance (DCAF)
- Abstract:
- Cyber security encompasses borderless challenges, while responses remain overwhelmingly national in scope and even these are insufficient. There are enormous gaps in both our understanding of the issue, as well as in the technical and governance capabilities required to confront it. Furthermore, democratic governance concerns – particularly regarding control, oversight and transparency – have been almost entirely absent from the debate. These concerns are exacerbated by the enormous role played by private actors (both alone and in cooperation with governments) in online security of all types. Given the pace at which states and private companies are reinforcing online security and preparing for cyber war, addressing democratic governance concerns has never been more pressing. They are the primary subject of this paper.
- Topic:
- Security, Intelligence, Science and Technology, and Governance
- Political Geography:
- Geneva
148. Full Issue: Emerging Domains of Security
- Author:
- Meg Guliford, Thomas McCarthy, Alison Russell, Michael M. Tsai, Po-Chang Huang, Feng-tai Hwang, Ian Easton, Matthew Testerman, Nikolas Ott, Anthony Gilgis, Todd Diamond, Michael Wackenreuter, Sebastian Bruns, Andrew Mark Spencer, Wendy A. Wayman, and Charles Cleveland
- Publication Date:
- 09-2015
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- The theme of this special edition is “Emerging Domains of Security.” Coupled with previously unpublished work developed under a prior “Winning Without War” theme, the articles therein honor Professor Martel’s diverse, yet forward-leaning, research interests. This edition maintains the journal’s four traditional sections of policy, history, interviews, and current affairs. Our authors include established academics and practitioners as well as two Fletcher students, Nikolas Ott and Michael Wackenreuter. Each of the articles analyzes critical issues in the study and practice of international security, and our authors make salient arguments about an array of security-related issues. The articles are borne out of countless hours of work by FSR’s dedicated editorial staff. I deeply appreciate the time and effort they devoted to the publication of this volume. They are full-time graduate students who masterfully balanced a host of responsibilities.
- Topic:
- Security, Defense Policy, Intelligence, International Cooperation, International Law, History, Military Affairs, Counter-terrorism, Cybersecurity, Navy, Conflict, Space, Interview, Army, Baath Party, and Norms
- Political Geography:
- China, Iraq, Europe, Middle East, Taiwan, Germany, Asia-Pacific, Global Focus, and United States of America
149. From Reporting to Reform: Eleven Opportunities for Increasing EITI Impacts
- Author:
- Max George-Wagner and Erica Westenberg
- Publication Date:
- 06-2015
- Content Type:
- Policy Brief
- Institution:
- Natural Resource Governance Institute
- Abstract:
- Under the EITI Standard, implementing countries are required to produce far more comprehensive reports than before; these go beyond revenue payments to include disclosures across the entire extractive industries decision chain. However, the objective of the Standard is not merely to generate more data, but rather that stakeholders will use the information to impact the governance of the sector. This EITI briefing note explores how countries are faring at meeting the EITI’s more ambitious requirements and what implementing countries can do to begin moving “from reporting to reform.” This briefing note is based on a review of the first 22 reports produced under the Standard; the review assesses both the quality of reporting, as well as the content. We found that in many respects countries have risen to the challenge and become more ambitious and comprehensive in their reporting. This has included highlighting critical deficiencies in license allocation processes, revealing politically affiliated owners of companies, and identifying significant local revenues that were never disbursed. However, a number of significant gaps remain and these are holding countries back from seeing meaningful impacts from their EITI processes. For instance, these reports have missed opportunities to inform major tax code revisions, ignored hotly debated issues of sector employment, and left stakeholders in the dark about individual extractive projects.
- Topic:
- Economics, Industrial Policy, Intelligence, Natural Resources, and Governance
- Political Geography:
- Global Focus
150. Foreign Fighters
- Author:
- The Soufan Group
- Publication Date:
- 01-2015
- Content Type:
- Special Report
- Institution:
- The Soufan Group
- Abstract:
- In June 2014, The Soufan Group (TSG) released its initial Foreign Fighters in Syria report, which identified approximately 12,000 foreign fighters from 81 countries. Nearly eighteen months later, despite sustained international effort to contain the Islamic State and stem the flow of militants traveling to Syria, the number of foreign fighters has more than doubled. Based on its own investigation, TSG has calculated that between 27,000 and 31,000 people have traveled to Syria and Iraq to join the Islamic State and other violent Salafist groups from at least 86 countries. This increase is evidence that efforts to contain the flow of foreign recruits to the Islamic State and other extremist groups in Syria have had limited impact
- Topic:
- Intelligence and International Affairs
- Political Geography:
- Global Focus