International Security
International Security
International
Security
Editor
Authors
CHAPTER 7
Assoc.Prof.Dr. Burak Şakir ŞEKER
Assessment Editor
Lecturer Günnur Tuba Türksavaş
Graphic Designers
Ayşegül Dibek
Gülşah Karabulut
Özlem Çayırlı
INTERNATIONAL SECURITY
E-ISBN
978-975-06-3553-3
3292-0-0-0-1902-V01
Contents
An Introduction Major IR
CHAPTER 1 to Security CHAPTER 2 Theories and
Studies Security
Introduction.................................................... 3 Introduction.................................................... 35
International Security and Security Studies Traditional IR Approaches to Security.......... 35
In The 21St Century.......................................... 3 Realism and Security ............................ 35
The Concept of International Security......... 7 Liberalism and Security......................... 40
Peace Studies and Conflict Resolution......... 12 Critical Security Studies................................. 43
From Traditional Security Studies to
Conflict Analysis and Conflict
Critical Security Studies ........................ 44
Mapping.................................................. 14
The Welsh School (The Aberystwyth
Peace and Conflict Theories.................. 17
School) in Critical Security Studies....... 45
Conflict Intervention............................. 18 The Copenhagen School in Critical
Current and Future Global Threats and Security Studies...................................... 48
Challenges....................................................... 20 The Paris School of Critical Security
Studies..................................................... 50
International Security From a Critical
Perspective...................................................... 51
Marxism and Neo-Marxism ................. 51
Critical Theory........................................ 52
Postsmodernism and Security....................... 53
Social Constructivism and Security............... 54
iii
Legitimate
Use of Force in
CHAPTER 3 International CHAPTER 4 Intervention
Relations
Introduction .................................................. 65 Introduction.................................................... 97
The Un Charter and the Legitimate use of The Concept of Intervention......................... 97
Force .............................................................. 66 Intervention and State Sovereignty............. 100
Article 2/4 of the UN Charter .............. 67 Legality of Intervention within the
Article 2/6 of the UN Charter .............. 67 Sovereignty Concept.............................. 100
Article 2/7 of the UN Charter ............... 67 The Blurring Lines of Sovereignty........ 102
Article 51 of the UN Charter:
States and Intervention: New Forms of
The Right of Self-Defense .................... 68
Intervention.................................................... 104
Article 53 of the UN Charter ................ 70
Security and Self-determination
Chapter VII of the Un Charter and the
Legitimate use of Force ............................... 71 with Relation to Intervention............... 105
The Un Peacekeeping Forces ........................ 71 Humanitarian Intervention from
Use of Force and Legitimacy the Perspective of Responsibility to
Beyond the Un Charter Paradigm ................ 74 Protect.................................................... 106
Humanitarian Intervention ................. 74 International Organizations and
Interventions Based on a Treaty ......... 77 Intervention: Peacekeeping and
Protection of State Citizens Abroad .... 79 Peacebuilding Missions.................................. 107
Use of Force against International The Spectrum of Peace Activities......... 107
Terrorism ............................................... 80
iv
Alliances and
CHAPTER 5 Military-Security CHAPTER 6 Terrorism
Cooperation
Introduction.................................................... 129 Introduction.................................................... 159
The Definition, Characteristics, Functions, Defining Terrorism and Giving a Typology.. 159
and Typologıes of Alliances........................... 129
Defining Terrorism ................................ 161
Defining the Concept of Alliance.......... 130
Giving a Typology of Terrorism............ 162
Basic Characteristics of Alliances.......... 131
Reasons of Terrorism .................................... 164
A Typology of Alliances ........................ 131
Main Functions of Alliances.................. 133 The Roots of Terrorism.......................... 164
Theories of Alliances and Security The Changing Facets of Terrorism....... 166
Cooperation.................................................... 134 Terrorism as a New Means of war in the
Balance of Power and Alliances ........... 134 21st Century...................................................... 167
Balance of Threat and Alliances........... 134 Proxy Wars............................................. 167
Balance of Interests............................... 135 International Terrorism: The
Historical Background and Examples........... 135 Globalization of Terror.......................... 167
THE North Atlantic Treaty Organization Cyber Terrorism: A New Form of
(NATO)............................................................ 136 Terrorism......................................................... 168
Founding the Alliance........................... 137 Defining Cyber Terrorism...................... 168
The Rivalry between the Two
Some Facts and Possible Scenarios
Alliances and the Dissolution of the
about Cyber Terrorism ......................... 169
Warsaw Pact........................................... 138
Potential Solutions to Cyber
NATO’s Transformation in the
Post-Cold War Era.................................. 138 Terrorism................................................ 170
A New Approach to Peacekeeping....... 139 Countering Terrorism..................................... 171
NATO Member Countries..................... 140 Economic and Social Solutions............. 171
Partners and Partnership Initiatives..... 140 The Role of the Military........................ 172
Turkey -NATO Relations....................... 140 International Cooperation against
The Nato Principles and the Main Terrorism................................................ 173
Organizational Structure............................... 142 The Struggle Against Financing
Political and Military Objectives of Terrorism................................................ 174
NATO...................................................... 142
Collective Defense................................. 142
Decisions and Consultations................. 142
The Organizational Structure of
NATO...................................................... 142
The Military Organizational
Structure of NATO................................. 144
NATO Immediate Response Capability.. 144
NATO Crisis Management Capability.. 144
Nato’s Tasks and Operations......................... 145
NATO’s Current Strategic Concept ...... 145
Core Tasks According to the Strategic
Concept................................................... 145
NATO Operations and Missions .......... 146
NATO’s Role in Conventional Arms
Control.................................................... 146
NATO Policy on Combating
Trafficking in Human Beings................ 146
NATO’s Role in Energy Security........... 147
v
Non-Military
CHAPTER 7 Energy Security CHAPTER 8
Security
vi
Preface
Dear Students,
International security is one of the major
new developments in world politics. Chapter
subjects of the study of International Relations-
3 later turns to the use of force beyond the
for the obvious reasons. As we cannot imagine
UN Charter paradigm and reviews issues
a society without some form of order and
such as peacekeeping and peacemaking, and
security, we cannot come to understand the
it specifically discusses the new forms of the
workings of international politics without
use of force such as the intervention based
assuming that there exist, to some extent at
on a treaty clause and the protection of the
least, order and stability as well as security
nationals (citizens) living abroad. Chapter 4
in the international system. Therefore, this
takes up the discussion and makes a further
textbook aims to make an introduction to
assessment of the UN peacekeeping mission
not only the academic study of international
and debates the issues surrounding the
security but also to the current and future
concept of humanitarian intervention.
threats to the international system.
Chapter 5 is on the role of alliances in the
The first chapter opens a general discussion on
management of power relations and the
international security and security studies. It
use of force in the system. It discusses some
defines international security and reflects on
major issues in alliance formation and traces
Peace Studies as well as Conflict Resolution
the historical development as well as the
as autonomous areas of research in today’s
organizational structure of the North Atlantic
International Relations. Chapter 2 is specifically
Treaty Organization (NATO). Chapter 6
about the theories of international security.
deals with one of the most critical issues in
The first section of this chapter reviews the
international security- terrorism. It tackles the
premises of the major IR theories on security
question of how to define terrorism and moves
such as Realism, Idealism/Liberalism, and
on to analyze the new forms of terrorism such
Constructivism. The second section is rather
as cyber terrorism. The Chapter also suggests
about the critical approaches to security and the
some means (tools) in an attempt to defeat
critical security studies with an emphasis on the
international terrorism.
Copenhagen School, the Welsh School, and the
Paris School. This chapter, through an analysis Chapter 7 and Chapter 8 are relatively on the
of the theoretical schools, makes it clear that new forms of security as well as the “non-
the security understanding and security threats military” security issues. Chapter 7 defines the
in the 21st century have considerably changed concept of energy security and reviews the main
and transformed so as to take into account new international institutions that help manage
developments and new threats in world politics. inter-state relations in the field of energy.
Chapter 8 goes into further detail on the non-
Chapter 3 and Chapter 4 are about the use of
military security issues and introduces the reader
force and interventions within and beyond
to such issues as human security, environmental
“the UN Charter paradigm.” These two
security, economic security, and natural
chapters also clarify the role of international
resources security, including food security.
institutions in managing the use of force
and power relations between states. Chapter It is my hope that this textbook will be helpful
3 reviews the Charter paradigm on the to you in better understanding of how the
legitimate use of force through a close analysis security threats affect not only international
of the UN Charter, especially critical Articles relations but also our daily lives. Therefore, it
of the Charter such as Article 2/4, Article 41, is also my hope that you draw firm conclusions
Article 42, and Article 51. It demonstrates about what we can and should do to create
that many issues in the Charter are open a relatively more secure and orderly world in
to debate and interpretation. Probably the the 21st century.
fathers of the UN designed the Charter so as Editor
to leave room for interpretation in the face of Prof.Dr. Nejat DOĞAN
vii
An Introduction to
Chapter 1 Security Studies
After completing this chapter, you will be able to:
Learning Outcomes
2
1
International Security
3
1
An Introduction to Security Studies
4
1
International Security
The nation-states are generally described as power and Iraq has raised concern about the sole state
maximizers and bear exclusive responsibility for control over the use of violence. PMSCs have
safeguarding its own survival and independence. As introduced the concept of corporate soldiers and
a result, states must protect and possibly enhance the security privatization in international politics.
their capacity for self-help. They have penetrated everyday life and private
Globalization has had important consequences security personnel have outnumbered their public
for national security. The traditionalist ISS scholars counterparts. For example, the world’s largest PSC
challenge that contemporary globalization is a Group4Securicor (G4S) is operating in over 110
relatively new novelty and the nation-states are countries with 580.000 personnel with its largest
still a primary actor. The critical ISS scholars employer being the London Stock Exchange. Private
believe in the new borderless world and the security has unforeseen impacts on international
global village phenomenon. First, globalization security. First, they present challenges in the
changes the nature and key principle of the Cold structures of authority, legitimacy, international
War international security. The regional and sub- law, and global governance. Secondly, they erode
regional international organizations have played the power of the state and threaten state authority
more active roles in international security with inside and contemporary structures of governance.
globalization. There is a significant partnership Thirdly, they lead to the emergence of “global
between the Security Council and regional security assemblages: public and private as well as
institutions such as the Organization of American local and global new security structures. Lastly, the
States (OAS), the African Union (AU), the Arab geographical boundaries of the nation-state became
League, the European Union (EU), the Economic less important. Private security practices in different
Community of West African States (ECOWAS), parts of the world produce complex relations and
the Organization for Security and Cooperation in different tensions on private-public and global-local
Europe (OSCE), and the North Atlantic Treaty relations (Abrahamsen and Williams, 2011: 1-3).
Organization (NATO). It is necessary to cooperate Buzan distinguished five models of security due
well with the United Nations, G7, and other to newly emerging diversity of perceived threats:
regional security institutions to address many 1. Military security concerns itself with the
regional conflicts. two-level interplay of the armed offensive
More recently, informal security institutions and defensive capabilities of states and
have emerged when a security problem arises that state’s perceptions of each other’s intentions,
cannot be dealt with efficiently and effectively by 2. Political security focuses on the
existing international security organizations. For organizational stability of states, systems of
example, because of the failed state of Somalia, a government, and ideologies that give them
large international flotilla was established to fight legitimacy,
the modern maritime piracy. Different international 3. Economic security emphasizes on
institutions and independent nation states have prioritazing access to resources, finance,
participated this “a coalition of willing” without and markets necessary to sustain acceptable
a single headquarter, budget, and other attributes levels of welfare and state power,
associated with more formal organizations (Weitz, 4. Societal security concerns itself with
2011: 2). the ability of societies to reproduce their
Also, the past two decades have seen the rapid traditional patterns of language, culture,
proliferation of private military and security association, religious and national identities
companies (PMSCs) in armed conflicts around and customs within acceptable conditions
the world. PMSCs expand contemporary security for evolution,
agenda into the discussion about globalization, neo- 5. Environmental security deals with
liberalism, risk, commoditization, and moralization. the maintenance of local and planetary
PMSCs have this image: Some burly men are in biosphere as well as space in order to ensure
combat gears with automatic weapons and wrap- continued existence of all human beings
around sunglasses. The extensive outsourcing of (Buzan, 1999: 433).
military and security activities in both Afghanistan
5
1
An Introduction to Security Studies
6
1
International Security
7
1
An Introduction to Security Studies
states. The Amphictyonic League was established by 2. All threats and challenges to peace must
the Greek-city states in order to maintain internal have a common attention from everyone. If
security by the commitment of the collective group an aggressor is not stopped, the conflict will
of small city-states. The Amphictyonic League was have spill-over effects to spread to regional
much more than an alliance. The members of the and international system. As a result, an
League accepted following obligations: “not to attack on any one state must be regarded as
destroy any city of the Amphictyons, nor cut off an attack on all states.
their streams, in war and peace, and if any should 3. If international peace and stability is
do so, they would march against him, and destroy threatened, international community via
his cities, and should any pillage the property of the CSO act timely with appropriate acts
the god, or be privy to or plan anything against including public condemnation, economic
what was in his temple at Delphi, they would take boycott, sanctions, and the use of force.
vengeance against him with hand and foot, and all 4. Members of the CSO should commit to
their might” (Downs, 1994a: 2). use peaceful means to solve international
Since the times of the Greek city-state, there have conflicts. The CSO must provide necessary
been many proposals for collective security systems conflict resolution mechanisms including
and dozens of attempts to implement the idea of judicial organ, arbitration, mediation, and
perpetual peace with the Union of States. During third-party intervention (Kegley, 2009: 527).
and after World War I, the founders of the League of It is well known by now that collective security
Nations have supported a project for the collective differs from human security. The first difference
enforcement of peace. The League of Nations was between collective security and human security
created in 1919 to institutionalize the ideas of peace is that collective security gives more importance
and stability based on the collective security system. to states rather than the well-being and needs of
After the establishment of the United Nations, the individuals. The focus of human security is the
founders give some teeth to the new organization”: protection of individuals. Secondly, collective
preposition is missing new organization. The Charter security mostly explains the international security
gave authority to the Security Council to make with realist assumptions, the doctrine of national
recommendations, or decide what measures shall security and interest, and external threats. The
be taken in accordance with Article 41 and 42 to interests of the people are equated with the
maintain or restore international peace and security protection of the state’s boundaries, values,
“in case of any threat to the peace, breach of peace, citizens, institutions, from external and internal
or act of aggression.” One of the most important aggression and threats. Thirdly, collective security
realist scholars Hans Morgenthau believed that paradigm believes that states are unchanging and
“the organizing principle of collective security is fundamental actors and have an undisputable
the respect for the moral and legal obligation to power over its people and other states to use force
consider an attack by any nation upon any member and the threat of use of force. Furthermore, the
of the alliances as an attitude upon all members of concept of national security plays a central role
the “alliance”. Full stop is necessary. He explained in collective security. New global threats such as
He explained alliance “as universal alliance against economic, health, food, personal, environmental,
potential aggression” “was universal alliance against community and political security that are included
potential aggression” (Morgenthau, 2005:142). in human security are placed in a secondary
position. In addition, the United Nations system
Collective security is rested on Alexandre Dumas’
has become less collective security and more
d’Artagnan and his fellow Musketeers motto: “One
human security system. Lastly, collective security
for all, and all for one!” The Musketeers motto has
rests on self-help and mutual help. Human security
following rules in collective security:
is based on other-help (Peou, 2009: 3-4).
1. All actors in international system should
Human security can be defined with narrow and
become a member in a collective security
broad senses. In a narrow sense, human security is
organization (CSO). If all actors join
conceptualized negatively in terms of the absence of
a single unifying alliance, they acquire
threats to the physical security or safety of individuals.
enough power to keep international peace
The broad definition emphasizes positive aspects and
and assume international legitimacy.
vital core of all human lives including fundamental
8
1
International Security
human rights, survival of livelihood, and fulfillment Jones and Miller, 1995: xix). Thirdly, collective
of human dignity and freedoms (Shani, 2011: 56). security systems diminish the possibility of war
It is unlikely for many poor people in the world’s less because they help in identification of aggressor
developed countries (LDCs) to be killed by hard or states, provide effective balancing against aggressors,
real threats such as dying would be better in attacks reduce the uncertainties of coalition formation, and
by terrorists or with weapons of mass destructions deter aggression by encouraging states to maintain
than soft threats such as lack of safe drinking water, relatively low levels of military and enhancing
hunger, lack of sanitation, and endemic diseases. For transparency (Downs, 1994b: 45).
example, the 2005 Human Development Report Collective security has been criticized from
presented some astonishing and gloomy pictures. different perspectives. First, nuclear weapons and
Despite India’s economic success, its child mortality mutually assured destruction (MAD) weaken the
rates were much higher than its poorer neighbor deterrent effect because they make it impossible
Bangladesh. In India, 732,000 more children have to use predominant force against a nuclear-capable
died in 2005 than in Bangladesh. Girls who aged aggressor. Secondly, collective security organizations
1-5 were 50 percent more likely to die than boys. (the League of Nations and the United Nations)
This means “130,000 girls were discriminated to have failed to prevent aggression in the 1930s and
death every year in India” (UNDP, 2005: 31). the postwar era. Thirdly, collective security is hard
to implement in an anarchical world of sovereign
nation-states because collective security forces
state to equate national security with international
security. It is almost impossible to convince states
to believe that an attack on anyone is an attack on
all. Furthermore, when states are attacked, they
are forced to give up their sovereign right to use
of force because they should ask collective security
organization. In addition, it is highly unlikely that
in a collective security system, states may not punish
friends as well as enemies and powerful countries as
well as weak ones. Lastly, collective security makes
the states believe that only in two conditions, use
of force is a legitimate form of aggression. The first
condition is that collective security organization
authorizes the use of force. Second condition is
Figure 1.3 Nonviolence and leadership: Mustafa self-defense, which is a legitimate use of force.
Abdülcemil Kırımoğlu In conclusion, it is exactly the peace that creates
Source: http://enacademic.com/dic.nsf/enwiki/1900981 collective security, not that collective security leads
to peace. Common great power interests cause
collective security that diminishes the chance of
International institutions especially the United war. But world politics is intrinsically based on
Nations can significantly reduce the risks of war. As rivalry and power maximization that cause conflicts
labeled “anti-realist” perspective for international among great powers (Frederking, 2007: 27-28).
security, critical theorists present another point
of view. Their first argument is that international
institutions prevent cheating and free-rider The nuclear weapon states are the Treaty
problems and provide information while promoting on the Non-Proliferation of Nuclear
cooperation. They can promote global peace. Weapons (NPT)-designated nuclear weapon
Their second argument is that even in an anarchic states (China, France, Russia, United
international system, in order to eliminate war, Kingdom, and United States) and other
new norms, rules, principles, ideas, and decision- states with nuclear weapons (India, North
making procedures (international regimes) should
Korea, and Pakistan) (Krieger, 2017: 112).
be created, implemented and evaluated (Lynn-
9
1
An Introduction to Security Studies
It is possible to explain, analyze and understand Human security, in the narrow sense, is defined
the international security in six levels: as “freedom from fear and freedom from want”
• Individual level: Security for the individual. (UNDP, 1994, p. 24). It includes two aspects:
• Societal level: Security for the social group, 1- safety from direct threat, and the guarantee
i.e. ethnic, national, religious, linguistic, or of their physical integrity, and 2- the satisfaction
community groups. of basic human needs. In a broad sense, human
• National level: Security for the state or security is defined as:
nation.
• Regional level: Security for the region, that “Protecting the vital core of all human lives in
is, a coherent security region. ways that enhance human freedoms and human
• International level: Security for the fulfillment. Human security means protecting
international society, the society of nations, fundamental freedoms – freedoms that are the
and most states in the world. essence of life. It means protecting people from
• Global level: Security for the planet Earth critical (severe) and pervasive (widespread) threats
and space (Heurlin and Kristensen, 2010: and situations. It means using processes that
69). build on people’s strengths and aspirations. It
means creating political, social, environmental,
economic, military, and cultural systems that
Regional Security in the Middle East together give people the building blocks of
survival, livelihood, and dignity” (Commission on
Since the beginning of the twentieth century,
Human Security, 2003: 4).
the Middle East has been remembered as hotbed
of conflicts, violence and security threats. The
Israel/Arab-Palestine conflict, the US-led war on Human security is an interdisciplinary concept
Iraq, and the Syrian conflict have demonstrated that brings ‘human elements’ of security, rights,
regional insecurities in the region. The Middle and development with five main features. First,
East security has usually been shaped by the human security is based on universal principles,
great power security interests during the bipolar trans-cultural and trans-systemic values, and
international system: The uninterrupted flow of global applicability. Secondly, the components of
oil at stable prices, the end of the Arab-Palestine/ human security are interdependent. It is suitable
Israel conflict, the prevention of any regional for the maximalist or holistic approaches of
hegemon, and the maintenance of ‘friendly international security. Thirdly, it addresses the
regimes’. During the Cold War, the West made root causes of insecurities and risks in security
alliances with Iraq, Iran, Saudi Arabia, Israel areas. The focus is on prevention that is multi-level,
and Turkey including them in two security reproductive and participatory. Furthermore,
umbrella organizations: The Middle East it is people-centered that the individual is placed
Defense Organization (1951) and the Baghdad at the center of the analysis. Lastly, it is multi-
Pact (1955). In the post-Cold War era, the
sectoral and comprehensive to broaden the concept
Middle East regional security has been defined
of security by including economic, food, health,
within four alternative representations: The
(New) Middle East, the Arab Regional System, environmental, personal, community, and
the Euro-Med Region, and the Muslim Middle political security (Persaud, 2016: 142).
East. Even though the Middle East during the
Cold War has been analyzed with the top-down
and military-focused character of the regional
security approach, in post-Cold War era, the
focus has moved towards more multi-level and
multi-dimensional approach to security such
as democratization, globalization, democratic
peace, multilateralism, technological change,
and economic transformation (Bilgin, 2005: 1).
10
1
International Security
11
1
An Introduction to Security Studies
12
1
International Security
“The strong do what they can and the weak suffer Instead of defining conflict, sometimes it is better
what they must” (Thucydides, 2018: 311). The end to list its features. First, conflict is normal, inevitable
of the Cold War has revived the effective handling and everywhere. Human beings inherently live in
of conflict and the resolution of self-stimulating the conflict-laden world since the beginning of time
and self-perpetuating violent conflicts with multi- itself. Secondly, a conflict exists at the center of all
disciplinary analysis. Conflict occurs in different human societies and is occasionally useful. Thirdly,
contexts, namely interpersonal, intergroup, it is almost impossible to eliminate the conflict in its
organizational, international and global levels. entirety but it is possible to manage the violent side
The conflict also escalates, de-escalates and of the conflict. Lastly, in some specific instances,
escalates again in a cyclical manner. Conflict can threat and coercion can be applicable to de-escalate
be influenced by attitudes, situations, behaviors, the conflict (Bercovitch, et al.: 3-4).
goals, values, and beliefs. In order to cope with International conflict and international dispute
the incompatible goals, objectives, images, and are usually used interchangeably in international
emotions, the conflicting parties may use five security studies. However, they are terminologically
main conflict styles: Avoidance, Accommodation, different. International conflict occurs when
Competition, Compromise, and Collaboration. basic human needs such as identity, security or
Peace can be defined in two ways. Negative recognition are not satisfied and incompatible
peace focuses on reducing, eliminating, and ending aspirations of power exist in international and
all physical violence as well as war. It is the absence intergroup relations. The international dispute
of direct violence. Positive peace means negative is originated from incompatible territorial and
peace plus the absence of structural and cultural economic interests and incompatible values or
violence. Violence is traditionally understood ideologies (Fisher, 1990). For example, a statement
as the infliction of bodily harm with the intent “Turkey and Greece had a conflict over the status
to hurt. Direct violence involves intentionally of Cyprus” means that two governments have
hurting or killing people and directed against opposed human needs and incompatible power
a specific group or person. It also incorporates relations that is hard to reconcile with. The Cyprus
verbal violence. (Galtung and Fischer, 2013: conflict, deep-rooted and protracted interstate
12). Structural violence occurs when people and inter-group conflict is caused by the denial of
can be killed, psychologically harmed, deprived intrinsic human needs.
or maldeveloped because of violent political or The basic human need approach differentiates
socioeconomic structures (Galtung, 1969). the symptoms and causes of conflict. Hostage
Cultural violence is the use of nationalism, taking, terrorism, gang warfare, public protest
racism, sexism, Islamophobia, xenophobia, and movements, and illegal strikes are symptoms. The
other forms of discrimination in the media, the causes of conflict cannot be seen in public eyes
arts, education, literature, films, street names, because they are under the iceberg. The international
monuments, celebrating special national days dispute on the other hand, is a situation where
and heroes, etc. to intellectually justify direct and the parties perceive incompatible interests and
structural violence (Galtung, 1990). The producer values/ideologies. The conflict behavior in which
of Third World insecurity is structural violence. conflicting parties use resources for damaging each
Examples of negative peace are as follows: Absence of other, does not occur in international disputes.
wife battering, rape, child abuse, dowry deaths, street For example, a disagreement between Britain
killings, and war. Positive peace can be exemplified and Spain over the sovereignty of Gibraltar is an
as the absence of inequalities and repression in international dispute rather than an international
microstructures leading to unequal life chances and conflict (Nicholson, 1992: 13). It is important to
less freedom of choice and fulfillment. In addition, emphasize that most international disputes may
it is the absence of economic structures in a country transform into international conflicts such as the
or between countries that causes the reduced life Iraq-Kuwait dispute, the Beagle Channel dispute,
chances of some people and the effects of damage the Vietnam-Cambodia dispute, the Tanzania-
on nature by pollution, radiation, etc. as well as the Uganda dispute, and the Yugoslavia dispute.
absence of repression in a country of free speech, the
right to organize, etc. (Broch-Utne, 1997: 150-160).
13
1
An Introduction to Security Studies
“Africans are captured, forced across the Atlantic multi-level conflict causes and conditions and
to work as slaves; millions are killed in the process designs necessary conflict intervention strategies,
– in Africa, on board, in the Americas. The perspectives, and processes. It is an exercise of
massive direct violence over centuries seeps down drawing your own map, your own perceptions, and
and sediments as massive structural violence, with reading of a particular conflict with a playful way
whites as master top-dogs and blacks as the slave to organize theories and data via “mind mapping”
underdogs, producing and reproducing massive (Demmers, 2017: 15). Conflict mapping should
cultural violence with racist ideas everywhere. include conflict parties, conflict issues, conflict
After some time, direct violence is forgotten, sources, dynamics, means, conflict orientations
slavery is forgotten, and only two labels show up, and conflict environment (Sandole, 1999).
pale enough college textbooks: ‘discrimination’ The basic conflict mapping includes conflict
for massive structural violence and ‘prejudice’ for parties, conflict issues, conflict relations, and
massive cultural violence. Sanitation of language: so on. The systemic conflict mapping aims to
itself cultural violence” (Galtung, 1996: 200). analyze the complex, deep-rooted and protracted
conflicts not only for academic purpose but
also for conflict resolution practitioners, aid
and development workers, and politicians. It is
usually a huge challenge to explain, analyze and
understand the systemic complex conflicts. It
requires the application of conflict resolution
theories with multi-level, multi-modal, and inter-
disciplinary approaches. In addition, it necessitates
conflict intervention with the emphasis on design,
implementation, prevention, and evaluation.
Conflict mapping assesses the scope of the
conflict, goals of the conflicting parties, types of
their relationship, and the contentious issues. The
Figure 1.4 TRT International April 23 Children’s Festival
first step of conflict mapping is the identification
Source: http://www.trt23nisan.com/en/ of conflicting parties. This helps us to understand
their positions, interests, and capacities as well as
Conflict Analysis and Conflict the level of external support. Secondly, the conflict
Mapping dynamics must be examined in order to overview
short-term and long-term relationships between
Conflict analysis is a tool of the complex
parties and their social context. It also presents
dynamics of interactive processes to explain and /
a timeline of how the conflicting parties see the
or understand (Hollis, 1994) why and how people
significance of each event, especially in a long-
use violence. As a research method, it sheds light
running conflict. Thirdly, the conflict processes are
on linking ideas (theory) and evidence (data) by
investigated to determine the origins of contention
breaking conflict into its basic structural parts and
with relations to security, political, economic, and
different key dynamic elements and by presenting
social issues (Sandole, 2006).
the whole conflict in drone-like snapshot view. The
most used conflict analysis tool is conflict mapping. It also links between micro-level activities and
macro-level forces that help us to uncover the
By mapping of a conflict, a person can present
internal and external factors behind prolonging
a road-map or a visual flip chart/blackboard
the conflict. The conflict mapping aims to obtain
for conflict analysts, practitioners and policy-
fundamental knowledge for constructive, win-win,
makers. Conflict mapping gives a comprehensive
positive-sum, and integrative solutions. The purpose
framework to explain deep-rooted and protracted
of conflict mapping is moving the conflicting
international conflicts, explores the complex,
parties from their existing positions and interests to
14
1
International Security
their real needs and values. It is the first step before (coercive peacemaking) or conflict
we manage and intervene in a particular conflict. It resolution is applied to deal with underlying
has been used mostly in conflict resolution training conditions and causes of the fire (non-
and problem-solving workshops. coercive peacemaking) both of which are
The Sandole’s Three Pillars Framework (3PF) reactive. In Bosnia, NATO’s bombing of
presents a detailed technique to show a conflict the Serb forces led to the Dayton Peace
graphically. The main hypothesis of 3PF is in Accords. Peace enforcement began with
order to deal with any given conflict situation, we the Stabilization Force (SFOR), followed
first must understand it. The essential elements by the Implementation Force (IFOR),
are located in Pillar 1 such as parties, issues, and eventually the European Union Force
objectives, means, handling orientations, and the (EUFOR-“Althea”).
environment. Pillar 2 learns about the underlying 4. Peacebuilding or conflict transformation
causes and conditions of the conflict and factors (John Burton calls conflict provention)
operative at individual, societal, international, is a reactive and proactive intervention
and global/ecological levels that drive the conflict. technique designed to work with the
When conflict mapping is done at Pillar 1 and 2, survivors of the fire on their long-term
it is appropriate to design conflict intervention. relationships so that the next time, they
We can use a “burning house” metaphor to do not have to burn down the house,
demonstrate how diplomats, military and third- the neighborhood, or the larger country
party interveners respond to actual conflict. The to solve their problems and to deal with
interveners have the following options: the conflict process. The best example of
effective conflict resolution plus conflict
1. Preventive diplomacy: Violent conflict
transformation (peacebuilding) is the
prevention takes necessary steps based on
European Union (Sandole, 2010: 4-5).
early warning systems and aims to prevent a
First, in Pillar 1, we must define the primary,
house catching fire with proactive measures.
secondary and third parties. In addition to main
The early warning system (EWS) has
parties, marginalized groups and external third
successfully implemented by undertaking
parties must be added in to the conflict mapping.
the preventive mission of the UN Preventive
The relationships of the parties should be represented
Deployment Force (UNPREDEP) to work
on the map. Is the relationship an alliance or a
as a dam to prevent the genocidal explosion
confrontation? Do the parties have close contacts or
of Bosnia-Herzegovina into Macedonia
broken relations? Secondly, it is useful to overview
(Ozcelik, 2006).
the issues causing the conflict among the parties
2. Conflict management or peacekeeping:
of the conflict. It answers the question of why the
If violent conflict prevention fails or
conflict exists. In this stage, it is necessary to show
the third-party interveners do not apply
the positions of the conflicting parties. Also, it
preventive measures, the house is on fire. As
helps us to distinguish between positions, interests
a result, the interveners take necessary steps
(material interests, values, relationships) and needs.
to prevent existing fire from spreading with
Thirdly, conflict objectives focus on the analysis
reactive measures. During the collapse of
of antagonism and incompatibilities, essentials of
the former Yugoslavia, the UN Protection
the ideology of warring parties, representation in
Force (UNPROFOR) reactively responded
countries, the relationship between leadership and
to prevent the fire from spreading.
their political constituencies, the roles of leaders,
3. Peacemaking is the third option when
the legitimization of violence, legitimate leaders
attempts to prevent the fire from spreading
versus gang leaders and warlords, mobilization of
have failed. In this stage, conflict settlement
is used to suppress the fire or conflict support and recruiting of activists.
15
1
An Introduction to Security Studies
Lastly, conflict means can be conflict formation Individual, societal, international, global/
and the process of militarization. Conflict ecological. When we analyze the conflict at the
resources can be a war of economy, means of individual level, the Freudian psychoanalytical
warfare, equipment, arms, strategies, sanctuaries, theory and the concepts of aggression, instincts,
international networks, diasporas, and hinterland. and drive must be the focus of analysis.
Conflict handling orientations are conflict styles Sociobiology and evolutionary psychology explain
and conflict dynamics (hidden/deeper conflict why war occurs and why human nature is prone to
momentum, triggers, escalators, de-escalators, the violence and conflict that is determined by human
degree of persistence, intensity, and essentials). biological structure. In addition, prejudice, enemy
They can be affected by different conflict actors’ image, attributions, needs for enemy and alliances,
motivations, interests, and open and hidden scapegoating, chosen traumas/glories, collective
agendas. Conflict dynamic is related to the phasing identity, Self/Other identity, victimization, the
of conflict, paradigmatic changes, and different narcissism of minor differences, Islamophobia,
phases in the course of violence/warfare: xenophobia, and dehumanization occur as psycho-
1. Different periods of a conflict: Violence dynamic processes. (Ogretir and Ozcelik, 2008;
escalates and de-escalates and is sometimes Ozcelik, 2010; Ozcelik, 2013).
interrupted by a period of peace. When a society experiences a mass historical
2. Changes of intensity: The route of violence, trauma like 9/11, nation’s collective identity is
strategies, and availability of weapons can reshaped and the enemy image is re-emerged
be changed. and disseminated through the popular culture.
3. Paradigmatic changes: Objectives may Each conflict group forms the ‘Self and Other’
change. New alliances, fall of the regime, identity with enemy images and dehumanization.
and political shifts can happen Many such psycho-dynamic processes resulted in
4. Cross-cultural and inter-cultural a cycle of violence and escalation of the conflict.
component: Conflict handling can be The societal level compromises economics, history,
affected by high-context and low-context political science, sociology, and anthropology.
cultural environment (Scherrer, 2002: 13). The international level is basically international
Conflict environment is related to conflict history relations. And the global/ecological level is
genesis/origins of destructive group interaction, climatology, geography, ecology, and geology
colonial legacies, the immediate and root causes (Sandole, 2016: 1906).
of conflict. Also, the international structure is an It should be mentioned that conflict mapping
important input that affects a nation’s conflict activity cannot provide all of the answers and solutions. It
to a degree. The unipolar, bipolar and multipolar can only provide partial insight into the nature of
international systemic structures may stimulate a conflict. Often the conflict resolution analysts
conflict. Last but not least, conflict environment is and practitioners need to look at the underlying
conflict context (political structures, communication observed relationships and issues and deep-rooted
networks, geographical boundaries). sources of the conflict. Pillar 1 is situated in the
In Pillar 2, the Sandole’s conflict mapping middle of the model because it is the main pillar to
investigates conflict conditions in four levels: map the conflict.
16
1
International Security
17
1
An Introduction to Security Studies
18
1
International Security
Table 1.3 The Basic Assumptions of the Middle Eastern/Islamic and the Western Model of Third-Party Intervention
The Middle Eastern/Islamic Model The Western Model
Go-between negotiation Face-to-face negotiation
Social harmony, social status, relationship Problem-solving
Group-oriented Individual-oriented
Verbal agreement Written agreement
Socially/morally binding Legally binding
Value-based Interest-based
Insider-partial Outsider-impartial
Traditional/religious values and norms Civic laws
Face-saving/Indirect communication Direct communication
Rituals and symbols Rules and guidelines
Experience, status, kinship Professional certificate
Social institution Pseudo-legal institution
Public/Pseudo-public setting Private and formal setting
Triadic structure Dyadic structure
19
1
An Introduction to Security Studies
20
1
International Security
The international relations scholars have moved from narrow to the broad and deep understanding of
security and from military threats to non-military threats of security policy. As a result, global security is
conceptualized within not only a nuclear but also climate change Armageddon. More human beings have
been killed by structural violence than direct violence inflicted by soldiers and weapons. The new apparent
threat is exposed by global warming and ozone depletion. Most of the less developed countries (LDCs)
are mostly concerned with internal, domestic and trans-border issues rather than external threats. The
rise of ultra-nationalism and the social impact of mass migration has been widening and deepening the
conventional realist threats and security studies.
The widening of security is expanding it from political and military dimensions to economic, social and
especially environmental dimensions. The deepening of security is broadening its national security focus to
collective and human security. In other words, the referents of securitization include not only nation-states
but also individuals and other international actors. The dramatic decline in traditional security threats
such as nuclear deterrence and mutually assured destruction (MAD) is a paradigmatic change in security
thinking with the special emphasis on intra-state conflicts, large-scale atrocities, and genocide. The new
security agenda includes the following issues: “intra-state conflict, ethnic-religious violence, landmines,
terrorism, democracy, human rights, gender, crime, poverty, hunger, deprivation, inequality, diseases and
health hazards, human development, economic security, markets, water, energy, migration, environmental
degradation, cyber security, and so on” (Brauch, 2010: 104).
21
1
An Introduction to Security Studies
The Copenhagen School of IR has widened risky events and processes. Risks affect vulnerability.
the concept of security by including non-military This concept is related to poverty, famines, and
issues that could be non-existential threats. Also, food security. The reconceptualization of security
non-military issues can be considered under have led to new debates about security threats
security concept even if they are not intimidating and challenges. Human security may address new
nation states. For example, the collapse of multi- threats through universal rights and freedoms as
ethnic and national Yugoslavia and the conflicts well as humanitarian intervention. In addition,
in Eastern Europe have resulted from competition there must be jurisdictional arrangements and R2P
between different ethnic groups within the state to stop atrocities and genocide and to improve the
“internal societal security dilemmas” (Hough, condition of people subject to conflict and war.
2008: 9). Wider security concentrates on deliberate It must include not only freedom from fear but
and direct violent threats and less directly human- also freedom from want which includes human
caused forms of insecurities such as disasters and development issues. Another important step in
diseases. Since the notion of security is perceived R2P is R2Prevent which encompasses diplomatic
more as a social construct, the security threats pressures or incentives, economic sanctions or
are what they are but what we think the most rewards, or coercive actions (Bellamy and Dunne,
threatening countless issues on the contemporary 2016: 1-19).
global political agenda.
The widening and deepening of international Table 1.5 Types of Human Security Threats
security in the new millennium and during the
Type of Security Examples of Main Threats
1990s is necessitated to analyze it with four
Economic Persistent poverty.
concepts: threats, challenges, vulnerabilities and
Security
risks (TCVR). With the end of the Cold War,
Food Hunger, famine.
the past security threats have been increasingly
Security
replaced by new security challenges and risks.
The vulnerabilities of modern societies have been Health Deadly infectious disease,
Security unsafe food, malnutrition, lack
multiplied by non-state terrorist actors. The
of access to basic health care.
vulnerability and risks could mostly be used within
Environmental Environmental degradation,
the context of global environmental problems such
Security resource depletion, natural
as climate change, biodiversity, desertification,
disasters, pollution.
hazardous waste, trans-boundary air pollution,
Personal Physical violence, crime,
stratospheric ozone, wetlands, endangered species,
Security terrorism, domestic violence,
and polar environmental issues.
child labor.
The concept of vulnerability has been Community Inter-ethnic, religious, and
increasingly used by in a number of disciplines Security other identity-based tensions.
including international security studies. It has two Political Political repression, human
fundamental elements – risk and resilience. The Security rights abuses.
vulnerability is the probability of suffering physical Source: UN Trust Fund for Human Security, 2009, p. 7;
and socio-economic consequences as a result of Özçelik and Bostan, 2016, p. 491.
22
1
International Security
Worldwide, what do you think will be the biggest root causes of insecurity in the next five years?
(% respondents, top eight responses)
In order to preserve a state’s political and economic status in the 21st century, the control of energy
market especially in the area of hydrocarbons is one of the most important subject in energy security.
International actors give high priority to diversification of fuel sources, the stability of producers and
transit routes and the development of a domestic and international strategy. Over the past twenty years,
integration between energy systems and increase of alternative energy resources has reduced inefficiencies
in energy sector and dependency on third countries. Still, there is a need to guarantee energy supply and
which creates symmetric level of energy security. It emphasizes that growing concerns over energy security
result from rapidly increasing global energy demand because oil consumption may rise by 50 percent by
2040 (Collins, 2016: 346).
In the autumn of 2018, the world has witnessed a new frontier in nano warfare. According to the reports, a Chinese
military unit has used tiny microchips, as small as the size of rice or the tip of a sharpened pencil to access com-
puter data of government agencies and companies including Amazon and Apple. This micro chip was developed
by a specialized computer hardware attack unit in the People’s Liberation Army (the Chinese military). Although
the attack was discovered in 2015 by the US intelligence services, it was interestingly resurfaced in October 2018.
Almost on the same day, three Western countries (USA, UK, and the Netherlands) accused the Russian gov-
ernment of cyber attacks. The Netherlands authorities believed that four Russian spies attempted to hack the
Organization for the Prohibition of Chemical Weapons (OPCW) that investigates the Salisbury novichok attack
to ex-Russian spy Sergei Skripal and his daughter. The US Justice Department alleged that Russian intelligence
targeted football’s governing body FIFA, nuclear technology company Westinghouse and World Anti-Doping
agencies offices in Canada and Switzerland. Last but not least, the UK accused that the Russian Main Intelligence
Directorate (GRU) was behind four higher-profile cyber-attacks. Both Chinese and Russian officials denied the
allegations and Russia told it is “Western spy mania”
Source: https://www.theguardian.com/technology/2018/oct/04/china-planted-chips-on-apple-and-amazon-servers-
report-claims; and https://www.bbc.com/news/world-europe-45746837.
23
1
An Introduction to Security Studies
Infectious diseases are seen as security threats. Tuberculosis, HIV, etc. are required to have global
response and to broaden security thinking to a ‘people-centered’ approach. These new threats are not
calculated in terms of weaponry. Its emphasis is placed on human life and human dignity. Biosecurity is a
general term to put necessary measures to prevent unwanted biological invasions that may include human,
plants, animals, viruses, and so on. In addition to infectious disease, another domain of biosecurity is
terrorism and surveillance. The third domain is genetic manipulation, synthetic biology, and dangerous
pathogens. The fourth one is food safety and food security.
24
1
International Security
International security (IS) is basically the defense of citizens from invasion of foreigners.
Traditionalists of IS mostly emphasize the nation-states and the military aspects as well as
the concepts of war, defense, strategy and geopolitics of security. Critical approaches believe
that other actors other than states are important and international security is socially
constructed. The structure of global security is changeable and determined by social constructs.
Globalization, for some scholars, may bring greater peace and security. For others, it may cause
greater fragmentation and conflict. The regional international organizations, private military
Summary
and security companies (PMSCs) are powerful forces and have contradictory effects on global
security. The 21st century has opened new and conventional forms of warfare: Irregular
warfare, asymmetrical warfare, psychological warfare, information warfare, cyber warfare,
hybrid warfare, and Nano-warfare.
25
1
An Introduction to Security Studies
Social conflict emerges when two or more parties have real or perceived incompatible
differences in values, beliefs, or interests. Conflict resolution refers to a variety of tools and
means including negotiation, mediation, and third party interventions to prevent, resolve,
manage, and transform the deep-rooted and protracted international conflicts. Peace is not
the absence of war but also the establishment of positive, life-enhancing social structures and
values. Peace studies came into existence as a response to the atrocities of the First and Second
World Wars. It aims to provide a non-state centric and more global view of major issues. It
Summary
Over the last sixty years, there has been a significant shift in the nature of the threats that
the world has been facing. The founders of the UN have mostly focused on the aggression
between states. The twenty-first century has been dominated by different set of security threats
ranging from global warming to HIV/AIDS. Wars, arms races, weapons of mass destructions
(WMDs), terrorism, insurgencies, suicide bombings, genocides, infectious diseases, refugee
crisis, oil depletion, global climate change, economic collapse, drug trafficking, cyber war,
and piracy make disturbing headlines on a regular basis. Scientists believe that Earth has been
through at least five mass extinction events in the past. They claim that we are currently in the
midst of a sixth great extinction due to climate change and global warming. Four major crises
in the condition of humanity, trade, the environment, and current global governance call for
the creation of social democratic globalization and human security agenda. Terrorist threats
have increased because of global terrorism. Cyber threats have risen because of the increasing
number of internet users around the globe and the rise of networking and connectivity of
government and infrastructure systems. Natural hazards and environmental threats have
increasingly gained greater importance through a series of cataclysmic disasters in the early
twenty-first century. International military crises will remain a risk for the national security
and international security in the foreseeable future.
26
1
International Security
1 If the World Anti-Doping Agency’s informa- 5 Which of the following statements is correct
tion technology systems were to be hacked, which on human security?
of the following warfare types would occur?
a. It explains the security with the doctrine of na-
Test yourself
a. Cyber Warfare tional interests and external threats.
b. Nano Warfare b. It is based on self-help and mutual help.
c. Asymmetrical Warfare c. New global threats such as economic, health,
d. Hybrid Warfare food, personal, environmental, community and
e. Irregular Warfare political security are primary issues in internati-
onal security.
2 I. The Stabilization Force (SFOR) d. States are the sole authority to use force or thre-
aten others with the use of force.
II. The European Union e. It gives more importance to states.
III. UNPREDEP
IV. EUFOR “Althea” 6 Which of the following is not a regional se-
curity organization?
Which of the above are among the examples for
peacemaking and peacebuilding? a. Economic Community of West African States
(ECOWAS)
a. I and III b. Black Sea Economic Cooperation (BSEC)
b. II and III c. African Union
c. I, III and IV d. Organization of American States (OAS)
d. I, II, and III e. Organization for Security and Cooperation in
e. I, II, and IV Europe (OSCE)
3 Which of the following countries is the only 7 Which of the following is not one of the
Muslim state with nuclear weapons? conflict intervention methods?
a. Iraq a. Conflict settlement
b. Syria b. Conflict transformation
c. Turkey c. Conflict prevention
d. Saudi Arabia d. Conflict mitigation
e. Pakistan e. Conflict prevention
27
1
An Introduction to Security Studies
8 Which of the following cannot be included 10 Which of the following is not true with re-
in the Buzan’s model? gard to violence and peace?
a. International security focuses on the organizati- a. The political or socio-economic structures cause
onal stability of states, systems of government, direct violence.
and ideologies that give them legitimacy. b. The use of nationalism, racism, sexism, Isla-
Test yourself
b. International security concerns with the ability mophobia, xenophobia, and other forms of
of societies to reproduce their traditional pat- discrimination is related to cultural violence.
terns of language, culture, association, and reli- c. Infant deaths due to hunger, poverty, and disea-
gious and national identities and customs. se are an example of structural violence.
c. International security analyzes domestic crimes d. Wife battering, rape, child abuse, dowry deaths,
such as burglary, theft, rape, and murder. street killings, and war are examples of direct
d. International security deals with the mainte- violence.
nance of local and planetary biosphere as well as e. Positive peace is absence of direct, structural
space in order ensure continued existence of all and cultural violence.
human beings.
e. International security emphasizes on priorita-
zing access to the resources, finance, and mar-
kets necessary to sustain acceptable levels of wel-
fare and state power.
28
1
International Security
If your answer is not correct, review the If your answer is not correct, review the
1. A section on “International Security and 6. B section on “International Security and
Security Studies In the 21st Century” Security Studies in the 21st Century”
section. section.
4. B If your answer is not correct, review the 9. D If your answer is not correct, review the
section on “Current and Global Threats and section on “Current and Global Threats and
Challenges” section. Challenges” section.
5. C If your answer is not correct, review the 10. A If your answer is not correct, review the
section on “The Concept of International section on “Peace Studies and Conflict
Security” section. Resolution” section.
International humanitarian law (IHL) defines the armed forces de jure under
the domestic law of the state in question. The individual is entitled to priso-
ner of war status if he/she is members of the armed forces. In order to clarify
the status of PMSCs, the Montreux Document (2008), an initiative of the
International Committee of the Red Cross (ICRC) was accepted. The PMSCs
was internationally recognized as an acceptable actor and very distinct from
your turn 1 mercenaries. A treaty or convention may be needed. There is a need to have a
better coordination between multi-stake holders and states to clarify PMSCs’
accountability and international legal obligations. The main role of the ICC
could be its ability to encourage national legislation on serious crimes and
to encourage the states to put in the trial of perpetrators of genocide, crimes
against humanity, and war crimes on their own. Theoretically, the ICC could
punish the employees of the PMSCs if they commit above-mentioned crimes
because its jurisdiction is based on individual criminal responsibility.
29
1
An Introduction to Security Studies
In order to answer this question, we must first start from the mandate of the
Suggested Answers for “Your Turn”
For example, the Crimea conflict has three main conflict parties: Russia, Uk-
raine, and the Crimean Tatars. Conflict sources are rooted in basic human ne-
eds theory. Security and identity needs of the parties must be satisfied. Crimea
is important for Russia, Ukraine, and the Crimean Tatars not only geo-strate-
gically and geo-economically but also historically and identity-based reasons.
The territorial integrity of Ukraine must be satisfied. At the same time, the
your turn 3 identity needs of the Crimean Tatars and Russians must be addressed. The
Crimean conflict has escalated after the Cold War in 1994 but the OSCE
third-party intervention has de-escalated the conflict. But in 2014 the Crime-
an conflict has resulted in a hybrid war that has spill-over effects in the Eastern
Ukraine and Syria. The Russian involvement in Syria cannot be separated
from the Russian invasion of Crimea in 2014. It shows that international
conflict is a complex, self-stimulating and enigmatic event that can result in
structural changes in the international system.
The current concern with new microbial threats has developed at least four
distinct domains: emerging infectious disease, bioterrorism, the cutting-edge
life sciences, and food safety. The first domain came into existence because of
the AIDS crisis and the drug-resistant strains of tuberculosis and malaria. We
were witnessing a return of the microbe by the appearance of new diseases such
as West Nile virus, SARS, and the influenza pandemic. Rogue states, the glo-
bal terrorist organization and the proliferation of weapons of mass destruction
your turn 4
calls for biodefense measures focused on bioterrorism. Thirdly, the cutting-
edge life sciences have opened the possibility of technical capacities to create
lethal organisms via synthetic biology and genetic manipulation. Lastly, the
food safety crises in Europe have caused anxieties about agricultural biosecurity
and the contamination of food supply. The outbreaks of mad cow disease and
foot-and-mouth disease have led to public outcry over food safety in Europe.
30
1
International Security
References
Abrahamsen, Rita and Michael C. Williams (2011). Demmers, Jolle (2017 ). Theories of Violent Conflict:
Security Beyond the State: Private Security in An Introduction, New York: Routledge, 2nd ed.
International Politics, Cambridge: Cambridge
Downs, George W. (1994a) “Beyond the Debate on
University Press.
Collective Security”, George W. Downs (ed.),
Avruch, Kevin (2013). “Basic Human Needs and the Collective Security Beyond the Cold War, Ann
Dilemma of Power in Conflict”, Kevin Avruch Arbor, Michigan: University of Michigan Press.
and Christopher Mitchell (ed.), Conflict Resolution
Downs, George W. (1994b). Collective Security Beyond
and Human Needs: Linking Theory and Practice,
the Cold War, Ann Arbor: University of Michigan
New York: Routledge, pp. 40-59.
Press.
Bellamy, Alex J. (2009). Responsibility to Protect: The
Fisher, Ronald J. (1990). The Social Psychology of
Global Effort to End Mass Atrocities, UK: Polity
Intergroup and International Conflict Resolution,
Press.
New York: Springer-Verlag.
Bellamy, Alex J. and T. Dunne (2016). “R2P in Theory
Frederking, Brian (2007). The United States and the
and Practice”, Alex J. Bellamy and T. Dunne
Security Council: Collective security since the Cold
(ed.), The Oxford Handbook of the Responsibility to
War, New York: Routledge.
Protect, Oxford: Oxford University Press, p. 1-19.
Galtung, Johan and Dietrich Fischer (2013). Johan
Bercovitch, Jacob et al. (2009). “Introduction: The
Galtung: The Pioneer of Peace Research, Dordrecht:
Nature of Conflict and Conflict Resolution”,
Springer.
Jacob Bercovitch et al. (ed.), The SAGE Handbook
of Conflict Resolution, London: Sage, pp. 1-13. Galtung, Johan (2004). Transcend and Transform:
An Introduction to Conflict Work, London: Pluto
Bilgin, Pınar (2005). Regional Security in the Middle
Press.
East: A Critical Perspective, New York: Routledge.
Galtung, Johan (1996). Peace by Peaceful Means:
Brauch, Gunter (2010). “Security Threats, Challenges,
Peace and Conflict, Development and Civilization,
Vulnerability, and Risks”, Ursula Oswald Spring
London: Sage Publications.
et al., Peace Studies, Public Policies, and Global
Security, United Kingdom: EOLSS Publishers, Galtung, Johan (1990). “Cultural Violence”, The
pp. 102-140. Journal of Peace Research, 27(3), pp. 291-305.
Broch-Utne, B. (1997). “Linking the Micro and Macro Galtung, Johan (1969). “Violence, Peace, and Peace
in Peace and Development Studies”, J. Turpin Research”, Journal of Peace Research, vol. 6, no. 3,
and L. R. Kurtz (ed.), The Web of Violence: From pp. 167-191.
Interpersonal to Global, Chicago, IL: University of Griffin, Em (2000). First Look at Communication
Illinois Press, pp. 150-160. Theory, New York: McGraw-Hill, 4th ed. https://
Buzan, Barry (1999). “New Patterns of Global Security www.afirstlook.com/docs/hierarchy.pdf
in the Twenty-First Century”, International Herz, John H. (1950). “Idealist Internationalism and
Affairs, vol. 67, no. 3, pp. 431-451. the security dilemma”, World Politics, 2(2), pp.
Buzan, Barry and Lene Hansen (2009). The Evolution 157-180.
of International Security Studies, Cambridge: Heurlin, Bertel and Kristensen (2010). “International
Cambridge University Press. Security”, P. Bilgin, et al., Global Security and
Collins, Alan (2016). Contemporary Security Studies, International Political Economy: Volume III, United
4th ed., Oxford: Oxford University Press. Kingdom: EOLSS Publishers, pp. 65-110.
Commission on Human Security. (2003). Human Hollis, Martin (1994). The Philosophy of Social
Security Now, New York: Commission on Human Science: An Introduction, Cambridge: Cambridge
Security. University Press.
31
1
An Introduction to Security Studies
Hough, Peter (2008). Understanding Global Security, Ozcelik, Sezai (2006). “The Theory and Practice of
2nd ed., New York: Routledge. Preventive Diplomacy: The Case of Preventive
Deployment in Macedonia”, Uluslararası İlişkiler,
ICISS. (2001). The Responsibility to Protect, Report of
vol. 11, no. 3, pp. 103-128.
the International Commission on Intervention
and State Sovereignty, Ottawa: International Ozcelik, Sezai (2010). “The Analysis of Intergroup
Development Research Centre, http:// Bias: Socio-Biology, Evolutionary Psychology and
responsibilitytoprotect.org/ICISS%20Report.pdf Social Cognition Theorıes”, Journal of Qafqaz
University, number: 30 Fall 2010, 1-9.
Kegley, Charles W. Jr. (2009). World Politics: Trends and
Transformation, Cengage Learning: United States. Ozcelik, Sezai (2013). “Border Creation in Cyprus:
Contested History and the Psychodynamic
Krieger, David. (2017). “The Challenge of Abolishing
Perspective of Vamik Volkan”, Peace and Conflict
Nuclear Weapons”, David Krieger (ed.), The
Review, Summer 2013, vol. 7, no.2, 1-11.
Challenge of Abolishing Nuclear Weapons, New
York: Routledge, pp. 1-6. Ozçelik, Sezai and A. Bostan (2016). “Yeni Güvenlik
Anlayışında Balkanları Özgürleştirmek: Bosna-
Kritz, Neil J. (2001). “The Rule of Law in the
Hersek ve Kosova Örnekleri”, Erman Akıllı (ed.),
Postconflict Phase: Building a Stable Peace”,
Türkiye’de ve Dünyada Dış Yardımlar, Ankara.
Chester A. Crocker, Fen Osler Hampson, Pamela
Nobel Yayınevi, pp. 486-520.
Aall (eds.), Managing Global Chaos: Sources of and
Responses to International Conflict, Washington Ozcelik, S. (2016). “The Triangular Conflict of Russia,
D.C.: United States Institute of Peace Press, pp. Ukraine, and the Crimean Tatars: Analysis of the
801-820. 2014 Crimean Occupation and Annexation”,
Sertif Demir (ed.), Turkey’s Foreign Policy and
Kutlugun, S. Bugra (2018). “Turkey tops global
Security Perspectives in 21st Century: Prospects
humanitarian assistance list in 2017”, Anadolu
and Challenges, Boca Raton, FL, USA: Universal
Ajansı (21.06.2018), https://www.aa.com.
Publishers/Brown Walker Press, pp. 143-167.
tr/en/todays-headlines/turkey-tops-global-
humanitarian-assistance-list-in-2017/1180815 Peou, Sorpong (2009) “Introduction: Collaborative
action problems in human security”, Sorpong
Lynn-Jones, Sean M. and Steven E. Miller (1995).
Peo (ed.), Human Security in East Asia: Challenges
“Preface”, Michael E. Brown, et al., The Perils of
for collaborative action, New York: Routledge, pp.
Anarchy: Contemporary Realism and International
1-11.
Security, Cambridge, MA: MIT Press, pp. ix-xx.
Persaud, Randolph B. (2016). “Human Security”,
Maerli, M. Bremer and Sverre Lodgaard (2007).
Alan Collins (ed.), Contemporary Security Studies,
“Introduction”, M. Bremer Maerli and Sverre
Oxford: Oxford University Press, 4th ed., pp. 139-
Lodgaard, Nuclear Proliferation and International
154.
Security, New York: Routledge, pp. 1-7.
Sandole, Dennis J.D. (1999). Capturing the Complexity
Malis, Christian (2012). “Unconventional Forms of
of Conflict: Dealing with Violent Ethnic Conflicts
Warfare”, J. Lindley-French and Y. Boyer (ed.),
of the Post-Cold War Era. London and New York:
The Oxford Handbook of War, Oxford: Oxford
Pinter.
University Press, pp. 185-199.
Sandole, Dennis J.D. (2003). “Typology”, Sandra
Mangold, Peter (1990). National Security and
Cheldlein et al. (ed.), Conflict: From Analysis to
International Relations, New York: Routledge.
Intervention, London: Continuum, pp. 39-55.
Morgenthau, Hans J. (2005). Politics Among Nations,
Sandole, Dennis J.D. (2006). “Complexity and
New York: Alfred A.Kropf.
Conflict Resolution”, Neil E. Harrison (ed.),
Nicholson, Michael (1992). Rationality and the Complexity in World Politics: Concepts and Methods
Analysis of International Conflict, Cambridge: of a New Paradigm, Albany: State University of
Cambridge University Press. New York Press, pp. 43-68.
Ogretir, Ayse Dilek and Sezai Ozcelik (2008). “The Sandole, Dennis J.D. (2010). Peacebuilding: Preventing
Study of Ethnocentrism, Stereotype and Prejudice: Violent Conflict in a Complex World, UK: Polity
Psycho-analytical and Psycho-dynamic Theories”, Press.
Journal of Qafqaz University, 24, Fall 2008, pp.
236-244.
32
1
International Security
Shani, Giorgio (2011). “Securitizing ‘bare life’: Critical UNDP (1994). 1994 Human Development Report:
perspectives on human security discourse”, New Dimensions of Human Security, Oxford:
David Chandler and Nik Haynek (ed.), Critical Oxford University Press,
Perspectives on Human Security, New York:
UN Trust Fund for Human Security (2009). “Human
Routledge, pp. 56-69.
Security in Theory and Practice: Application of
Scherrer, Christian P. (2002). Structural Prevention of Human Security Concept and the United Nations
Ethnic Violence, New York: Palgrave MacMillan. Trust Fund for Human Security” 2009.
Tadjbakhsh, Shahrbanou (2005). Human Security: Vayrynen, Tarja (2001). Culture and international
Concepts and Implications with an Application conflict resolution: A critical analysis of the work of
to Post-Intervention Challenges in Afghanistan, John Burton, Manchester: Manchester University
France: CERI. https://www.sciencespo.fr/ceri/ Press.
sites/sciencespo.fr.ceri/files/etude117_118.pdf
Walt, Stephen M. (1991). “The Renaissance of Security
Thucydides (2018). History of the Peloponnesian Studies”, International Studies Quarterly, vol. 35,
War, http://www.documentacatholicaomnia. no.2, pp. 211-239.
eu/03d/-460_-400,_Thucydites,_History_Of_
Weitz, Richard (2011). War and Governance:
The_Peloponnesian_War,_EN.pdf
International Security in a Changing World Order,
UNDP (2005). Human Development Report 2005: Santa Barbara, CA: Praeger.
International Cooperation at a Crossroads -Aid,
Trade, and Security in an Unequal World, New
York: Oxford University Press.
33
Chapter 2 Major IR Theories and Security
After completing this chapter, you will be able to:
1 2
Learning Outcomes
34
2
International Security
35
2
Major IR Theories and Security
of power for the first time (Chatturvedi, 2005). on national interests defined in terms of power
In ancient Greece, Thucydides wrote on the (Pevehouse and Goldstein, 2014). For all realists,
Peloponnesian War (431–404 B.C.), focusing on the struggle for power is the main motivation in
relative power among the Greek city-states. Power political life. As Morgenthau notes, the ‘will to
is regarded as a zero-sum game. According to the power’ is unlimited, and states try to maximize
zero-sum game, “the actors in the international their power in international politics where anarchy
system must deprive one another of their power in is a ‘permissive force’ (Shimko, 1992).
order to add it to their own” (Molloy, 2006). Morgenthau outlines the “six principles of
During the Renaissance, Machiavelli, the political realism” as follows:
Italian statesman and philosopher, defined the • Politics is governed by objective laws which
key objective of the prince must be to preserve his have their root in human nature.
position and the security of his realm in a world • The key to understanding international
filled with wicked men who may threaten his politics is the concept of interest defined in
position (Walt, 2010). Thomas Hobbes, in his terms of power.
book Leviathan, refers to similar concepts. His • The forms and nature of state power will
idea about the state of nature incorporates some vary in time, place and context but the
of the main realist principles, such as the state of concept of interest remains consistent.
anarchy (Oldemeinen, 2010). From Thucydides to • Universal moral principles do not guide state
Hobbes, human nature is seen as the source of an behavior, although this does not rule out
endless desire for power. an awareness of the moral significance of
political action.
• Moral aspirations are specific to a particular
nation; there is no universally agreed set of
moral principles.
• The political sphere is autonomous
(Heywood, 2011).
The notion of national interest has
underpinned foreign policy since the advent of the
Westphalian system. As posited by Morgenthau,
“objectives of a foreign policy must be defined
in terms of the national interest” (Morgenthau,
1960). He defines the national interest “in terms
of power” (1993). That means power is the
ultimate result and cause of the national interest
taking its roots from the will to power inherent
in human nature. Whatever the ultimate aims
of international politics, power is always the
immediate aim. Therefore, international politics
is a struggle for power (Morgenthau, 1993).
Power can be conceptualized in different ways.
Power as an influence, for instance, is the ability to
influence the behavior of others. Military force and
Figure 2.1 Thomas Hobbes, Leviathan, 1651 economic sanctions are among the various means
Source: https://en.wikipedia.org/ that states and non-state actors use to influence
each other. It is also conceptualized as capability:
For realism, the importance of power politics “The traditional approach to power in
is timeless and cross-cultural. Hans Morgenthau, international politics is to treat it in terms of
a classical realist, argues that international politics capabilities. Power is therefore an attribute or
is governed by objective, universal laws based possession. Such an approach has, for instance,
36
2
International Security
been reflected in attempts to list the ‘elements’ system and the structure of international politics
or ‘components’ of national power (Military is seen as the distribution of power capabilities
strength, Economic development, Population, across the units.
Geography). The most significant of these
usually include the size and quality of a state’s
armed forces, its per capita wealth and natural
resources, the size and skills of its population, its
land mass and geographical position and so on.
The advantage of this approach is that it enables
power to be analyzed on the basis of observable,
tangible factors, such as military and economic
strength, rather than intangibles, suggesting that
power is quantifiable. The often quoted example
of the Vietnam War (1959–75) helps to illustrate
this. The USA failed to prevail in Vietnam despite
enjoying massive economic, technological and
military advantages over North Vietnam and its
communist ally” (Heywood, 2011).
For realists, war is a permanent feature of
international relations. The possibility of war
stems from the inescapable dynamics of power
politics: as states pursue their national interest
they will inevitably come into conflict with one
another, and this conflict will sometimes (but not
always) be played out in military terms (Heywood, Figure 2.2 Kenneth Waltz’s seminal work: Theory of
2011). For realism, the state is the most important International Politics.
actor in the international system and is, therefore, Source: www.abebooks.co.uk
the primary unit of analysis. The state, as an actor,
must ensure its survival in a self-help situation.
Survival becomes the first objective of the state. Structural realism emphasizes four core
In a world where a number of sovereign nations elements of international politics:
compete with and oppose each other for power, the • States are seen as rational actors and
foreign policies of all nations must necessarily refer by far the most important actors in the
to their survival as their minimum requirements international system.
(Morgenthau, 1952). As such, security is first • The international system is anarchic;
understood in the sense of national security. In a there is no international authority that can
self-help international system, all states are under prevent the use of force between states.
the threat of all other states. For national security, • Each state cannot take its security for
military power is essential because the more granted and thus, is responsible for ensuring
powerful a state’s military is, more secure that state its own survival, most notably through the
is likely to be. nurturing of material capabilities.
• The balance of power (the formation of
alliances with certain states to counter
Neorealism
the threat of other states) is the defining
From the 1970s onwards, neorealism or mechanism that regulates the international
structural realism began to emerge as new thinking system and explains war and peace.
of the realist tradition with the work of Kenneth According to Waltz, theories about
Waltz. In neorealism or structural realism, the international politics can be developed at three
international system is accepted as a self-help levels of analysis: the individual level, the state
37
2
Major IR Theories and Security
level, and the international system level. Structural Waltz sees the pursuit of power as a means for
realism conceptualizes international politics at the survival and security. In an anarchical international
system level and describes the behavior of states in system, security is the highest end. Only if survival
terms of the structure of the international system. is assured can states safely seek other goals such as
While shifting attention towards the international tranquility, profit, and power. Therefore, “power
system, structural realism emphasizes the effects is a means and not an end” (Waltz, 1979). The
of anarchy on the behavior of states. For neo- survival is the ultimate aim of all states on which
realists, international anarchy necessarily causes John Mearsheimer also agrees as an offensive
tension, conflict and inevitable warfare for three neo-realist. Like Waltz, he states that other goals
main reasons. First, the states are autonomous and of states apart from survival such as “prosperity
formally equal political units which ultimately rely and protecting human rights… take a back seat
on their own resources to achieve their interests to survival, because if a state does not survive, it
in international politics. As states cannot trust cannot pursue those other goals” (Mearsheimer,
other states, international anarchy is a “self-help” 2007). However, Mearsheimer argues that power,
system. Second, relations between states are always as a means to ensure survival, can also become an
shadowed by uncertainty and doubt, which creates end. In his words, “states should maximize power,
a security dilemma. Due to the self-help system, and their ultimate goal should be hegemony”
states strive for security and survival and try to (Mearsheimer, 2007). Here power becomes an
obtain sufficient military capacity to deter other end which states must strive for. This apparent
states from attacking them. However, these actions contradiction with the above stems from the
are always subject to interpretation as hostile or different power understandings of defensive and
aggressive. For this reason, the uncertainty about offensive neo-realists. Defensive neo-realists see
motives forces states to treat themselves as hostile it futile “to pursue hegemony” (Mearsheimer,
to all other states. Therefore, persistent insecurity is 2007), whereas offensive neo-realists defend the
the inevitable result of living in anarchy conditions. idea that states must try to gain as much power
Third, conflict is also encouraged by the fact that as possible because of firstly, to ensure the survival
states are primarily concerned about maintaining in the system and secondly, to pursue hegemony.
or improving their position relative to other states Ensuring the survival treats power as a means while
through relative gains. Each state is actually the struggle for hegemony treats power as an end.
more worried about whether other states benefit Only the accumulated power can give the state the
more than it does, which discourages cooperation chance to pursue hegemonic projects.
and reduces the effectiveness of international
organizations (Heywood, 2011).
Offensive realism - Defensive realism
Offensive realism is a form of structural
Self-help refers to a state’s reliance on its realism that portrays states as ‘power
own capacities and resources, rather than maximizers’, as there is no limit to
external support, to ensure security and their desire to control the international
survival. environment. Defensive realism is a form
Security dilemma arises from the fact that of structural realism that views states as
a build-up of military capacity for defensive ‘security maximizers’, placing the desire to
reasons by one state is always liable to be avoid attack above a bid for World power.
interpreted as aggressive by other states.
The concept of relative gains refers to the
position of states in relation to one another, “Neorealists believe that conflict can be
reflected in the distribution of benefits and contained by the balance of power. This is a
capabilities between and amongst them. key concept for all realist theorists. However,
while classical realists treat the balance of power
38
2
International Security
as a product of prudent statecraft, neorealists see Strange insisted that the same state or states
it as a consequence of the structural dynamics need not dominate each of these structures, but
of the international system, and specifically, of rather that their structural power may vary across
the distribution of power (or capacities) between the structures. This analysis of power provides an
and among states. In short, the principal factor alternative to state-centrism and highlights the
affecting the likelihood of a balance of power, important and growing role played by regimes and
and therefore the prospect of war or peace, are international organizations. The issue of structural
the number of great powers operating within the power also clearly demonstrates how questions
international system. Although neorealists believe about the nature of power are closely linked to
that there is a general bias in the international debates about the shape of world order. During
system in favor of balance rather than imbalance, the 1980s, Strange used the theory of structural
world order is determined by the changing fate power to reframe the debate about hegemonic
of great powers. This is reflected in an emphasis stability theory and to challenge the then
on polarity. Neorealists have generally associated fashionable notion of US decline, which had largely
bipolar systems with stability and a reduced been based on the USA’s economic decline relative,
likelihood of war, while multipolar systems have in particular, to Japan and Germany” (quoted in
been associated with instability and a greater Heywood, 2011). Hegemony demands power,
likelihood of war (neorealist stability theory). This which is defined by Susan Strange as the ability
inclined neorealists to view Cold War bipolarity of one party to affect outcomes such that their
in broadly positive terms, as a ‘long peace’, but to preferences take precedence over the preferences of
warn about the implications of rising multipolarity other parties. The question of whether the United
in the post-Cold War era. Realists, nevertheless, States is still a hegemon is tied into whether or not
disagree about the relationship between structural it has lost power. Susan Strange uses this logic to
instability and the likelihood of war. For so-called argue that the United States is still a hegemon.
offensive realists, as the primary motivation of
states is the acquisition of power, if the balance of
power breaks down (as it tends to in conditions
Focus on China and the USA
of multipolarity), there is a very real likelihood China may increasingly bristle at international
that war will break out (Mearsheimer, 2001). rules and norms that it feels serves the
Defensive realists, on the other hand, argue that interests of the United States. For its part,
states tend to prioritize security over power, in the United States may fear that growing
which case states will generally be reluctant to go to Chinese economic and military power will be
war, regardless of the dynamics of the international used to challenge U.S. power. In 2010, the
system (Mastanduno, 1991)” (Heywood, 2011). U.S. military’s strategic review questioned
China’s “long-term intentions,” raising
British scholar Susan Strange (1996) offers
new questions about future power transition
Structural Power Thoeory and defines it as “the
(Pevehouse and Goldstein, 2014). China is taking
power to decide how things shall be done, the
advantage by industrializing its army using their
power to shape frameworks within which states
wealth. China’s military budget is increasing and
relate to one another, relate to people or relate to
the troops are expanding (Andrew, 1992). Steven
corporate enterprises”. She distinguishes between
W. Mosher insists that China is building up its
four primary power structures:
armed forces «to break America’s back in Asia and
• The knowledge structure, which influences thus end America’s reign as the sole superpower in
actor’s beliefs, ideas or perceptions; the World”. However, many argue that China has
• The financial structure, which controls a symbiotic relationship with the United States. If
access to credit or investment; the United States declines, it is likely that China
• The security structure, which shapes defence also may be in jeopardy. John Gulick points out
and strategic issues; that China’s prosperity is “deeply ensconced in the
• The production structure, which affects ‘China produces and lends, the US borrows and
economic development and prosperity. spends’ framework” (Gulick, 2011). Economic
39
2
Major IR Theories and Security
interdependence of China derives from the rights generally, as well as over growing resource
fact that they are a producing state rather than rivalry in Africa, the Middle East and elsewhere.
a consuming state. China’s economy is export However, others have portrayed the rise of China
heavy as its driving force lies in “export processing in a far less threatening light. Not only are China
measures” (Gulick, 2011). The export dependent and the USA bound together by the bonds of
structure could severely dampen economic growth economic interdependence (the USA is China’s
if demand for Chinese exports is reduced by main export market, and China is the USA’s
another economic crisis in the United States. Thus, most important creditor), but, as the twenty-first
China’s economic woes are one of the barriers to century progresses, these two powers may create
its hegemonic aspirations. However, it is not the a new form of bipolarity, which, as neorealists
only barrier that China must overcome to achieve argue, would usher in a higher level of security and
hegemony. In fact, Hegemonic Stability Theory stability. The USA, furthermore, has an interest
demonstrates that theoretical requirement for in China assuming greater global responsibilities,
world leadership is the will to lead and the ability both to share the burden of such responsibilities
to lead and that China should strive for this ability and to encourage China to bandwagon rather
in order to gain hegemonic status. Also, other than balance (Heywood, 2011).
factors- for example, domestic political instability,
environmental degradation, public health issues,
and demographic trends- could possibly hinder Bandwagon is to side with a stronger
China’s ascent to great power status (Susan, 2007). power in the hope of increasing security and
The balance of threat theory was suggested by influence; ‘jumping on the bandwagon’.
Stephen M. Walt first in an article titled “Alliance
Formation and the Balance of World Power” in
1985. The balance of threat theory modified the Liberalism and Security
balance of power theory in the neorealist school of
Liberal ideas and theories have been influencing
international relations. According to the balance of
the discipline of IR following World War I.
threat theory, states’ alliance behavior is determined
Liberalism was characterized as idealism which was
by the threat they perceive from other states. Walt
based on Kant’s account of universal and perpetual
contends that states will generally balance by
peace. From the 1970s onwards, liberalism has
allying against a perceived threat, although very
taken the form of neoliberalism. The increasing
weak states are more likely to bandwagon with the
influence of globalization after the end of the Cold
rising threat in order to protect their own security.
War and a new wave of democratization in the
He points to the example of the alliance patterns
1990s each gave liberal theory an additional boost.
of European states before and during World
War I and World War II, when nations with a
significantly greater combined power allied against Security in Liberalism
the recognized threat of German expansionism. Liberalism asserts that collective security will
There are a number of sources of potential be ensured by the establishment of international law
Chinese–US conflict. For example, cultural and and norms. In this respect, it implies a special role
ideological differences between ‘liberal-democratic’ for institutionalization by stating that international
USA and ‘Confucian’ China may provide the institutions will provide international regulation.
basis for growing enmity and misunderstanding. International law will also create collective
In this light, the peaceful transition from British security, and establishes collective order and peace.
hegemony in the nineteenth century to US global The collective security system, which will become
hegemony in the twentieth century was only operative with this institutionalization, will gain a
possible because of historical, cultural and political new dimension as a result of the democratization
similarities that allowed the UK to view the rise of states through common norms and rules. Liberal
of the USA as essentially unthreatening. A conflict theories are trying to establish a roadmap for the
could also arise from divisions that already exist establishment of security by focusing on how to
over issues such as Taiwan, Tibet and human create channels of cooperation among actors in the
40
2
International Security
international system. According to these theories, have given way to ‘global’ security (Heywood, 2011).
the relations between the actors can gain an identity Adler and Barnett (1998) emphasize the
based on common security through international potential impact of institutions, values and
norms, rules and regimes. identities even in the high politics of international
For liberalism, the security agenda in modern security. The concept of security communities is
global politics has changed in a number of ways. an attempt to find a remedy for the insecurity of
These include, on the one hand, the expansion of states in the international arena. It is thus related
‘zones of peace’ in which the tensions and incipient to the concept of collective security, in the sense
conflicts implied by the security dilemma appear that security communities aim to provide collective
to be absent. Thus ‘security regimes’ or ‘security security for members. Deutsch defined the security
communities’ have developed to manage disputes community as a group of states that had become
and help to avoid war, a trend often associated integrated to the point at which there is “real
with growing economic interdependence (linked to assurance that the members of that community will
globalization) and the advance of democratization. not fight each other physically, but will settle their
On the other hand, September 11 and the wider disputes in some other way” (Adler and Barnett,
threat of terrorism has highlighted the emergence 1998). In other words, in a security community,
of new security challenges that are particularly states perceiving common threats construct
problematic because they arise from non-state actors collective identities against a commonly perceived/
and exploit the greater interconnectedness of the identified enemy, which in turn help overcome
modern world. International security may, therefore, security dilemma.
Levels of Analysis
Individual Domestic Interstate Global
Realism
Neorealism
Liberal Theories
(Kant)
RIES
CIAL THEO Constructivist
SO
Theories
Marxism
(Imperialism)
Postmodernist
Theories
Peace Studies
Gender Theories
Figure 2.3 Liberal Theories
Source: Dr Clayton Thyne, PS 235-001: World Politics, Spring 2010, Pevehouse and Goldstein, International Relations,
8/e Student notes version.
41
2
Major IR Theories and Security
Liberal Institutionalism
Liberal institutionalism is an approach to
study that emphasizes the role of institutions (both
formal and informal) in the realization of liberal
principles and goals. Liberal institutionalism
rejects a realist argument that international
politics is a struggle for power in which military
security issues are the top priority. In fact, the chief
‘external’ mechanism that liberals believe is needed
to constrain the ambitions of sovereign states is
international organizations. This reflects the ideas
of what is called liberal institutionalism.
42
2
International Security
through the use of inducements (carrots) or threats scholars with interests in security and with concern
(sticks). By contrast, there has been a growth in about new security studies in the early post-Cold
soft power. Soft power is co-optive power; it rests War era. This conference title was used as the title
on the ability to shape the preferences of others of the book, edited by Keith Krause and Michael C.
by attraction rather than coercion (Nye 2004). Williams. In their 1997 book, Critical Security Studies:
Whereas hard power draws on resources such as Concept and Cases, Krause and Williams suggested
force, sanctions, payments and bribes, soft power a broad definition of critical security studies which
operates largely through culture, political ideals covered all “new approaches” from Constructivism
and foreign policies (especially when these are through Feminism and “Copenhagen School” to
seen to be attractive, legitimate or to possess moral Poststructuralism.
authority)” (Heywood, 2011:214). Krause and Williams helped shape critical
security studies as a pluralistic field. In addition,
they pose such questions to open a broad and
Hard power is the ability of one actor (usually
complex agenda for security studies. Questioning
but not necessarily a state) to influence
the referent object of security, ‘who or what is to
another through the use of threats or
be secured’, Krause and Williams challenged the
rewards, typically involving military ‘sticks’ or
traditional state-centric understanding of security
economic ‘carrots’. Soft power is the ability to
and instead put forward the individual as the object
influence other actors by persuading them to
of security. However, according to Barry Buzan, this
follow or agree to norms and aspirations that
approach has never gained wide support, and the
produce the desired behavior.
term Critical Security Studies was more widely used
to refer to “Aberystwyth School” or “Welsh School”
as a coherent school of thought in the discipline of
international security studies (Buzan, 2009: 206).
1 The term Critical Security Studies is also used to refer
to the coherent theoretical school created mostly by
How does liberal institutionalism
the endeavor of Professors Ken Booth and Richard
see security?
Wyn Jones, Andrew Linklater and their colleagues
from the Aberystwyth University. Booth and Wyn
Jones developed a brand of ‘Critical Security Studies’
CRITICAL SECURITY STUDIES that challenged the definition of security in terms of
During the Cold War era, security was military threats to the state, and instead linked the
overwhelmingly a matter of state’s sovereignty, its study of security to human emancipation.
territorial integrity, and its political autonomy.
The end of the Cold War is often regarded as
the beginning of a fundamentally different
international political environment. This change
in the environment brought new approaches to
thinking about international security. Since 1991
the focus of security studies as a discipline has been
broadened and deepened. It has moved away from
merely military concerns and included economic,
political, societal and environmental issues,
focusing on people rather than the state.
Critical Security Studies is an academic
discipline within security studies which rejects
mainstream approaches such as realism and
neorealism. In May 1994, a small conference was
held at York University in Toronto entitled Strategies
Figure 2.5 Ken Booth, Professor at Aberystwyth University
and Conflict: Critical Approaches to Security Studies. It
brought together from around the world a variety of Source: https://www.thebritishacademy.ac.uk/fellows/
ken-booth-FBA
43
2
Major IR Theories and Security
Critical Security Studies contributes to for those presently in power with the purpose of
security studies by broadening and deepening the maintaining their dominance. From a Coxian
concept of security. This provides to have better Critical perspective (theory is for someone and
and fuller agendas that cover all those issues that for purposes) this worldview is itself derived from
engender security. The broadening camp argues the theories of white, Western and predominantly
that a predominantly military definition does not male academics (Cox, 1981: 1544).
acknowledge that the important threats to state
survival may not be military, but also environmental, Key Concepts in Critical Security Studies
social, political and economic (Buzan, 1991). The Referent Object: It is an object that is taken as
deepeners, on the other hand, asked the question the focus for analysis in security studies. As to
of whose security is being threatened and supported this concept, there are two main approaches to
the construction of a definition of security that the security: state-centric security (the state is
allows for individual or structural referent objects, the referent object) and human-centric approach
as opposed to the state (Booth, 1991a). Another (human is the referent object).
main idea of critical security studies is the argument
that security is a derivative concept. This means Traditional Security Studies: It refers to Realist,
that the view of security reflects our understanding Liberal, Peace Studies and Strategic Studies
of the world and the perception of our threats. perspectives in the study of security. All of
them prioritize the state as the referent object
Critical security studies take the Frankfurt of security and focus on military threats to the
School critical theory as a guide in order to security of the state.
define the world. Critical theory rejects positivism
by claiming that knowledge does not arise from Broadening: The broadening security agenda
the objective reality but it reflects some interests refers to Barry Buzan’s sectoral analysis that the
and purposes (Linklater, 1996: 279). Critical security agenda includes not only military sector
security studies use post-positivist epistemological issues but also political, economic, societal and
methodology. Positivism is an epistemological environmental issues.
approach that includes certain methodology and Deepening: The state is not only the referent
methods. Positivists claim that social sciences can object of security but it also includes human
be built upon the same model as natural sciences. individuals, institutions and groups.
Using this epistemological approach to international Positivism: It claims that social sciences can
relations discipline, observation is possible for be built upon the same model as natural
acquiring knowledge and social truth exists sciences. Scientific principles such as objectivity,
independent of the observer. Thus, there is objective verification/falsification, and generalization can
truth and the international relations theory is the adapt to the study of society.
result of this objective knowledge. However, the Post-Positivism: It rejects the idea that it is
Frankfurt Critical Theory opposes a constant world possible to analyze the natural world and the
structure and the distinction between the subject social world in the same way. There is no objective
(observer) and the object (observed). For example, view (Peoples and Vaughan-Williams, 2010:4).
the identity of the observer is important in observing
the subject. His/her beliefs and world vision affect
the knowledge. According to this perspective, the From Traditional Security Studies
definition of security is what we define it. In the to Critical Security Studies
contemporary case of Syria, the Syrian government
Traditional security studies refer to work
may define security as the freedom from the Western
associated with the broader approach to
influence. The opponent groups, on the other hand,
international relations known as political realism,
may view it as the self-determination from Bashar Al
both in its classical and structural (or neorealist)
Assad’s dictatorship. European Union countries may
variants. As to political realism, the state is the
define it as migration issues.
main object of security and war is the main threat
From the point of critical theorists, it is not to it. The question of ‘which security should have
possible to claim the existence of value-free priority?’ on the subject of realist security studies
knowledge. If all knowledge is for someone and revealed the state and its existence, sovereignty
for some purpose, theories are the ones that are
44
2
International Security
and integrity. Neorealist Stephen Walt has the world were intrastate (civil wars) conflicts instead
defined security studies as ‘the study of threat, of interstate (two or more states’ war). In addition,
use, and control of military force’. As to his view, the intensified process of globalization, rising new
international security means competition for technologies (computer, communication etc.), and
power (military power) among states (Walt, 1991: the integration of global finance, investment and
212-213). Therefore, security is viewed narrowly in production challenged the traditional state-centric
terms of the survival of the state and issues such security thinking.
as nuclear proliferation, deterrence, and power. In To sum up, the field came to understand that the
addition to the state-centric and military –focused traditional approach to security was inadequate and
security agenda, traditional security also embraced needed new approaches. Critical Security Studies
the positivist methodology of realism. Positivism share the belief that in order to respond to complex
rejects human subjectivity and argues that only threats of the post-Cold War period, the agenda
objective knowledge can lead to science. of security should be expanded. This paradigmatic
Realists, however, failed to anticipate the end shift, that took place during the 1980s, broadened
of Cold War. Rapid transformations in world the security agenda. Critical security theorists are
politics led to the emergence of new non-state particularly interested in human beings as the
actors and their security challenges, the growth central referents of a dynamic security discourse.
of interdependence, the declining importance of They challenge the military focused approach of
military power and prioritizing environmental the traditional security understanding.
issues. In the 1990s, most of the armed conflicts in
Ken Booth is the first scholar who has developed In utopian realism, the role of the state is not limited
the idea of security as emancipation. He defined only to being a security provider. As some instances
emancipation as “the freeing of people (as individuals in the world show, many people are under the threat
and groups) from those physical and human constraints, of oppressive administration of their own state. From
which stops them from carrying out what they would that point, the state is a part of insecurity rather than
freely choose to do” (Booth, 1991a:319). Security and a solution. In addition, he rejects the identification of
emancipation are regarded as two sides of the same security with military threats. Compared to military
coin. Since the publication of Booth’s article ‘Security threats, new security threats such as environmental
and Emancipation’ (1991) this approach has confirmed disasters, international migration and xenophobia
its originality by combining three sets of ideas; have different characteristics. Those kind of threats
• It has shifted the focus towards individuals are threats without enemies and require different
as the ultimate referent object of security. solutions (Cheeseman, 2004: 71).
• Security understanding and practices are To sum up, what are the main features of the Welsh
political. School? First, it is highly critical of seeing the state
• The normative side of this view is that the as a referent object and rather puts the emphasis on
condition of insecurity means oppressive individual security. Moreover, its researchers think that
relations and structures (economic, social states often create threats to individuals. To Wyn Jones
and political) which determines the lives of (1999: 309), Critical Security Studies implies “placing
individuals and groups. the experience of those men and women and communities
As to Booth, security means the absence of threats. for whom the present world order is a cause of insecurity
To widen the security issue, Booth ranges threats rather than security at the center of the agenda”. Second,
from direct bodily violence from other humans (war), the Welsh School has its roots in the Gramscian and
through structural, political and economic forms of Frankfurt School tradition of critical theory. That is
oppression (slavery) into more existential threats to where its normative approach and the perception
identity (cultural imperialism) (Booth, 1991a). People of security as emancipation come from. Thus the
can feel secure not just through protection from military third distinctive characteristic of the approach is its
threats but also through protection from the threat of emphasis on emancipation which is understood as
poverty, ill-health, environmental degradation and so removing any barriers that prevent individuals from
on. The Welsh School believes that sustainable peace freedom. The Welsh School believes that if people are
can only be obtained with the emancipated society, emancipated, what they freely choose to do is peaceful
which is free from constraints and able to choose freely. (Buzan, 2009: 206). Furthermore, the School is easily
In short, the emancipatory security approach focuses distinguishable from the other approaches due to its
on human security and human rights. Therefore, the normative-political agenda. Last, they intensify the
instrumentality of justice and law are more important understanding of security by viewing it as a derivative
than military and force. In other words, justice is concept of politics (Booth, 2007: 150). The security is
important rather than order and human rights are also seen as a reflection of the nature of politics.
significant rather than state sovereignty. Criticisms against the Welsh School are mostly
Booth brought forward an alternative to directed to the concept of emancipation. First, it is not
the realism which is “utopian realism”. This is a easy to define the emancipation concept universally.
challenge to realism and its assumptions. According While its usage is ambiguous within western
to his utopian realist view, security and cooperation countries, it may also produce legitimate illiberal
is possible under the anarchical system; instead of practices. In non-western countries, emancipation
state level of analysis, security should be evaluated in can be defined as the right of the independence of
the holistic manner. This means that the individual any ethnic group. This, in turn, may lead to chaos
and international system levels of analysis should and rebellion instead of security (Ayoob, 1997: 127).
be taken into account to evaluate the referents of Many poststructuralists argue that emancipation
the security; lastly security does not mean military is a dangerous ‘meta-narrative’ term and use it for
security (Booth, 1991b: 527). Common security, overarching sceptical explanations of the world.
which is an alternative choice to the realist term The second group of criticisms is about equating
self-help system is also realizable under an anarchic emancipation with security. Emancipation cannot
international system. For example, Western security always provide security. In civil wars, people feel
communities such as the European Union prove themselves more insecure under the regime oppression
that security under the anarchical system is possible. and they have problems with emancipation.
46
2
International Security
Human Security
Human security means the protection of the vital core of all human lives in ways that enhance human
freedoms and human fulfillment. It means protecting people from critical and widespread threats and
situations (CHS, 2003:4). It is a universal concern relevant to people everywhere, both in rich and in
poor nations. Threats to people’s security may differ; hunger and disease afflict those in poor nations
while crime and drugs affect rich nations. Some threats are indeed common to all nations such as job
insecurity and environmental threats. The main principles of human security are people-centered, multi-
sectoral, comprehensive and context-specific and prevention-oriented (UNOCHA, 2010).
In the United Nations Development Program’s (UNDP) 1994 Human Development report, seven main
threats were identified for human security. These are economic security, food security, health security,
environmental security, personal security, community security, and political security (UNDP, 1994:24-
25).
Human security integrates three freedoms: freedom from fear, freedom from want and freedom from
indignity. Freedom from fear refers to protecting individuals from threats directed at their physical
security which includes a various forms of violence (war, civil war, terrorism, and crime etc.). Freedom
from want refers to satisfy people’s basic needs. Freedom from indignity refers to the enhancement of
human welfare and provide an improved quality of life. In the case of the Syrian civil war, many had to
flee to neighboring countries to stay alive and were forced to leave their assets in Syria.
47
2
Major IR Theories and Security
The Copenhagen School in Therefore, the ‘wide’ versus ‘narrow’ debate ended
Critical Security Studies in the favor of widening supporters. Thinking
about security in terms of sectors has widened the
The Copenhagen School of security studies
agenda of security. Buzan examines the dynamics
emerged at the Conflict and Peace Research
of security in five sectors: military, political,
Institute (COPRI) of Copenhagen. Its most
economic, environmental and societal. Each sector
prominent scholars are Barry Buzan, Ole Waever
is identified with specific types of interaction and
and Jaap de Wilde. They all claim that traditional
determined by securitizing actors and referent
methods are inadequate to describe the current
objects. These five sectors do not operate in
security needs. Their main argument is the
isolation from each other.
necessity of ‘broadening and widening’ the security
agenda. In the school’s primary book, Security: A
New Framework for Analysis (1998) Buzan, Waever Five Sectors in the Analysis of Security
and Wilde have built two important conceptual Military Sector refers to the two-level
contributions to the study of security. Barry interplay between the armed offensive capacity
Buzan’s notion of sectoral analysis of security and defensive capabilities of states and their
and Ole Waever’s concepts of securitization and perceptions of each other’s intentions. It is
societal security are the significant contributions about relationships of forceful coercion. Here
of the Copenhagen School. the referent object can be states.
Political Sector means the regime type of
states and their ideologies that provide them
with legitimacy and authority. It is related to
authority, governing status and recognition. In
this sector, the referent object can be national
sovereignty or an ideology.
Economical Sector shows the welfare of the
state and its access to natural resources and
financial markets. It concerns trade, production,
and finance. Its referent object refers to national
economies.
Societal Sector relates to national identity,
Figure 2.6 Barry Buzan, Emeritus Professor in the sustainable culture, customs, and religion. It is
Department of International Relations at LSE and a about relationships of collective identity. The
Fellow of the British Academy referent object here is collective identities.
Source: www.lse.ac.uk Environmental Sector includes the
maintenance of the planetary biosphere. It refers
to the relationship between human activity and
Barry Buzan put forward first sectoral analysis
planetary biosphere. Its referent object is species
of security in his book People, States, and Fear in
or habitats (Buzan, Waever, and Wilde, 1998: 8).
1983. In this book, he points out the limitations of
the realist approach as it gives importance to state
actors only and the military power. In opposition Moreover, to broaden the issue, Buzan claims
to the realist theory, he argues that people are more that the level of analysis is also important for
affected by threats in different areas than military deciding the referent objects of security. Issue levels
ones, such as economic, political, societal and include substate, state, and international system
environmental sectors. The rise of economic and levels. The Copenhagen School believes that in
environmental questions in the 1970s and 1980s, addition to the state, other complementary actors
and later by the rise of concerns with identity issues should be taken into consideration. Although
and transnational crime in the 1990s cannot be Buzan admits non-state actors are also important
explained through a narrow definition of security. units in the securitization model, the state is still
the main actor as a policy-making actor in his
48
2
International Security
approach. As his state-centric view, Buzan can be school defines security as speech act and it is about
called as ‘neo-realist’ and his sectoral analysis is a survival. For them, securitization means ‘an act
synthesis of constructivist and realist approaches. which is presenting an issue as an essential threat that
The most important contribution the requires emergency measures and justifying actions
Copenhagen School to security studies is the outside (Buzan, Wide and Waever, 1998: 24). In
development of an analytical framework of other words, when an issue comes to be treated as
securitization and de-securitization models. a security issue, it is justifiable to use exceptional
The School defines securitization as an act which political measures to deal with it. Waever also
is shifting an issue out of the realm of normal defines securitization as a ‘conservative mechanism’
political debate into the realm of security as an which is created by state elites (Bilgin, 2004: 29).
existential threat. Therefore, this school is also On that issue, Buzan asserts a spectrum from non-
known as ‘securitization studies’. In this model, the politicized through politicized to securitized as
demonstrated in Table 2.3.
The Copenhagen School relies on a two-stage process of securitization to explain how and when an issue
is to be perceived and acted upon as an existential threat to security. The first stage is to declare a referent
object existentially threatened. This move can be initiated by both state and non- state actors. The second
stage is to convince the public that a referent object is existentially threatened. Only then can extraordinary
measures be imposed. The center of these two-stage process of securitization is speech act. Thus an issue
can become a security question through the speech act alone. From that process, we can summarize the
key components of securitization as securitizing actors (government, political elites, military or civil
society), referent objects (state, groups, national sovereignty, legal ideology etc.), threats for referent
objects, and extraordinary measures. Securitization of an issue may provide advantages to government
and political elites in authoritative states such as eliminating opponents and building hegemony on certain
groups. Deciding to securitize one issue and desecuritize the other is a political decision. From that point,
securitizations can be regarded as a massive politicization process.
Another contribution of Ole Waever is the development of the concept of societal security. Taking
conflicts the in Balkans as an example, he mentions the importance of the identity groups inside the
state and their threat perceptions. In his security approach, people and state are defined as two different
referent objects. While the state security focuses on sovereignty, societal security attaches importance
to identity. Thus under societal security, “Identity of a group is presented as threatened by cultural flows,
economic integration or population movements” (Buzan, 1993:47). The state itself may be the cause of the
societal insecurity. An ethnicity or a religious group can create the ‘we’ feeling inside the state, the state
may take extraordinary measures to press these demands. In the Yugoslavian ethnic conflict, Croats, Serbs,
and Bosnians perceived each other as an existential threat and tried to protect their identity in order to
survive (Crawford and Lipschultz, 1997: 178).
The last concept of the Copenhagen School is Regional Security Complex Theory developed by
Barry Buzan and Ole Waever in their book Regions and Powers: The Structure of International Security in
2003. They argued that international relations would take on a more regionalized character in the post-
49
2
Major IR Theories and Security
Cold War world. Therefore, they take the regional international relations, and criminology to analyze
level as the main level of analysis instead of the security. The academic works of the Paris School
international system in the neorealist view. In this are related to post-structural approaches to security.
theory,“a Security Complex is defined as a set of states The school opposes the domination of international
whose major security perceptions are interlinked that relations on security studies. One of the well-
their national security problems cannot be reasonably known scholars of the Paris School is Didier Bigo.
analyzed or resolved apart from one another” (Buzan, He examines the relationship between liberty and
Waever and Wilde, 1998: 12). Security and threats security from the International Political Sociology
are clustered in geographical regions. Security perspective. Bigo has published works related to
regions can be regarded as miniature systems this school in his journal Cultures & Conflicts. The
of international politics where all International school is mostly inspired by French social theorists
Relations theories can be applied such as alliance Pierre Bourdieu and French phiolospher Michel
theory, polarity, and balance of power etc. A Foucault. To date, the most important book of this
regional security complex is is based on four school is Controlling Frontiers: Free Movement into
components as follows: and within Europe (2005) edited by Didier Bigo
1. Regional boundaries, which differentiate and Elspeth Guild.
itself from its neighbors. For Didier Bigo, (in)security is largely a
2. Regional anarchical system, which consists product of security discourses and security policy.
of two or three independents states Like some other non-traditional approaches to
3. Power differences among countries in the security, the Paris School treats security as a social
region, construction as opposed to objective reality. It is
4. The patterns of amity and enmity (Buzan argued that security is the result of what it refers to
and Waever, 2003: 53). an (in) securitization process. The school questions
The most useful aspect of this theory is that it the understanding of security as survival and as a
is a framework for organizing empirical studies of positive value.
regional security. The Regional Security Complex
Theory provides a view of four levels of analyses: state
level, inter-state relations, inter-regional interactions,
and the global level (Buzan and Waever, 2003: 51).
In any time, these regional security complexes
are open to changes, due to internal and external
transformation, or to protect their status quo.
To sum up, the Copenhagen School has
introduced a constructivist approach to security
studies. Its main contributions are securitization
theory, sectoral analysis of security, regional
security complex theory, and societal security. In
addition, this school has been criticized due to
its Eurocentric approach to security. Realists also
argue that their widening of security agenda may
lead to destruction in intellectual coherence (Walt,
1991:213). Furthermore, there is a lack of a clear
definition of security. Figure 2.7 Didier Bigo: Professor at King’s College
London Department of War Studies, and MCU Research
Professor at Sciences-Po Paris.
The Paris School of Critical
Source: https://didierbigo.com/
Security Studies
The Paris School has an interdisciplinary
perspective that brings scholars together from Key components of this school are internal
different disciplines such as political sociology, law, - external security merges, security agencies, and
praxis over discourse. Merging between internal
50
2
International Security
51
2
Major IR Theories and Security
The world systems theory is an approach to Justin Rosenberg has developed the Neo-
world history and social change. The most prominent Marxism. Rosenberg used the elements of Marx’s
proponent of the world systems theory is Immanuel ideas to criticize the realist approach in IR,
Wallerstein. The world systems theory suggests there arguing that the two core concepts of realism,
is a world economic system in which some countries namely sovereignty and anarchy, are the features
benefit while others are exploited. The world-system of the capitalist era. Sovereignty, which is a tool
consists of interrelationships between the ‘core’, the of capitalism, separates some parts of the world
‘periphery’ and the ‘semi-periphery’. from the production process, while anarchy results
The main characteristics of this theory are: from capitalist relations, which are not necessary
circumstances of international relations (Rosenberg
• The world systems theory is established on
1994). Security and insecurity in the Neo-Marxist
a three-level hierarchy consisting of a core,
approach is the condition that has its roots in the
periphery, and semi-periphery areas.
separation of different areas of the world from the
• The core countries, such as the developed
process of production and the need of the capitalist
North, dominate and exploit the peripheral
system to maintain the separation.
countries for labor and raw materials.
• The peripheral countries such as the less
developed South are dependent on core Critical Theory
countries for capital. ‘Critical theory’ or ‘Frankfurt School critical
• The semi-peripheral countries share theory’ is distinguished from other Marxism-
characteristics of both core and peripheral inspired critical theories. The ideas of Antonio
countries. They are economically Gramsci mostly influenced the critical theory.
subordinate to the core but in turn take Gramsci (1970) argues that the capitalist class
advantage of the periphery, thereby system is upheld not simply by unequal economic
constituting a buffer between the core and and political power, but by what he terms the
the periphery. hegemony of bourgeois ideas and theories.
• This theory emphasizes the social structure Hegemony means leadership or domination and,
of global inequality. in the sense of ideological hegemony, it refers to
As for security, the world-system theory holds that the capacity of bourgeois ideas to displace rival
“the existence of security in the world-system theory views and become, in effect, the ‘common sense’ of
is based on the continuity of relations between the the age (Heywood, 2011).
peripheral areas and the core areas. In other words, a
change in resource distribution is viewed as a threat
to security of the system” (Soltani and Yusoff, 2012).
Figure 2.8 Immanuel Wallerstein Figure 2.9 Antonio Gramsci, Italian political philosopher
Source: www.en.wikipedia.org Source: www.britannica.com/biography/Antonio-Gramsci
52
2
International Security
associated with Jacques Derrida’s ([1967] 1976) For postmodernists, discourses are the vehicles
famous formulation: ‘There is nothing outside to reality. David Campbell defined discourse as
the text.’ Poststructural or postmodern thinking “the representation and constitution of the real”
has exerted growing influence on international (Campbell, 1998, quoted in Dominguez, 2011).
relations theory, especially since the publication This can suggest that the knowledge of reality
of Der Derian and Shapiro’s International/ will depend on how we perceive it and how we
Intertextual (1989). Poststructuralism draws represent reality (Dominguez, 2011). Therefore,
attention to the fact that any political event will truth and knowledge can be perceived as socially
always be susceptible to competing interpretations. constructed depending on the space, time and the
9/11 is an example of this. Not only is there, power relations among the different discourses
for poststructuralists, irreducible debate about of reality (Acharya A. et al 2010, quoted in
whether 9/11 is best conceived as an act of Dominguez, 2011). For example, Nelson Mandela
terrorism, a criminal act, an act of evil, or an act was considered a terrorist by conservative British
of (possibly justified) revenge, but there is also Prime Minister Margaret Thatcher and years later
uncertainty about the nature of the ‘act’ itself – was he was considered “one of the greatest men alive”
it the attacks themselves, the process of planning, by conservative British Prime Minister David
the formation of al-Qaeda, the onset of US neo- Cameron (Grice A, 2006). On the one hand, all
colonialism, or whatever? In such circumstances, these different perceptions of the reality may lead
the classic poststructuralist approach to exposing to the interpretation that discourse and language
hidden meanings in particular concepts, theories are everything and there is no real awareness of
and interpretations is a deconstruction. Critics, reality (Campbell, 1998, quoted in Dominguez,
however, accuse postmodernism/Poststructuralism 2011). Postmodernists seek to “deconstruct” such
of relativism, in that they hold that different modes constructions as states, the international system,
of knowing are equally valid and thus reject the and the associated stories and arguments (texts and
idea that even science can distinguish between discourses) with which realists portray the nature
truth and falsehood” (Heywood, 2011:73). of international relations (Campbell, 1993, quoted
For postmodernists like Richard Ashley, realism in Pevehouse and Goldstein, 2014).
is one of the central problems of international
insecurity (Ashley, 1984). This is because realism
is a discourse of power and rule which has been 4
dominant in international politics in the past
and which has encouraged security competition Discuss the poststructuralist
between states. approach to power.
54
2
International Security
55
2
Major IR Theories and Security
56
2
International Security
Summary
and the two terms are sometimes used interchangeably.
57
2
Major IR Theories and Security
1 The existence of security in the ……… is 6 Which of the following is the epistemology
based on the continuity of relations between the of Critical Security Studies?
peripheral areas and the core areas.
a. Post-positivism
Which of the following options correctly completes
the sentence above? b. Positivism
Test Yourself
c. Empiricism
a. Marxism d. Ontology
b. Critical Theory e. Analogy
c. Gramscianism
d. World System Theory
e. New Marxism 7 To which of the following does the Welsh
School’s main concept of emancipation refer?
2 Which of the following holds that democratic a. Survival
states do not go to war with one another? b. Actor
a. Cooperation c. International System
b. Securitization theory d. Policy
c. Security Complex Theory e. Security
d. Democratic peace theory
e. Collective security 8 Which of the following is not one of the
conceptual contributions of the Copenhagen
3 National security is linked to ………. and School to Security Studies?
considered as……………… a. Security Complex Theory
Which of the following options correctly completes b. Securitization Theory
the sentence above? c. Military Security
a. struggle for power … soft politics d. Sectoral Analysis
b. survival… high politics e. Societal Security
c. intervention … high politics
d. diplomacy… soft politics
e. justice …high politics
9 Which of the following IR theories is also
related to the Copenhagen School Security
Studies?
4 Which of the following approaches argues a. Social Constructivism
that security is a social construction?
b. Liberalism
a. Constructivism c. Critical Theory
b. Feminism d. Neo-Liberalism
c. Critical Theory e. Neo-Realism
d. English School
e. Realism
10 According to the Paris School, the concept of
5
Which of the following is not one of the securitization refers to…
differences between traditional and critical security Which of the following options correctly completes
theories? the sentence above?
a. Referent object
a. Survival
b. Methodology
b. Absent of threats
c. A subfield of international relations.
c. Internal/ External security
d. Threats type
e. The meaning of security d. Intolerance towards differences
e. Emancipation
58
2
International Security
1. d If your answer is incorrect, review the 6. a If your answer is incorrect, review the
section on “Marxism and Security” section “Critical Security Studies”
If your answer is incorrect, review the If your answer is incorrect, review the
If your answer is incorrect, review the If your answer is incorrect, review the
3. b 8. c
section on “Realisms/Neorealism and section “Copenhagen School in Critical
Security” Security Studies”
If your answer is incorrect, review the If your answer is incorrect, review the
5. c 10. d
section “Key Dimensions Of Approaches section “Paris School in Critical Security
In Security Studies” Studies”
59
2
Major IR Theories and Security
your turn 1 cooperation, which can help to overcome the dangers of security competition
between states. There are also other approaches to contemporary international
security which take realpolitik and power calculations seriously but which
also argue that domestic politics, beliefs and norms must also be included as
important determinants of state behavior. One such approach is associated
with collective security ideas (Baylis, 2001).
60
2
International Security
References
Adler, E. and Barnett, Michael (1998), Security Bigo, D. (2007). “Internal and External Aspects of
Communities, Cambridge University Press. Security”, Journal of European Security, Vol. 15/4:
385-404.
Ashley, Richard K. (1984). “The Poverty of
Neorealism,” International Organization, Vol. Bilgin, P. (2004). Regional Security in the Middle East:
38/2: 225-286. A Critical Perspective. Routledge.
Ayoob, M. (1997). ‘Defining Security: A Subaltern Booth, K. (1991a). “Security and Emancipation
Realist Perspective’ in Critical Security Studies: “Review of International Studies, Vol. 17/4: 313-
Concepts and Cases. Krause, K. and Williams, 326.
M., Minneapolis: University of Minnesota Press,
Booth, K. (1991b). “Security in Anarchy: Utopian
pp.121-148.
Realism in Theory and Practice”, International
Baldwin, David (1997). ‘The concept of security.’ Affairs, Vol. 67/3: 527-545.
Review of International Studies 23(1): 5-26.
Booth, K. and Vale, P. (1997) “Critical Security Studies
Baylis, John, (2001). “International and Global and Regional Insecurity: The Case of Southern
Security in the Post-Cold War Era,” Smith, Steve, Africa” in Critical Security Studies: Concepts and
and Baylis, John, (Ed), The Globalization of the Cases, Krause, K. and Williams, M. Minneapolis:
World Politics. Oxford: Oxford University Press. University of Minnesota Press
Bigo, D. and Guild, E. (2005). Controlling Frontiers: Booth, K. (2005). Critical Security Studies and World
Free Movement into and within Europe, London: Politics, London: Lynne Rienner.
Routledge.
Booth, K. (2007). Theory of World Security, Cambridge:
Bigo, D. (2002). “Security and Immigration: Towards Cambridge University Press.
a Critique of the Governmentality of Unease”,
Alternatives, Vol 27, pp. 63-92.
61
2
Major IR Theories and Security
Bourbeau, Philippe, Balzacq, Thierry and Cavelty Crawford, B. and Lipschutz, R. D. (1997). “Discourses
Dunn Myriam (2015). “International Relations: of War: Security and the Case of Yugoslavia” in
Celebrating Eclectic Dynamism in Security Critical Security Studies: Concept and Cases, ed.
Studies,” pp.1-37. Keith Krause and Michael Williams, Minnesota:
University of Minnesota Press, pp. 149-187.
Burchill, Scot, Andrew Linklater, Richard Devetak,
Matthew Paterson, Jacqui True (1996). Theories of Dominguez, Alvaro. Mellado (2011). “Postmodernism
International Relations, Macmillan Press. and security challenges in the developing world,”
(20.03.2018), http://www.e-ir.info/2011/03/06/
Buzan, B. (1983). People, States and Fear: An agenda do-postmodernists-have-anything-meaningful-
for International Security Studies in the Post-Cold to-say-about-the-security-challenges-facing-
War Era. Harvester Wheatsheaf. societies-in-the-developing-world/.
Buzan, B. (1991). People, States, and Fear: An Agenda Doyle, Michael (1986). “Liberalism and World
for International Security Studies in the Post-Cold Politics,” The American Political Science Review,
War Era, London: Lynne Rienner. Vol. 80/4: 1151-1169.
Buzan, B. (1993). “Societal Security, State Security Doyle, Michael (1995). “Liberalism and World Politics
and Internationalization “ in Identity Migration Revisited,” in C.W. Kegley (ed.) Controversies
and the New Security Agenda in Europe, (eds) Ole in International Relations Theory. New York: St.
Waever, Barry Buzan, Morten Kelstrup and Pierre Martin’s Press, pp. 83-105.
Lemaitre, Palgrave Macmillan.
Emmers, R. (2010). “Securitization”, in Contemporary
Buzan, B., Ole Wæver, Jaap de Wilde (1998). Security: Security Studies, (ed.) Allan Collins. New York:
A New Framework for Analysis. Boulder: Lynne Oxford University Press, pp.136-151.
Rienner.
Fierke, Karin M. (2007). Critical Approaches to
Buzan, B. and Richard Little (2000). International International Security. Cambridge: Polity Press.
Systems in World History: Remaking the Study of
International Relations. Oxford: Oxford University Foucault, M. (1985). Discipline and Punish: The Birth
Press. of Prison, Harmondsworth: Penguin.
Buzan, B. and Ole Waever (2003). Regions and Powers: Gallie, W. B. (1956). “Essentially Contested
The Structure of International Security. Cambridge: Concepts”, in: Proceedings of the Aristotelian
Society, New Series, 56: 167–198.
Cambridge University Press.
Gulick, John (2011). “The Long Twentieth Century
Buzan, B. and Lene, Hansen (2009). The Evolution
and Barriers to China’s Hegemonic Accession”,
of International Security Studies. Cambridge,
Journal of World-Systems Research, Vol. 17/1.
Cambridge University Press.
Habermas, J. (1984). The Theory of Communicative
Campbell, David (1998). Writing Security: United
Action, Vol 1, Boston: Beacon Press.
States foreign policy and the politics of identity.
Minneapolis: University of Minnesota Press. Heywood, Andrew (2011). Global Politics. New York:
Palgrave Macmillan.
Chatturvedi, J.C. (2005). Political Governance (In 3
Volumes, Comparative Politics), Volume 1, ISHA Hurd, Ian (2008). “Constructivism,” http://faculty.
Books, New Delhi, India. wcas.northwestern.edu/~ihu355/Home_files/17-
Smit-Snidal-c17.pdf.
Cheeseman, G. (2004). “Military Force(s) and In/
security” in Critical Security Studies and World Jones, Richard Wyn (1999). Security, Strategy and
Politics, ed. Ken Booth, London: Lynne Rienner Critical Theory, Boulder: CO Lynne Rienner.
Publishers, pp. 63-87. Karacasulu, Nilüfer, and Uzgoren, Elif (2007).
CHS (2003). “Human Security Now: Final Report” “Explaining Social Constructivist Contributions
Commission on Human Security, New York: To Security Studies,” Perceptions, Summer-
CHS. Autumn 2007, pp. 27-48.
Cox, W. R. (1981). “Social Forces, States, and World Katzenstein, Peter J. (Ed.) (1996). The Culture of
Orders”, Millennium, Vol: 10/2: 126-156. National Security: Norms and Identity in World
Politics. New York: Columbia University Press.
62
2
International Security
Keohane, Robert O. and Joseph S. Nye (1977). Power Peoples, C. and Vaughan-Williams, N. (2010).
and interdependence: world politics in transition. Critical Security Studies An Introduction, New
Boston, Little, Brown. York: Routledge.
Krause, Keith and Michael C. Williams (1997). Pevehouse, Jon C. W. and Joshua S. Goldstein (2014).
Critical Security Studies: Concepts and cases. International Relations. Boston: Pearson, 10th ed.
Minneapolis, University of Minnesota Press.
Shimko, K L. (1992). “Realism, Neorealism and
Laşan, Nicoleta (2012). “International Relations American Liberalism.” The Review of Politics, Vol
Theory and Security,” The Public Administration 54/2: 281-301.
and Social Policies Review, Year IV, No.2/9: 39-48,
Soltani Fakhreddin and Yusoff Mohammad Agus
http://revad.uvvg.ro/files/nr9/4.%20nicoleta%20
(2012). “Concept of Security in the Theoretical
lasan.pdf
Approaches,” Asian Social Science, Vol. 8/15: 244-
Lin, Leo S. F. (2011). “State-Centric Security And 249.
Its Limitations: The Case Of Transnational
UNDP (1994). Human Development Report, http://
Organized Crime,” Research Institute For
hdr.undp.org/sites/default/files/reports/255/
European And American Studies, no.156
hdr_1994_en_complete_nostats.pdf
(accessed on 3 February 2015), http://isndemo.
atlasproject.eu/asset_demo/file/22a0f2f9-49ff- UNOCHA, (2010). “Human Security in Theory
40dc-9023-fecc0e122de4/d3b1d8a9-ecb6-4063- and Practice”, UN Office for the Coordination
8b13-c4177bf822c0/rieas156.pdf of Humanitarian Office, https://www.unocha.
org/sites/dms/HSU/Publications%20and%20
Linklater, A. (1996). “The Achievements of Critical
Products/Human%20Security%20Tools/
Theory” in International Theory: Positivism and
Human%20Security%20in%20Theory%20
Beyond, ed. Steve Smith, Ken Booth and Marysia
and%20Practice%20English.pdf
Zalewski, Cambridge: Cambridge University
Press, pp. 279-301. Walt, Stephen (2010). “Realism and Security,” http://
internationalstudies.oxfordre.com/view/10.1093/
Lyotard, Jean-François (1984). The Postmodern
acrefore/9780190846626.001.0001/
Condition: The Power of Knowledge. Minneapolis:
acrefore-9780190846626-e-286#acrefore-
University of Minnesota Press.
9780190846626-e-286-bibItem-141
Mearsheimer, John (2001). The Tragedy of Great Power
Walt, Stephen (1991). “The Renaissance of Security
Politics. New York: W.W. Norton
Studies.” International Studies Quarterly, Vol.
Molloy, Sean (2006). The Hidden History of Realism: 35/2: 211–39.
A Genealogy of Power Politics. New York: Palgrave
Waltz, K. (1979). Theory of International Politics.
Macmillan.
Reading: Addison Wesley.
Morgenthau, Hans (1993). Politics Among Nations.
Weldes, Jutta (1999). Constructing National Interests:
Brief Edition, foreword by Kenneth Thompson,
The United States and the Cuban Missile Crises.
London, McGraw Hill.
Minneapolis: University of Minnesota Press.
Morgenthau, Hans (1960). Politics Among Nations:
Wendt, Alexander (1992). “Anarchy is what States
The Struggle for Power and Peace. New York:
Make of it: The Social Construction of Power
McGaw-Hill Education, 3rd ed.
Politics.” International Organization, Vol. 46/2:
Mosher, Steven (2002). Hegemon: China’s Plan to 391-425.
Dominate Asia and the World. San Francisco,
Wendt, Alexander (1999). Social Theory of International
California: Encounter Books.
Politics. Cambridge: Cambridge University Press.
Mutimer, David (Ed.) (1999). Canadian Annual
Review of Politics and Public Affairs. Toronto:
University of Toronto Press.
Oldemeinen, Mareike (2010). The Political Realism of
Thucydides and Thomas Hobbes, E-International
Relations students, (Accessed on 2 May 2018),
http://www.e-ir.info/2010/02/15/the-political-
realism-of-thucydides-and-thomas-hobbes/
63
Legitimate Use of Force in
Chapter 3 International Relations
After completing this chapter, you will be able to:
1 2
Learning Outcomes
Explain the UN Charter paradigm on the use of Identify Chapter VII of the UN Charter as a
force source of legitimacy for the use of force
Key Terms
• Use of force
• Legitimacy
Chapter Outline • The United Nations
Introduction • The UN Charter
The UN Charter Paradigm and Legitimate Use • Peacekeeping
Force • UN Peacekeeping Forces
The Use of Force Based on Chapter VII of the UN • Self-defense
Charter • Alliance
The UN Peacekeeping Forces • Humanitarian intervention
The Use of Force and Legitimacy beyond the UN • Protection of citizens abroad
Charter Paradigm • Special tribunals
• Terrorism
• Conventional weapons
• Nuclear weapons
• Nuclear energy
64
International Security
65
Legitimate Use of Force in International Relations
politics, later explains the emerging principles of defense rather than collective security. Yet the UN
use of force beyond the Charter paradigm while Charter, different from the League Covenant,
surveying such issues as humanitarian intervention, establishes a strong Security Council, where the
defense of nationals (citizens) abroad, and treaty- Permanent 5 members (namely the US, China, the
based intervention. United Kingdom, France, and Russia) have had the
veto power and acted somehow as arbitrators in
the system. Besides the right of self-defense defined
THE UN CHARTER AND THE by the Charter, generally these veto states (the P5)
LEGITIMATE USE OF FORCE decide when (and under which circumstances) the
The UN Charter was signed on June 26, 1945 use of force in the system may be considered as
and it came into force on October 24, 1945. Because legitimate as well as when the very UN members
the UN Charter is an international treaty, it binds can resort to military force.
the signatory states in their relations, including on
the use of force. With regard to any attack on states
in the system and the use of force as a result of a
threat to the international order, the UN Charter
has tried to balance the collective-security approach
of the League of Nations era (1920-1939) with
the distribution of power that emerged after the
Second World War. Therefore, some scholars have
referred to both the UN Charter and its security
understanding as ‘realistic’ (Claude, 1999).
In fact, the Covenant of the League of Nations
defined a collective-security system. Article 10 of
the Covenant states as follows: “The Members of Figure 3.1 Security Council considers the situation in
the League undertake to respect and preserve as Afghanistan, December 17, 2018.
against external aggression the territorial integrity Source: www.unmultimedia.org
and existing political independence of all Members
of the League. In case of any such aggression or
in case of any threat or danger of such aggression In principle, the UN Charter has outlawed
the Council shall advise upon the means by which initiating a war of aggression. In other words, it
this obligation shall be fulfilled.” According to this is against the UN-Charter principles for any state
system, which can be considered as a system of to wage an aggressive war. However, the UN does
“one for all, all for one,” when one member of the not outlaw the use of defensive force. We cannot
League is attacked, all the other members would too much stress the importance of this rule of the
automatically come to the help of this victimized UN Charter; that is, the use of defensive force
member. or waging a defensive war has not been outlawed
by the UN. Therefore, it is one of the critical
However, the invasion of Abyssinia, Manchuria,
questions of international law today that under
and Austria fell on deaf ears in the 1930s; the
which circumstances the use of force by states can
League of Nations did almost nothing to stop those
be considered as defensive rather than offensive.
aggressions. This proved that the member states did
For this reason, below we will first reflect on those
not have the will to employ the collective security
Charter principles that regulate the use of force.
system, defined by Article 10 of the Covenant
(Doğan, 2012: 89-122). Therefore, having learned important
a lesson from this experience, the signatories of the
UN Charter stayed away from defining such an The UN Charter has not outlawed the use of
automatic response to use of force by states. defensive force or waging a defensive war.
The UN Charter, which is the primary source
from which we can discern today’s system of
international security, places an emphasis on self-
66
International Security
Article 2/4 of the UN Charter there exists a clear division of opinion whenever
Article 2/4 of the UN Charter is the main rule a state resorts to use of force in the system. For
that regulates the use of force in international example, the US government’s indirect intervention
relations. Accordingly, “All Members shall refrain in Nicaragua through sending aids to the Contra
in their international relations from the threat guerillas was interpreted as an act of individual and
or use of force against the territorial integrity or collective self-defense from the point of the United
political independence of any state, or in any other States; however, from the Nicaraguan perspective,
manner inconsistent with the Purposes of the it was a direct attack on the political independence,
United Nations.” This rule, then, bans a member territorial integrity as well as the economic and
state from using force and from threatening other political system of the country.
states to use force in such a manner that it would
be: a) against the territorial integrity of member Article 2/6 of the UN Charter
states; b) against the political independence of
Article 2/6 of the UN Charter stipulates that
member states; and c) inconsistent with the aims
“the Organization shall ensure that states which
of the UN Charter.
are not Members of the United Nations act in
One can claim that Article 2/4 is clear on the accordance with these Principles so far as may be
use of force in international relations. However, necessary for the maintenance of international
Article 2/4 introduces many uncertainties or, from peace and security.” As such, Article 2/6 emphasizes
a different perspective, it is quite flexible on the that even those states that are not members of the
use of force between states. This creates a debate UN must comply with the Charter’s rules and
and tension between states. “The first point of norms on peace and security as well as it provides a
debate on Article 2/4 is the meaning and scope legal ground for UN members to impose sanctions
of the concept ‘force.’ According to the positivist on these states, if necessary.
approach, which interprets Article 2/4 from a
relatively narrow perspective, the use of force in
international relations refers to the actual use of Article 2/7 of the UN Charter
military force or to threatening a state with using Article 2/7 has been one of the most controversial
military force. From a broader perspective, however, articles of the UN Charter. It is the embodiment of
the concept of use of force in Article 2/4 refers to power struggle among the member states on those
any kind of action that may be undertaken (or any issues that are stipulated in Article 2/4, Article
threat of action) against the territorial integrity 51, and Chapter VII of the Charter. According
and the political independence of a state. From to Article 2/7, “Nothing contained in the present
this perspective, then, even without using military Charter shall authorize the United Nations to
force a state may threaten other states through intervene in matters which are essentially within
ideological, economic, and political means. the domestic jurisdiction of any state or shall
Another debate on Article 2/4 is the scope require the Members to submit such matters to
of the principles of territorial integrity and settlement under the present Charter; but this
political independence. According to the principle shall not prejudice the application of
positivist approach, the scope of Article 2/4 is enforcement measures under Chapter VII.”
limited to the threat and the use of force that The legal key term in the wording of Article 2/7
directly has an effect on the territorial integrity and is the domestic jurisdiction of states. This is so
political independence of a state. From a broader because which actions and issues fall under the legal
perspective, however, the scope of Article 2/4 and political domain of state and when the state
extends to any kind of action against the political can exclusively take decisions on these actions and
authority in a state” (Doğan, 2006: 106). issues have always been controversial. Therefore,
These heated legal and political debates, coupled many decisions that states take on issues related to
with the ambiguity of the UN-Charter objectives, use of force, self-defense, aggression, and political
point to the fact that there is no consensus on independence face opposition at international
Article 2/4 among the UN member states and that platforms.
67
Legitimate Use of Force in International Relations
68
International Security
• “The invasion or attack by the armed b. Another controversial issue on the natural
forces of a State of the territory of another right of self-defense as stipulated in Article 51
State, or any military occupation, however is whether a state must wait for an actual armed
temporary, resulting from such invasion attack to occur against its territorial integrity or
or attack, or any annexation by the use of political independence in order to use its right of
force of the territory of another State or self-defense. Despite the fact that the UN General
part thereof, Assembly has decided that “the first use of armed
• Bombardment by the armed forces of a force by a State in contravention of the Charter
State against the territory of another State shall constitute prima facie evidence of an act of
or the use of any weapons by a State against aggression,” however, the Assembly also qualified
the territory of another State; the use of armed force by drawing attention to
“other relevant circumstances” and to the gravity
• The blockade of the ports or coasts of a
of such an act as well as to the gravity of the act’s
State by the armed forces of another State;
consequences.
• An attack by the armed forces of a State on
Therefore, the critical legal question here is,
the land, sea or air forces, or marine and air
whether a state when it has reasonable doubt and
fleets of another State;
adequate information that another state’s attack
• The use of armed forces of one State which against itself is imminent can first act and use its
are within the territory of another State right of self-defense. In other words, if the threat
with the agreement of the receiving State, of an attack in imminent, does this justify the state
in contravention of the conditions provided to use force preemptively? This issue, which in
for in the agreement or any extension of the literature of International Relations is known
their presence in such territory beyond the as “preemptive strike” or “preventive strike,” is
termination of the agreement; still controversial (Bellier, 2006); however, the
• The action of a State in allowing its actual law (with the exception of recent grave
territory, which it has placed at the disposal situations such as terrorism) is in conformity with
of another State, to be used by that other the approach that the UN Charter should be
State for perpetrating an act of aggression interpreted rather narrowly.
against a third State; c) Another controversial issue on the right of
• The sending by or on behalf of a State self-defense is whether a third state may exercise
of armed bands, groups, irregulars or this right in the name of another state that has
mercenaries, which carry out acts of armed been subject to an attack. For instance, if the state
force against another State of such gravity X is not in a position to defend itself because of
as to amount to the acts listed above, or its an attack, can the state Y, without a call by the
substantial involvement therein.” state X, use legitimate force against the aggressors
by arguing that X has the right of collective self-
defense under international law?
d) Article 51 entitles the member states to
use the right to self-defense “until the Security
Council has taken measures necessary to maintain
international peace and security.” This wording
creates another confusion and controversy. Because,
even though the right of self-defense is considered
natural and resorting to self-defense does not
require the blessing of the Security Council, it is
not clear, however, which circumstances justify a
state to continue enjoying its right of self-defense
and which specific measures taken by the Council
Figure 3.2 The UN General Assembly Hall make it impossible for the state to continue using
Source: www.un.org legitimate force in the name of self-defense.
69
Legitimate Use of Force in International Relations
70
International Security
71
Legitimate Use of Force in International Relations
As a rule, the authority to decide on a decision emerge, the General Assembly can make
peacekeeping mission or a military intervention recommendations and even decide to establish a
rests with the Security Council. As stated in Article peacekeeping mission.
24 of the UN Charter, “in order to ensure prompt
and effective action by the United Nations, its
Members assign the Security Council with the main
responsibility to maintain the international peace
and security.” In fact, the UN Charter has taken
into account the possibility that a conflict of powers
may arise between the various organs of the UN,
especially between the Assembly and the Council.
Therefore, Article 12 states that “While the Security
Council is exercising in respect of any dispute or
situation the functions assigned to it in the present
Charter, the General Assembly shall not make any
recommendation with regard to that dispute or Figure 3.5 a photo of the UN Peacekeeping Force
situation unless the Security Council so requests.” Source: www.peacekeeping.un.org
Through Article 12, the UN reaffirms the scope of
the Council’s authority and responsibilities in such Indeed, upon the Suez crisis, the General
a way not to hurt national interests of the P5 states. Assembly decided to initiate a peacekeeping mission,
However, especially in gray times and in gray the UN Emergency Force (UNEF-I), in November
areas the General Assembly does not hesitate to 1956. The Security Council had established the first
seize opportunities toward exerting and widening peacekeeping mission of the UN (the UN Truce
its authority. In fact, when the Security Council Supervision Organization, UNTSO) in 1948 in an
was not able to act on the issues under its authority attempt to ensure security in Palestine. Therefore,
during the heyday of the Cold War simply because UNEF-I was the second such mission and its
the permanent members failed to reach a consensus primary objective was to observe the withdrawal of
and frequently resorted to their veto power, the French, Israeli, and British forces from Egypt as well
General Assembly passed Resolution 377 (the as to create a buffer zone between Egypt and Israel.
“Uniting for Peace” decision) on November 3, From 1948 onwards the UN has established
1950 (Reicher, 1981). According to this decision, seventy-one peacekeeping missions in various
the General Assembly “resolves that if the Security geographies to address many different problems
Council, because of lack of unanimity of the (UN, 2018a). Out of these seventy-one missions,
permanent members, fails to exercise its primary the following fourteen peacekeeping missions are
responsibility for the maintenance of international still underway:
peace and security in any case where there appears
• United Nations Mission for Justice Support
to be a threat to the peace, breach of the peace,
in Haiti (MINUJUSTH)
or act of aggression, the General Assembly shall
consider the matter immediately with a view • United Nations Mission for the Referendum
to making appropriate recommendations to in Western Sahara (MINURSO)
Members for collective measures” (UN General • United Nations Multidimensional
Assembly, 1950). Moreover, the General Assembly Integrated Stabilization Mission in the
established a Peace Observation Commission, Central African Republic (MINUSCA)
which was composed of 14 members. Therefore, • United Nations Multidimensional
from a legal point of view, one can conclude that Integrated Stabilization Mission in Mali
in accordance with the UN Charter principles (MINUSMA)
the Security Council has the authority to decide
• United Nations Organization Stabilization
on a peacekeeping mission; however, once the
Mission in the Democratic Republic of the
conditions stated within the Uniting for Peace
Congo (MONUSCO)
72
International Security
• African Union - United Nations Hybrid For example, the following two missions
Operation in Darfur (UNAMID) were the peace enforcement missions where the
• United Nations Disengagement Observer UN troops had to physically fight: 1) The UN
Force (UNDOF) Operation in Congo (UNOC): started on July
14, 1960 with the Security Council Resolution
• United Nations Peacekeeping Force in
143 and continued until June 1964; 2) The UN
Cyprus (UNFICYP)
Operation in Somali (UNOSOM II): started
• United Nations Interim Force in Lebanon on March 26, 1993 with the Security Council
(UNIFIL) Resolution 814 and continued until March 1995
• United Nations Interim Security Force for under the leadership of the USA. Since the UN is a
Abyei (UNISFA) universal political organization, its main objective
• United Nations Interim Administration is not, and should not be, waging wars or engaging
Mission in Kosovo (UNMIK) in combat missions, but ensuring global stability
• United Nations Mission in the Republic of and bringing about a lasting peace as an impartial
South Sudan (UNMISS) actor through winning the support and trust of
all states and parties to various conflicts across the
• United Nations Military Observer Group
world. Fighting a war or creating stability in the
in India and Pakistan (UNGOMIP)
system through using force should be the mission
• United Nations Truce Supervision of alliances such as NATO. In short, the UN
Organization (UNTSO). should stay away from any engagement that would
Besides these, the UN also has an ongoing shadow its impartiality and its role as an arbiter in
political mission called the UN Assistance Mission political questions.
in Afghanistan (UN, 2018b). The fundamental objective of the UN in
peacekeeping missions, then, should not be
important fighting but implementing a political and military
observation task in an attempt to ensure regional
For further information on peacekeeping and and global stability. This task may involve observing
the UN peacekeeping missions, please see a referendum or an election in a member state,
Chapter 4. making sure that the security is not threatened in
a given state, monitoring a truce to prevent the
parties from initiating the fighting, or creating
As can be understood from the titles of a buffer zone between the parties. However,
these missions, the primary function of the UN the proliferation of military interventions in
peacekeeping forces is neither using force nor international relations especially after the fall of the
participating in military conflicts. It is widely Berlin Wall, the attempts at transforming the UN
accepted in academia and political circles that two “peacemaking” missions into peace enforcement
criteria must be met for a United Nations mission missions as well as creating new nation states
to be considered as a “peacekeeping mission.” First, in some conflictual geographies have come to
all the parties (whether they are states or political undermine the confidence in the UN.
groups) to the conflict must give their approval to
the deployment of the UN peacekeeping forces.
Second, the peacekeeping forces must not be in
possession of heavy weapons and use force only 3
for self-defense purposes. Therefore, those missions Do some research on UN peacekeepers.
that do not possess these conditions, even though
they are officially named as “peacekeeping,” are
not peacekeeping but, in military (technical
and political terms) are peace enforcement or
peacemaking missions.
73
Legitimate Use of Force in International Relations
74
International Security
Some interventions that had the approval of the before the military operation (Krylov, 1994-1995:
UN are classified as “humanitarian intervention” in 387-402; Brenfors and Petersen, 2000: 476-484).
the IR literature. However, from a legal perspective, Based on these criteria, scholars give the following
humanitarian intervention is an act of use of force interventions as examples of humanitarian
carried out either unilaterally or multilaterally in intervention: East Pakistan, Uganda, Liberia, Iraq
an attempt to protect people in another state from (1991-92).
severe human-rights violations without getting the The decisions of international courts and
approval of the UN. recent developments in international criminal law
Those who have supported the humanitarian may also act as a source for the above-mentioned
interventions and argued that such interventions criteria for humanitarian intervention. With
should be carried out in the system provide both the establishment of the Nuremberg and Tokyo
legal and ethical reasons for their arguments. Military Tribunals, the international society started
As explained above, however, the UN Charter to prosecute individuals for their gross violations
considers it legitimate to use force only in two of human rights, crimes of war, and crimes against
occasions: for self-defense purposes and through humanity. Moreover, following the end of the
the decision of the UN Security Council, acting Cold War the individual responsibility gained a
under Chapter VII of the Charter. As such, the UN prominent place in international criminal law and
Charter does not address the issues of humanitarian the UN established two specific interim tribunals
intervention and gross human-rights violations. for crimes committed in the former Yugoslavia and
Nevertheless, some legal scholars argue that Rwanda (The International Criminal Tribunal
Article 2/4 bans only the use of force “against for the Former Yugoslavia and the International
the territorial integrity or political independence Criminal Tribunal for Rwanda, respectively).
of any state, or in any other manner inconsistent Yet the most critical development in
with the Purposes of the United Nations” and, international criminal law has been the initiation
therefore, that humanitarian intervention does not of the International Criminal Court (ICC) as
violate the UN Charter principles. For example, a permanent international court (Norton, 2010-
according to Kemp, the UN Charter should 2011). Article 5 of the Rome Statute that established
be revised and/or reinterpreted in such a way to the ICC states that the Court has jurisdiction “with
accommodate international human rights norms respect to the following crimes: a) the crime of
and a humanitarian regime in the system (Kemp, genocide; b) crimes against humanity; c) war crimes;
2002: 472). From this legal and ethical perspective, d) the crime of aggression” (ICC, 2014). Therefore,
in situations where the Security Council does not one can argue that criteria that can legitimize an act
act or becomes deadlocked, it is a “legal right of humanitarian intervention have been covered by
and even an ethical duty” for states to initiate a the Rome Statute. Especially the first two crimes
humanitarian intervention (Brenfors and Petersen, listed in Article 5 (namely, the crime of genocide
2000: 499). and crimes against humanity) can play a critical role
Scholars who support this approach also hold in determining, and reaching a consensus on, the
that there must be some objective criteria for criteria for humanitarian intervention. In fact, even
initiating a humanitarian intervention as well as though Serbia had initiated cases at the ICJ (Legality
certain limits on the use of force. Among others, of the Use of Force) against the Britain, Portugal,
the following criteria stand out in the literature: the Netherlands, Italy, Germany, France, Canada,
the actual violation of fundamental human rights Belgium, Spain, and the USA because of the NATO
and especially serious threats to the right to life in intervention in Kosovo, the Court, however, rejected
a country, the necessity, the proportionality, the these cases on the ground that “it has no jurisdiction
exhaustion of peaceful means, the existence of a to entertain the claims made in the Application”
humanitarian intent on the part of the interveners (ICJ, 2004). Those who argue for humanitarian
(the intent must not be political), a collective intervention consider this decision of the ICJ as a
(multilateral) operation rather than a unilateral proof for the merit of their legal approach.
act, and the consultation with the Security Council
75
Legitimate Use of Force in International Relations
Figure 3.6 Presiding judge Peter Tomka of Slovakia opening the World Court session in The Hague, 2015, Croatia v.
Serbia, genocide case.
Source: The Telegraph, February 4, 2015, www.telegraph.co.uk
However, according to those legal scholars Somali, Rwanda, Haiti, Kosovo, and East Timor,
who argue against humanitarian interventions, concludes that “the international community
the UN system has banned the use of force in increasingly views gross violations of human rights
international relations except in the circumstances as threats to international peace and security
that the Charter has explicitly listed. Moreover, and justifies these violations to circumscribe the
they argue that humanitarian intervention may immunity of sovereign boundaries” (Lodico, 2001:
provide an excuse for those states that may want 1029-1031).
to use force for political reasons and that, in fact, One can observe that “Western” legal scholars and
many interventions so far were carried out not politicians, as opposed to their “Eastern” counterparts,
for humanitarian but for political reasons. For lean toward supporting humanitarian interventions.
example, according to Goodman, the necessity . Compared to France, the UK, and the USA, both
for humanitarian intervention has a high potential China and Russia, in their international relations
to create an excuse for future wars (Goodman, as well as at the UN Security Council, approach
2006: 107). Upcher also underlines the fact that warily to the issue of humanitarian intervention
humanitarian intervention is not a legal doctrine (Bass, 2009). Nevertheless, the Group of 77, which
but a political act and asserts that the “tendency is also known as the “Non-Aligned Movement,” at
to employ international law as an instrument the end of the Havana Summit convened between
for political whim and moral assertion should April 10-14, 2000, declared that they “reject the so-
be resisted, especially when war is framed in called ‘right’ of humanitarian intervention, which
humanitarian rhetoric, as a noble emancipation of has no legal basis in the United Nations Charter or
the powerless undertaken for the sake of humanity” the general principles of international law” (Group
(Upcher, 2004: 276). On the other hand, Lodico of 77, 2000). The Group also voiced its concerns
argues that, taking into account all the interventions with regard to the proliferation of humanitarian
since 1990, the international society has been very interventions and the developments within the UN
selective in carrying out military interventions and on this subject matter.
that in the absence of important strategic interests
It is still a matter of argument whether from the
states have considered humanitarian and ethical
start of the Westphalian system up until the adoption
reasons inadequate for initiating an intervention.
of the UN Charter there was a rule of humanitarian
Lodico, who closely studied the examples of Iraq,
intervention in customary international law.
76
International Security
77
Legitimate Use of Force in International Relations
Examples of an intervention clause in multilateral committee govern the Abkhazia region. Furthermore,
treaties abound. For one, the Cotonou Agreement the warring factions in Somali called for the
authorizes the Observer Group for Economic international society to implement the agreements
Union of West African States (ECOMOG), which reached among themselves through a joint
was established by the Economic Community of international force (Wippman, 1995: 607-608).
West African States-ECOWAS, to use military Besides these examples, what has been more
force, if necessary, against those parties that are in critical for both Turkish foreign policy and the
breach of the agreement. security in the Eastern Mediterranean is the
Besides, Article XIII of the Statement of Treaty of Guarantee signed on August 16, 1960
Principles of the International Conference on the among Turkey, Greece, and the United Kingdom.
Former Yugoslavia that convened in 1992 refers According to Article II of the Treaty “Greece, the
to the “need for international guarantees” in United Kingdom and Turkey, undertake to prohibit,
order to implement the agreements reached at the as far as lies within their power, all activity having
Conference. Furthermore, Article 6 and Article 1 the object of promoting directly or indirectly either
of Annex I of “the Agreement on a Comprehensive the union of the Republic of Cyprus with any
Political Settlement of the Cambodia Conflict,” other State or partition of the Island.” Article IV of
signed on October 23, 1991 in Paris Conference, the Treaty, in fact, authorizes each party, including
has delegated all the authority to the UN and an Turkey, to take action unilaterally, if necessary; it
organ it established, namely UNTAC, in order states that “in so far as common or concerted action
to ensure the implementation of the Agreement. may not prove possible, each the three guaranteeing
The Cambodia Agreement was accepted and Powers reserves the right to take action with the sole
announced by the UN (documents S/23177 and aim of re-establishing the state of affairs created by
A/46/608). the present Treaty.” Based on these clauses of the
The president of Georgia suggested the UN Treaty of Guarantee, Turkey initiated the Cyprus
Security Council in 1994 that an international Peace Operation on July 20, 1974.
There are two main approaches in the IR literature with regard to military interventions or use of
force based on a treaty. According to the first approach that supports such interventions, making a treaty
is a matter within the exclusive jurisdiction of states. In other words, states, which is entitled to political
sovereignty, can voluntarily sign a binding international treaty that may have a clause on how they should
use or limit their sovereign rights in the future. Just as a state can create a new political institution in
cooperation with another state or a group of states, in the same way it can agree to a clause that a military
78
International Security
intervention may initiate against itself, if it does Arend and Beck define the act of protecting
not implement the treaty. the state citizens abroad as follows: under such
The second approach to military interventions circumstances when the lives of a state’s citizens
or use of force based on a treaty takes into account are actually in danger in another state or when
the concept of “peremptory norm” (jus cogens) the citizens are under an imminent threat, it is to
and holds that a treaty that would eliminate the evacuate these citizens from the area controlled
political sovereignty, territorial integrity, and by the state in question (such as from its territory,
political independence of states cannot be duly ship, or aircraft) (Arend and Beck, 1993: 94).
signed in international relations. Simply because Examples of such acts abound in international
the political sovereignty, territorial integrity, and relations (Wingfield, 1999-2000: 444-460):
political independence are the basic premises of • The threats of British intervention in Iran
being a state, any treaty clause that would eliminate (1946, 1951);
them would go against the peremptory norms of • The rescue plan of the British nationals
international law (and of the Westphalian state during the Cairo Riots (1952);
system) (Wippman, 1995: 610-611).
• The British and French joint intervention
Beyond this theoretical discussion, the examples in Egypt- the Suez crisis (1956);
given above demonstrate that both the United
• The Belgium intervention in the Congo
Nations through its documents and decisions
(1960);
and the very states through the international
treaties have agreed and accepted that a third party • The United States interventions in the
(whether it is a state or an international institution) Dominican Republic (1965), Grenada
may forcefully intervene in the domestic affairs of (1983), Panama (1989), and Liberia
a sovereign state. (1990);
• The rescue of the United States the
American merchant ship “Mayaguez” from
Protection of State Citizens Abroad the Kampuchean control (1975);
Another critical recent issue with regard to the • The evacuation of the US citizens from
use of force in international relations is whether Lebanon (1976) and the US attempt to free
it is legitimate for a state to protect its nationals the American hostages in Iran (1980);
or citizens living in other states by using force, if
• The Israeli attack on the Entebbe airport in
necessary, without such an authorization by the
Uganda (1976);
UN Security Council.
• The threat of French intervention in the
In fact, this issue has been debated in reference
Western Sahara (1978);
to the right of “self-defense.” This right of states
emanates from two basic sources: Article 51 of • The Egyptian raid on an aircraft at the
the UN Charter and customary international law. Larnaka International Airport (1978).
We have already discussed the norms that Article Two main approaches have tackled the legitimacy
51 evokes and what these norms may suggest for issue of state interventions or threats of intervention
the use of force in world politics. International to protect the nationals. According to the rather
customary law, on the other hand, requires for narrow approach, such interventions are basically
resorting to force such legal principles as the under the UN authority and the UN should decide
urgency, the necessity, the proportionality as well as on the use of force in a specific case except the use of
the bond of citizenship between the individuals to force for self defense purposes, when an armed attack
be protected and the state. Taken these principles occurs against the territorial integrity of a member
together, one may conclude that if a state resorts to state. Besides, this approach holds that agreeing to
force to protect its citizens living in another state such use of force by states would initiate a process that
in such a way that would conflict with Article 51 would encourage them to legitimize interventions in
and/or international customary law, then, this use world politics. Those who argue against this rather
of force would be illegal and illegitimate. narrow approach claim that customary international
law allows such interventions.
79
Legitimate Use of Force in International Relations
Accordingly, an attack on a state’s citizens that Russia did not use proportional force against
may be considered as an attack on that state and Georgia, did not exhaust all diplomatic options,
would invoke the right of self-defense, as defined and the situation in Georgia was not that grave,
in Article 51 of UN Charter. Moreover, from this the Russian occupation of Georgian territory can
perspective, acts done out of respect for human be considered neither a legitimate act nor an act
rights should be allowed in international relations, of self defense under Article 51 of the UN Charter
even if they are carried out for protecting state (Chatham, 2011: 90-102).
nationals abroad (Wingfield, 1999-2000: 460- As discussed above, Turkey carried out its
466). Recently such acts have been debated with Peace Operation on Cyprus in 1974, based on
reference to international terrorism; therefore, the intervention clause of the Treaty of Guarantee
states have resorted to either multilateral treaties signed in 1960 among Turkey, Greece, and the
signed under the auspices of the UN or the right UK. Although Turkey has not voiced the thesis
to self defense against terrorism to legitimize of protecting the nationals abroad, it would be
their operations to protect its nationals abroad. legitimate for Turkey to argue that it intervened
Especially the Israeli attack on the Entebbe airport in the “Cyprus Republic” in 1974 to protect its
and the Egyptian raid at the Larnaka Airport can nationals living on the island of Cyprus and that
be given as examples of such legitimization of the it reserves this right for future political or military
use of force in world politics. developments on the island. However, compared
Protection of citizens abroad and the criteria to the absolute and unlimited right conferred to
for intervention recently came to the forefront in Turkey by the Treaty of Guarantee, this reasoning
international relations because of a conflict between would provide Turkey with relatively circumscribed
Russia and Georgia. Russia started a military rights to protect its nationals on the island.
operation against Georgia on August 8, 2008, and
almost occupied all of Georgian territory. Russia
withdrew from Georgia two months later. During
Use of Force against International
this operation, Russia claimed that it was using and Terrorism
protecting the right of self defense of its citizens Another issue that has become prominent
living in Georgia, and particularly in South Ossetia especially with the attacks on the Twin Towers and
(Chatham, 2011: 76). Georgia, on the other hand, the Pentagon building in the US on September 11,
declared that it was fighting the Russian forces to 2001 and that has provided the target states with
sustain its political independence and protect its the legitimacy for resorting to force beyond the UN
territorial integrity. When armistice was signed Charter paradigm is the fight against international
on August 12, 2008, Russia was controlling terrorism. Because not only Turkey has been the
all South Ossetian territory and asserted at the target of such attacks but also most regions in the
diplomatic talks that Georgia was not able to fulfil world have witnessed many acts of terrorism, the
its responsibility to protect the Russian nationals. issue of what kind of means are available to states
However, as explained above, in order for the in their fight against terrorism, including the use
use of force of a state in an incident to be legitimate, of military force, has been critical. Below we will
that act of use of force should conform the right of first give a definition of terrorism and then review
self defense, as laid down in Article 51 of the UN the measures taken by the international society and
Charter. Even if one assumes that Georgia failed to the legal texts accepted within the UN system, and
fulfil its responsibility, Russia did not have the right finally touch on the issue of self defense in case of
to resort to reprisal. Moreover, the principle of a terrorist attack.
protection in international law and politics is based
not on the kin relations but on citizenship. Given
80
International Security
81
Legitimate Use of Force in International Relations
Figure 3.9 A photo of The UN Secretary-General Antonio Guterres with the Under-Secretary-General of the UN
Counter-Terrorism Office, Mr Vladimir Voronkov (left).
Source: www.un.org
The Council condemned all international “legal instruments” (conventions and protocols)
terrorist actions carried out after 2001, including toward combating international terrorism:
the attacks in Istanbul in 2003. Moreover, the • Convention on Offences and Certain Other
Council passed Resolution 1386 that authorized Acts Committed on Board Aircraft (1963),
the establishment of an international force toward
• Convention for the Suppression of
preventing further terror acts in Afghanistan.
Unlawful Seizure of Aircraft (1970),
More specifically, through this resolution the
Council established the International Security • Convention for the Suppression of
Assistance Force (ISAF) that would assist “the Unlawful Acts against the Safety of Civil
Afghan Interim Authority in the maintenance of Aviation (1971),
security in Kabul and its surrounding areas, so • Convention on the Prevention
that the Afghan Interim Authority as well as the and Punishment of Crimes against
personnel of the United Nations can operate in Internationally Protected Persons (1973),
a secure environment.” The Council also called • International Convention against the
upon all UN members to “contribute personnel, Taking of Hostages (1979),
equipment, and other resources” to ISAF (UN • Convention on the Physical Protection of
Security Council, 2001c). Besides the Security Nuclear Material (1980),
Council’s initiatives, the General Assembly adopted
• Convention for the Suppression of
the Global Counter-Terrorism Strategy in 2006
Unlawful Acts against the Safety of
and prepared a comprehensive “Plan of Action.”
Maritime Navigation (1988),
Through the adoption of the Global Counter-
Terrorism Strategy, all UN members have agreed • Protocol for the Suppression of Unlawful
to “a common strategic and operational approach Acts of Violence at Airports Serving
to fight terrorism, not only sending a clear message International Civil Aviation, supplementary
that terrorism is unacceptable in all its forms and to the Convention for the Suppression of
manifestation but also resolving to take practical Unlawful Acts against the Safety of Civil
steps individually and collectively to prevent and Aviation (1988),
combat it” (UN General Assembly, 2006). • Protocol for the Suppression of Unlawful
Within the framework of the United Nations, Acts Against the Safety of Fixed Platforms
states have adopted the following major multilateral Located on the Continental Shelf (1988),
82
International Security
• Convention on the Marking of Plastic whether a state or a terrorist organization carries out
Explosives for the Purpose of Detection the armed attack makes no difference when it comes
(1991), to using the right to self-defense under Article 51
• International Convention for the of the UN Charter. It seems that the fathers of the
Suppression of Terrorist Bombings (1997), UN Charter did not define the concept of “armed
attack” on purpose. As such, they made it possible
• International Convention for the
for the UN organs to interpret each act of attack
Suppression of the Financing of Terrorism
on its own merits and decide whether that act is
(1999),
an act of self-defense as well as that they opted for
• International Convention for the Suppression formulating Article 51 not that rigid to allow the
of Acts of Nuclear Terrorism (2005), states to take legitimate measures against certain
• Convention on the Suppression of acts of non-state actors (Stahn, 2003: 35-36).
Unlawful Acts Relating to International The terrorist attacks on the US on September
Civil Aviation (2010). 11, 2001 has had such a profound effect on
As it is clear from the titles of these legal texts, international scholars and the states that they
the international society so far has been able to changed their approach to the use of force
create binding legal rules especially for promoting beyond national borders. In the aftermath of the
the safety of civil aviation and maritime navigation. 9/11 attacks, the UN Security Council, through
It has also been instrumental in the signing of legal Resolution 1368, not only condemned the attacks
texts toward suppressing both terrorist bombings but also reaffirmed the right to self-defense in
and financing of terrorism that are relatively responding to terrorism. Moreover, NATO referred
more critical for some members’ national security. to the 9/11 attacks as a direct attack on the United
However, it is also a fact that the international States and invoked Article 5 of the Washington
society has failed to conclude a comprehensive Treaty (the casus feoderis clause) for the first time in
international treaty against terrorism. its history that paved the way for the deployment
Operations conducted outside of a state’s borders of its assets in support of the US. Therefore, a
due to an act of terror should be considered as an critical change that the 9/11 attacks have defined
act of “self-defense” under Article 51. Although in international relations and international law is
the UN Charter makes it legitimate to use force that acts carried out by a state or a group of states
in self-defense against an “armed attack,” it does against terrorism may be considered as self-defense
not qualify the nature of the perpetrator of such within the scope of Article 51 of the UN Charter
an attack (Schachter, 1988-1989: 311). Therefore, (Stahn, 2003: 37).
83
Legitimate Use of Force in International Relations
A state’s use of its natural right of self-defense In the post-9/11 world, the state that has been
though dispatching troops to another state in an the target of international terrorism does not have
attempt to defeat terrorism constitutes an exception to prove a direct relationship between the state
to the basic principle enshrined in Article 2/4 of the protecting the terrorists (the host state) and the
Charter that “members shall refrain from the threat terrorist groups to launch cross-border military
or use of force against the territorial integrity or operations. For example, although it was not
political independence of any state.” In fact, in its Afghanistan that carried out 9/11 acts against the
Corfu Channel opinion of 1949, the International United States, the coalition forces held Afghanistan
Court of Justice “stated that every state is under an responsible and started a military mission against
obligation ‘not to allow knowingly its territory to the country because they concluded that it was
be used for acts in a manner contrary to the rights Afghanistan through its Taliban regime who
of other states’” (Kittrich, 2009: 135). One can provided Al Qaeda with a safe heaven.
observe the application of this rule in the aftermath
of the 9/11 attacks. Now the legal interpretation
and the state practice have changed in such a way
that states not only expect that other states must 4
keep the terrorists in their territory under effective Do some research on the jurisdiction of the
control but also consider it legitimate to undertake International Criminal Court.
a military mission if certain states provide terrorists
with a safe heaven or an indirect support because of
their reluctance or inability to prevent terrorist acts
(Michael, 2009: 159).
84
International Security
The UN Charter, which is the primary source from which we can discern today’s system of international
security, places an emphasis on self-defense rather than collective security. Yet the UN Charter, different
from the League Covenant, establishes a strong Security Council, where the Permanent 5 have had the
veto power and acted somehow as arbitrators in the system. Besides the right of self-defense defined by the
Charter, generally these veto states (the P5) decide when (and under which circumstances) the use of force
Summary
in the system may be considered as legitimate as well as when the very UN members can resort to military
force. In principle, the UN Charter has outlawed initiating a war of aggression. In other words, it is against
the UN-Charter principles for any state to wage an aggressive war. However, the UN does not outlaw the
use of defensive force. We cannot too much stress the importance of this rule of the UN Charter; that
is, the use of defensive force or waging a defensive war has not been outlawed by the UN. Therefore, it is
one of the critical questions of international law today that under which circumstances the use of force by
states can be considered as defensive rather than offensive. Article 2/4 of the UN Charter is the main rule
that regulates the use of force in international relations. One can claim that Article 2/4 is clear on the use
of force in international relations. However, Article 2/4 introduces many uncertainties or, from a different
perspective, it is quite flexible on the use of force between states. This creates a debate and tension between
states. Article 2/6 emphasizes that even those states that are not members of the UN must comply with
the Charter’s rules and norms on peace and security as well as it provides a legal ground for UN members
to impose sanctions on these states, if necessary. Article 2/7 has been one of the most controversial articles
of the UN Charter. It is the embodiment of power struggle among the member states on those issues
that are stipulated in Article 2/4, Article 51, and Chapter VII of the Charter. The right of self-defense is
enshrined in Article 51 of the UN Charter. The UN Charter acknowledges that, in this system of states,
each state has the right to defense either individually or collectively, through combining its efforts with
those of other states, within an alliance if it is needed. Article 51 also acknowledges that self-defense is
a natural right in that in order for the state to exercise this right, the permission or the authorization of
any organization or institution is not needed. With regard to the legitimate use of force, another issue
that has occupied a prominent place in the agenda is the role that regional organizations can play in the
international system. However, Article 53 is not only unclear on such concepts as “arrangements” and
“regional agencies,” but also silent on the question of under which particular conditions the Security
Council should ask help from these arrangements and agencies.
Chapter VI of the UN Charter empowers the Security Council on the issue of “peaceful resolution of
disputes” among states and defines various political and judicial solutions. Whereas these measures would
be inadequate, Chapter VII of the UN Charter gives the authorization to the Security Council to take
precautions of the implementation of necessary sanctions and coercive measures, including the use of
force. According to Article 42, the Security Council is able to take the decision of use of armed force in
the international system. As such, the use of force by member states to implement a decision of the UN
Security Council is “legitimate” under international law. In fact, the UN, within the scope of Article 42,
decided to use armed force on two occasions only: first, during the Korean War in 1950 and, second,
through its Resolution 678 (1990) to drive the Iraqi forces out of Kuwait. However, we also observe that
some states use force in international relations without the authorization of the Security Council. For
example, although the UN was not able to pass a resolution on the US occupation of Iraq in 2003 as well
as on the independence question between Serbia and Kosovo, some states either unilaterally intervened in
these questions or participated in NATO operations.
85
Legitimate Use of Force in International Relations
Chapter VI of the UN Charter is related to the Security Council’s authority with regard to pacific
settlement of disputes, whereas Chapter VII is about the coercive measures, including the use of force in
case of an attack against a member state. Nevertheless, there is no legal arrangement for “peacekeeping”
in the UN Charter. In fact, the concept of, and the mission of, peacekeeping is something invented by
the UN Secretary-General Dag Hammarskjöld, because the Security Council had become paralyzed and
perplexed due to the Cold War and especially to the conflictual relations between the two superpowers
Summary
that made it impossible for the UN to implement the clauses of Chapter VII. As a rule, the authority to
decide on a peacekeeping mission or a military intervention rests with the Security Council. However,
especially in gray times and in gray areas the General Assembly does not hesitate to seize opportunities
toward exerting and widening its authority. In fact, when the Security Council was not able to act on the
issues under its authority during the heyday of the Cold War simply because the permanent members
failed to reach a consensus and frequently resorted to their veto power, the General Assembly passed
Resolution 377 (the “Uniting for Peace” decision) on November 3, 1950. The fundamental objective
of the UN in peacekeeping missions, then, should not be fighting but implementing a political and
military observation task in an attempt to ensure regional and global stability. However, the proliferation
of military interventions in international relations especially after the fall of the Berlin Wall, the attempts
at transforming the UN “peacemaking” missions into peace enforcement missions as well as creating new
nation states in some conflictual geographies have come to undermine the confidence in the UN.
The UN system makes it legitimate to use armed force only in two occasions: self-defense under Article
51, and interventions because of a UN Security Council resolution within the scope of Article 42.
However, there are also some philosophical and political underpinnings or reasons such as humanitarian
intervention, protecting state citizens, and terrorism that would help legitimize the instances of use of
force in international relations. These reasons for resorting to force may be classified as “beyond the UN
Charter paradigm” because the UN Charter does not cover or directly address them. First of all, especially
following the end of the Cold War we have witnessed in the international system such issues as killing the
civilians in war zones or conflict zones, gross violation of human rights, genocides as well as the violation
of international humanitarian law. The international society decided to intervene or not to intervene in
these grave issues. The political literature and academia mainly had this discussion with a reference to
the concept of humanitarian intervention. It is still a matter of argument whether from the start of the
Westphalian system up until the adoption of the UN Charter there was a rule of humanitarian intervention
in customary international law. However, it is also a fact that more and more scholars and politicians/
practitioners support the idea today that under some specific circumstances and under the condition of
minding the stability of the international system, it is possible to initiate a humanitarian intervention.
Second, the UN Charter is silent on interventions based on a treaty. However, given that treaty is one of
the primary sources of international law, one can conclude that an intervention based on a treaty clause is
legitimate. Third, another critical recent issue with regard to the use of force in international relations has
been whether it is legitimate for a state to protect its nationals or citizens living in other states by using
force, if necessary, without such an authorization by the UN Security Council. This issue has been debated
in reference to the right of self-defense. Finally, another issue that has become prominent especially with
the attacks on the Twin Towers and the Pentagon building in the US on September 11, 2001 and that
has provided the target states with the legitimacy for resorting to force beyond the UN Charter paradigm
is the fight against international terrorism. The terrorist attacks on the US on September 11, 2001 has
had such a profound effect on international scholars and the states that they changed their approach to
the use of force beyond national borders. In the aftermath of the 9/11 attacks, the UN Security Council,
through Resolution 1368, not only condemned the attacks but also reaffirmed the right to self-defense in
responding to terrorism. Moreover, NATO referred to the 9/11 attacks as a direct attack on the United
States and invoked Article 5 of the Washington Treaty.
86
International Security
1 Which of the following UN secretaries- 5 Which of the following is not a part of the
general invented the concept of peacekeeping? definition of terrorism?
a. Kofi Annan a. Violence
b. Antonio Guterres b. The existence of a target group
Test Yourself
c. Dag Hammarskjöld c. A political objective
d. Ban Ki-moon d. Fear
e. Kurt Waldheim e. Robbery
87
Legitimate Use of Force in International Relations
9 Which of the following acts may not be 10 Which of the following Articles of the UN
considered as an act of attack in the scope of Charter lays down the basic principles of the use
Resolution 3314 of the UN General Assembly? of force in international relations?
a. Invasion a. Article 2/4
b. Occupation b. Article 2/6
c. Blockade c. Article 2/7
Test Yourself
d. Bombardment d. Article 51
e. Economic sanctions e. Article 53
88
International Security
If your answer is not correct, please review the If your answer is not correct, please review
1. c 6. b
“The UN Charter Paradigm and Legitimate the “The Use of Force and Legitimacy
Use Force” section. beyond the UN Charter Paradigm” section.
If your answer is not correct, please review If your answer is not correct, please review
3. a 8. e
the “The Use of Force and Legitimacy the “The Use of Force Based on Chapter VII
beyond the UN Charter Paradigm” section. of the UN Charter” section.
If your answer is not correct, please review If your answer is not correct, please review the
4. c 9. e
the “The Use of Force and Legitimacy “The UN Charter Paradigm and Legitimate
beyond the UN Charter Paradigm”section. Use Force” section.
If your answer is not correct, please review If your answer is not correct, please review the
5. e the “The Use of Force and Legitimacy
10. d
“The UN Charter Paradigm and Legitimate
beyond the UN Charter Paradigm” section. Use Force” section.
89
Legitimate Use of Force in International Relations
“The Charter does not provide an exhaustive list of sanctions that the Security
Council may invoke, but it mentions two types: sanctions not involving the
use of armed forces, and military sanctions. Sanctions not involving the use
of armed forces may be of two kinds. One is the severance of diplomatic
relations with one or more of the belligerent states. The other is economic
sanctions, including partial or complete interruption of economic relations
and communications, such as rail, sea, and air traffic, postal and telegraphic
services, and radio. The purpose is to isolate the country or countries against
which they are directed, physically, economically, and morally. For example, a
would-be aggressor that is denied certain strategic materials may be compelled
to cease hostilities. If successful, such measures have great advantages over
your turn 2 military sanctions. They impose fewer burdens on the participating countries
and fewer hardships on the population of the areas of conflict. They also
avoid the danger that once military action on behalf of the UN has been
taken, war may spread. Military sanctions, the Charter stipulates, may include
demonstrations by air, sea, or land forces; blockade; or “other operations by
air, sea, and land forces,” the latter including actual military action against
the off ending country or countries. Once the Security Council has decided
on specific sanctions, all members of the UN are under legal obligation to
carry them out. The council may, however, at its discretion, decide that only
certain member states shall take an active part, or it may demand that even
nonmember states participate in economic sanctions to make them effective”
(Gall and Hobby, 2007: 34-35).
90
International Security
91
Legitimate Use of Force in International Relations
“The Court may exercise jurisdiction in a situation where genocide, crimes against
humanity or war crimes were committed on or after 1 July 2002 and the crimes
were committed by a State Party national, or in the territory of a State Party, or in
a State that has accepted the jurisdiction of the Court; or the crimes were referred
to the ICC Prosecutor by the United Nations Security Council (UNSC) pursuant
to a resolution adopted under chapter VII of the UN charter.
As of 17 July 2018, a situation in which an act of aggression would appear to
have occurred could be referred to the Court by the Security Council, acting
under Chapter VII of the United Nations Charter, irrespective as to whether it
involves States Parties or non-States Parties. In the absence of a UNSC referral
of an act of aggression, the Prosecutor may initiate an investigation on her own
your turn 4
initiative or upon request from a State Party. The Prosecutor shall first ascertain
whether the Security Council has made a determination of an act of aggression
committed by the State concerned. Where no such determination has been made
within six months after the date of notification to the UNSC by the Prosecutor
of the situation, the Prosecutor may nonetheless proceed with the investigation,
provided that the Pre-Trial Division has authorized the commencement of the
investigation. Also, under these circumstances, the Court shall not exercise its
jurisdiction regarding a crime of aggression when committed by a national or on
the territory of a State Party that has not ratified or accepted these amendments”
(https://www.icc-cpi.int/about/how-the-court-works).
92
International Security
References
Ajaj, Ahmad M. (1992-1993). “Humanitarian Goodman, Ryan (2006). “Humanitarian Intervention
Intervention: Second Reading of the Charter of and Pretexts for War,” The American Journal of
the United Nations,” Arab Law Quarterly, No. 7, International Law, No. 100, pp.107-141.
pp. 215-236.
Group of 77 (2000). http://www.g77.org/summit/
Arend, Anthony C. and Robert J. Beck (1993). Declaration_G77Summit.htm
International Law and the Use of Force: Beyond the
Halberstam, Malvina (1995). “The Legality of
UN Charter Paradigm, New York: Routledge.
Humanitarian Intervention,” Cardozo Journal of
Bass, Gary J. (2009). “Humanitarian Intervention International and Comparative Law, No. 3/1, pp. 1-8.
in the 21st Century,” The Tocqueville Review,
Henkin, Louis (1991). “Use of Force: Law and U.S.
No.30/1 pp.17-35.
Policy.” Barry E. Carter and Phillip R. Trimble
Beck, Robert J. and Anthony Clark Arend (1993- (Ed.), International Law. Boston: Little and
1994). “Don’t Tread on Us: International Law and Brown, pp. 1233-1241.
Forcible State Responses to Terrorism,” Wisconsin
ICC (2014). Rome Statute of the International
International Law Review, No. 12/2, pp. 153-219.
Criminal Court. http://www.icc-cpi.int/NR/
Bellier, Stephanie (2006). “Unilateral and Multilateral rdonlyres/ADD16852-AEE9-4757-ABE7-
Preventive Self-Defense,” Maine Law Review, 9CDC7CF02886/283503/RomeStatutEng1.pdf
No.58/2, pp. 508-542.
ICJ (1986). Case Concerning Military and Paramilitary
Bozkurt, Enver, Akif Kütükçü, Yasin Poyraz (2009). Activities in and against Nicaragua (Nicaragua v.
Devletler Hukuku, Ankara: Yetkin, 5. Baskı. United States of America). Merits, Judgment of
27 June 1986.
Brenfors, Martha and Malene Maxe Petersen (2000).
“The Legality of Unilateral Humanitarian ICJ (2004). http://www.icj-cij.org/docket/
Intervention: A Defence,” Nordic Journal of files/113/8538.pdf
International Law, No. 69/4, pp. 449-499.
Kemp, Gerhard (2002). “Mission Impossible?
Chatham, Robert P. (2011). “Defense of Nationals Humanitarian Intervention and the New Paradigm
Abroad: The Legitimacy of Russia’s Invasion of of International Criminal Law,” Stellenbosch Law
Georgia,” Florida Journal of International Law, Review, No. 13, 2002, pp. 460-472.
No. 23, pp.75-102.
Kittrich, Jan (2009). “Can Self-Defense Serve as an
Claude, Inis L. Jr. (1999). “A Scholar’s Beginnings: Appropriate Tool against International Terrorism,”
A Study of the San Francisco Charter,” Virginia Maine Law Review, No.61/1, pp. 133-169.
Journal of International Law, No. 40/1, pp. 311-
Krylov, Nikolai (1994-1995). “Humanitarian
329.
Intervention: Pros and Cons,” Loyola Los Angeles
Dekker, Ige F. (2001). “Illegality and Legitimacy of International and Comparative Law Journal, No.
Humanitarian Intervention: Synopsis of and 17, pp.365-407.
Comments on a Dutch Report,” Journal of Conflict
Lodico, Yvonne C. (2001). “The Justification for
and Security Law, No. 6/1, pp. 115-126.
Humanitarian Intervention: Will the Continent
Doğan, Nejat (2006). “Uluslararası İlişkilerde Güç Matter?” The International Lawyer, No. 35/3, pp.
Kullanımı ve New Haven Ekolü: Eleştirel Bir 1027-1050.
Giriş,” Cumhuriyet Üniversitesi İktisadi ve İdari
Michael, Brent (2009). “Responding to Attacks by
Bilimler Dergisi, No.7/1, pp. 103-113.
Non-State Actors: The Attribution Requirement
Doğan, Nejat (2012). Pragmatic Liberal Approach to of Self defense,” Australian International Law
World Order: The Scholarship of Inis L. Claude, Jr. Journal, No. 16, pp. 133-159.
Lanham: University Press of America.
Miller, Christopher E. (2005). A Glossary of Terms and
Gall, Timothy L. and Jeneen M. Hobby (Eds.) Concepts in Peace and Conflict Studies. San José,
(2007). United Nations: Worldmark Encyclopedia Costa Rica: University for Peace.
of the Nations, Twelfth Edition. Farmington Hills,
MI: Thomson Gale.
93
Legitimate Use of Force in International Relations
Ndulo, Muna (2011). “United Nations Peacekeeping UN Peacekeeping (2019). United Nations
Operations and Security and Reconstruction,” Peacekeeping. (2019). [online] Available at:
Akron Law Review, No. 44, pp. 769-807. https://peacekeeping.un.org/en
Norton, Jerry E. (2010-2011). “The International UN Security Council (2001a). http://www.
Criminal Court: An Informal Overview,” Loyola un.org/ga/search/view_doc.asp?symbol=S/
University of Chicago International Law Review, RES/1368%282001%29
No. 8, pp.83-93.
UN Security Council (2001b). http://www.
Pazarcı, Hüseyin (2011). Uluslararası Hukuk, Ankara: un.org/ga/search/view_doc.asp?symbol=S/
Turhan Kitabevi, 10. bası. RES/1373%282001%29
Reicher, Harry (1981). “The Uniting for Peace UN Security Council (2001c). http://daccess-dds-ny.
Resolution on the Thirtieth Anniversary of Its un.org/doc/UNDOC/GEN/N01/708/55/PDF/
Passage,” Columbia Journal of Transnational Law, N0170855.pdf?OpenElement
No. 20/1, pp. 1-49.
UN Security Council (2004). http://www.
Rodley, Nigel S. and Başak Çalı (2007). “Kosovo un.org/ga/search/view_doc.asp?symbol=S/
Revisited: Humanitarian Intervention on the RES/1540%282004%29
Fault Lines of International Law,” Human Rights
UN (2018a). https://peacekeeping.un.org/en/data
Law Review, No. 7/2, pp. 275-297.
UN (2018b). https://unama.unmissions.org/mission-
Rogers, A.P.V. (2003-2004). “Humanitarian
statement
Intervention and International Law,” Harvard
Journal of Law and Public Policy, No. 27/3, Upcher, James (2004). “Savage Wars of Peace?
pp.725-736. International Law and the Dilemmas of
Humanitarian Intervention,” Deakin Law Review,
Schachter, Oscar (1988-1989). “The Extraterritorial
No. 9, pp. 261-276.
Use of Force Against Terrorist Bases,” Houston
Journal of Law, No.11, pp. 309-316. Vesel, David (2003-2004). “The Lonely Pragmatist:
Humanitarian Intervention in an Imperfect
Stahn, Carsten (2003). “Terrorist Acts as Armed
World,” BYU Journal of Public Law, No. 18/1,
Attack: The Right to Self-Defense, Article 51 ½
pp.1-58.
of the UN Charter, and International Terrorism,”
Fletcher Forum of World Affairs, No. 27/2, pp. 35- Wingfield, Thomas C. (1999-2000). “Forcible
54. Protection of Nationals Abroad,” Dickinson Law
Review, No. 104/3, pp. 439-469.
UN General Assembly, 1950. A/RES/5/377. http://
www.un-documents.net/a5r377.htm Wippman, David (1995). “Treaty-Based Intervention:
Who can Say No?” University of Chicago Law
UN General Assembly (1974). http://daccess-
Review, No. 62, pp.607-687.
d d s - n y. u n . o r g / d o c / R E S O L U T I O N /
GEN/NR0/739/16/IMG/NR073916. Wippman, David (2001-2002). “Kosovo and
pdf?OpenElement the Limits of International Law,” Fordham
International Law Journal, No. 25, ss. 129-150.
UN General Assembly (2006). http://daccess-dds-ny.
un.org/doc/UNDOC/GEN/N05/504/88/PDF/ Wolf, Daniel (1988). “Humanitarian Intervention,”
N0550488.pdf?OpenElement Michigan YBI Legal Studies, No. 9, ss. 333-366.
Online References
www.iaea.org www.nti.org:
https://www.iaea.org/sites/default/files/publications/ https://www.nti.org/learn/treaties-and-regimes/non-
magazines/bulletin/bull22-3/223_403587380. aligned-movement-nam/Aaaa
pdf
94
Chapter 4 Intervention
After completing this chapter, you will be able to:
1 2
Learning Outcomes
Define the concept of intervention and explain Assess in what ways interventions affect the
its theoretical background. state sovereignty.
3 4
Comprehend the role of international
Analyze the new forms of state intervention organizations in peace operations, including
and evaluate humanitarian intervention. peacekeeping and peacebuilding.
96
4
International Security
97
4
Intervention
Such humanitarian crises might be the result of particularity that raises the issue of intervention
a governing body’s instigating, facilitating and/ (Phillips, 1996: 5). Lives of men are not that
or ignoring the abuse of groups falling within its different than states’ in many respects. Freedom
jurisdiction. Such misuse can take places in the of self-determination and sovereignty distinguish
form of deliberate and systematic violations of men among themselves. This subject is a hot debate
basic human rights by either certain governing in various cultures and civilizational perspectives in
body, institutions and/or because of no effective the field of theological, philosophical and ethical
government or civil order. If there is breach of matters. Circumstances and natural inheritance
universally recognized civil rights in a sovereign as well as choices lead to the various degrees of
state over its citizens, then, that state could face freedom for man. Human beings might not know
with consequences of humanitarian intervention. what is good for themselves as is the case with
There are debates about whether humanitarian freedom issue. Respected integrity of basic human
intervention is a breach of state sovereignty; wellbeing is a fundamental issue as is life, and the
its legality, necessity, limits and practices were/ object of man’s choices, knowledge and friendship.
are persistently being debated. As philosophers, Evil, on the other hand, is the pursuit of one good
theologians, statesman and lawyers have discussed it by means of the suppression of another. It is rather
in the previous centuries, the topic will still likely to difficult to have objective moral order. Intervention
be in the core of incessant debates in future. There requires a maturity of judgement, an ability to
were also several controversial military actions which maintain the essential dignity of the other while
have taken place under the name of humanitarian providing a self-effacing help.
intervention in the past. Examples may be given as The purpose of the state, as well as the UN, is
follows: India intervened during the Bangladesh the preservation of a just order among mankind. If
War in 1971 (Lyon, 2008: 166). Vietnam removed there are basic human goods and if participation
Khmer Rouge regime from power in Cambodia in in these is the condition of human fulfillment,
1978 (Morris, 1999: 103-107). Tanzania ousted then, the role of the state/the UN is to foster these
dictator Idi Amin from the power in Uganda in goods and the opportunities for such participation.
1979 (Avirgan and Honey, 1982). One needs to recognize that a state is the member
Victorious powers of the Second World War of a larger world community whose good is
created the post-war international system under intimately linked to a common good. No matter
the name of the UN. New countries emerged how imperfectly such a world is realized in history,
because of decolonization period from 1945 to the there is no choice but to direct the state/the UN
1970s. Nevertheless, the emerging countries have toward this common ideal. The state has duties of
had difficulties to cope with being a proper state commutative and distributive justice, not only to
and establishing a functioning democracy. During its members but also to all whom form the human
these transition phases to democratically stable community of the world. The capacity of the state/
state periods, autocratic leaders have emerged. Such the UN to undertake this task will depend upon
leaders used brutal methods to establish their way its vitality and that will depend upon a reasonable
of governing system in their respected countries. self-regard. As with any community, leadership will
Some hid their intentions and practices behind the have an obligation first to its members’.
shield of “state sovereignty”, which is recognized The doctrine and understanding of
by the UN charters. Nevertheless, the international “humanitarian” intervention, perhaps rightly so, has
community have an obligation to intervene to stop been widely criticized. Many argued that such notion
the widespread abuse of human rights wherever it represents a coercive mode of liberal imperialism
takes place. of Western ideas and ideals. Western norms and
The purpose of any intervention must be to help understanding of international system and cultural
people to help themselves in almost universally rights were/are imposed onto other cultures of
accepted cultural norms. All human beings must regions. In this way “humanitarian” associated ideas
be treated justly because they share a common and arguments were used simply a rhetorical cover
human nature ordained to a set of specific goods. up for their implementation and practical use of
It is the violation of this universal order by some traditional geopolitical understandings.
98
4
International Security
Imperial and previous colonial powers, and humanitarian crises as it became obvious once
alongside with able states, used intervention again in recent years in Syria. Rwanda was a show-
issue for their own interests from time to time. case of a catastrophic failure and a spur for human
During the 1990s, intervention took places in rights abuse and intervention issue.
“no-fly zones” in Iraq, Somalia, Bosnia, Sierra There were/are a number of debates going on
Leone, East Timor and Kosovo. Even the United about theoretical and practical aspects of legitimacy
States, led so-called coalition, created a war in Iraq of humanitarian intervention and its consequences.
(2003-2011) under the name of “humanitarian” Its legal and moral aspects need to be scrutinized.
intervention. As there were no obvious economic One of the main problems with intervention is
and/or political interests at stake, none of the who the authority will be and who is going to
Western country intervened in the 1994 genocide decide whether intervention is legitimate or on
in Rwanda. Rwanda case was a demonstration of what grounds intervention is necessary.
Western hypocrisy on a real abuse of human rights
There is no consensus about whether interventions actually work, delay or exacerbate the problems that
were aimed to be resolved as required. Interveners’ real intention of motivation might be also problematic
to the parties. Was the intervention ever really possible to act solely for humanitarian, or any other
political, economic, social, and/or cultural reasons? Moreover, should humanitarian intervention require a
motivation? In fact, such arguments depend on whether an ethical system or legal issue is employed or not.
Thus, it is simply a matter of consequences of an intervention conducted purely in the name of national
self-interest that resulted in a “humanitarian” outcome could be classified as a “humanitarian intervention”
(Universal Declaration of Human Rights, 2015).
An intervention might be conducted out of concern for human rights. Nevertheless, if it fails in its
primary objective, then, there is a possibility that it could not be classified as humanitarian intervention.
Such issues continue to drive the debates in the field of IR and International Law on what is “legitimate”
and “necessary” for the humanitarian intervention.
Although the term used in this chapter corresponds to the second phase of peace operations mentioned
before, traditional and new generation peacekeeping operations have also been discussed. The main aim
of this chapter is to elaborate the evolution of peace operations in practice, find out the approach of
99
4
Intervention
the UN Charter, and reveal the role of regional of any state, or in any other manner inconsistent
organizations to undertake this kind of operations. with the Purposes of the United Nations” (UN
The chapter pursues with following three headers: Charter, 1945: 3). Another exception is self-
Beyond the UN Charter Paradigm; States and defense articulated in Article 51 as “Nothing in
Intervention: Humanitarian Intervention/ the present Charter shall impair the inherent right
New forms of Intervention; Organizations and of individual or collective self- defense if an armed
Intervention: Peacekeeping and peacebuilding attack occurs against a Member of the United
missions. Nations…” (UN Charter, 1945: 10).
Potential interventions carried out by a member
(or a coalition of members) of the UN against
the interests and/or governing body of another
1 member would create problems on legality of such
interventions. The UN Charter grants the Security
Do some research on the UN Council powers to take whatever measures it regards
General Assembly’s “Declaration on as necessary to reestablish international peace and
the Inadmissibility of Intervention security. If there is an act which is believed to
in the Domestic Affairs of States threaten peace, security and order, then, the UN
and the Protection of Their can empower directly and through their action in
Independence and Sovereignty.” the appropriate international agencies of which
they are members to rectify such an act.
However, the intervention could be interpreted
INTERVENTION AND STATE as an attack against the sovereignty of a nation
SOVEREIGNTY which is mostly agreed as a bedrock rule of an
The approaches on resolution of disputes independent state. So, it engenders sovereignty
or conflict rely on two consecutive Chapters versus intervention dilemma.
of UN Charter. One of them, Chapter VI,
suggests pacifist settlements of disputes involving Legality of Intervention within the
negotiation, enquiry, mediation, conciliation, Sovereignty Concept
arbitration, judicial settlement, resort to regional
Sovereignty means a central governing
agencies or arrangements, or other peaceful means
authority within a specified geographical territory,
of their own choice. Secondly, Chapter VII
combined with the recognition of its status by
examines the situations which yield threats to the
other states conferring on the state sovereignty.
peace, breaches of the peace, and acts of aggression.
The recognition of a central authority, whether
Article 41 in Chapter VII outlines the measures of
domestic or international, does not imply approval
the interruption of economic relations and of rail,
of that particular government and its system. An
sea, air, postal, telegraphic, radio, and other means
unpopular and oppressive totalitarian government
of communication, and the severance of diplomatic
is no less sovereign than a popularly elected and
relations with these states threatening the security.
democratic republic. Sovereignty flows from the
However, the following article recommends that
recognition of the legitimacy of some central
acts by air, sea, or land forces as may be necessary
governing power. ‘Internal’ affairs can be described
to maintain or restore international peace and
and include as the form of government, the structure
security if the measures underlined by Article 41
of the constitution with its due apportionment
are failed or proved to be inadequate (UN Charter,
of rights and duties, the economic system, the
1945: 9).
definition and implementation of distributive
It is one of the exceptions to the restriction on justice and the social relations among members
the use of force mandated by Article 2 which states of the community. In short, sovereignty covers all
“All Members shall refrain in their international relations between citizens and government, and
relations from the threat or use of force against among citizens as specified by law and custom
the territorial integrity or political independence (Phillips, 1996: 15-16).
100
4
International Security
The sovereignty of a state is embodied by The concept of sovereignty has been in the
Westphalia Agreement, and it is reiterated and process of newly emerged stances with alleged
strengthened by Articles 2.1, 2.7, and 51 of the globalization of economic, cultural and social
UN Charter. The sovereign entity should possess activities. There is a growing debate on quasi-
the following elements as stated in Article 2 (1-7) of states and failed states. It is assumed that advanced
the UN Charter: (1) every state is legally equal; (2) industrialized states’ effective sovereignty is being
every state enjoys the rights and benefits inherent eroded. Contrary to this, the poorer states are
in full sovereignty; (3) every state is obligated to enjoying effective forms of sovereignty. Sovereignty
respect the fact of the legal entity and sovereignty is classified into, negative and positive forms.
of other states; (4) the territorial integrity and Negative sovereignty which refers to the legal right
political independence of a state are inviolable; (5) to demand that other states refrain from interfering
each state has the right to freely choose and develop in the state’s internal affairs. This sovereignty is
its own political, social, economic, and cultural given by the international community rather than
systems; (6-7) each state is obligated to carry out its achieving it achieving it on its own. In contrast
international obligations fully and conscientiously to this, positive sovereignty refers to the ability of
and to live in peace with other states within the the state to exercise effective control in the arena
UN system. of its formal jurisdiction. This requires capability
Nonetheless, sovereignty is not entirely on enabling government on their own as like
absolute. States have domestic/international the Great Powers of the 19th and 20th centuries
obligations when they enter into international (Mutaqin, 2017: 44-61).
treaties and agreements. They are free to enter and/ Sovereignty should be re-examined in a
or not to enter into agreements. Once they do, they normative sense. If sovereign states systematically
relinquish a certain measure of their sovereignty abuse the human rights of their citizens, “should
to the international community which creates they continue to enjoy those privileges of
International Law. sovereignty or not?” is the growing question in
The modern understanding of (Western) International Law. This issue is at the heart of the
political ideas was transplanted to various parts debates over the past decades. It will continue to be
of the world. European imperialist/colonialist a debate in the upcoming years as well; however,
powers imposed their worldview through their whether the humanitarian intervention will ever
military might upon militarily underdeveloped play a greater role in the International Law or not
nations around the world. With utmost care and remains to be unclear yet.
detail, European powers drew lines upon maps Scholars and states explore variations in
in accordance to their interests, thus delineating different dimensions of sovereignty over time
nations where none had existed before, or dividing and space, and its applicability and limits of full
nations as if they had never existed, like in the sovereignty. Accordingly, hard colonization in the
Southwestern Asian Countries (the Middle East) past has taken the shape of soft colonization in the
and Africa. present. The idea in the mind of the Western world
The claim of sovereignty within a bordered that said “the world outside my border is totally
territory brought a powerful legitimizing factor with wrong and that land is an object that has to be
it for an incumbent ruling elite. Established entity conquered.” was problematic in IR.
of the elites might impose cultural, religious and Just intervention involves the use of force and
political understandings using the state apparatus this is a problematical issue in IR as well. The
in a more systematic and efficient manner. As use of force to achieve justice and peace may be
may be named under the notion of ‘nationalism’ necessary as a means to achieve earthly justice as
becomes the claim that political power should envisaged by the theological teachings. Any kind
reflect cultural homogeneity in every corner of the of domination of one by another is a substitute or
sovereign territory. Thus, nationalism extends and a shadow of natural born right, which can be called
deepens the scope of sovereignty to require certain Divine justice. Those undertaking to affect justice
kinds of cultural, religious and social conformity as the and peace by force should do so in a spirit
and citizenship. of service to others animated by a lively sense of
101
4
Intervention
humility. The use of force in interventions must be of “peoples” is fatally vague, failing to specify a
undertaken with a sense of moral duty. It requires workable definition of a “people” or what size a
a willingness to ask a series of defining questions self-determining population has to be. Why such
for its legalization. These defining questions are groups have an overriding right to sovereignty is
known as the tradition of the Just War. In the not argued. Interventions on behalf of such groups
context of intervention where sovereignty is being are, therefore, morally problematic. Perhaps it
breached, it is very important that serious efforts would be better off to adopt a strategy of protecting
be made to find peaceful solutions to the problem minority groups and their integrity within the
before using force. Nonetheless, seeking legitimacy larger sovereignty in which they find themselves
and justification for every war has become part of (Phillips, 1996: 13). Nevertheless, the issue is one
the war itself. of the most misused principles in International Law
by the Great Powers for their own benefit. This is
clearly evidenced by choices of the names for their
invasion under the name of intervention as in the
following examples: “Operation Just Cause” for
Panama Invasion in December 1989, “Operation
Restore Hope” in Somalia Intervention in 1993,
“Operation Enduring Freedom” in Afghanistan
between 2001 and 2014, and “Operation Iraqi
Freedom” Invasion of Iraq beginning in 2003.
102
4
International Security
There are also other views that rule out the shall not prejudice the application of enforcement
substitution of foreign intervention for the internal measures under Chapter .” in cases of self-defense,
struggle. It is opposed to intervention that the where this is understood or defined as the violation
internal freedom of a political community should of recognized international borders (UN Charter,
be won only by the members of that community. 1945: 3). The use of force only can be legalized
As individuals, political communities must seek by self-defense, overwhelming humanitarian
their own freedom to cultivate their own virtue. catastrophe or if it is authorized by the Security
These self-determination/virtue and liberty Council under Chapter VII of the UN Charter.
cannot be achieved by any external force/state. The theory of self-determination reached
On the other hand, where people are under such its peak in the 1960s. The principle of self-
massive oppression and/or are being massacred, determination reinforces absolute sovereignty in
international community/the UN is required to which non-intervention is a precondition of the full
intervene due to severity of the situation. exercise of self-determination. The newly emerged
There is certain behavior of a state that understanding of intervention has changed the
oppresses its people to the point that they are traditional understanding of self-determination
unable to resist, then, such a state gives forfeits and sovereignty. In the New World Disorder, the
their title to sovereignty. Even though legally the boundaries between domestic and international
title remains in International Law, morally there is affairs became more blurred. The observance
a duty of charity to the international community to of fundamental human rights recognizes no
intervene. People who partake in massacre of others national boundaries. Therefore, there was a
lose their right to participate in the normal process shift in international public opinion in favor of
of domestic self-determination. Their military/ intervention particularly on humanitarian grounds.
power capability defeat is morally/legally necessary This was exemplified as a stronger commitment
(Phillips, 1996: 15-16). This idea can suggest that to protection of human rights in Northern Iraq,
the cause of war and international strife was/is the Somalia, Liberia and in former Yugoslavia. UN
tendency of states to meddle in each other’s affairs. Resolution 688 envisaged distressed people to
In the last century, absolute sovereignty has have the right to access to humanitarian assistance
been continuously written into various Law of (UNSCR 688, 1991). Similarly, Resolution
Nations as in the followings: The Covenant of the 43/131 urged the relevant countries to facilitate
League of Nations in 1920, The Convention on the variety of humanitarian assistances to the distressed
Duties and Rights of States in the Event of Civil areas in 1988. The other emergency humanitarian
Strife in 1928, and the Montevideo Convention assistances can be seen in the recent Resolutions
on the Rights and Duties of States in 1933. The 68/102 regarding the situation of human rights in
catastrophic conflicts of the last century within the Syrian Arab Republic in 2013 (UNGA, 1988;
Europe and worldwide colonies followed many UNGA, 2013). The Security Council has asserted
breaches of national sovereignty. These former the right of humanitarian access in Bosnia, Iraq and
imperialist/colonialist powers’ breaches were Somalia. These humanitarian related accesses were
frequently disguised as interventions in aid of some given without permission of the concerning state.
beleaguered party. Therefore, in order to prevent Such practices indicated that humanitarian issues
such breaches, the UN Charter was framed with a could not be interpreted as intervention in the
vision that engraves absolute sovereignty into the affairs of states sovereignty and self-determination.
law. Article 2, Section 7 in Chapter I specifically The new principles of natural justice supersede the
forbids intervention by one state into the affairs Hobbesian/Machiavellian imperative to seek peace
of another as “Nothing contained in the present at all costs. The continuing emergence of a global
Charter shall authorize the United Nations to community deteriorated absolute sovereignty. This
intervene in matters which are essentially within the means a weakening of political boundaries of the
domestic jurisdiction of any state or shall require states. With the collapse of the Cold War order, the
the Members to submit such matters to settlement sharp lines between domestic and foreign realms
under the present Charter…” Nevertheless, have changed. Traditional International Law in
exceptions were attached “… but this principle support of absolute sovereignty has dramatically
103
4
Intervention
declined. Those changes in jus gentium brought slides into total anarchy and is unable to protect
closer accord with traditional theories of bellum the lives, security, and wellbeing of its people.
justum and with theories of natural justice. A conclusive moral assessment of humanitarian
Nevertheless, one can say that the weakening of intervention is problematic due to the continuing
sovereignty itself is threat to peace. The Security evolution of its theory and practice. In the General
Council in 1992 observed, “non-military sources Assembly and membership of the UN, equal
of instability in the economic, humanitarian and sovereignty is clearly seen while the legalized
ecological fields have become threats to peace hegemony of the Great Powers institutionalized
and security” (https://www.securitycouncilreport. in the veto rights of the Security Council. This
org). Thus, the danger to world peace might be is a synthesis from the previous stage of colonial
constituted within the developments in recent and imperial history. Clearly, there is a shift
decades. The global village concept has changed the taking place in international law and in the
traditional understanding of international affairs practice of nations regarding the various kinds
into more inclusive of commerce and advanced of interventions. Nevertheless, public opinion
communication. Consequently, the traditional about the implementation of the newly developed
reasons for non-interventions are diminished while interventions is not clearly defined ad legalized
the failure of just intervention where there is a in the UN. Intervention requires all institutions
cause of war might lead to new wars. of civil order to have been broken down anarchy
Humanitarian intervention is justifiable reigns, and the inhabitants suffer loss of rights
whenever/wherever for lack of an effective and life due to the absence of civil society order.
government, a country slides from order into In such cases, restoration of civil order is morally/
anarchy, thus jeopardizing seriously first and legally required as intervention’s goal to some
foremost the lives of its citizens’ security and extent. People should be rescued from starvation
well-being. Governments, non-governmental and disease rather than simply to abandon them to
organizations (NGOs) and the public, as well as the a state of nature or to the form of government that
international community, should intervene in the led them into anarchy.
case of an authority abusing its powers to subject
its citizens to chaotic and inhumane circumstances.
As in Somalia and in Liberia in the past, in Syria
at present peoples are killed indiscriminately and/ 2
or to be subjected massive and systematic human In what ways do interventions
rights abuses by their governments. violate the sovereignty of states?
If there is a serious humanitarian crisis emerged
in a state, it is not a question of whether the
international community has the right to intervene
or whether it should intervene. It is a question STATES AND INTERVENTION:
of how and in what way it should be carried NEW FORMS OF
out. The issue is no longer considered as whether INTERVENTION
humanitarian aid is an intervention or not. If The need to feel secure is a core human value.
a state refuses to allow to those people access to Security is one of the key issues of present IR
humanitarian assistance, contrary to their basic discipline. The most important actors in the
sovereign obligation to do so, force can be used international system are states, whose primary
toward that state on humanitarian grounds. Under objective and motive is to protect their sovereignty
specific circumstances, international community is (Sönmezoğlu, 2005: 17-33). A state might attack
morally/legally required to ignore sovereignty when its neighbor for a number of different reasons.
lives and rights are denied. There are also other The reasons might be related to enhance its
views contrary above stance of intervention. The power position and/or improve easy access to vital
mere abrogation of these basic rights is insufficient resources. States endemically feel insecure in an
to trigger humanitarian intervention. Rather, it is anarchical world. Such feelings lead them to get
argued, intervention only occurs when a country more premiums on military power which also
104
4
International Security
requires wealth and geopolitical advantage. It is Kurds, the Tibetans, and the Tamils. Such stances
believed that the more militarily powerful a state create violence and political struggles between the
is, the more secure it is likely to be. dominant values of the co-existing community
and that particular individual group. So, self-
determination involves/creates conflict between
Security and Self-determination two competing selves. Which one is the true self
with Relation to Intervention became a hot subject matter for international
The traditional state-centric understanding community to decide.
of security has changed to a broader meaning of One of the UN’s main purposes is to promote
perception among scholars and policymakers after the of the principle of self-determination. The UN
Cold War period. Regional security arrangements, Charter however mentions this only twice (in
such as the ones taken place in Asia and in Europe, Article 1 (2) and 55) in the whole document
shifted the security discussions from one perspective by affirming a ‘respect for the principle of equal
to another. The new understanding of security rights and self-determination of peoples’ in order
embraced all relevant issues of humanity, natural to promote development of friendly relations and
and vital environmental resources, rather than being strengthen universal peace. In the formal sense,
exclusive to states. Although, interstate war is still after the UN Charter and the Universal Declaration
possible, nevertheless, the bloodiest violent conflicts of Human Rights in 1948 marked the end of
have taken places mostly within states. Group imperialism (Universal Declaration of Human
identity, cultural differences and/or political stances Rights, 2015). Formerly colonized Afro-Asian
may be used for creation of conflicts. The capacity of world began to find some sort of voice in the UN.
the state to provide security for its citizens has been The Declaration on the Granting of Independence
tested particularly by a range of non-military threats. to Colonial Countries and Peoples in 1960 (The
These were/are environmental issues, rapid expansion United Nations and Decolonization, 1960) and
of population, diseases, influx of asylum seekers, the Declaration on Friendly Relations in 1970
regulated and/or undocumented migrants, and explicitly link self-determination to decolonization
growing scarcity of vital resources. Governing bodies (UNGA, 1970). Nevertheless, these declarations
of states concerned mainly on its citizens’ welfare and did not recognize any right to internal self-
wellbeing to be safe from hunger, disease, repression, determination and alter their territorial frontiers
and events likely to undermine the normal pattern of the inhabitants. Variety of understanding and
of everyday existence, and redistribution of wealth practice of self-determination paved the way for
adequately among them. Some states, like Canada, various inter-communal and interstate conflicts.
articulated the idea of human security is the most Such conflicts required international intervention
important state objective, which will be tested in due to exploitation of self-determination within
the near future. The debate is still ongoing whether the newly created states on their inhabitants’ basic
security is only meaningful in terms of interstate human rights.
behavior or in terms of universally originated new
The former imperial powers unwillingly
global threats such as varieties of terrorism. All these
permitted colonized world to have their self-
security issues, particularly newly emerged terrorism
determination, which lacks lots of principles in
related interstate and global threats create concerns
both definition and applicability (http://legal.
on international community to intervene wherever
un.org/avl/ha/dicc/dicc.html). The newly emerged
it is necessary.
decolonized world’s autonomy, democracy, human
There are correlations between intervention and rights, and the proper right to self-determination
self-determination issues. In self-determination require the adoption of a more liberal and expansive
processes ‘the self ’ is a problematic matter to solve. interpretation of the meaning of self-determination.
How should that ‘self ’ be governed and identified It should be noted that self-determination does
and who will decide its cultural and territorial not include irredentism, secession, and the violent
borders, and on what grounds? A number of renegotiation of territorial frontiers. It is rather
groups are seeking to proclaim self-determination, the promotion of minority rights, devolution,
as the Québécois, the Basques, the Palestinians, the federalism, and greater acknowledgment of the
105
4
Intervention
legitimacy of cultural self-expression of individual 4. External agent should carry out humanitarian
groups. Practical misuse of self-determination intervention.
creates an atmosphere for intervention. 5. Humanitarian intervention must have a
humanitarian intention.
6. The Security Council authorization is
Humanitarian Intervention from required.
the Perspective of Responsibility The report and its supplementary published by
to Protect International Commission on Intervention and
There is a plethora of definitions on State Sovereignty (ICISS) are among the first studies
humanitarian intervention considering the fact on humanitarian intervention, and the concept of
that the study field intersects with many disciplines responsibility to protect is based on this report. One
such as international law, politics, history, IR and of the essential suggestions the commission agreed
questions national sovereignty. In 1921, one of these is that international actors have the ‘responsibility
definitions defined humanitarian intervention as to protect’ people who live in dire conditions
“the reliance upon force for the justifiable purpose even in the situation of host government’s dissent.
of protecting the inhabitants of another state from It approaches the question as “a duty to react to
the treatment which is so arbitrary and persistently situations in which there is a compelling need for
abusive as to exceed the limits of that authority humanitarian protection”. So, ‘responsibility to
within which the sovereign is presumed to act with protect’ not only means ‘responsibility to react’
reason and justice (Stowell, 1921: 53). but also means ‘responsibility to prevent’ and
One of the most cited definition, Adam Roberts ‘responsibility to rebuild’ as well (The Responsibility
(1993, p.429) points out that humanitarian to Protect, 2001: 17).
intervention is “coercive action by one or more The concept of responsibility to protect have
states involving the use of armed force in another been bolstered by other works. In a report of the
state without the consent of its authorities, UN High-Level Panel on Threats, Challenges
and with the purpose of preventing widespread and Change in 2004, A More Secure World, it is
suffering or death among the inhabitants”. In argued that “there is a growing recognition that the
another description, it is called as the uninvited issue is not the ‘right to intervene’ of any State,
interference by a state, states, or international but the ‘responsibility to protect’ of every State”
organizations in the domestic affairs of another and it recognized the notion as an emerging norm
state to prevent and/or end human rights abuses (UNGA, 2004: 57). In Larger Freedom (UNGA,
(Shimko, 2010). Further, Pattison (2010: 28) puts 2005: 35), the report presented by then Secretary-
forth a comprehensive definition that intervention General to the UN, Kofi Annan acknowledges
is “forcible military action by an external agent the aforementioned works and emphasizes that
in the relevant political community with the “we must move towards embracing and acting on
predominant purpose of preventing, reducing, or the ‘responsibility to protect’ potential or actual
halting an ongoing or impending grievous suffering victims of massive atrocities.”
or loss of life.” This responsibility lies, first and foremost,
Although there are minor differences in with each individual State, whose primary raison
arguments among definitions, some common points d’être and duty is to protect its population. But
could be derived from these conceptualization if national authorities are unable or unwilling to
efforts on humanitarian intervention (Weiss, 2002; protect their citizens, then the responsibility shifts
Pattison, 2010: 25-27; Shimko, 2010): to the international community to use diplomatic,
1. It comprises use of force, particularly military humanitarian and other methods to help protect
elements. the human rights and well-being of civilian
2. Humanitarian intervention must lack the populations.
consent of the government of the target So, it was a strong statement by Secretary-General
state. that the protection of people should be performed
3. It takes place where there is actual or by international actors if national authorities are
impending grievous suffering or loss of life. reluctant to do so. Later at the 2005 UN World
106
4
International Security
107
4
Intervention
108
4
International Security
Though peacekeeping operations commenced with the UN Truce Supervision Organization (UNTSO)
in May 1948, 71 peacekeeping operations have been conducted by the authorization or mandate of the UN
since then. With 57 of the peacekeeping operations having concluded, 14 of them are currently continuing
in Africa (7), Middle East (3), Europe (2), Americas (1) and Asia (1) (UN Peacekeeping Operations,
2018). The increasing trend in peacekeeping operations after the end of the Cold War, particularly since
1991, can be seen clearly in the figure below, with each lasting almost a decade. There were also five new
peacekeeping operations on average which begin in each year during this period.
18
16
14
12
10
0
48 952 956 960 964 968 972 976 980 984 988 992 996 000 004 008 012 016
19 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2
Start Date End Date Total
Figure 4.4 The UN Peacekeeping Operations by the Time (as of August 24, 2018)
Source: www.un.org
109
4
Intervention
There are also political missions engaged in conflict prevention, peacemaking and post-conflict
peacebuilding managed by the Department of Political Affairs (DPA). It monitors and assesses global
political developments to detect potential crises and develop effective responses. According to the UN data
provided, there were 29 past operations established in Africa (16), Americas (6), Asia and Pacific (7) while
there are 13 ongoing political and peace building missions deployed in Africa (7), Middle East (3), Asia
(2), South America (1) as seen in Figure-2 (UN Department of Political Affairs, 2018). The majority of
these political missions were founded in the last decade.
Considering the figures provided by the UN over the peace operations, the conclusion that peacebuilding
operations or special political missions have been gaining momentum while peacekeeping operations have been
decreasing relatively during the last decade could be drawn. It is also remarkable that the operations in Africa
take the lead, and they are followed by the Middle East region regarding the figures of current operations.
110
4
International Security
attacks to Turks during the Greek Uprising/ (between France and Germany) and the Greek-
Greek War of Independence. Further, in the Bulgarian crisis (Schmidl, 1999: 9).
Crete problem, an international mission was The common characteristic of activities over
undertaken by European countries such as Great this period is that the League of Nations sought to
Britain, Austria-Hungary, Germany, Italy and achieve peace through dialogues and consultation
Russia. One can argue that the mission organized or referral bodies. However, it desperately needed
judicial, police and administration issues across the the recognized enforcement body to provide order
island that might be interpreted as an ancestor of and security.
‘wider peacekeeping’ or ‘peace building’ operations
(Schmidl, 1999: 8).
The Boxer Rebellion in China in 1900 is
Maturity: The United Nations
another example to give for the ancestors of peace Although these are among the first initiatives
operations before the League of Nations. An allied of international military actions, contemporary
force of several nations was composed to rescue the peace operations have been carried out since the
foreign legations in Beijing (Diehl, 2008, p.29). founding of the UN. The UN period, that is the
It is argued as a first international ‘enforcement 3rd phase of peace operations, could be elaborated
operation’ of its time (Schmidl, 1999, p.8), through four generations such as traditional
although one could criticize the operation had peacekeeping, civilian tasks, peace enforcement,
been conducted to pursue Western powers’ own and peace-building (Kenkel, 2013).
interests. The peacekeeping operations began by the
These examples before the establishment mission called as UNTSO in the Middle East
of the League of Nations share some common in May 1948, and it was followed by the UN
characteristics. Firstly, they operated on an ad Monitoring and Observation Group in India and
hoc basis which is the similar feature of modern Pakistan, active in Kashmir in 1949. So, the 1st
peace operations. Second, these military actions generation of peace operations within the UN
were performed under no specific procedures period, traditional peacekeeping, has just begun.
coordinated before the deployments. Finally, The operations over this period commenced
related to the second one, there was not any after a cease-fire achieved between fighting sides
authoritative and institutionalized international and the resolution of the UN Security Council
organization orchestrating or managing the peace in accordance to Chapter VI of the UN Charter.
activities (Diehl, 2008: 29). The operations in this phase especially focused
on preventing overt violence between states
and protecting the Westphalian international
Novice Attempts: The Period of League system (Richmond, 2004: 86). They aimed at
of Nations creating a relatively conducive environment for
The League of Nations was founded in 1920 peaceful conflict resolution efforts. Deploying an
as a result of the Paris Peace Conference ending interposition body between the frontlines of the
the First Great War. It was the first international enemy forces, monitoring borders and verifying
organization established by the goal of achieving demilitarized zones are among the typical peace
international peace. As stated in its agreement activities of this generation.
act, the organization aimed to resolve the disputes However, the operation in Suez in 1956
through negotiation and arbitration. However, would beget first challenge over the execution of
the League of Nations has not been successful traditional peacekeeping operations. Although the
to prevent aggression and proved its own UN Emergency Force (UNEF) in Suez retained the
incompetency with the eruption of the 2nd World basic principles of peacekeeping, the UN deployed
War. Despite its failures, in fact, there were some 6,000 armed troops into the conflict for the first
achievements including the territorial disputes time to enable the intervention forces to withdraw
of Åland Islands (between Sweden and Finland), and patrol the armistice line (Kenkel, 2013: 126). It
Upper Silesia (between Poland and Germany), was the outcome of recognition of the ineffectiveness
Vilnius (between Poland and Lithuania), Saar
111
4
Intervention
of small units to tackle this kind of problem in the in 1992 to coordinate activities effectively. The
field. The UN soldiers put on blue head gears and ascending trend could be attributable to various
blue badges as distinctive insignia firstly through factors such as the collapse of the bi-polar world,
this operation which in turn called by the familiar the expansion of civil conflicts and raising numbers
term, “blue berets” (Schmidl, 1999: 10). of failed or collapsed states (Diehl, 2008: 53).
On the other hand, the United Nations Although the peace operations were easier to
Operation in Congo (ONUC), taking place deploy, they were more dangerous and complex
between 1960 and 1964, had bequeathed some to execute than before since the range of duties
features to the later operations as well. The primary carried out in these missions were multiplied
task of ONUC was to restore order and ease the (Hillen, 1998: 141). Indeed, the peace operations
withdrawal of Belgian troops. Yet, its mandate was in this phase were conducted not only to halt the
revised after the escalation of civil war, and the conflicts but also help the transition from conflict
UN authorized ONUC taking all necessary steps to peace. So, the civilian tasks required for political
to provide security in Katanga, the capital city of transition from conflict had gained importance
Congo (Diehl, 2008: 45-46). So, the UN forces (Kenkel, 2013: 128). The firstly introduced term
have been firstly engaged to execute peacekeeping, was “wider peacekeeping” through the British
peacebuilding and peace enforcement activities at Army Field Manual in 1995 to encompass the tasks
the same operation in a conflict-ridden country. of conflict prevention, demobilization operations,
The meaning of traditional peacekeeping military assistance, humanitarian relief, guarantee
has been changing gradually from observing and denial of movement (Wider Peacekeeping,
and monitoring missions to wielding necessary 1996, p.46). The peace missions conducted over
minimum force in order to enforce peace. So, this generation had traditional and transitional
traditional peacekeeping operations appear to fall tasks in hostile environments by adhering to
between the Chapters VI and VII since former the basic principles of traditional peacekeeping
suggests peaceful settlements of conflicts while later (Bellamy et al., 2010:193).
implies military intervention by the authorization This was evident in the case of Somalia
of Security Council. Hence, it is referred as Chapter where the United Nations Operation in Somalia
“six and a half ” by then Secretary-General of the (UNOSOM) commenced in 1992 to tackle the
UN, Dag Hammarskjöld, to reflect the distinctive problem of public order and humanitarian issues
character of operations at that time. However, concurrently. UNOSOM has some distinctive
it should be kept in mind that peace operations features comparing to other peace operations. First,
were still consistent with the essential principles of the Somalia crisis was purely an internal dispute,
peacekeeping (Kenkel, 2013: 125-126). but not an inter-state as seen almost exclusively
The number of peacekeeping operations had before; secondly, the operation was motivated by
increased with time to adapt their composition and humanitarian concerns; thirdly, there was a lack
duties to meet field’s necessities. Indeed, the period of consent of the host country since Somalia had
from 1956 (UNEF I) until 1978 (United Nations no government then; and lastly, UNOSOM had
Interim Force in Lebanon/UNIFIL) is popularly assumed intrusive peacebuilding activities such as
known as the first “golden age” of peacekeeping. emergency relief, establishment of law and order
In these two decades, the UN deployed 10 new (Diehl, 2008: 51). So, it is clearly seen that the peace
peacekeeping or observation missions to different operations in the field have compelled to change the
regions of the world. However, the following limits of the traditional principles of peacekeeping.
decade (1979-88) was quiet and called as the “lost Hence, the term of ‘peacebuilding’ was coined
decade” since no new operations were deployed by the UN report, An Agenda for Peace, at that
during this time (Diehl, 2008: 43-44, 47). time. It was a result of desire to deal with structural
problems and improve the conditions underlying
The second generation of peace operations has
conflict (Richmond, 2004: 89). However, Somalia
begun with another “golden age” of peace keeping.
ended with relatively heavy losses, and the UN
The growing numbers entailed the establishment of
missions in Rwanda and Srebrenica could not
the UN Department of Peacekeeping Operations
prevent the massacres occurring in front of peace
112
4
International Security
forces. It is argued that the instruments in the hand of peacekeepers did not correspond well to the
assigned tasks for these missions (Thakur and Thayer, 1995). These three humiliating failures in Somalia,
Rwanda, and Srebrenica led the questioning of the UN system and paradigm on peacekeeping and paved
the way for the next generation.
Third generation of peace operations was characterized by the use of force expressed through Chapter
VII of the UN Charter, protection of human rights even against their own government and rising of
regional organizations’ intervention. The UN has not deployed any new mission during the late 1990s,
since there was an ongoing discussion to solve ineffectiveness in peace operations and ambivalence in UN
paradigm.
As one of the earlier efforts, then Secretary-General Kofi Annan appointed the “Panel on United
Nations Peace Operations” to assess the shortcomings of the existing peace operations system and to
make specific and realistic recommendations for change. The panel consisting of individuals experienced
in conflict prevention, peacekeeping and peacebuilding published a study called as “Brahimi Report”
because of his chairman Lakhdar Brahimi.
Figure 4.6 The Genocide Memorial near Srebrenica, Bosnia and Herzegovina.
113
4
Intervention
It was the most significant challenge to national combination of states and non-state actors. Hybrid
sovereignty after the Westphalian Order. The threats aim to achieve synergistic effects in the
international actors seem confident to protect physical, psychological dimensions of the conflict
humans at the expense of national sovereignty even and cognitive environment in pursuit of their
without the consent of the host government. These objectives. The threats faced today blur the lines
developments are also serious questioning of basic between crime and law enforcement as well as
principles of peacekeeping. Indeed, the NATO between the war and peace.
military action against Yugoslavia in Kosovo in Thus, this type of conflict environment requires
1999 illustrates this point clearly. Following these multidimensional response. It is generally called
developments, the first international mandate as “robust peacebuilding” to imply intrusive
by the Security Council has given to Australian- operations challenging national authority along
led intervention in East Timor to prevent human with peacebuilding activities (Bellamy et al., 2010:
suffering. Australia provided the necessary 231). Such operations involve larger number of
troops for successful intervention and halted the troops than previous ones, and those troops have
immediate crisis substantially (Pattison, 2010: 5). greater military capability, with weaponry well
International Force in East Timor (INTERFET) beyond the traditional rifle or side arms carried by
completed its task on 23 February 2000 and traditional peacekeepers. Rules of engagement are
transformed command and control responsibility also more permissive, allowing soldiers to initiate
to the UN peacekeeping force. the use of force if necessary to carry out their duties.
The fourth generation of operations has Another essential characteristic over the
been conducted under the new circumstances operations of this era is the increasing deployment
of conflict environment. It is mainly affected of international civilian police units (CIVPOL)
from globalization and advanced information integrated to the missions because of ongoing civil
technology, called as the 4th Industrial Revolution disturbances while the peace operation continues.
(The Industry 4.0). The new era is characterized Beginning in Kosovo, CIVPOL’s mandate was
by a fusion of technologies that is blurring the expanded to allow units full authority to make
lines between the physical, digital and biological arrests and use deadly force if necessary (Diehl,
spheres. Interconnectedness has spread and the 2008: 55-56). Additionally, not only civilian police
physical as well as cultural borders have become but also military forces with some judicial authority
hazier thanks to the social media and developed and gendarmeries, aka law enforcement forces with
transport systems. military status (LEFMS), have been increasingly
The characteristics of armed conflicts have taking place in these kinds of operations.
changed in parallel with the factors mentioned Notwithstanding the “robust” (or muscular)
above. Being called as the 4th generation of warfare, nature, missions of this generation also aim to
it has such distinctive features as follows: (Lind et resolve conflicts by addressing the causes rooted
al., 1989; Kaldor, 2012): actors are generally non- in politics, economics and socio-cultural life.
state but state sponsored armed organizations and This endeavor highly requires multi-disciplinary
terrorist groups; their objectives are transnational approach as the contribution of all related civilian
and ideological; socio-cultural structures have and governmental bodies, facilitation of local
generally been on the target; the exploitation of reconciliation initiatives, and the coordination
high technological media assets is widespread; with Non-Governmental Organizations (NGOs)
psychological operations have been wielded as well. Since political institutionalization and
alongside armed attacks; the violence is protracted nation building were among the main topics of this
and committed by nontraditional means; generation, transitional administrations were also
organizations have network typed structures. attempted through some cases as in quintessential
The changing environment also transforms models of UN Interim Administration Mission
the threats. As firstly called by Hoffman (2009), in Kosovo (UNMIK), UN Transitional
hybrid threats are the activities that comprise a Administration in East Timor (UNTAET) and
tailored mix of conventional, irregular, terrorism Mission des Nations Unies pour la Stabilization en
and criminal means and perpetrated by a Haiti (MINUSTAH) (Kenkel, 2013: 133).
114
4
International Security
On the other hand, there are military of American States (OAS), NATO and the World
interventions to achieve humanitarian ends during Bank are among the main contributors of peace
this generation that nurture the discussion over the operations.
justification of operations and the role of the UN. The rising role of regional organizations in peace
For example, the Iraq operation (2003) has never operations could be attributed to several factors.
been acknowledged as a multinational operation First, they are very eager to take parts in this kind of
based on humanitarian concerns, nor justified by operations to pursue their own interests. Secondly,
international law. The characteristics of the 4th their intervention is required because of suffering
generation of peace operations in the UN period from high intensity of violence by varied actors
could be emphasized concisely through three and contagious transnational effects. Third, it is a
statements (Cottey, 2008: 429-432): “intervention response of the UN with a variety of related (sub)
takes place often without the consent of the host organizations by acknowledging local differences.
state’s government; the centrality of humanitarian Fourth, powerful donors have been needed in order
objectives; use of military force aggressively to to pursue peace operations effectively (Cottey,
achieve aims.” Indeed, the peace operations begin 2008: 440).
to depart themselves from sticking to the basic
As one of the most powerful military
traditional principles of peacekeeping.
organizations of contemporary security
environment, NATO underwent a transformation
The Role of International after the end of Cold War. It firstly operated on
Organizations in Interventions and its own across the old territories of Yugoslavia by
Peace Operations carrying out air and ground operations in Bosnia
in 1995 and Kosovo in 1999. These military
Peace operations during the Cold War were far
attacks were followed by elements of peacekeeping
more likely to be assumed by a single state whether
and nation-building activities (Cottey, 2008: 440)
directly or by proxy, but after the 1990s they tended
to be multilateral (The Responsibility, 2001:
18). Beginning by the second, but intensifying
through the third generation, the peace operations
have undertaken by regional organizations and
multinational actors alongside with the UN. As
Diehl (2008: 66) states, the peace operations have
commonly been performed by the UN (54%), but
the regional organizations and multinational actors’
share in peace operations have been increasing,
which are 27% and 19% respectively.
Current peace missions comprise various
organizations which handle different aspects of
peace activities. These could be composed in
Figure 4.7 The NATO’s mission in Afghanistan.
three configurations: certain actors may provide
financing, logistics, etc. while others supply troops
on the ground; one peace mission can perform NATO expanded its operational field by
certain duties in advance of different peacekeeping Afghanistan in 2003 as well. It took over the
missions; joint mission might be carried out operational responsibility of the International
between international institutions (Diehl, 2008: Security Assistance Force (ISAF) mission, called as
75-76). European Union (EU), Organization for Resolute Support (RS) in January 1st 2015. Freed
Security and Co-operation in Europe (OSCE), mostly from its combative role through RS, NATO
African Union (AU), Organization of American intends to train, advice and assist the Afghan
States, Organization for Security and Cooperation National Defense and Security Forces (ANDSF).
in Europe (OSCE), Economic Community of The mission in Afghanistan currently involves
West African States (ECOWAS), the Organization around 16,000 personnel from 41 NATO allies
115
4
Intervention
and partners (Resolute Support, 2018). The last Force for the elimination of the Lord’s Resistance
military intervention of NATO began on March Army (LRA)” to reinforce the operational capacity
19th 2011 in response to the resolution of The of the LRA-affected countries, create conditions
Security Council. The operation comprised war- conducive for the stabilization of the affected
fighter elements from 19 countries and concluded areas, and facilitate the delivery of humanitarian
on 31 October 2011. assistance to the affected populations (African
The EU has been taking role in peace keeping Union Peace and Security, 2018).
activities and conflict prevention in accordance The inner composition of peace forces has been
with Common Defense and Security Policy shifting as well. Although there are three traditional
(CDSP) to help strengthen international security. types of security organizations as military, police
The organization began its peace activities by taking and gendarmeries; particularly after the first phase
over the small peacekeeping mission responsibility of intervention, the deployment of CIVPOL and
from NATO in Macedonia, and launching policing Law Enforcement Forces with Military Status
mission in Bosnia and Herzegovina in 2003. And (LEFMS), aka gendarmeries, have been increasing
it took over operational responsibility from NATO while the number of troops contributing peace
in Bosnia and Herzegovina (Operation ALTHEA) operations has been decreasing by the time (UN
by the authorization of Security Council resolution Peacekeeping Operations Fact Sheet, 2017). The
in 2004 and the mission is still continuing. Since police forces multiplied almost 11 times compared
then, the EU has extended its capability by to the year of 1995, while the number of troops
undertaking 34 operations across three continents: increased just about 1.4 times (UNPOL, 1995-
Europe, Africa, and Asia. There are six ongoing 2004; UNPOL, 2005-2017). Besides of CIVPOL,
military and ten civilian missions undertaken by the LEFMS has also been gaining importance. They
the EU, and 18 completed missions and operations have been employed under the composed body
(EU External Action, 2018). of Formed Police Units (FPUs) or Multinational
The EU also constituted European Specialized Units (MSUs) by the UN. The MSUs in
Gendarmerie Force (EUROGENDFOR) in 2004 particular, were constituted exclusively by LEFMS
as a Multinational Law Enforcement Force to units from the respected countries (Hansen, 2002:
participate in the stabilization of crisis and conflict 71-72).
areas outside the EU. It currently operates in five There is also a trend of employing private
countries such as Bosnia and Herzegovina, Haiti, military companies (PMCs) in the interventions or
Mali, Afghanistan, and Central African Republic peace operations. They provide a variety of services
(European Gendarmerie Force, 2018). including combat support; logistics; advice;
The African Union began its peacekeeping training; operational support; intelligence support;
operations in the 2000s. It draws the authority humanitarian assist; communication; security
from the article four of its charter, Constitutive Act services (Bures, 2005: 536-537). It is beyond of
of the African Union, which states as “the right of this study to delve into the employment of PMCs
the Union to intervene in a Member State pursuant in peace operations, but it should be kept in mind
to a decision of the Assembly in respect of grave that “private peacekeeping” serves generally as a
circumstances, namely: war crimes, genocide and supplement rather than a replacement to peace
crimes against humanity”. The organization has operations (Diehl, 2008: 77).
the sub-structure of Peace and Security Council As a response to a range of security challenges
(PSC) whose duties are somewhat like Security in peacekeeping missions, the NGOs also carry
Council of the UN. Currently, the operational out some crucial duties. Although NGOs have
responsibility of African mission in Somalia been around for some time, the International
(AMISOM) has been carried out by the AU. It Committee of the Red Cross (ICRC) was founded
has been executing coordinated operations with in 1863, the last few decades have seen a sharp
the UN in Darfur (UN–AU Hybrid Operation increase in their numbers. The rise of NGOs could
in Darfur/UNAMID). The African Union also be attributable to the augmented recognition of
leads the “The African Union-Led Regional Task human rights and acceptance of humanitarian
116
4
International Security
intervention. As of 2,000 there were almost 40,000 conflicts in 2016 occurred within states (SIPRI
such organizations, and they continue to proliferate Yearbook, 2017: 2). So, peace operations have
at a rapid pace. It is argued that there are well over been increasingly conducted to address intra-state
3,000 NGOs focused on the issue of human rights problems despite the risks concerning the breach of
alone (Shimko, 2010: 245). national sovereignty.
The peace missions could be carried out by National sovereignty has been acknowledged
different organizations as stated above. Each one has as a sacred value for a long time, and it’s been
its own advantages and disadvantages. Beginning affirmed through the founding charters of
by the benefits of regional organizations, these various international organizations, agreements
missions have similar political outlooks emanated and norms. Yet, violations of human rights and
from their common culture, politics, economic massacres occurring in civil wars particularly
roots and problems. Hence, regional organizations since the late 1990s made the international public
might have more respect from the community question the inviolability of national sovereignty.
they served, and they could be accepted as an Thus, it is commonly believed that international
honest broker. Multinational organizations with actors have the ‘responsibility to protect’ people
different areas of interest could find a plausible living in dire conditions even in the situation of
way to contribute the reconstruction efforts of host government’s dissent (The Responsibility,
post-conflict countries. So, organizations may 2001: 17). Although humanitarian intervention
help improve the peacekeeping capacity of the UN vs. national sovereignty keeps becoming a hot
(Bellamy and Williams, 2004: 195). topic, three traditional characteristics of a state
However, intervention by regional organizations (territory, authority, and population) have been
has some drawbacks. Regional organizations seek complemented by a fourth, respect for human
to establish large coalitions since they depend on rights (Chandler, 2004: 65).
resources. The regional organizations may have The actors participating in peace operations
inability to take concerted action against their have been also multiplied since the contemporary
powerful members (Diehl, 2008: 79-82). The security problems, mostly emanated from several
inclusion of various parties and governments in causes such as desperate living conditions, lack of
operations has entailed accumulation of critiques civil rights, terrorism and transnational organized
arguing the clash of interests of related sides. The crime, need multi-dimensional and robust
students of this argument contend that actors responses. Regional organizations and NGOs
pursue their own interests through the operations with the support of local actors and international
rather than taking account of host nation’s donors have been increasingly taking part in peace
needs. Although there are many achievements by operations to manage the process and resolve the
multinational organizations, there are also some root causes of conflict.
failures such as ECOWAS’ intervention in Liberia The peace building operations aim to reform
in 1990 and French-led intervention in Côte the conditions underlining unsecure environment.
d’Ivoire (Pattison, 2010: 6). These missions include many related activities
from helping to build sustainable institutions of
The Future of Peace Operations governance to human rights monitoring; security
sector reform; disarmament, demobilization and
The peacekeeping and peacebuilding operations
reintegration of former combatants. So, the peace
have evolved considerably because of various
programs should not only aim to suppress violence,
factors such as the changing nature of threats
but also exert efforts to eliminate or relieve the
and conflicts, transformation in the international
underlining conditions. The foundation of this
system and emerging new actors, developing
idea is rooted through the seminal works of Johan
humanitarian worries, and experiencing a number
Galtung (1967) as negative vs. positive peace.
of organizational ineffectiveness. For example,
civil conflicts have been occupying the world’s Although peace operations call for secure
security agenda particularly after the end of Cold environment to operate, contemporary peace
War. According to a report, 47 out of 49 active operations have been undertaking while the
117
4
Intervention
armed conflict continues. According to a report increasingly structural armed conflicts comprising
published by the UN, “casualties have spiked since indirect, structural violence and seek to maintain
2013, and 195 personnel in UN peacekeeping state, economic, identity and social inequality.
missions have been killed by acts of violence, more Secondly, it entails questioning of composition
than during any other 5-year period in history” of the organization during peace operations. As
(Improving Security of UN Peacekeepers, 2017). mentioned before, the countries in conflict are
Hence, it is required to have more robust response exposed to hybrid and severe threats from a variety
before peacekeeping or peace building operations of actors as never experienced before. However, the
and capable law enforcement forces during these host countries do not have related capabilities to
operations taking place. encounter these risks. It is called as “indigenous
policing gap”: Failing to provide safe and secure
environment for public security and the rule of law
(NATO Standard AJP- 3.22, 2017). Hybrid threats
require hybrid responses or hybrid institutions as
Diehl (2008: 76) argued. The need to combine
and integrate distinctive advantages of various
organizations and actors would most probably be
accelerated.
There is a surplus of factors undermining
estimated prospect for future peace operations,
because both the tangible and intangible issues
Figure 4.8 UN Peacekeepers
have been changing. The actors providing security
Source: https://peacekeeping.un.org/en/service-and- have been deepening as international system, state,
sacrifice social groups, individuals; while the issues, as well,
have been widening to comprise political, military,
First, it caused widening of interpretation of environmental, social, and economic aspects.
the UN Charter, particularly Chapter VI and VII, The question of “security for whom” has already
over the legitimacy of peace operations. While been replied by the transformation from merely
traditional consent-based missions are sometimes ‘the security of states’ to the ‘security of human
called as “chapter six-and-a-half ”, more robust beings’ and comprehensive security. So, the peace
missions have been dubbed “chapter six-and- operations need to adapt and renovate itself to
three-quarters” (Fortna, 2004: 270). Merging effectively response in a multidimensional and
with humanitarian concerns, it paves the way for multileveled way.
intervention.
However, intervention and suppression of
armed fighting at the early stages of the conflict 4
does not easily lead to permanent peace, because
contemporary security environment is more What are the main features of
complex than before. As Richmond (2014: 510) peace activities specified by the
argues, new wars in the twenty-first century are United Nations?
118
4
International Security
Summary
has become part of the war of neo-colonization itself. The theory of
the national self-determination/sovereignty argues that states have a
right to determine the shape of their association and institutions.
Interventions on behalf of a very specific group are morally/legally
problematic. The intervention issue is one of the most misused
principles in International Law by the Great Powers. Internal
freedom of a political community should be won by the members of
that particular community for the achievement of self-development
and sovereignty. Political communities must seek their own freedom
and cultivate their own virtues. External forces cannot, perhaps
should not, achieve self-determination, sovereignty, and liberty of a
community for the community. The principles of self-determination
reinforce absolute sovereignty in which non-intervention is a
precondition of the full exercise of self-determination.
119
4
Intervention
Peace operations during the Cold War were more likely to be carried
out by a single state whether directly or by proxy, but after the 1990s
they tended to be multilateral. The peace operations have been carried
out by regional organizations and multinational actors alongside
with the UN. The inner composition of peace forces has been
shifting as well. Although there are three traditional types of security
organizations as military, police and gendarmeries; particularly after
the first phase of intervention, the deployment of Civilian Police
(CIVPOL) and Law Enforcement Forces with Military Status
(LEFMS), as known as gendarmeries, have been increasing while the
number of troops contributing peace operations has been decreasing
by the time. There is also a trend of employing private military
companies (PMCs) which provide a variety of services including
combat support; logistics; advice; training; operational support;
intelligence support; humanitarian assist; communication; security
services.
120
4
International Security
1 In which of the following countries did the 5 Which of the following criteria does not
Western powers not intervene because of the lack apply to humanitarian intervention?
of immediate political and economic interests?
a. It should be undertaken by the UN, or
a. Rwanda on its mandate and under its authority
b. Liberia and coordination, and/or by the regional
Test Yourself
c. Somalia organization to which the state belongs.
d. Sierra Leone b. When carried out by a regional organization
e. Iraq concerned, it should be preceded by
consultations with the Security Council.
c. It should be undertaken immediately whenever
2 The most recently emerged security threat to there is a total lack of governmental institutions
the international community is ……..
and the seriousness of the gravity of the
Which of the following options correctly completes humanitarian situation is such that the lives
the sentence above? and wellbeing of the population as a whole is
threatened.
a. the anarchical international system.
d. It should not be limited in time and space.
b. vulnerable life in underdeveloped/developing
countries. e. It should be proportionate in the sense that it
should not cause more damage and harm than
c. universally originated global terrorism.
that caused by the situation it intends to correct.
d. the possibility of a nuclear exchange.
e. acquiring new offensive weapons.
6 Which of the following is not a peace activity
that has been proposed by the UN?
3 According to the UN Charter’s description of
sovereignty, which of the following is not true? a. Peace enforcement
b. Peace building
a. Every state is legally equal.
c. Peace operation
b. Every state is not obligated to respect the fact of
d. Peace keeping
the legal entity and sovereignty of other states.
e. Conflict prevention
c. Every state enjoys the rights and benefits
inherent in full sovereignty.
d. The territorial integrity and political 7 Which of the following is not one of the
independence of a state are inviolable. principles of conducting peacekeeping operations?
e. Each state has the right to freely choose and a. Impartiality
develop its own political, social, economic and
b. Consent of the conflicted parties
cultural system.
c. Non-use of force except in self-defense and
defense of mandate
4 Which of the following covenants or d. Authorization and mandate delivered by the
agreements is not directly related to the issues of UN
state sovereignty? e. The importance of humanitarian concerns
a. The Covenant of the League of Nations in 1920. above the national sovereignty.
b. The Convention on the Duties and Rights of
States in the Event of Civil Strife in 1928.
c. The Montevideo Convention on the Rights and
Duties of States in 1933.
d. The United Nations Charter in 1945.
e. The Universal Declaration of Human Rights in
1948.
121
4
Intervention
122
4
International Security
If your answer is not correct, review If your answer is not correct, review
1. a 6. c
“States and Intervention: New Forms of “International Organizations and
Intervention.” Intervention.”
If your answer is not correct, review If your answer is not correct, review
If your answer is not correct, review If your answer is not correct, review
3. b 8. c
“States and Intervention: New Forms of “International Organizations and
Intervention.” Intervention.”
123
4
Intervention
The use of force in intervention requires a deep moral honesty to ask a series
Suggested Answers for “Your Turn”
of defining questions for its legalization, which are known as the tradition
of the Just War. Intervention might breach the sovereignty if not serious
efforts have been made to find peaceful solutions to the problem before using
the force. Nonetheless, seeking a legitimacy and justification for every war
has become part of the war itself. The theory of national self-determination
and sovereignty is peoples/states have a right to determine the shape of their
association and institutions. Interventions on behalf of a very specific group
your turn 2 are morally problematic. The intervention issue is one of the most misused
principles in International Law by the Great Powers for their own benefit.
Internal freedom of a political community should be won by the members
of that particular community for the achievement of self-development and
sovereignty. Political communities must seek their own freedom and cultivate
their own virtue. External forces cannot, perhaps should not, achieve self-
determination, sovereignty and liberty of a community for the community.
The principles of self-determination reinforce absolute sovereignty in which
non-intervention is a precondition of the full exercise of self-determination.
124
4
International Security
References
African Union Peace and Security, (2018). “Peace Diehl, P.F. (2008). Peace Operations, Cambridge:
Operations conducted by the African Union and Polity Press.
Partners”, http://www.peaceau.org/en/page/72-
European Gendarmerie Force, (2018). http://www.
peace-ops
eurogendfor.org/
An Agenda for Peace, (1992). http://www.un-
Fortna, V.P. (2004). “Does Peacekeeping Keep Peace?
documents.net/a47-277.htm
International Intervention and the Duration
Bellamy, A.J. and Williams, P.D. (2004). “Conclusion: of Peace after Civil War”, International Studies
What future for peace operations? Brahimi and Quarterly, 48(2): 269-292.
beyond”, International Peacekeeping, 11(1): 183-212.
Fortna, V.P. and Howard, L.M. (2008). “Pitfalls and
Bellamy, A. J., Williams, P.D. and Griffin, S. (2010). Prospects in the Peacekeeping Literature”, Annual
Understanding Peacekeeping, Cambridge: Polity Review of Political Science, Vol. 11: 283-301.
Press.
Galtung, J. (1967). Theories of Peace: A Synthetic
Brahimi Report (2000). http://undocs.org/A/55/305. Approach to Peace Thinking. Oslo: International
Peace Research Institute.
Bures, O. (2005). “Private Military Companies: A
Second Best Peacekeeping Option?” International Goulding M. (1993). “The Evolution of United
Peacekeeping, 12(4): 533-546. Nations Peacekeeping”, International Affairs,
69(3): 451-464.
Chandler, D. (2004). “The responsibility to protect?
Imposing the ‘Liberal Peace’”, International Hansen, A.S. (2002). From Congo to Kosovo: Civilian
Peacekeeping, 11(1): 59-81. Police in Peace Operations, Adelphi Papers, Vol.
41, No. 343. London: Routledge.
Cottey, A. (2008). “Beyond humanitarian intervention:
The new politics of peacekeeping and intervention”, Hillen, J. (1998). Blue Helmets: The Strategy of UN
Contemporary Politics, 14(4): 429-446. Military Operations. Washington: Brassey’s.
125
4
Intervention
Hoffman, F.G. (2009). “Hybrid Warfare and SIPRI Yearbook (2017). Armaments, Disarmament
Challenges”, JFQ, Issue 52 (1st quarter): 34-39. and International Security (Summary). from
https://www.sipri.org/sites/default/files/2017-09/
Improving Security of United Nations Peacekeepers,
yb17-summary-eng.pdf
(2017). https://peacekeeping.un.org/sites/default/
files/improving_security_of_united_nations_ Sönmezoğlu, F. (2005). Uluslararası Politika ve Dış
peacekeepers_report.pdf. Politika Analizi. İstanbul: Filiz Kitabevi.
Kaldor, M. (2012). New and Old Wars, Cambridge: Stowell, E.C. (1921). Intervention in International
Polity Press. Law, Washington: John Byrne and Co.
Kenkel, K.M. (2013). “Five generations of peace Thakur, R. and Thayer C.A. (eds.) (1995). A Crisis
operations: from the “thin blue line” to “painting of Expectations: UN Peacekeeping in the 1990s,
a country blue”, Revista Brasileira de Política Boulder, CO: Westview.
Internacional, 56 (1): 122-143.
The Responsibility to Protect: Research, Bibliography,
Lind, W. S., Nightengale, K., Schmitt, J. F., Sutton, Background, (2001). Supplementary Volume
J. F. and Wilson, G. I. (1989). “The Changing to the Report of the International Commission
Face of War: Into the Fourth Generation”, Marine on Intervention and State Sovereignty, Ottawa:
Corps Gazette, 73 (10): 22-26. International Development Research Center.
Lyon, P. (2008).Conflict between India and Pakistan: The United Nations and Decolonization, (1960).
An Encyclopedia. California: ABC-CLIO. “Declaration on the Granting of Independence
to Colonial Countries and Peoples,” http://www.
Morris, S. J. (1999). Why Vietnam Invaded Cambodia:
un.org/en/decolonization/declaration.shtml
Political Culture and Causes of War. Stanford, CA:
Stanford University Press. UN Charter, (1945). https://treaties.un.org/doc/
publication/ctc/uncharter.pdf
Mutaqin, Z. Z. (2017). “Negative Sovereignty and
Positive Sovereignty (Why the Great Powers UN Department of Political Affairs, (2018). https://
Invade Outlaw States),” Canterbury Amicus Curiae www.un.org/undpa/en
Law Journal, 1(4): 44-61.
UN Peacekeeping Operations, (2018). https://
NATO Standard AJP-3.22: Allied Joint Doctrine for peacekeeping.un.org/en/where-we-operate
Stability Policing, (13 July 2017). https://www.
UN Peacekeeping Operations: Principles and
gov.uk/government/publications/allied-joint-
Guidelines, (2008). http://www.un.org/en/
doctrine-for-stability-policing-ajp-322a.
peacekeeping/documents/capstone_eng.pdf
Pattison, J. (2010). Humanitarian Intervention and
UN Peacekeeping Operations Fact Sheet, (31 August
the Responsibility to Protect: Who Should Intervene?
2017). http://www.un.org/en/peacekeeping/
Oxford: Oxford University Press.
documents/bnotelatest.pdf
Phillips, R.L. (1996). “The Ethics of Humanitarian
Universal Declaration of Human Rights, (2015)
Intervention”, in Robert L. Phillips & Duane
http://www.un.org/en/udhrbook/pdf/udhr_
L. Cady (Ed.), Humanitarian Intervention, Just
booklet_en_web.pdf
War vs. Pacifism. London: Rowman & Littlefield
Publishers. United Nations General Assembly (UNGA), (1970).
“Declaration on Principles of International Law
Principles of Peacekeeping, (2018). https://peacekeeping.
concerning Friendly Relations and Co-operation
un.org/en/principles-of-peacekeeping.
among States in accordance with the Charter of
Resolute Support, (2018). https://rs.nato.int/about- the United Nations”, http://www.un-documents.
us/mission.aspx net/a25r2625.htm
Richmond, O.P. (2004). “UN peace operations and United Nations General Assembly (UNGA), (1988).
the dilemmas of the peacebuilding consensus”, “Humanitarian assistance to victims of natural
International Peacekeeping, 11(1): 83-101. disasters and similar emergency situations”, http://
www.un.org/documents/ga/res/43/a43r131.htm
Roberts, A. (1993). “Humanitarian War: Military
Intervention and Human Rights”, International
Affairs, 69(3): 429-449.
126
4
International Security
United Nations General Assembly (UNGA), (2004). UNPOL, (1995-2004). “Monthly Summary of
“A more secure world: our shared responsibility”, Military and Civilian Police Contribution to
https://www.securitycouncilreport.org/atf/ United Nations Operations”, http://www.un.org/
cf/%7b65BFCF9B-6D27-4E9C-8CD3- en/ peacekeeping/contributors/documents/
CF6E4FF96FF9%7d/CPR%20A%2059%20 Yearly_Summary.pdf
565.pdf
UNPOL, (2007-2017). “Monthly Summary of
United Nations General Assembly (UNGA), (2005). Military and Police Contribution to United
“In larger freedom: towards development, Nations Operations”, http://www.un.org/en/
security and human rights for all”, http://undocs. peacekeeping/documents/Yearly.pdf
org/A/59/2005
UNSCR 688, (1991). http://unscr.com/en/
United Nations General Assembly (UNGA), resolutions/688
(2009). “Implementing the responsibility to
Walzer, M. (1977). Just and Unjust Wars. New York:
protect”, http://responsibilitytoprotect.org/
N.Y. Basic Books.
implementing%20the%20rtop.pdf
Wider Peacekeeping. (1996). The RUSI Journal,
United Nations General Assembly (UNGA), (2013).
141(1): 45-50.
“Situation of human rights in the Syrian Arab
Republic,” https://www.securitycouncilreport.
org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-
CF6E4FF96FF9%7D/a_res_68_182.pdf
Websites
http://www.un-documents.net/a25r2625.htm
http://www.un.org/documents/ga/res/43/a43r131.htm
http://www.un.org/en/decolonization/declaration.shtml
http://www.un.org/en/sections/un-charter/chapter-i/index.html
http://www.un.org/en/sections/un-charter/un-charter-full-text/
http://www.un.org/en/udhrbook/pdf/udhr_booklet_en_web.pdf
https://www.nato.int/kosovo/history.htm
https://www.ohchr.org/EN/UDHR/Documents/UDHR_Translations/eng.pdf
https://www.researchgate.net/publication/317388312_NEGATIVE_SOVEREIGNTY_AND_POSITIVE_
SOVEREIGNTY_Why_the_Great_Powers_Invade_Outlaw_States
https://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/a_
res_68_182.pdf
https://www.securitycouncilreport.org/atf/cf/%7b65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7d/
Disarm%20S24111.pdf
127
Alliances and Military-Security
Chapter 5 Cooperation
After completing this chapter, you will be able to:
1 2
Learning Outcomes
128
5
International Security
129
5
Alliances and Military-Security Cooperation
soft balancing. States use mainly their military independence (Schroeder, 1994; Vasquez and
and economic capacities in hard balancing, whereas Elman, 2003; Walt, 1987: 21; Mearsheimer,
soft balancing suggests the use of diplomatic and 2001). In fact one can differentiate between two
cultural means, which are the soft power resources types of bandwagoning: defensive and offensive.
(Fortmann, Paul and Wirtz, 2004: 362-365; Paul, In defensive bandwagoning, which is a form of
2004: 3; Pape, 2005: 9-10). appeasement, a state aligns with a threatening power
Balancing can also appear in the form of to avoid being attacked. Offensive bandwagoning
onshore balancing and offshore balancing. In is alignment with a dominant state for the payoffs.
onshore balancing, a great power deploys some of Balancing and bandwagoning are not the only
its capacity forward in selected regions of the world means through which a state reacts to the external
to contain a rival. Offshore balancing, on the other world. Yet another strategy is to hide from threats.
hand, describes a strategy in which a great power This could take various forms, including simply
keeps all of its national capabilities, particularly ignoring the threat, declaring neutrality in a general
military capabilities, at home and uses regional crisis, trying to withdraw into isolation, assuming
powers and/or proxies to balance the threatening a purely defensive position, or seeking protection
actors (Brown, Cote, Lynn-Jones and Miller, 2000: from some other powers without acting as an ally
166). Omni-balancing is a more suitable strategy or committing itself to any use of force (Dwivedi,
to explain the balancing behavior of the leaders of 2012: 226). Another strategy is transcending,
the third world states. This concept suggests that which is defined as an attempt by states to deal
omnibalancing explains Third World alignments with the dangers of concentration of power and
as a consequence of leaders seeking to counter of concrete threats by taking the problem to a
internal and external threats to their rule. leaders of higher level, establishing norms of a legal, religious,
the Third World countries seek alliances to counter moral, or procedural nature to govern international
both internal and external threats to their rule practice (Vasquez, Elman, 2003: 119). Finally,
(David, 1991: 235). buck-passing refers to the behavior of a state
The following three patterns of balancing when it refuses to balance against a rising state,
behavior come into prominence: alliance, hoping that another threatened state will furnish
alignment, and coalition (Ward, 1982: 14). the necessary blood and treasure (Christensen and
Although they are used interchangeably and bear a Snyder, 2003: 73).
number of common properties, there are also some
important differences. An alignment is considered
as any general commitment between states in order Defining the Concept of Alliance
to achieve mutual security goals. Its objectives are An alliance is “a formal agreement that pledges
cooperation and collaboration that are broad and states to co-operate in using their military resources
vague rather than narrow and explicit (Krause and against a specific state or states and usually obligates
Singer, 2001: 16; Snyder, 1990: 105). A coalition one or more of the signatories to use force, or
is characterized by the commitment of two or more to consider (unilaterally or in consultation with
states to coordinate their behavior and policies in allies) the use of force in specified circumstances”
order to perform particular functions or pursue (Osgood, 1968: 17). It is normally a written and
specific goals. It is often formed during a war mostly voluntary agreement, treaty, or convention
(Snyder, 1990: 106). Members of coalitions tend among states pledging to coordinate their behavior
to be acting in concert at x time regarding one to n and policies in the contingency of military conflict.
issues (Fedder, 1968: 80). If the states perceive a vital threat, the bonds among
Within the balance of power politics, the members of an alliance get tougher. Alliances
there is another strategy employed by states; are established to deal with mainly military security
bandwagoning. Bandwagoning refers to aligning affairs. Therefore, the principal goal of alliances is
with or joining the powerful actor toward to ensure political sovereignty, territorial integrity,
protecting itself from fear and attack, even if this and national security on the basis of collective
means insecurity and a certain sacrifice from its military defense (Krause and Singer, 2001: 16).
130
5
International Security
131
5
Alliances and Military-Security Cooperation
Wartime alliances are, in fact, generally There are three basic types of formal military
established in peacetime to prevent, or prevail in, alliances; defense pact, nonaggression/neutrality,
a possible future war. These alliances continue to and entente (Singer and Small, 1968).
operate under wartime conditions. “States augment A defense pact requires its signatories to
their joint planning, consultation and sometimes intervene with military force on behalf of any
integrate their forces as their plans for war are alliance partner(s) engaged in armed hostilities.
unfolding and being implemented. Member states The signatories to the defense pact determine the
usually expect the alliance will endure beyond threats in the treaty and concretely prepare to
any specific war or crisis” (Weitsman, 2010: 115; respond to it together. The North Atlantic Treaty
Russett, 1971: 264). Organization (NATO) is the most frequently cited
Peacetime alliances are just formal or informal example of a defense pact. The Warsaw Pact was also
agreements between two or more states intended a defense pact between the Soviet Union and seven
to further the national security of the participating other communist states during the Cold War. After
states, operating when the signatories are not at war. it was dissolved in 1991, the Collective Security
If war begins and the alliance does not dissolve, Treaty Organization (CSTO) was established in
it turns into a wartime alliance. If the alliance 1992 as a defense pact among Russia, Armenia,
endures beyond the war, it reverts to a peacetime Belarus, Kazakhstan, Kyrgyzstan, and Tajikistan.
alliance (Weitsman, 2010: 115). On the other A Nonaggression pact is an alliance whose
hand, peacetime alliances tend to be limited to a signatories pledge not to resort to military action
fraction of the total interests and the objectives of against other pact signatories. An example of a
the signatories. A nation will conclude a multitude non-aggression treaty is the Molotov–Ribbentrop
of alliances with different nations which may Pact of 1939 between the Soviet Union and Nazi
overlap and contradict each other on specific points Germany during World War II. A neutrality pact
(Morgenthau and Thompson, 1985: 203-206). includes a promise to avoid supporting another
The pure type of an ideological alliance is country, which may act against the interests of any
presented by the Treaty of the Holy Alliance of of the pact signatories (Leeds, Ritter, Mitchell and
1815 and the Atlantic Charter of 1941. Both Long, 2002). The Soviet–Japanese Neutrality Pact
documents laid down general moral principles to of 1941 is an example.
which the signatories pledged their adherence and In an entente, the signatories merely agree to
general objectives whose realization they pledged consult one another in the event of a security-
themselves to seek. military threat. An example of an entente is the
British-French Entente Cordiale of 1904. No firm
commitment exists between the partners. Entente
agreements are relatively flexible associations, and
they make sense only if they serve the common
interests of the partners. Secrecy, ideological issues
etc. are well delineated in alliance treaties but not
in ententes (Kann, 1976).
There are some types of relationships that are
often confused with alliances and coalitions such as
strategic partnership and security community.
The concept of strategic partnership has been
widely used to describe the security alignments,
among others, between Japan-Australia, the USA-
India, the USA-Turkey, and NATO-the EU.
The strategic partnership is neither an alliance
nor a coalition, rather a structured collaboration
between states to take joint advantage of
Figure 5.2 The Atlantic Charter of 1941. economic opportunities or to respond to security
challenges more effectively. The concept of
Source: www.harropianbooks.com
security community, on the other hand, refers
132
5
International Security
133
5
Alliances and Military-Security Cooperation
134
5
International Security
perceived intentions in forming alliances (Walt, where also unthreatened states formed alliances.
1987: 5). According to Walt, pragmatic interests Randall Schweller has pointed to this behavior
and security needs of states are more important for of states and come up with the theory of balance
alliance formation than ideological considerations of interests. Contrary to the balancing behavior
(Walt, 1987: 33). He argues that it is not claimed by realist theorists, Schweller argues that
necessarily a strong neighbor that can be a threat, states tend to bandwagon for profit (Schweller,
but also a relatively weak nation can pose a threat. 1994: 99). To Schweller, alliances are responses
This depends on the threat perception of the state not only to threats but also to opportunities. He
in question. Then, the perception of intent plays a regards an alliance as a tool to make gains as well
crucial role in alliance formation. as to avoid losses. While the theories of balance of
threat and balance of power explain the alliance
formation only in high-insecurity environments,
when survival is at stake, the balance of interests
theory takes into account both security and non-
security interests rather than threats alone. Thus,
it provides a relatively complete explanation for
alliance formation (Sweeney and Fritz, 2004: 436).
HISTORICAL BACKGROUND
Figure 5.3 Stephen M. Walt’s prominent book on AND EXAMPLES
alliances, The Origins of Alliances, 1987.
Alliances date back to as early as the 5th century
Source: www.goodreads.com BC. For example, the League of Delian led by
Athens and the Peloponnesian League led by Sparta
Walt tested his theory by examining the pattern were formed during the Peloponnesian War, which
of alliance formation in the Middle East from 1955 lasted between 431-404 BC (Shewey, 2004).
to 1979. He showed that it is a general tendency of During the Crusades to Jerusalem, a variety
states to balance against, rather than bandwagon of alliances were formed among the Christian
with, the most threatening state or the coalition. powers, including France, England, the Holy
Because states perceive that they can lose their Roman Empire, the Kingdom of Jerusalem, and
freedom of action when they bandwagon with the Republic of Venice. The Thirty Years’ War of
the powerful state or the coalition. Nevertheless, 1618–1648 marked the start of alliances in the
balancing against threats is not universal; rather it early modern period. While Bavaria and other
is more common than bandwagoning. Catholic German states came together under the
alliance of Catholic League, a number of small
Protestant German states formed the alliance of
Balance of Interests Protestant Union. In this period several alliances
The theories of balance of power and balance of were formed in Europe as a result of the French
threat mainly focus on the behavior of threatened Revolution. Some of them were limited in time
states, ignoring the behavior of unthreatened and scope. They were primarily wartime alliances,
states. However, one may give several examples, and they dissolved as soon as the war ended.
135
5
Alliances and Military-Security Cooperation
During the last quarter of the 19th century, the Following the end of the Cold War and the
balance of power in Europe was disrupted by several disappearance of the Soviet Union from the
developments such as the weakness of France due world map, the unipolarity of the international
to the Napoleonic wars, the retreat of the Ottoman system caused the alliances to relatively lose their
Empire from Europe, and the rise of both Germany importance. However, gradually coalitions or
and Italy. Consequently, several alliances were formed coalitions of willing came into existence. The first
which re-established the equilibrium in Europe. such example was the Coalition of Willing against
These include but are not limited to the following: Iraq that was formed after Iraq had invaded Kuwait
• The League of the Three Emperors in 1990. This coalition consisted of the US and
was created among the Russian Empire, other 33 countries. During the crises in the former
Austria-Hungary, and the German Empire Yugoslavia, several coalitions were formed to
in 1873. After Russia withdrew from the intervene in the conflicts in Bosnia-Herzegovina,
League in 1878, Germany and Austria- Croatia, Kosovo, and Macedonia from 1992 to
Hungary established the Dual Alliance in early 2000s.
1879 against Russia. In the twenty-first century, the 9/11 terrorist
• The Triple Alliance of 1881 was formed attack on the US and the “global war on terror”
by Germany, Austria-Hungary, and Italy. had considerable impact on the formation of
They pledged mutual support in case of an alliances and coalitions. Allies came together under
attack by France as well as of a war with two the Operations Enduring Freedom and later the
or more European nations. Italy, however, International Security Assistance Force (ISAF)
signed a deal with France and left the Triple in Afghanistan consisted of the USA, the UK,
Alliance. Australia, and the Northern Alliance of Afghan
The 20th century also witnessed the formation factions. This coalition later expanded to include
of several alliances. During the First World War, about forty nations and formed the NATO mission
the Central Powers included Germany, Austria- of Resolute Support in 2015.
Hungary, the Ottoman Empire, and Bulgaria. They
fought against the Entente Powers of the Russian
Empire, the British Empire, France, Italy, Serbia,
Romania, and Portugal. During the Second World 3
War, while the Axis Powers included Germany, Discuss in which ways the alliances have
Japan, Italy, Romania, Hungary, and Bulgaria, the changed after the fall of the Soviet Union
Allies consisted of the United States, the United
and the end of the Cold War.
Kingdom, the Soviet Union, China, Poland,
France, and Yugoslavia. The Cold War was also
characterized by military-political alliances. In fact The North Atlantic Treaty
NATO and the Warsaw Pact were ideologically- Organization (NATO)
based alliances of the twentieth century.
The North Atlantic Treaty Organization
(NATO) is an alliance that provides security for
its members. NATO is an intergovernmental
organization, where each member maintains its
political sovereignty. All NATO decisions are taken
jointly based on the agreement of each member
country (Bayer, 2013, 33). In other words, NATO
takes its decisions unanimously. Its members
are states parties to the founding North Atlantic
Treaty, which is also referred to as the Washington
Treaty. It was founded in 1949, and it has been the
most influential security organization in the world
since then.
Figure 5.4 Logo of the Warsaw Pact
Source: istockID: 838962512
136
5
International Security
137
5
Alliances and Military-Security Cooperation
invoked. In other words, the Treaty has never been The 1979 Soviet invasion of Afghanistan and
revised nor has a member state withdrawn from the Soviet deployment of SS-20 Saber ballistic
the organization, except the fact that Greece and missiles in Europe led to the end of détente. To
France left NATO’s integrated military command counter the Soviet deployment, Allies made the
(the military wing of NATO) for some time, but “dual track” decision, which called for deploying
they rejoined the command in 1980 and 2009, nuclear-capable cruise missiles in Western Europe
respectively. while continuing negotiations with the Soviets.
The 1980s also saw the accession of NATO’s first
new member since 1955; in 1982, Spain joined the
The Rivalry between the Two transatlantic alliance.
Alliances and the Dissolution of
The fall of the Berlin Wall on November 9,
the Warsaw Pact 1989 and later the collapse of the Soviet Union
After the foundation of the alliance in 1949, brought new uncertainties for NATO. Scholars
new allies joined NATO. Greece and Turkey and politicians alike started discussing whether
became full members in 1952, and West Germany there was any need for the Atlantic Alliance in the
followed suit in 1955. In reaction to West international system. Who/what was the threat that
Germany’s becoming a NATO member, the Soviet would legitimize keeping NATO alive? Ultimately,
Union and its East European allies formed the NATO endured because while the Soviet Union
Warsaw Pact in 1955. was no more, the Alliance’s two other original, if
NATO was based on a realistic approach to unspoken, mandates remain: To deter the rise of
world politics. Therefore, it had to undergo several militant nationalism and to provide a collective
transformations during the Cold War so as to security environment that would encourage
adapt itself to the changing securing environment further democratization and political integration in
(Çaman, 2006: 52). During the heyday of the Europe. It is also suggested that NATO is a means
Cold War (roughly between 1949 and 1962), to keep the United States and the US military
NATO followed the strategic doctrine of Massive power in Europe.
Retaliation. According to which, if a power (read
it as the Soviet Union) launches an attack on the
alliance members, NATO would respond with
NATO’s Transformation in the
nuclear weapons, no matter what the nature of Post-Cold War Era
the first attack was. Scholars and NATO officials In 1989, with the end of the Cold War, we
claimed that the strategy of Massive Retaliation witnessed a paradigm shift in the theories of
allowed the members of the alliance to focus international relations. For example, Francis
their energies on economic growth rather than on Fukuyama considered the end of the Cold War as
maintaining large conventional armies. the end of history and the end of ideologies, except
In the 1960s NATO changed its security liberalism (Fukuyama, 2010, 7). Globalization
policy and military strategies. The focus of the emerged not only as an economic movement but
allies shifted away from deterrence and defense also as a political ideology, which filled the gap left
to détente, which referred to the relaxation of by the end of the Cold War. According to Beck
tensions between the Western and Eastern blocs (1999: 14-22), the nation-state political structure
driven by an acceptance of the status quo. Détente has begun to collapse, country boundaries have
had many faces. The strategy of Flexible Response become blurred, and new risk societies have
replaced the Massive Retaliation as the main emerged. Under this complex political, social,
strategy of NATO. This strategy made it possible economic, and security environment, NATO
for the alliance members to consider in which decided not to dissolve but rather to change its
ways and means they would counter and defeat a strategic doctrine.
future attack, thus allowing the use of conventional NATO decided to transform old rivals into new
weapons besides nuclear weapons. friends. “In December 1991, the Allies established
138
5
International Security
the North Atlantic Cooperation Council, NATO Allies – militarily intervened in Afghanistan
renamed the Euro-Atlantic Partnership Council in the fall of 2001. The UN Security Council
in 1997. This forum brought the allies together with Resolution 1386 authorized the deployment of
their Central European, Eastern European, and the International Security Assistance Force (ISAF),
Central Asian neighbors for joint consultations. a multilateral force in and around Kabul to help
Cooperation also extended southward. In 1994, stabilize the country and create the conditions of a
the Alliance founded the Mediterranean Dialogue self-sustaining peace. In August 2003, NATO took
with six non-member Mediterranean countries: over the command and coordination of ISAF.”
Egypt, Israel, Jordan, Mauritania, Morocco, and “Meanwhile, NATO continued to accept new
Tunisia; with Algeria also joining in 2000.” The members and to build new partnerships. In 2004,
Dialogue seeks to contribute to security and the Alliance launched the Istanbul Cooperation
stability in the Mediterranean through better Initiative as a way of offering practical bilateral
mutual understanding.” security cooperation to countries of the broader
“The allies created the Partnership for Peace Middle East region. Finally, subsequent rounds
program (PfP) in 1994. The Partnership for Peace of enlargement brought more Allies into the fold
allowed non-NATO countries, or “partners,” – Romania, Bulgaria, Slovakia, Slovenia, Latvia,
to share information with NATO Allies and to Estonia and Lithuania in 2004, and Croatia and
modernize their militaries in line with modern Albania in 2009” (www.nato.int).
democratic standards. Partners were encouraged
to choose their own level of involvement with the A New Approach to Peacekeeping
Alliance. The path to full membership would remain
open to those who decided to pursue it. Three “In Afghanistan, as in Bosnia and Kosovo,
former Partners – Poland, the Czech Republic, and Allies have found that military power is no longer
Hungary – took their seats as full Alliance members enough to ensure peace and stability. Peacekeeping
in 1999, following their completion of a political has become at least as difficult as peacemaking. For
instance, much of the world’s attention in 2011 was
and military reform program.”
focused on the crisis in Libya where NATO played
NATO’s experiences in Bosnia and Kosovo a crucial role in helping to protect civilians. In the
demonstrated that NATO had been a static new Strategic Concept agreed in 2010, the Alliance
organization whose mere existence was enough committed itself to dealing with “all stages of a
to deter the Soviet Union. “Balkan intervention crisis – before, during and after” - an all-embracing
began the Alliance’s transformation into a more principle that implies a greater role for cooperative
dynamic and responsive organization. Accordingly, security. Accordingly, the Alliance is not only
the Alliance adopted a new Strategic Concept developing security partnerships with countries
describing the Alliance’s purpose and priorities. In across the Mediterranean, the Gulf region, and
1991, the Alliance had issued, for the first time, even the Pacific area, but it is also reaching out to
an unclassified Concept in the wake of the Soviet other fellow international organizations and non-
Union’s decline. The Concept that followed in governmental organizations that have mandates
1999, stated that since the end of the Cold War, the in such areas as institution-building, governance,
world had come to face complex new risks to Euro- development, and judiciary reform.
Atlantic peace and security, including oppression,
The 21st century will not be all about
ethnic conflict, economic distress, the collapse of
peacebuilding, however. Russia’s illegal annexation
political order, and the proliferation of weapons of
of Crimea in 2014 and its aggressive actions
mass destruction.”
against Ukraine has been a sobering reminder of
“The 11 September 2001 (9/11) terrorist attacks the importance of NATO’s core task: collective
on the World Trade Center and the Pentagon defense. This, coupled with the Syrian conflict, the
demonstrated to the Allies that political disorder rise of ISIL (Islamic State of Iraq and the Levant)
in distant parts of the globe could have terrible and terrorism (and often home-bred terrorism) has
consequences at home. In the aftermath of the 9/11 become a brutal reality across many continents.
attacks, a coalition of countries – including many Meanwhile, tensions rise as migrants seek refuge
139
5
Alliances and Military-Security Cooperation
from conflict in countries that are struggling with the NATO’s door remains open to any European
weight of ethnic and religious strife, demographic country in a position to undertake the
pressures and economic underperformance. commitments and obligations of the membership.
Cyberattacks are becoming ever more frequent NATO’s “open door policy” is based upon Article
and ever more destructive. And through social 10 of the Washington Treaty, which states that
media and other means, the opponents of liberal membership is open to any “European State in a
open societies are spreading disinformation and position to further the principles of this Treaty and
propaganda that seek to undermine the values that to contribute to the security of the North Atlantic
NATO has always sought to protect and promote. area”. As of 2018, four partner countries have
Since its founding in 1949, the transatlantic declared their aspirations to NATO membership:
Alliance’s flexibility, embedded in its original Treaty, Bosnia and Herzegovina, Georgia, Macedonia, and
has allowed it to suit the different requirements of Ukraine (NATO Enlargement, 2018).
different times. In the 1950s, the Alliance was a During the NATO Summit on 11 July
purely defensive organization. In the 1960s, NATO 2018, NATO leaders invited the government in
became a political instrument for détente. In the Skopje-Macedonia to start accession talks. Once
1990s, the Alliance was a tool for the stabilization all national procedures have been completed
of Eastern Europe and Central Asia through the to finalize the agreement, the country will join
incorporation of new Partners and Allies. In the NATO as the thirtieth member (Press Conference,
first half of the 21st century, NATO faces an ever- 11 July 2018).
growing number of new threats” (www.nato.int).
Therefore, NATO proved itself as the primary
institution that can provide peace and freedom in a
Partners and Partnership
wider area to meet the new challenges. Initiatives
“Over more than 25 years, the Alliance has
developed a network of partnerships with non-
NATO Member Countries member countries from the Euro-Atlantic area,
NATO is an Alliance that consists of 29 the Mediterranean and the Gulf region, and other
independent member countries. Member states partners across the globe. NATO pursues dialogue
are the states that party to the NATO Treaty. and practical cooperation with these nations on a
The Twelve original members of the Alliance that wide range of political and security-related issues”
found the organization in 1949 are as follows: (www.mod.gov.lv). NATO cooperates with a range
Belgium, Canada, Denmark, France, Iceland, Italy, of international organizations and countries in
Luxembourg, the Netherlands, Norway, Portugal, different structures.
the United Kingdom, and the United States.
The other member countries that later joined
the alliance are as follows: Greece and Turkey Turkey -NATO Relations
(1952), Germany (1955), Spain (1982), the Czech After the Second World War, Turkey wanted to
Republic, Hungary and Poland (1999), Bulgaria, act with the Western nations. This was basically due
Estonia, Latvia, Lithuania, Romania, Slovakia and to policies of the Soviet Union. The Soviet Foreign
Slovenia (2004), Albania and Croatia (2009), and Minister Molotov had invited Turkey’s Moscow
Montenegro (2017). ambassador to the ministry on June 7, 1945 and
communicated the Soviet demands, including
the cession of Kars and Ardahan to the USSR,
providing the USSR with a base that would ensure
internet
the common defense of the Straits, and revising
the Montreux Convention (Aydın, 2001: 475). In
For further detail on the NATO member
the face of the Soviet threat, Turkey wanted to act
states, please visit the web page https://www.
within an alliance with the Western powers and,
nato.int/cps/en/natohq/nato_countries.htm
therefore, sought to join NATO.
140
5
International Security
Turkey’s applications for membership in NATO On two occasions in 2012, Turkey requested
had been turned down before 1950. In June 1950, a NAC meeting under Article 4: On June 22,
however, Turkey became one of the few countries 2012, when one of its fighter jets was shot down
that sent troops to Korea. By this move, Turkey by the Syrian air defense forces, and on October
sought to neutralize the opposition of some Western 3, 2012, when five Turkish civilians were killed by
countries to Turkey’s entry to NATO (Zürcher, Syrian shells hitting the border town of Akcakale.
2008: 342). In fact, NATO was also willing to Following these incidents, on November 21, Turkey
keep both Turkey and Greece in the Western requested the deployment of Patriot missiles on
Pact. Finally, in an attempt to accept them as full Turkish territory. NATO agreed to this defensive
members NATO signed a protocol with Turkey and measure to help Turkey defend its population and
Greece on October 17, 1951 (Tezcan, 1994: 58). territory as well as to help de-escalate the crisis
Turkey together with Greece joined NATO along the border (NATO Press Release 148, 2012).
in 1952. According to Smith (2000, 94), Turkey
had been accepted to NATO due to its potential
support to the alliance, its proximity to both air
bases in the Middle East and oil resources of the
region, and its capability to strain the Soviets. For
Turkey and Greece to join the alliance, Article 6
of the NATO Treaty was modified. As a result, the
NATO area of responsibility expanded to include
the territory of the Republic of Turkey (Protocol
to the North Atlantic Treaty on the Accession of
Greece and Turkey, 1951).
During the Cold War, Turkey was a “wing
country” under NATO’s strategic framework. By Figure 5.6 The Patriot missiles deployment in
allocating its forces to NATO, providing command Gaziantep.
and control facilities as well as bases in Turkey, and Source: www.nato.int
allowing NATO to possess deterrent weapons on
the Turkish territory, Turkey contributed to NATO
to prevail against the Soviet Union. Following On 26 July 2015, Turkey requested that the
the United States, Turkey has the second-largest NAC convene under Article 4 in view of the
number of troops in the alliance (NATO Support seriousness of the situation following a terrorist
to Turkey, 1952-2018). attack and wanted to inform Allies of the measures
it was taking (NATO Press Release 108, 2015).
Article 4 of the NATO Treaty states that “The
Parties will consult together whenever, in the Although the above-mentioned developments
opinion of any of them, the territorial integrity, are some examples of support that NATO
political independence or security of any of the provided, it is a fact that NATO and some leading
Parties is threatened.” In fact, Turkey has invoked NATO countries also failed to provide Turkey with
Article 4 several times. support especially on such issues as combatting
terrorism, developing the military infrastructure,
On one occasion, on February 10, 2003, Turkey and giving military supplies.
formally invoked Article 4, asking for consultations
in the North Atlantic Council (NAC) on defensive
assistance from NATO in the event of a threat
to its population or territory resulting from the
4
armed conflict in neighboring Iraq. NATO agreed
on a package of defensive measures and conducted Do some research on the NATO’s role in
Operation Display Deterrence from the end of countering terrorism.
February to early May 2003 (NATO and the 2003
campaign against Iraq, 2015).
141
5
Alliances and Military-Security Cooperation
Collective Defense
NATO is committed to the principle that an attack against one or several of its members is considered
as an attack against all. This is the principle of collective defense, which is enshrined in Article 5 of the
Washington Treaty. So far, Article 5 has been invoked once - in response to the 9/11 terrorist attacks in the
United States in 2001 (NATO Press Conference, 2001).
142
5
International Security
NATO Delegations
“Each member country has a permanent delegation at NATO’s political headquarters in Brussels. Each
delegation is headed by an “ambassador,” who represents his/her government in the Alliance’s consultation
and decision-making process.”
143
5
Alliances and Military-Security Cooperation
144
5
International Security
145
5
Alliances and Military-Security Cooperation
Countering Terrorism
Terrorism in all its forms poses a direct threat
Figure 5.9: The NATO operation in Afghanistan.
to the security of the citizens of NATO countries,
Source: www.nato.int and to international stability and prosperity. It is
a persistent global threat that knows no border,
NATO’s Role in Conventional nationality or religion and is a challenge that the
Arms Control international community must tackle together.
NATO’s work on counter-terrorism focuses on
“NATO attaches great importance to
improving awareness of the threat, developing
conventional arms control and provides an
capabilities to prepare and respond, and enhancing
essential consultative and decision-making forum
engagement with partner countries and other
for its members on all aspects of arms control and
international actors. NATO invoked its collective
disarmament. NATO’s 2010 Strategic Concept
defense clause (Article 5) for the first and only time
highlights the continued importance of harmonizing
in response to the terrorist attacks of 11 September
defense and arms control policies and objectives,
2001 on the United States (https://www.nato.int/
and the Alliance’s commitment to the development
cps/en/natohq/topics_77646.htm).
146
5
International Security
147
5
Alliances and Military-Security Cooperation
– in particular the United Nations – and civil steps, as part of the wider international community,
society. NATO is also taking action within its own to confront this issue. NATO has also produced
organization and structures to promote gender an e-learning module on child protection aimed at
equality and the participation of women” (www. deployed troops. When participating in NATO-
europeanwesternbalkans.com). led operations or missions, military leadership and
personnel are trained to recognize and respond to
possible violations identified by the UN Secretary-
Protection of Civilians General. When training local forces, NATO
“NATO and its partners are contributing to ensures that the protection of children affected
the protection of civilians by integrating related by armed conflict is given the right attention;
measures in the planning and conduct of NATO- NATO also promotes adequate reporting and
led operations and missions. It also includes efforts monitoring mechanisms focusing on the serious
to protect children from the effects of armed violations” (https://www.nato.int/cps/en/natohq/
conflict and to prevent conflict-related sexual and topics_156399.htm).
gender-based violence” (https://www.nato.int/cps/
en/natohq/topics_135998.htm).
148
5
International Security
An alliance is a formal agreement in which states pledge to co-operate in using their military resources
against a specific state or states and usually obligates one or more of the signatories to use force, or to
consider, unilaterally or in consultation with allies, the use of force in specified circumstances. Alliances
fall into the realm of national security. This gives alliances a quality of seriousness that clearly distinguishes
them from agreements in other areas of foreign policy, such as finance or commerce. There are three basic
types of formal military alliances; defense pact, nonaggression/neutrality and entente. Alliances can also
Summary
be differentiated as offensive and defensive; serving identical, complementary, and ideological interest
and policies; mutual and one sided; general and limited; temporary and permanent, and operative and
inoperative. Alliances perform several functions such as prevention of war among major actors, providing
collective defense and collective security, containment of rivals, control of allies, fostering military power
of each member, cost-effectiveness for defense and security, and opportunities for minor powers to achieve
various nonmilitary objectives.
The balance of power concept is based on the widely used phenomenon of “equilibrium” in which the ba-
lance of power and policies aiming at its preservation are inevitable and an essential stabilizing factor in the
international system. The theory suggests that states in the anarchical international system behave in ways
that result in balances forming. Whenever the balance is disrupted by one state’s or a group of states’ incre-
ased power, other states will increase their powers with internal and external efforts (alliances) and balance
will be restored again. Stephen Walt does not completely reject the theory of balance of power but modifies
it by claiming that states do not balance against power but rather against threats. His balance of threat theory
takes into account the factors such as geographic proximity, offensive capabilities, and perceived intentions
on alliance formation. While the balance of threat theory, and balance of power theory, explain alliance
formation only in high-insecurity environments when survival is at stake and the balance of interest theory
takes into account both security and non-security interests rather than threat alone.
Alliances are said to be typically associated with Westphalian state systems and the European balance of po-
wer, but many examples go back as early as the fifth century BC. Two alliances which were formed during
the Peloponnesian War in 431–404 BC: League of Delian led by Athens; and Peloponnesian League led
by Sparta. The Thirty Years’ War of 1618–1648 marked the start of alliances in the early modern period.
During the last quarter of the 19th Century, the balance of power in Europe was disrupted by several
developments such as the weakness of France after Napoleonic wars, the retreat of Ottoman Empire from
Europe and the rise of Germany and Italy. Consequently, several alliances were formed which re-established
the equilibrium in Europe. After the WWII, the Cold War was characterized by military-political alliances.
Two best known examples are the NATO and the Warsaw Pact. These two alliances are typical examples of
ideology-based alliances in the twentieth century. Following the demise of Soviet Union and end of Cold
War, the unipolarity of the international system caused the alliances to relatively lose their importance, but
later give rise to coalitions or coalitions of willing the first example of which was the coalition of willing
against Iraq after its invasion of Kuwait in 1990, composing the US and other 33 countries worldwide.
149
5
Alliances and Military-Security Cooperation
North Atlantic Treaty Organization (NATO) is an international organization providing security for its mem-
bers. Its members are states parties to the founding NATO Treaty. It was founded after the Second World
War in 1949 and has been the most influential security organization all over the world. The Treaty com-
mitted each member to share the risk, responsibilities and benefits of collective defense. From the initial 12
members, Today, NATO enlarged in number to the 29 independent member countries and has altered its
strategies and concepts many times based on the changing environment. In the 1950s, the Alliance was a
purely defensive organization. In the 1960s, NATO became a political instrument for détente. In the 1990s,
Summary
the Alliance was a tool for the stabilization of Eastern Europe and Central Asia through the incorporation
of new partners and allies. In the first half of the 21st century, NATO faces an ever-growing number of new
threats. In this situation, NATO proved itself as the primary institution to provide peace and freedom in a
wider area to meet those challenges. Today, NATO cooperates with a range of international organizations
and partner countries. Turkey has been in the NATO as a member state since 1952.
NATO’s aim is to guarantee the freedom and security of its members through political and military
means. The reason for the existence of NATO is to provide security for its members. NATO promotes
democratic values and enables members to consult and cooperate on defense and security-related issues
to solve problems, build trust and, in the long run, prevent conflict. NATO is committed to the principle
that an attack against one or several of its members is considered as an attack against all. All NATO deci-
sions are made by consensus, after discussion and consultation among member countries. Each member
country has a permanent delegation at NATO’s political headquarters in Brussels. Delegations are compo-
sed of civilian and military officials. The North Atlantic Council (NAC) is political decision-making body
composed of civilian representatives of states. The Secretary General is the Alliance’s top international
civil servant. He/she is responsible for steering the process of consultation and decision-making within
the Alliance and ensuring that decisions are implemented. NATO has very few permanent military forces
of its own. When the North Atlantic Council agrees to launch an operation, members contribute military
forces on a voluntary basis. These forces then return to their countries once the mission is completed.
The 2010 Strategic Concept “Active Engagement, Modern Defense” is a very clear and resolute statement
on NATO’s core tasks. The 2010 Strategic Concept states that collective defense is the Alliance’s greatest
responsibility and “deterrence, based on an appropriate mix of nuclear and conventional capabilities, re-
mains a core element” of NATO’s overall strategy. NATO will engage, where possible and when necessary,
to prevent crises, manage crises, stabilize post-conflict situations and support reconstruction. The Alliance
will engage actively to enhance international security, through partnership with relevant countries and
other international organizations; by contributing actively to arms control, non-proliferation and disar-
mament. NATO is an active and leading contributor to peace and security on the international stage.
NATO promotes democratic values and is committed to the peaceful resolution of disputes. However, if
diplomatic efforts fail, NATO has the military capacity needed to undertake crisis management operati-
ons, alone or in cooperation with other countries and international organizations.
150
5
International Security
1 States’ attempt to balance threats by establis- 4 Which of the following is one of the basic
hing informal or formal alliances is called--- characteristics of a wartime alliance?
Which of the following options correctly comple- A. It is exclusively established in wartime.
tes the sentence above? B. It operates when the signatories are not at war.
A. internal balancing C. It is established for promoting international or-
Test Yourself
B. hard balancing der at the expense of national interests.
C. external balancing D. It is usually established in peacetime, but conti-
D. off-shore balancing nues to operate under wartime conditions.
E. omni-balancing E. It is formed by only two states.
2 Which of the following statements is true? 5 Which of the following caused the alliances
to relatively lose their importance after the end of
A. Alliances fall into the realm of national security. Cold War?
B. The North Atlantic Treaty Organization
(NATO) is most frequently cited example of an A. The unipolarity of the international system
entente. B. The enforcement of International rules
C. Bandwagoning is alignment with, and joining, C. The creation of international regimes
the weaker side. D. The establishment of the UN system
D. Participation in alliances may increase minor E. The rise of international terrorism
powers’ diplomatic flexibility to deal with fore-
ign policy crises they face. 6 Which of the following is a correct state-
E. Strategic partnership and security community ment?
are contemporary examples of alliances.
A. Turkey is a founding member of NATO.
B. NATO was established in 1949.
3 What is the basic difference between the ba- C. NATO is a non-governmental organization.
lance of power theory and the balance of threat
D. The Eastern Alliance formed NATO in 1955.
theory?
E. West Germany joined NATO in 1950.
A. The notion of perception is vital to the balance
of power.
B. The balance of threat theory suggests that states 7 Which of the following developments
do not balance against power but rather against symbolizes the end of the Cold War?
threats. A. The Soviet Invasion in Afghanistan.
C. The balance of threat theory regards the geog- B. The establishment of NATO.
raphical proximity as a fundamental factor. C. The Serbian War in 1993.
D. The balance of threat lists four principal balan- D. The 9/11 terrorist attacks on the US.
cing strategies employed by states: divide and E. The disintegration of the Warsaw Pact.
rule, compensations, armaments, and alliances.
E. The balance of threat suggests that bandwago-
ning is more common than balancing.
151
5
Alliances and Military-Security Cooperation
8 The NATO’s “open door policy” with regard 10 The 2010 NATO Strategic Concept high-
to the enlargement of the alliance is based upon lights the Organization’s current core tasks. Which
Article 10 of the Washington Treaty. According of the following describes today’s core tasks of
to Article 10, which states are eligible for NATO NATO?
membership?
A. Collective Defense, Crisis Management, Coo-
Test Yourself
152
5
International Security
If your answer is wrong, please review the If your answer is wrong, please review the
1. C 6. B
“he Definition, Characteristics, Functions, “The North Atlantic Treaty Organization.”
and Typologies of Alliances.” section. section.
If your answer is wrong, please review the If your answer is wrong, please review the
2. A 7. E
If your answer is wrong, please review the If your answer is wrong, please review the
3. B 8. B
“Theories of Alliances and Security Coop- “The North Atlantic Treaty Organization.”
eration. ” section. section.
If your answer is wrong, please review the If your answer is wrong, please review the
4. D 9. A
“The Definition, Characteristics, Func- “The NATO Principles and the Main Or-
tions, and Typologies of Alliances.” section. ganizational Structure.” section.
153
5
Alliances and Military-Security Cooperation
atened state. Therefore, they may seek alliances in order to increase their
security on the basis of major power guarantees to protect their territories and
populations against military aggression. For minor powers, alliances have inc-
reasingly become means not only to acquire essential military benefits but also
to achieve various nonmilitary objectives such as diplomatic support, techno-
your turn 1 logy transfer, economic aid, trade privileges. After the end of the Cold War,
the former Communist states such as Poland, the Czech Republic, Hungary,
Slovenia, Slovakia and several others aimed membership in NATO to streng-
then their newly democratic regimes and to increase their trade with states in
North America and Western Europe. NATO membership for these countries
became a first step towards admission to the European Union (Krause and
Singer, 2001, 19).
Following the demise of Soviet Union and the end of Cold War, the unipolarity
of the international system caused the alliances to relatively lose their importance,
but later give rise to coalitions or coalitions of willing the first example of which
was the coalition of willing against Iraq after its invasion of Kuwait in 1990, com-
posing the US and other 33 countries worldwide. During the crises and conflicts
after the dissolution of Yugoslavia, several coalitions were formed to intervene in
your turn 3 such as Bosnia Herzegovina, Croatia, Kosovo and Macedonia in 1992-2000. In
the twenty-first century, 9/11 attacks in the USA and following war on terror had
a considerable impact on the formations of alliances and coalitions. The recent
Global Coalition to Counter the Islamic State of Iraq and the Levant is one of the
most crowded coalitions in history by comprising almost 70 states and internatio-
nal organizations (Operation Inherent Resolve-Coalition-2018).
154
5
International Security
• “NATO invoked its collective defense clause (Article 5) for the first and
NATO’s aim is to guarantee the freedom and security of its members through
political and military means. NATO promotes democratic values and enables
members to consult and cooperate on defense and security-related issues to
solve problems, build trust and, in the long run, prevent conflict. NATO is
your turn 5 committed to the peaceful resolution of disputes. If diplomatic efforts fail, it
has the military power to undertake crisis-management operations. These are
carried out under the collective defense clause of NATO’s founding treaty -
Article 5 of the Washington Treaty or under a United Nations mandate, alone
or in cooperation with other countries and international organizations.
155
5
Alliances and Military-Security Cooperation
References
Abbas, W. and Schneider, Z. (2015). “Understanding Fortmann, Michel, T. V. Paul and J. Wirtz (2004).
Alliance Formation Patterns,” Unpublished “Conclusions: Balance of Power at the Turn of
Post Graduate Thesis. Monterey, CA: Naval the New Century”, in T. V. Paul, J. Wirtz and M.
Postgraduate School. Fortmann (Eds.), Balance of Power: Theory and
Adler, E. and Barnett, M. (1998). Security Communities. Practice in the 21st Century. Stanford: Stanford
Cambridge: Cambridge University Press. University Press: 360-374.
Aydın, M. and Oran, B. (Ed.) (2001). “İkinci Dünya Fukuyama, F. (2010). The “End of History, 20 Years
Savaşı ve Türkiye, 1939-1945.” Türk Dış Politikası, Later.” New Perspectives Quarterly, Volume 27,
Kurtuluş Savaşından Bugüne Olgular, Belgeler, Issue 1: 7-10.
Yorumlar, Cilt 1 (1919-1980), İstanbul, İletişim Grieco, Joseph M. (1997). “Realist International
Yayınları: 399-476. Theory and the Study of World Politics,” in
Bayer, D. (2013). “NATO’s Stance toward Turkish- Michael W. Doyle and J. G. Ikenberry (Eds.),
Greek Relations and Its Reflections on Turkish- New Thinking in International Relations Theory.
NATO Relations”, Unpublished Doctoral Thesis. Boulder, CO: Westview Press: 163-210.
Ankara: Hacettepe University, Social Sciences Griffiths, Martin, T. O’Callaghan and S. R. Roach
Institute. (2008). International Relations: Key Concepts.
Beck, U. (1999). Siyasallığın İcadı. İstanbul, İletişim Routledge.
Yayınları. Healy, B. and Stein, A. (1973). “The Balance of Power
Bergsmann, S. (2001). “The Concept of Military in International History: Theory and Reality.”
Alliance,” in Erich Reiter, Heinz Gartner (Eds.), Journal of Conflict Resolution, Vol.17/1: 33-61.
Small States and Alliances. Heidelberg: Physica: Heywood, A. (2011). Global Politics. New York:
35-36. Palgrave.
Brown, Michael E, O. R. Cote Jr., S.M. Lynn-Jones Kann, Robert A. (1976). “Alliances versus Ententes,”
and S.E. Miller (2000). America’s Strategic Choices. World Politics, Vol. 28/4: 611-615.
Cambridge: MIT Press, revised ed. Krause, Volker and J. D. Singer (2001). “Minor
Christensen, Thomas J. (1997). “Perceptions and Powers, Alliances, and Armed Conflict: Some
Alliances in Europe, 1865-1940.” International Preliminary Patterns,” in Erich Reiter and
Organization, Vol. 51/1: 65-97. H. Gärtner (Eds.), Small States and Alliances.
Christensen, Thomas J. and J. Snyder (2003), Heidelberg: Physica: 15-23.
“Progressive Research on Degenerate Alliances”, Kolasi, K. (2013). “Soğuk Savaş’ın Barışçıl Olarak
in John A. Vasquez and Colin Elman (Eds.) Sona Ermesi ve Uluslararası İlişkiler Teorileri.”
Realism and the Balancing of Power: A New Debate. Ankara Üniversitesi SBF Dergisi, Cilt 68, No 2:
New Jersey: Practice Hall: 66-73. 149-175.
Çaman, E. (2006). “Uluslararası İlişkilerde (Neo) Leeds, Brett, J. Ritter, S. Mitchell, A. Long (2002).
Realist Paradigmanın Almanya’daki Gelişimi “Alliance Treaty Obligations and Provisions,
ve Evrimi: Kindermann ve Münih Okulu.” 1815-1944.” International Interactions: Empirical
Uluslararası Hukuk ve Politika Dergisi. Cilt 2, No and Theoretical Research in International Relations,
8: 36-52. Vol. 28/3: 237-260.
David, Steven R. (1991). “Explaining Third World Levy, Jack S. (1982). “Contagion of Great Power
Alignment.” World Politics, Vol. XLIII/2: 233- War Behavior, 1495-1975.” American Journal of
256. Political Science, Vol. 26/3: 562–84.
Deutsch, Karl W., S.A. Burrell, R.A. Kann, and M. Levy, Jack S. (1983). War in the Modern Great Power
Lee Jr (1957). Political Community and the North System. Lexington: University Press of Kentucky.
Atlantic Area: International Organization in the Liska, George (1962). Nations in Alliance: The Limits
Light of Historical Experience. Princeton: Princeton of Interdependence. Baltimore: Johns Hopkins
University Press. University Press.
Dwivedi, Sangit S. (2012). “Alliances in International Little, Richard (2007). The Balance of Power in
Relations Theory.” International Journal of Social International Relations. Cambridge: Cambridge
Science & Interdisciplinary Research, Vol.1/8: 224- University Press.
237.
Mearsheimer, John (2001). The Tragedy of Great Power
Fedder, Edwin H. (1968). “The Concept of Alliance.” Politics. New York: W.W. Norton.
International Studies Quarterly, Vol. 12/1: 56-86.
156
5
International Security
Morgenthau, Hans J and K. Thompson (1985). Schweller, Randall L.(1994). “Bandwagoning for
Politics Among Nations: The Struggle for Power Profit: Bringing the Revisionist State Back.”
and Peace. New York: Alfred A. Knopf, 6th ed. International Security, Vol.19/1: 72-107.
Murphy, Martin (2017). “The Importance of Alliances Shaw, M. N., (2008). International Law. Cambridge:
for U.S. Security,” in Dakota L. Wood (Ed.), 2017 Cambridge University Press, 6th ed.
Index of U.S Military Strength. Washington: The Shewey, David A (2004). “Athenian Ambitions &
Heritage Foundation: 17-30. Available at https:// the Delian League.” Digital Commons, WOU.
index.heritage.org/military/2017/resources/ Available at http://digitalcommons.wou.edu/
download/ his/120/
NATO A to Z Pages. (2014). Retrieved from https:// Singer, J. David, and Melvin Small (1968). “Alliance
www.nato.int/nato_static_fl2014/assets/pdf/. Aggregation and the Onset of War, 1815-1945,”
NATO and the 2003 campaign against Iraq. (2015). in J. David Singer (Ed.), Quantitative International
Retrieved from https://www.nato.int/cps/en/ Politics. New York: The Free Press: 247-286.
natohq/topics_51977.htm?selectedLocale=en. Small, Melvin J. and D. Singer (1982). Resort to Arms:
NATO Member Countries (2018). Retrieved from International and Civil Wars, 1816-1984. Beverly
https://www.nato.int/cps/en/natohq/nato_ Hills, CA: Sage Publications.
countries.htm. Smith, M. (2000). NATO Enlargement during the Cold
NATO Enlargement. (2018). Retrieved from https:// War: Strategy and System in the Western Alliance.
www.nato.int/cps/en/natohq/topics_49212.htm. New York: Palgrave.
NATO Press Conference. (2001). Podcast retrieved Snyder, Glenn H. (1990). “Alliance Theory: A
from https://www.nato.int/nato-welcome/index. Neorealist First Cut.” Journal of International
html. Affairs, Vol. 44 (1): 103-123.
NATO Press Conference, 11 July 2018. Retrieved Steff, Reuben and N. Khoo (2014). “Hard Balancing
from https://www.nato.int/cps/en/natohq/ in the Age of American Unipolarity: The Russian
opinions_156733.htm. Response to US Ballistic Missile Defense during
NATO Press Release 148. (2012). Retrieved the Bush Administration (2001-2008).” Journal of
from https://www.nato.int/cps/en/natohq/ Strategic Studies, Vol. XXXVII/2: 222-258.
news_92476.htm. Sweeney, Kevin, and Paul Fritz (2004). “Jumping on
NATO Press Release 108. Retrieved from https:// the Bandwagon: An Interest-Based Explanation
www.nato.int/cps/en/natohq/news_121898.htm. for Great Power Alliances.” The Journal of Politics,
Vol.66/2: 428–449.
NATO Support to Turkey. (1952-2018). Retrieved
from http://www.natolibguides.info/Turkey. Tezcan, Y. (1994). Türk-Yunan İlişkilerinin Dünü,
Bugünü, Yarını. Harp Akademileri Komutanlığı
Operation Inherent Resolve-Coalition (2018).
Yayını. İstanbul: Harp Akademileri Basımevi.
Available at http://www.inherentresolve.mil/
About-us/Coalition/ Vasquez, John A. and C. Elman (2003). Realism and
the Balancing of Power: A New Debate. New
Osgood, Robert E. (1968). Alliances and American
Jersey: Practice Hall.
Foreign Policy. Baltimore: The Johns Hopkins
University Press. Ward, Michael D. (1982). “Research Gaps in Alliance
Dynamics.” Monograph Series in World Affairs,
Pape, Robert A. (2005). “Soft Balancing against
Vol.19: 3-95.
the United States.” International Security, Vol.
XXX/1:7-45. Walt, Stephen M. (1987). The Origins of Alliances.
Ithaca, NY: Cornell University Press.
Paul, Thazha V (2004). “The Enduring Axioms of
Balance of Power Theory,” in Thazha V. Paul, J. Waltz, Kenneth N. (1979) Theory of International
Wirtz and M. Fortmann (Eds.), Balance of Power: Politics. New York: Random House.
Theory and Practice in the 21st Century. Stanford: Weitsman, Patricia A. (2010). “Wartime Alliances versus
Stanford University Press: 1-28. Coalition Warfare: How Institutional Structure
Russett, Bruce M. (1971). “An Empirical Typology of Matters in the Multilateral Prosecution of Wars.”
International Military Alliance.” Midwest Journal Strategic Studies Quarterly, Vol.4/2: 113-136.
of Political Science, Vol.15/2: 262-289. Zürcher, E. J. (2008). Modernleşen Türkiye’nin Tarihi.
Schroeder, Paul W. (1994). “Historical Reality versus İstanbul: İletişim Yayınları.
Neo-Realist Theory.” International Security, Vol.
19/1: 108-148.
157
Chapter 6
Terrorism
After completing this chapter, you will be able to:
1 2
Learning Outcomes
158
6
International Security
159
6
Terrorism
Another group, the Assassins, was established by Hassan-i Sabbah in 1090 (Öz, 1997: 418). It is argued
that they had connection to the Batiniyya cult of the Ismaili sect. The Assassins attracted attention due to
the assassinations against the front-benchers of enemy states. Its militants were called as Fedayeen, who
were castrated to eliminate the possibility of failure because they might fall in love, marry, or have children.
Fedayeen, who were held captive, would either commit suicide by swallowing the opium that they had
carried or get killed by the fellow Fedayeen not to confess the secrets of the group. Fedayeen wielded
wedge-daggers for assassination (Amir, 2008, 44-168). Compared to the present-day terrorist organizations,
the Assassins followed a different path in terms of its target group. They selected the targets from upper-
class administrators such as Nizam al-Mulk, the vizier of the Seljuk Empire, and Abbasid and Fatimid
caliphs, kadi -Muslim judges, and supreme commanders. Among others, they also assassinated Conrad of
Montferrat (the King of Jerusalem) and Raymond II (the Count of Tripoli) (Öz, 1997: 418-419).
The inquisition was institutionalized in the 13th century and it reigned until the 19th century. However,
it even dates back to the11th century (Eroğlu, 2004: 93-100). Through the inquistion, those who were
believed to have acted contrary to the doctrines of the Catholic Church were condemned as misbelievers.
Then, they were first excommunicated and later transferred to the courts to ‘leave the world’. The method
for ‘leaving the world’ included various forms of torture such as auto-da-fe and drownings. The inquisition
was revived and reinvented in the fight against the Protestants in the 16th century. The Spanish Inquisition
also tested the sincerity of Christian converts (Oxford Living Dictionaries, 2018). As a result, thousands
of Jews and Muslims were burned to death (Eroğlu, 2004:98).
Inquisition, a judicial procedure and later an institution that was established by the papacy and, sometimes,
by secular governments to combat heresy. Derived from the Latin verb inquiro (“inquire into”), the name
was applied to commissions in the 13th century and subsequently to similar structures in early modern
Europe (www.britannica.com).
160
6
International Security
161
6
Terrorism
use violence and threats of violence to publicize their causes as means to achieve their goals. They
often aim to influence or exert pressure on governments and government policies but reject democratic
processes, or even democracy itself (MI5, 2018).
In defining terrorism, it may be helpful to employ some parameters. For example, Başeren (2006)
examines the definition of terrorism through such parameters as motive, instrument, goal, and intent.
Motive is the reason for the act that the perpetrator has, works to satify, and operates from. Instrument is
the terror act itself. The goal of terrorism refers to achieving a result such as killing and death. Intent refers
to creating certain impact. Motive is something political and requires violent action. The threat of violence
may suffice if perpetrators have already caused fear in the society through previous acts of violence.
As a result, according to Başeren (2006), terrorism in the context of Criminal Law is a violent act with
political content that affects the behavior of millions and that aims at reaching certain results such as death
or keeping people under control through fear.
162
6
International Security
163
6
Terrorism
REASONS OF TERRORISM
Subjective Reasons
Cultural and social psychological reasons constitute the subjective reasons. Cultural reasons refer to
the material practice and spiritual practice of a society. A culture that values violence or war may be given
as an example for cultural reasons of terrorism.
Social-psychological reasons also help explain political violence. Among these reasons, “intent
detection and anger” and “expectation of revenge” stand out. Academic studies show that “intent
detection” increases the anger and the aggression has the potential to cause further aggression as long as
the anticipation of revenge keeps the negative thoughts in the consciousness (Taylor et al., 2007: 412-
453). Therefore, one can conclude that giving voice to “malevolence” may create a potential enemy. Iran’s
labeling the US as “the Great Satan” and Israel as the “Little Satan” is an example of “intent detection and
anger.” On the other hand, the US list of rogue states is another example of “intent detection and anger.”
Moreover, the violence that continues over a long time may provide future generations with cultural and
social-psychological reasons for the continuation of a conflict, as we have observed in the case of the
Palestine-Israeli conflict. As such, both “intent detection and anger” and “expectation of revenge” increase
violence. In other words, violence causes violence.
The US list of rouge states: Iraq, Iran, Syria, Libya, Cuba, North Korea, and Sudan are the rouge states
from the perspective of the American government (see CIA, 2003).
164
6
International Security
165
6
Terrorism
7. Other reasons: There are other approaches that tackle violence either at the individual level or
at the group level. While some approaches put an emphasis on the individual’s psychology and
argue that, in the last analysis, an individual adds his or her nuance to violence, others stress
the importance of group dynamism (Hogg and Vaughan, 2007). These approaches hold differing
views on why a person may want to join a terrorist organization – such reasons as personal hatred,
adventure, personality predisposition, financial incentives, and mercenary militancy.
To conclude, one of the reasons listed above may not be enough alone to make someone a terrorist.
Otherwise, everyone who is poor or miserable would be a terrorist. At least two of the reasons listed above
(for example, poverty and poor management, or injustice in the distribution of wealth and intellectual
awakening) should come together so as to create a grave condition for the person to initiate an act of
violence for political reasons. Terrorism is a specific but extreme form of violence. To be driven by political
motives, it must be systematic rather than temporary. A victim does not turn into a terrorist overnight;
but when the victimization becomes systematic, the individual reacts against this systematic victimization.
This in turn can motivate the individual for joining a terrorist organization.
166
6
International Security
TERRORISM AS A NEW MEANS of directly fighting with each other- which is called
OF WAR IN THE 21ST CENTURY “proxy wars.” Proxy war may be defined as “conflicts
in which a third party intervenes indirectly in order
Throughout history, individuals, states, or
to influence the strategic outcome in favor of its
political groups have tried to achieve their goals
preferred faction” (Mumford, 2013:40). Another
by resorting to violence and war (Mark, 2009).
source defines proxy war as “an armed conflict
Sometimes the aim was to dominate a region,
between two states or non-state actors which act on
sometimes to struggle for power, and sometimes to
the instigation or on behalf of other parties that are
colonize a region. not directly involved in the hostilities” (Wikipedia
The Prussian military analyst Carl Von Free Encyclopedia, 2018).
Clausewitz, for example, defines war as “the The use of irregulars or proxy actors in the
continuation of politics carried on by other means.” context of guerrilla warfare is a phenomenon
Contending armies have historically settled that may be observed throughout world history
political disputes on the battlefield even though, in (Marshall, 2016: 83). The US President Dwight
time, these armies changed in formation and size D. Eisenhower once mentioned proxy wars as ‘the
(Mark, 2009). International law covers different cheapest insurance in the world,’ while former
cases involving the use of force by states. The use Pakistani President Zia-ul-Haq deemed them
of force is regulated by the UN Charter and the necessary to ‘keep the pot boiling’ in existing
decisions (resolutions) of the Security Council conflict zones.
today (Council of Europe, 2017).
Although it seems like a new occasion in which
War and terrorism are both forms of violence conflicts take place through proxy actors, some
that aim at defeating an opponent (University of authors suggest that this is an ongoing process. For
Minnesota, 2018). War and terrorism are very example, the two major superpowers of the 20th
similar in many ways. Both involve extreme violent century (the United States and the Soviet Union)
acts, both motivated by political, ideological used proxy actors in many situations (Marshall,
or strategic goals, and both are inflicted by one 2016:185). In fact, the Cold War is full of many
group of individuals against another (Council of examples of proxy war. Vietnam and Afghanistan,
Europe, 2017). for instance, are the examples of proxy wars between
In the 21st century, terrorism continues to the US and the Soviet Union. While the Soviet
be a vital threat to national and global security. Union and the People’s Republic of China supported
Modern terrorist attacks include kidnapping of North Vietnam, South Vietnam was supported by
businesspeople, assassination of political leaders, the US between 1955 and 1975 (Sputnik Türkiye,
bombing of embassies, and hijacking of aircrafts. 2015). Similarly, the US supported Afghanistan,
Terrrorism has also introduced new types of which fought against the Soviet Union from 1979
violence in terms of technology, victimization, to 1989 (Tarihi Olaylar İnternet Sitesi, 2018). In
threats, and responses (Alexander, 2002:1). other words, the Soviet Union and the US ran proxy
wars in Vietnam and Afghanistan in order to achieve
their hegemonic goals.
Proxy Wars
Yet, nowadays proxy wars are waged through
As technology has developed, wars have
terrorist organizations. Not only major powers
become more severe and the loss of lives has
but also relatively small states such as Iran and
increased. Today, with a single bomb hundreds of Israel wage proxy wars against each other through
thousands of people may die or may be exposed terrorist organizations.
to severe suffering. Throughout history, wars have
been carried out in many forms, and the countries
and groups waged wars against each other through International Terrorism: The
many different methods to achieve their goals in. Globalization of Terror
Today, groups or states employ yet another Globalization can be defined as the integration
method to realize their political objectives: using of markets, politics, values, and environmental
some other states, groups or organizations instead concerns across the globe. Globalization has
167
6
Terrorism
168
6
International Security
recognized authority, of violence, disruption or interference against cyber systems, when it is likely that
such use would result in death or injury of a person or persons, substantial damage to physical property,
civil disorder, or significant economic harm.”
As the above definitions of cyber-terrorism have not proved helpful in measuring the effects of cyber
terrorism, Terzi has defined cyber-terrorism in such a way to operationalize Başeren’s concepts and
parameters. According to Terzi (2015: 194), cyber terrorism is politically motivated, and its instrument is
the terror act itself; that is, it aims at influencing the behavior of millions of people. Its intent is to create
impact; it aims at intervening in our daily lives as a result of the prevention of performance. Prevention of
performance results from a motion that harbors corrupting the cyber systems and hurting or threatening
people in the cyber space through using the global infrastructure. As implied by this definition, the death/
injury or the threat of death/injury is not a necessary component of cyber terrorism. But the death or the
injury can also be one of the potential or willful consequences of cyber terrorism.
169
6
Terrorism
In addition to the examples given above, one may give the following possible scenarios in an attempt
to better define and explain cyber terrorism:
• Blocking emergency communications or cutting off electricity or water in the wake of a conventional
bombing or a biological, chemical, or radiation attack,
• Destroying the actual machinery of the information infrastructure,
• Disrupting the information technology underlying the internet, government computer networks,
or critical civilian systems such as financial networks or mass media,
• Using computer networks to take over machines that control traffic lights, power plants, or dams
in order to cause collateral damage,
• Stealing classified information, altering the content of web pages, disseminating false information,
sabotaging operations, erasing data etc. in cyber milieu,
• Disrupting financial markets or media broadcasts, an attack could undermine confidence or cause
panic such as breaching dams, colliding airplanes, shutting down the power grid etc., via remote
control systems (Nardia, 2013).
The National Judicial Network Project (UYAP) is a management information system which fully
automates the judiciary and judicial support units, using all the necessary modern technological
improvements. UYAP, developed in a way compatible with the electronic signature infrastructure, has
created a central information system, and this system insures complete functional integration between the
judiciary and judicial support units (For further information, see Havelsan, 2017).
170
6
International Security
171
6
Terrorism
The Role of the Military the terrorists can slip into our societies,
Military forces may use force both at home and and exploit our openness to inflict massive
abroad, in both war and peace time. For this reason, attacks that have consequences that only
it is not surprising that there is a comprehensive the military can manage. We should use
literature available on this subject (Alexander, every capability at our disposal to deal with
2016:3). In a democratic state, internal security this new threat.
missions are normally carried out by the police • It will sometimes be impossible to protect
whereas the armed forces protect the country and populations against terrorist attacks by
the citizens against foreign attacks. Sometimes the using only defensive measures. To prevent
army is called to help the government to defeat a a clearly impending attack, or to respond
serious threat to internal security. This is known to a successful attack, sometimes it may
as the “Military Aid to Civilian Power” (MACP) be necessary to deploy military assets
(Sen, 1991:58). offensively against terrorist networks.
According to Wilkinson (1977:147), “the Military action is sometimes the appropriate
police should carry the main responsibility for response to terrorist acts. However, a large military
dealing with terrorist attacks and the army also may not be able to prevent terrorist attacks for the
has an important ‘firefighting’ and backup role, following basic reasons:
and MACP is useful in the event of any threat • terrorists are not traditional enemies that
to security which the police force is inadequately may be deterred by traditional military
equipped to deal with.” force;
Making use of the armed forces in combating • terrorism is not a traditional warfare;
terrorism or insurgency has taken place in different • terrorists choose the time and the place of
countries at different times. For example, since their attacks, and their targets are not on
1969 a large number of British troops have been military battlefields;
deployed in Northern Ireland for containing the • terrorists do not wear uniforms to
activities of the IRA (the Irish Republican Army) distinguish themselves from their enemies;
and other terrorist groups. Also in May 1980, • terrorists are the antithesis of the type of the
a team from the British Special Air Services enemy that armed forces are designed and
was deployed against terrorists who took some trained to fight (Pena, 2001).
diplomats as hostages at the American Embassy in Finally, the army has three main roles in
Iran (Sen, 1991:58). combating terrorism (Robertson, 2002):
It is clear that only if other remedies are • anti terrorism: defense measures to reduce
insufficient, the unique ability of the armed vulnerability of populations, territories,
forces to protect the security of, and freedoms in, and infrastructure, information and
a democratic state must be used with great care communication systems.
(Alexander, 2016:6). For example, Robertson • counter terrorism: offensive measures to
(2002) gives the following reasons for the track down, prevent, deter, and interdict
continuation of the role of the military in the fight terrorist activities.
against terrorism: • result management: measures to limit the
• The clear distinction between terrorism consequences of terrorist attacks, and to
and war is disappearing. Today’s terrorists stabilize the situation in the aftermath of
are seeking to cause mass casualties and are such attacks with the support of civilian
increasingly likely to have access to weapons authorities.
of mass destruction. As a result, terrorist The military’s role in countering terrorism
groups are operating at a higher level of is important. However, military solutions alone
violence, resulting in a large number of are often not enough. Holistic, comprehensive,
casualties and greater economic damage. and long-term plans will be more successful
• The distinction between internal and by incorporating military means with social,
external security is disappearing. Today, economic, and political means.
172
6
International Security
International Cooperation against The fight againts terrorism has benefited from
Terrorism the urgency of multilateral cooperation following
the terror attacks on the United States and then on
With the advance of technology, the methods of
Europe, Russia as well as on some African, Middle
attack by terrorist organizations have also changed
Eastern, and Asian countries. The international
and multiplied as well as the damage caused by these
community has developed many instruments and
attacks has increased. Especially, the September
created new initiatives in fighting international
11 attacks have generated some interest in jointly
terrorism (CFR, 2011).
combating international terrorism. This has led to
the intensification of international-cooperation International cooperation is the only way to
efforts against terrorism. effectively tackle the threat of terrorism, and this
threat cannot be dealt with at the national level only.
With the increase in the number of the terrorist
In this regard, major international organizations
attacks, international security has been seriously
should consider it one of their main tasks to counter
endangered and international terrorism has become
international terrorism (Exterios, 2018).
a common enemy of the international society.
International cooperation, because of ever increasing Some examples of international efforts in the
challenges of international terrorism, has become fight against terrorism are given below:
the common desire of all nations (Gang, 2006:1). The United Nations General Assembly
However, cooperating on such issues as policing adopted the Global Anti-Terrorism Strategy.
and intelligence may not be enough without also This is “a unique global instrument to develop
trying to ameliorate the conditions that foster national, regional, and international efforts to
extremism. The cooperation of European nations combat terrorism. Those practical steps include a
against terrorism, in fact, began in the late 19th wide range of measures ranging from strengthening
century when assassinations committed against state capacity to counter terrorist threats to better
the heads of states and other government officials. coordinating United Nations system’s counter-
European nations in 1898 convened a conference terrorism activities” (UN, 2018a).
to discuss the need to work together on policing. The Counter-Terrorism Implementation
From this effort, a number of measures emerged Task Force (CTITF) was “established by the
(Keiber, 2016). Moreover, with the terrorist attack Secretary-General in 2005 and endorsed by the
on September 11, 2001, a new era for international General Assembly through the United Nations
cooperation against terrorism has begun. Especially Global Counter-Terrorism Strategy, which was
the law enforcement and intelligence agencies adopted by consensus in 2006. The Task Force
around the world have increased their efforts consists of 38 international entities which by virtue
to cooperate and shared information after each of their work have a stake in multilateral counter-
significant terrorist attack. terrorism efforts. The primary goal of CTITF is to
Different definitions of terrorism may lead to maximize each entity‘s comparative advantage by
double standards in countering terrorism. Some delivering as one to help Member States implement
states may even make use of terrorists and terror the four pillars of the Global Strategy. These four
organizations to achieve their own objectives. Due pillars are:
to different perceptions of terrorism, the terrorists • Measures to address the conditions causative
may even be perceived as “freedom fighters” or to the spread of terrorism;
“national heroes” by some countries and people. • Measures to prevent and fight terrorism;
The differences in the definition of terrorism may • Measures to build states’ capacity to prevent
give rise to mutual suspicions and thus weaken the and fight terrorism and to strengthen the
efforts for further cooperation (Gang, 2006:4). role of the United Nations system in that
Therefore, coming up with a common definition regard;
of terrorism, determining who acts as a terrorist • Measures to provide respect for human
and which acts will be regarded as terror acts would rights for all and the rule of law as the
help eliminate the differences of opinion and raise fundamental basis for the fight against
the possibility of international cooperation. terrorism” (UN, 2018b).
173
6
Terrorism
“In addition to the Global Strategy, the United pursuant to the principles of the OAS Charter and of
Nations has established institutional counter- the Inter-American Counter-Terrorism Convention
terrorism architecture within the framework of the (Exterios, 2018).
Security Council (SC), particularly through the International anti-terrorism initiatives continue
Counter-Terrorism Committee” (Exterios, 2018). to suffer from three major weaknesses: First, the
The Global Counterterrorism Forum (GCTF) lack of a universal definition of terrorism weakens
is an “international forum of 29 countries and the the efforts to formulate a harmonized global
European Union with a mission of reducing the response. Second, multilateral action suffers from
vulnerability of people worldwide to terrorism by inadequate adaptation and implementation of
preventing, combating, and prosecuting terrorist existing instruments. Third, although counter-
acts, and countering incitement and recruitment to radicalization and de-radicalization attempts have
terrorism. The forum brings together experts and attracted some attention, no progress has been
practitioners from countries and regions around made especially in states with limited resources and
the world to share experiences and expertise, and expertise (CFR, 2011).
develops tools and strategies on how to encounter
the evolving terrorist threat” (GCTF, 2018). important
A number of regional organizations such as
the European Union (EU), the African Union, and International anti-terrorism initiatives
the Association of Southeast Asian Nations have continue to suffer from three major
presented formal declarations summarizing their weaknesses: 1) the problem of how to
joint commitments on countering terrorism. define terrorism, 2) inadequate efforts,
While the European Union follows a strong 3) the limited resources and expertise.
statement on the fight against terrorism, it is
aggressively lacking capacity, finance and political
will, bringing together law enforcement and judicial
The Struggle Against Financing
apparatus such as the EU judicial co-operation
unit, EUROJUST and other police agencies such
Terrorism
as the EU police organization and EUROPOL Terrorist acts take place in many different ways.
to follow the strategies of combating terrorism. For this reason, the forms of financing terrorism
In addition, these organizations frequently work vary accordingly. The financing of terrorism not
separately from the UN programs (CFR, 2011). only involves financing terrorist acts, but also
In 2005, the EU approved its Counter-Terrorism includes any support to the criminal network.
Strategy, based on four main pillars: prevent, Terrorist organizations require significant funding
protect, pursue, and respond. The EU also has both for dealing with de facto terrorist acts and for
a strategy to combat both radicalization and the other matters such as maintaining the functioning
recruitment of terrorists, which focuses on the of the organization, providing basic technical
pillar of prevention (Exterios, 2018). needs, and disseminating the costs associated with
spreading relevant ideologies (COE, 2018).
Organization for Security and Co-operation
in Europe (OSCE) has a comprehensive approach Financing terrorism can be defined simply as
to security that encompasses politico-military, “the process of raising, storing, and moving funds,
economic and environmental, and human aspects, obtained through legal or illegal means, for the
purpose of terrorist acts or sustaining the logistical
and it has also had a counter-terrorism unit since
structure of a terrorist organization” (Stringer,
2003 (OSCE, 2018).
2011:102).
Inter-American Counter-Terrorism Committee
Terrorist organizations need to generate
(ICTC) was established under the Organization of
substantial income to survive and continue their
American States (OAS). The main aim of the ICTC is
operational capabilities and daily activities.
to promote and develop cooperation among Member
Unlike states, terrorist organizations do not have
States to prevent, combat and eradicate terrorism,
the authority to legally levy taxes on citizens, but
174
6
International Security
groups like the Liberation Tigers of Tamil Eelam Many institutions and regulations are fully
in Sri Lanka and the Taliban in Afghanistan have committed to fight the financing of terrorism.
taxed civilians to gain profits. In Iraq and Syria, ISIS For example, in the United States, one of the
collected the taxes and tariffs of the population in main reasons for the US Patriot Act to enter into
the land by imitating the acts of a real nation-state, force was to cut funding for terrorist organizations
and by operating state-owned businesses and trade (Complyadvantage, 2018).
institutions, including oil trading while extorting Moreover, The Financial Action Task
individuals, ethnic groups, private companies, Force (FATF), which currently consists of 38
local businesses, and the Iraqi government (Clark, nations, agreed, in addition to the initial 40
2018:2-3). The terrorist organizations constantly recommendations to combat money laundering,
adapt to how and where they carry their funds to on 9 special recommendations to prevent the
overcome the measures the countries have taken. financing of terrorism. The FATF draws up reports
They will use products such as new technology or and makes evaluations on compliance with the
social media payments to attract and move their recommendations in force, and establishes a system
money (FATF, 2018). of sanctions. It also provides technical assistance
Money laundering is used to loosely describe the for the creation of Financial Intelligence Units to
«turning of dirty money into clean money». The act enable these recommendations to be applied in
by which illicit funds are made to appear legitimate each jurisdiction (Exterios, 2018).
is defined in key international instruments-most The countering-terrorism financing (CTF)
notably in the UN Convention against Illicit Traffic agenda has been a priority for the FATF since 2001.
in Narcotic Drugs and Psychotropic Substances In December 2015, the FATF settled that more
and the UN Convention against Transnational urgent action was needed to strengthen global anti-
Organized Crime. The latter defines money terrorism financing regimes in order to combat
laundering as (APGML, 2018): the financing of these serious terrorist threats
and to contribute to strengthening the financial
“The conversion or transfer of property, and economic system and security (FATF, 2018).
knowing that such property is the proceeds
of crime, for the purpose of concealing or
disguising the illicit origin of the property The Financial Action Task Force (FATF) is an
or of helping any person who is involved in inter-governmental body established in 1989
the commission of the predicate offence to by the Ministers of its Member jurisdictions.
evade the legal consequences of his or her The objectives of the FATF are to set standards
action; or the concealment or disguise of the and promote effective implementation of legal,
true nature, source, location, disposition, regulatory and operational measures for combating
movement or ownership of or rights with money laundering, terrorist financing and other
respect to property, knowing that such related threats to the integrity of the international
property is the proceeds of crime” (Article financial system. The FATF is therefore a “policy-
6, UN Convention against Transnational making body” which works to generate the
Organized Crime). necessary political will to bring about national
legislative and regulatory reforms in these areas
At the first look, many actions to send money (http://www.fatf-gafi.org/about/whoweare/).
to terrorist organizations seem to be small and
harmless. Because terrorist financiers do not
send large amounts of money not to be noticed The International Monetary Fund (IMF) and
by governments and financial institutions. the World Bank work also toward monitoring
Additionally, individuals financing terrorism and supporting the implementation of FATF
also use commercial laundering schemes to recommendations. They issued country reports
get their money across borders. This becomes on compliance with international anti-terrorism
much more common and difficult to follow financing regimes and implemented CTF
(Complyadvantage, 2018). workshops (CFR, 2011).
175
6
Terrorism
176
6
International Security
Summary
times. Terrorism is a violent act with political content, affecting
the behavior of the millions with results such as death, and
controlling them through fear. A typology of terrorism classifies
terrorism and terrorists into five distinctive subgroups: by
location, by personality trait, by purpose, by target, and by issue.
177
6
Terrorism
178
6
International Security
1 In which of the following periods did 5 Which of the following is a subjective reason
terrorism have a positive connotation? of terrorism?
a. World War I a. Misgovernment
b. World War II b. Poverty
c. The French Revolution c. Intellectual awakening
Test Yourself
d. The American Revolution d. Loose democracy
e. The Arabian Spring e. Intent detection
179
6
Terrorism
180
6
International Security
If your answer is not correct, review the If your answer is not correct, review the
3. d 8. a
section on “Defining Terrorism and Giving section on “Cyber Terrorism: A New Form
a Typology.” of Terrorism.”
4. e If your answer is not correct, review the 9. e If your answer is not correct, review the
section on “Reasons of Terrorism.” section on “Countering Terrorism.”
5. e If your answer is not correct, review the 10. b If your answer is not correct, review the
section on “Reasons of Terrorism.” section on “Countering Terrorism.”
181
6
Terrorism
182
6
International Security
183
6
Terrorism
References
Alexander, Y. (2002). “Introduction,” in Y. Alexander Forest, J. J. F. (2007a). “Editors note,” in J. J. F. Forest
(Ed.), Combating Terrorism.Ann Arbor, MI: The (Ed.), Countering terrorism and insurgency in the
University of Michigan Press, 1-20. 21st century international perspectives volume 3:
Lessons from the fight against terrorism (pp. ix-xii).
Alpkaya, F. and Kavas, L. (1993). “Terör ya da mülkün
Westport: Prager Security International.
temeli üzerine deneme II,” Birikim Dergisi, Vol.
56: 33-44. Forest, J. J. F. (2007b). “An introduction to the
comperative study of counterterrorism,” in J. J. F.
Amir, P. (2008). Alamut’un efendisi Hasan Sabbah
Forest (Ed.), Countering terrorism and insurgency
(Hasan Sabbah, the grand master of Alamut).
in the 21st century international perspectives volume
(Trans: F. Parin). Emre Yayınları.
3: lessons from the fight against terrorism (pp. 1-10).
Avcı, E. and Demir, C. K. (2017). “Terörizm Westport: Prager Security International.
çalışmaları: Türkiye’deki araştırmalara ilişkin
Gang, Z. (2006). “Regional cooperation against
betimsel bir analiz” Güvenlik Stratejileri, Vol. 26:
terrorism -The responsibility of defense
1-44.
institutions in education and research.” ARF
Aydın, N. (2005). Küresel terör ve terörizm. Ankara: Conference of Heads of Defence Universities, China:
Kocacık Yayıncılık İletişim. PLA National Defense University.
Başeren, S. (2006). “Uluslararası şiddet ve terörizm George, B. and Watson, T. (2002). “1992 sonrasında
ders notları.” Ankara Üniversitesi. terörizmle uluslararası mücadele,” in C. Güzel
Brenner, S. (2007). “At light speed: Attribution (Ed.), Silinen yüzler karşısında terör. Ankara:
and response to cybercrime/terrorism/warfare.” Ayraç Yayınevi.
Journal of Criminal Law and Criminology, Vol Haq, I. ( 2010). “Information and communication
97(2): 379-475. technologies, globalization and terrorism: An
Centre of Excellence Defence against Terrorism empirical analysis of terrorist attacks around
(2006). Brochure on the countering cyber terrorism the world from 1991-2006.” Unpublished
course. Ankara: Centre of Excelllence Defence Master Thesis. Norwegian University of Science
Against Terrorism. and Technology, Department of Computer and
Information Science.
Clark, C. P. (2018). An overview of current trends in
terrorism and illicit finance: Lessons from the Islamic Hogg, M. A. and Vaughan G. M. (2007). Sosyal
state in Iraq and Syria and other emerging threats. psikoloji. (Trans. İ. Yıldız and A. Gelmez). Ankara:
Santa Monica, California: RAND Corporation. Ütopya Yayınları.
Cragin, K. and Chalk, P. (2003). Terrorism and Holmes, J. S. (2007). “Developing and Implementing
development using social and economic development a Counterterrorism policy in a liberal
to inhibit a resurgence of terrorism. Santa Monica, democracy,” in J. J. F. Forest (Ed.), Countering
California: RAND Cooperation. terrorism and insurgency in the 21st century
international perspectives volume 1: Strategic and
Crenshaw, M. (1981). “The causes of terrorism,” in tactical considerations. Westport: Prager Security
E. Moxon-Browne (Ed.), European terrorism. New International.
York: The City University of New York.
Hudson, R. A. (1999). The sociology and psychology
Enders, W. Sandler, T. and Gaibulloev, K. (2011). of terrorism: Who becomes a terrorist and why?
“Domestic versus transnational terrorism: Data, Washington, D.C.: Library of Congress.
decomposition, and dynamics.” Journal of Peace
Research, Vol. 48(3): 319–337. Jasparro, C. (2007). “Sociocultural, economic and
demographic aspects of counterterrorism,”in J. J.
Eroğlu, A. H. (2004). “Farklı inancı tehdit olarak F. Forest (Ed.), Countering terrorism and insurgency
algılamanın sonucu: Engizisyon terörü.” Dini in the 21st century international perspectives volume
Araştırmalar Dergisi, Vol. 7(20): 93-100. 2:Combating the sources and facilitators. Westport:
Prager Security International, 420-450.
184
6
International Security
Jenkins, B. M. (1975). “International terrorism: A Sofaer, A., Goodman, S. E., Cuellar, M. F., Drozdova,
new mode of conflict,” in D. Carlton and C. E. A., Elliott, D. D., Grove, G.D., Lukasik, S. J.,
Schaarf (Eds.), International terrorism and world Putnam, T. L. and Wilson, G. D. (2000). Proposal
security. Londra: Croom Helm. for an international convention on cyber crime and
terrorism. Standford University.
Kartal, A. B. (2018). “Uluslararası terörizmin değişen
yapısı ve terör örgütlerinin sosyal medyayı Stringer, K. D. (2011). “Tackling threat finance: A
kullanması: Suriye’de DAEŞ ve YPG örneği,” labor for Hercules or Sisyphus?” Parameters, Vol.
Güvenlik Stratejileri Dergisi, Vol. 27: 39-77. 41: 101-119.
Keiber, J. (2016). “Monkey cage: We’re in a new era Ştibli, F. (2010). “Terrorism in the context of
of international cooperation against terrorism. Is globalization.” Aarms, Vol. 9(1): 1–7.
that good or bad?” The Monkey Cage blog from
Terzi, M. (2006). “Information based economy and
The Washington Post. March 31, 2016.
e- government: Transformation in the public
Keleş, R. and Ünsal, A. (1982). Kent ve siyasal şiddet. administration.” Unpublished Master Thesis.
Ankara: Ankara Üniversitesi Siyasal Bilgiler Ankara: METU, The Graduate School of Social
Fakültesi Yayınları. Sciences.
Kırılmaz, H. and Ayparçası, F. (2016). “Modernizm Terzi, M. (2015). “Cyber terrorism, E-Government
ve postmodernizm süreçlerinin tüketim kültürüne and actor network theory,”in M. Terzi and S.
yansımaları.” İnsan ve İnsan, Vol. 8: 32-58. Yenal (Eds.), International security and terrorism.
Ankara: Sinopsis Yayınları, 181-212.
Kojeve, A. (2001). Hegel felsefesine giriş. (Trans: S.
Hilav). İstanbul: Yapı Kredi Yayınları. Terzi, M. (2016). Din referanslı terörizm üzerine.
Ankara: Edge Akademi.
Marighella, C. (1969). Şehir gerillasının elkitabı. Eriş
Yayınları. Terzi, M. (2018). “Bilgi ve iletişim teknolojilerine
dayalı oluşumlar ile bu oluşumların uluslararası
Marshall, A. (2016). “From civil war to proxy war:
ilişkilere güvenlik bağlamındaki etkisi: Siber
Past history and current dilemmas.” Small Wars &
terörizm 2016-2019 ulusal siber güvenlik strateji
Insurgencies, Vol.2 7(2): 183-195.
belgesi kapsamında Türkiye incelemesi.” Kara
Mumford, A. (2013). “Proxy warfare and the future of Harp Okulu Bilim Dergisi, Vol. 28(1): 73-108.
conflict.” The RUSI Journal, Vol. 158(2): 40-46.
Thornton, T. P. (1964). “Terror as a weapon of
Nassar, J. R. (2005). Globalization and terrorism: the political agitation,” in H. Eckstein (Ed.), Internal
migration of dreams and nightmares. Lanham, War Problems and Approaches. New York: Free
Maryland: Rowman and Littlefield Publishers. Press of Glencoe.
Neack, L. (2006). Elusive security: states first, people Türkiye Bilişim Şurası (2002). E-Devlet raporu 2002.
last. Lanham, Maryland: Rowman and Littlefield Türkiye Bilişim Vakfı.
Publishers.
Uysal, A. (2016). “Security and help desk in UYAP,”
Öz, M. (1997). Haşîşiyye (Hashishiye). İslam in A. Karakocalı (Ed.), Ulusal yargı ağı projesi I.
Ansiklopedisi, Vol.16: 418-419. Eskişehir: Anadolu Üniversitesi Yayınları.
Robertson, L. (2002). The role of the military in Wilkinson, P. (1977). Terrorism and the Liberal State.
combating terrorism. Available at: https://www. New York: John Wiley.
nato.int/docu/speech/2002/s021209b.htm
Wilson, C. (2008). Botnets, cybercrime, and
Schmid, T. (2004). “Terrorism-The definiton cyberterrorism: Vulnerabilities and policy issues for
problem.” Case Western Reserve Journal of Congress. Congressional Research Service.
International Law, Vol. 36(2): 375-419.
Sen, S. (1991). “Role of the army in combating
terrorism.” The Police Journal, Vol. 64(1): 58-62.
185
6
Terrorism
Online References
APGML (2018). “About APG” [Online]. Available at: http://www.apgml.org/about-us/page.aspx?p=5620f71b-
1858-4ca1-85d7-f9eae97210a7.
Balkhi, S. (2014). “25 biggest cyber attacks in history.” Available at: https://list25.com/25-biggest-cyber-
attacks-in-history/2/.
BBC (2014). “Seks kölesi Ezidi kadınlar anlatıyor: Ölmek istedik.” Available at: https://www.bbc.com/turkce/
haberler/2014/12/141222_ezidi_kadinlar.
BİANET (Bağımsız İletişim Ağı) (2013). “Büyükanıt: Asimetrik teröre dikkat.” https://bianet.org/bianet/
siyaset/19361-buyukkanit-asimetrik-terore-dikkat.
CFR (2011). “The global regime for terrorism.” Available at: https://www.cfr.org/report/global-regime-
terrorism.
CIA (2003). “National strategy for combating terrorism.” Available at: https://www.cia.gov/news-information/
cia-the-war-on-terrorism/Counter_Terrorism_Strategy. pdf.
COE (2018). “Financing of terrorism.” Available at: https://www.coe.int/en/web/moneyval/implementation/
financing-terrorism.
Complyadvantage (2018). Overview of the fight against terrorist financing [Online]. Available at: https://
complyadvantage.com/knowledgebase/anti-terrorist-financing/
Council of Europe (2017). “War and terrorism.” Available at: https://www.coe.int/en/web/compass/war-and-
terrorism
Dictionary. com LLC. (2018). “Casus belli.” Available at: http://www.dictionary.com/browse/casus-belli
Elmusharaf, M. M. (2004). “Cyber Terrorism: The New Kind of Terrorism.” Available at: http://www.crime-
research.org/articles/Cyber_Terrorism_new_kind_Terrorism
English Oxford Living Dictionary (2018). Zealot. Available at: https://en.oxforddictionaries.com/definition/
zealot
Exterios (2018). “Terrorism” Available at: http://www.exteriores.gob.es/Portal/en/PoliticaExteriorCooperacion/
Terrorismo/Paginas/LuchaContraElTerrorismoDesdeLosForosInternacionales.aspx
FATF (2018). “Terrorist financing.” Available at: http://www.fatfgafi.org/publications/fatfgeneral/documents/
terroristfinancing.html
GCTF (2018). “The global counter terrorism forum.” Available at: https://www.thegctf.org/
Havelsan (2017). “National Judicial Network Project (UYAP).” Available at: http://www.havelsan.com.tr/en/
information-and-communication-technologies-national-judicial-network-project-uyap
Hür Haber. “El-Kaide’nin kafa kesme infazı kan dondurdu.” Available at: http://www.hurhaber.com/el-kaide-
nin-kafa-kesme-infazi-kan-dondurdu/haber-590087
Hürriyet Gazetesi (2011). “Tarihe geçen en büyük 10 siber sdaldırı.” Available at: http://www.hurriyet.com.tr/
teknoloji/tarihe-gecen-en-buyuk-10-siber-saldiri-18527241
Mark, J. J. (2009). “War in ancient times.” Available at: https://www.ancient.eu/war/
MI5 (2018). “International Terrorism.” Available at: https://www.mi5.gov.uk/international-terrorism
Nardia, A. (2013). “Terrorism around us.” Available at: https://www.usadojo.com/terrorism-around-us/
NATO (2018). “Countering terrorism.” Available at: https://www.nato.int/cps/en/natohq/topics_77646.htm
O’Connor, T. (2011). “Definitions, Typologies and Types of Terrorism.” Available at: http://www.cultsandterror.
org/sub-file/TOConnor%20Lecture.htm
OSCE (2018). “What is the OSCE.” Available at: https://www.osce.org/whatistheosce
186
6
International Security
187
Chapter 7 Energy Security
After completing this chapter, you will be able to:
1 2
Learning Outcomes
188
7
International Security
INTRODUCTION
During the Cold War and before, there had been only military oriented security (border-oriented
security) approach. However, after the Cold War this approach left its place to a multidimensional approach
that includes even social and environmental threats to security.
Based upon the rapid increase in the demand for energy, which is an indicator of wealth and power,
the security risks and threats have emerged in all processes, from the availability of energy to the final
consumption. Hence, energy security also plays a crucial role in the changing security concept. Within this
framework; oil, natural gas reserves, pipelines, energy transportation lines, sea lines of communications
(SLOCS), and choke points are geopolitically important in the power struggles of states.
Rivalry for the access to the energy resources in order to control many geographical areas through
power and energy-transportation lines has been creating conflict in international relations and making
these areas unstable. This situation not only threatens the security of the nations but also raises many
global security issues.
Energy, which is one of the basic needs for the survival of human beings, has also become an important
strategic commodity- an indicator of the welfare and power of states. Coal, which is an important energy
source for industrial activities, has been effective in accelerating the industrialization process. Coal had
been a strategic energy source until the beginning of the 20th century; however, it lost its importance to oil
and natural gas, the two energy sources widely used by both the industry and the military.
The energy resources, which strategically demonstrate the relative power of nations, are concentrated
in certain regions of the world- they are unevenly distributed. Therefore, global and regional conflicts may
rise for also controlling these resources. Two-thirds of the world’s oil and natural gas reserves are located
in the Middle East, a region located at the crossroads of key commercial maritime routes and straits.
Therefore, the hegemon that aims to dominate the energy sources and transport routes has had to face the
opposition of other states and this rivalry has resulted in political and economic instability in the region.
These instabilities and conflicts in the hydrocarbon-rich regions pose a risk for the access to the energy
reserves and, as such, threatens the world energy security. Therefore, the Middle East and Latin America
(the proven oil reserves in Venezuela are recognized as the largest in the world) are the regions that we
189
7
Energy Security
should highly take into consideration with regard by several international theories such as Marxism,
to energy security issues (BP, 2018). liberalism, constructivism and the Copenhagen
With the increasing dependence on energy school. These theories have treated security from a
resources, the energy security has become one of the relatively global perspective and taken into account
most critical national security concerns of states. recent threats and risks such as world oil shocks,
Energy demand is rising almost hourly because environmental disasters, nuclear disasters, global
of the increase in global economic activities, warming, hunger, poverty, immigration, excessive
population, urbanization, and the advance in population growth, terrorism, and organized
technologies. The limited availability of resources crime in their approach to international relations
coupled with the increasing demand has resulted (Brauch, 2008: 27-43).
in the rise of security threats. Therefore, the At the top of these threats comes the exhaustion
establishment of a global energy security regime of all non-renewable energy resources. This has
requires the cooperation of nation states and been supported by reports and research conducted
a mutual effort for peace and stability in energy by several international research institutions.
resource-rich regions of the world. Their findings yielded that unfortunately our
world faces the threat that energy sources will be
exhausted one day.
THE CONCEPT OF ENERGY
The concept of risk may be defined as the severity
SECURITY
of a possible incident, the threat to the resources, or
Although the concept of security in international the potential loss of the personnel. The concept of
relations varies according to different conditions threat consists of events or phenomena that have the
in different periods, the nature of security threats potential negative consequences for the existence of
within the concept also changes. It can be said values of a state, society, or individual. According to
that energy has an important role in shaping the Arnold Wolfers, security is the objective situation
concept of security in socio-economic and political in which the threat to values disappears. In the
fields. That is to say, states have been in constant subjective sense, to be secure is to be free from fear
struggle and conflict on resources that show wealth (Wolfers, 1952: 484, 485). According to Brauch,
and power in the historical process. security as a social value refers to a situation that is
These conflicts over resources and the free from danger, risk, disorder, and fear. Security
implausible use of resources are the leading causes also refers to a situation with relative protection,
of increasing security risks and threats in recent certainty, reliability, trust, confidence, and
years in the political, economic, geographic and predictability (Brauch, 2008: 65-98).
environmental dimensions that cross borders. Security, which is derived from the Latin
Risks and threats arising within the scope of word se-curus, is a state of lack of anxiety, risk,
these dimensions can be listed as follows; global or concern. Incidents of insecurity include the
economic and political crises, environmental exposure to violence, deprivation, and poverty. The
disasters, terrorism, organized crime, regional possibility of insecurity raises the risks, and risks
conflicts, hunger, poverty, refugee problem etc. in turn create anxiety and fear. The dose of this
(Renner, 2006: 11). anxiety and concern depends on the proximity of
The fact that security risks have crossed the their realization- the more immediate the danger,
national borders and that a single state can no the greater the anxiety is (Mesjasz, 2004: 4).
longer manage these risks has made it necessary In addition, the answer to the question of what
to discuss, re-conceptualize, and expand security and whom should be secured does also matter. For
within the framework of international relations example, military measures and national territorial
theories. In the Cold War era, security-oriented integrity were the priorities of states until the
approach to government-based military power mid-20th century. However, recently, states have
was effectively used by IR scholars, especially by the been fighting many new issues such as terrorism,
Realist school (Buzan, 2008: 553-560) The analyses environmental disasters, cyber terrorism, refugee
of the Realist school, however, were re-evaluated problem, organized crime that have emerged as
190
7
International Security
new threats to national and international security of national security. However, we can say for
due to rapid globalization (Buzan, 2008: 553-560). sure that most definitions refer to protecting the
Common policies of states in the struggle territorial integrity of the state against any threat
against these threats come into question. During and defending the national interests in the face
the Cold War, states followed a security strategy of competition from other states. This, in fact, is
that prioritized the military and the power- the treatment of security by the traditional (the
oriented realist security policies as well as national realist) approach.
security. In other words, states made military and From a wider perspective, national security is
security policies a priority and, as such, followed the absence of internal and external threats to the
high politics. However, in parallel with the new integrity and stability of a state. However, in the
global trend, new security risks and threats have international system, any measure to protect the
emerged (Shaw, 1996: 39-40). national interests of the state is considered an asset
to the national security, while any act that may harm
the security of that state would be perceived as a
threat (Crawford and Lipschutz, 1997: 149, 150).
This brings us to the discussion of the concept
of security dilemma. This concept refers to the
situation where one nation’s efforts to enhance
its security creates security concerns for another
nation with any prior intention. For example, in
the Cold War era, developing nuclear weapons
cause a security dilemma, which had almost
resulted in a new world war in the early 1960s.
This dilemma has been further manifested in
the international arena with increasing military
technologies, arms races, and deterrent national
policies. In an attempt to solve this dilemma,
nations resorted to such policies as arms control,
disarmament, reduction or elimination of certain
weapons as well as diplomatic efforts to reach a
Figure 7.2 East Side Gallery, Berlin. consensus on international security issues (Buzan,
2008: 553-560).
Economic, social, environmental risks and
threats are second-order policy issues. Recently,
not only scholars and politicians discuss low The Importance of Energy Security
political issues but the very low political issues Since the dawn of humankind, energy is a
impinge on world politics and national security vital necessity. Today, both homes and workplaces
policies. These issues include environmental need energy. This need is increasing day by day
disasters, immigration, refugee problems, social due to the increase in population and the advance
injustice, hunger, poverty, epidemics, biodiversity of technologies. However, energy sources are
loss, erosion, acid rain, desertification, and global concentrated in certain regions of the world. In
warming. Any approach to security, therefore, the international system, states’ access to the energy
should take into account these new threats and resources has implications for both national and
risks in making suggestions for a more orderly and international security policies. Moreover, the
secure world. energy use in economies, military complexes, and
While discussing security, we should mention social areas is the most significant indicator for
its two critical dimensions: national security the development level of states. Therefore, there is
and international security. It should not come as overwhelming competition for energy resources and
a surprise for international relations students to conflict about energy policies. However, competition
hear that there are many definitions of the concept on resources brings with it some risks and threats
191
7
Energy Security
192
7
International Security
The search for energy resources and the national means. As for the concept of affordability, while a
policies to achieve certain interests cause conflicts competitive energy market with an energy supply-
with regard to energy sources, and this process demand equilibrium is significant, it is also critical
changes the threat perception of many states to provide energy at low cost and affordable prices.
within the new security context. Especially the It is important to make sure that the marginal
advance of new technologies, the rapid growth in utility of the energy to be produced by investments
world population, the urbanization, the surge in be higher than its marginal cost. Sustainability
economic activities, the struggle for dominance means that the requested energy can be supplied
over the energy resources, and the ineffective without any disruption as long as the energy is
resource management have not only raised security needed (APERC, 2017).
concerns but also increased the risk of exhausting Energy security can be further studied from
world resources (Rose, 1999: 235-236). three perspectives: the security of the energy
There is not one single definition of energy supply, the energy demand security, and the
security. However, energy security is closely energy transfer safety. The security of the energy
related to products such as electricity, gas, fuel oil supply refers to the reasonable supply of the
are that affect the economic well-being of states, energy resources to countries until these resources
national and foreign policies as well as the welfare are exhausted. The energy demand security
of the individual. Therefore, energy security, ensures that energy-suppliers sell their resources
including economic, political, geographical and at the highest price possible in the most suitable
environmental security should be evaluated from markets. The energy transfer safety involves the
many angles (Baumann, 2008: 4, 5). majority of the risks and threats associated with
One such angle is the already conflict-ridden the energy security today. Because it involves high
regions. For example, the political instability in costs and affects the national security of major
the Caucasus, Central Asia, the Middle East and powers and the stability of many regions. One
Africa has considerably changed the security/threat may observe that these regions with rich energy
perceptions due to the increasing demand for reserves are exposed to terror attacks as well as
energy and, at the same time, the desire of major negative economic shocks due to international
powers to continue controlling the oil/natural gas/ political reasons (Winzer, 2011: 9-12).
mineral reserves. Because of regional and ethnic
conflicts, such problems are on the rise: the
unequal distribution of resources, organized crime,
1
drug smuggling, arms smuggling, international
terrorism, and mass immigration. Discuss the dimensions of energy security.
Although the continuity of energy services
falls in the scope of energy security, the Asia
Pacific Energy Research Center (APERC) INTERNATIONAL
has made an effective attempt to determine the INSTITUTIONS AND MANAGING
components of energy security. In a 2007 study, THE ENERGY SECURITY
it listed these components as follows: energy As Wheeler stated, “energy security has
efficiency, availability, accessibility, affordability, been a hot topic of discussion in global capitals
and sustainability. There has been some discussion and amongst many influential international/
on these components; however, the APERC’s intergovernmental organizations for at least
approach has been widely accepted in academic a decade. However, despite these extensive
circles (Cherp and Jewell, 2014: 420). discussions, there does not seem to be a consensus
The concept of availability refers to the presence for a common understanding of energy security.
of energy resources and sustaining the “demand and Adding to the complicated nature of the issue,
supply equilibrium” of the world energy resources. many international and intergovernmental
Accessibility is important for ensuring the organizations have very different approaches in
continuous flow of energy within the technological their treatment of the energy security topic; each of
193
7
Energy Security
these organizations has its own goals in relation to Ensuring open, transparent, and secure global
the energy issue” (Wheeler, 2014). Below we will markets for energy resources and technologies
review some of the international institutions that remains a top priority for the G7 countries. The
help manage the energy security. Heads of Delegation reaffirmed at the Halifax
meeting, held on September 21, 2018, the
importance of mutual cooperation and continued
The Group of Seven (G7) commitment to diversification, including diverse
The Group of Seven (G-7) is a forum of the energy mix, routes and sources of supply, as core
world’s seven most industrialized economies. G-6 elements for energy security and improving the
was formed in 1975 by France, Germany, Italy, resilience of the energy systems.
Japan, the United States, and the United Kingdom.
While underlining the strategic role of the
Canada was invited to join this group in 1976 that
existing transit routes for gas deliveries to Europe,
eventually created the Group of Seven. In 1998,
the G7 countries agreed to continue to promote
the Russian Federation (RF) was accepted by the
gas security through the diversification of sources
G-7 countries as a full member, transforming G-7
and routes of supply. G-7 is planning the opening
into the Group of Eight (G-8). However, in 2014,
of new pipeline interconnections, new gas supply
Russia was suspended from G-8 after it had annexed
corridors, and the start of new and future LNG
Crimea and created tensions with Ukraine.
exports, with the aim of increasing market liquidity
“The G-7’s major role is to discuss and resolve and diversity, and the management of disruption and
global problems. The seven nations represent emergencies. G-7 is also discussing the important
approximately 50 percent of the global economy. role of storage as a component of a secure gas
The G-7 has been particularly vocal about the need system. G-7 countries “reaffirmed the importance
to prevent the overall global economy from entering of greater flexibility of commercial clauses in LNG
a recession. The group has discussed financial crises, contracts, including relaxing destination clauses,
monetary systems and major world crises such as and similar restrictive mechanisms. To this end, G7
oil shortages” (www.investopedia.com). In the is fully encouraging the sharing of information, on
context of the crisis between Russia and Ukraine, a voluntary basis, of private sector and regulatory
G-7 members reiterated that energy should not best practices” (G7, Energy Security, 2017).
be used as a means of political coercion nor as a
threat to security and that energy disputes should
important
be solved through dialogue based on reciprocity,
transparency, and continued cooperation (www.
g7.utoronto.ca/energy/150512-hamburg.html). “LNG (liquefied natural gas) is a clear,
G-7 has recognized the key role of the energy colorless, and non-toxic liquid that forms
transition through the development of new when natural gas is cooled down to -162ºC
markets for clean energy and through non-market- (-260ºF). The cooling process shrinks the
distortive support measures. The enhancement volume of the gas 600 times, making it easier
of research and development of innovative and safer to store and ship. In its liquid state,
technologies are crucial for the future, recognizing LNG will not ignite” (Shell, 2018).
that both economic growth and environmental
protection could be achieved. The Group of Discussions on cybersecurity threats in
Seven has also continued investing in the energy electricity and other energy sectors and on different
sector, particularly in promoting the quality of concepts of cybersecurity strategies in the energy
energy infrastructure, upstream development, low sector are still ongoing, and G7 has made protecting
emissions, and low carbon technologies. Energy the energy networks one of its top priorities.
efficiency remains critically important for ensuring
future energy security and mitigating the risks to
the sustainable growth of global economy (G7,
Energy Security, 2017).
194
7
International Security
195
7
Energy Security
reflects the challenge of balancing: energy security, The Organization of the Petroleum
energy equity, and environmental sustainability. Exporting Countries (OPEC)
Balancing these three goals constitutes a ‘policy
OPEC is a permanent intergovernmental
trilemma’ and it is the basis for the long-term
organization that was formed at the Baghdad
prosperity and competitiveness of individual
Conference, held on September 10-14, 1960, by
countries. Dimension of the Trilemma is energy
Iran, Iraq, Kuwait, Saudi Arabia, and Venezuela.
security, where Market Design is seen with greater
Today, with 14 Member Countries, “OPEC’s
uncertainty than clean energy-related issues. This
objective is to co-ordinate and unify petroleum
is shaping an energy security environment that
policies among Member Countries, in order
is mostly impacted by the urgency of adaptation
to secure fair and stable prices for petroleum
to the rapid changes brought by the integration
producers; an efficient, economic and regular
of new energy technologies. Regarding extreme
supply of petroleum to consuming nations; and
weather risks, in energy matters, leaders must focus
a fair return on capital to those investing in the
their efforts on ensuring resiliency to guarantee
industry” (OPEC, 2018).
affordability and energy security after natural
disasters occur” (World Energy Council, 2018b).
Members of OPEC (as of March 2019): Iran,
Political instability hinders the advancement
Iraq, Kuwait, Saudi Arabia, Venezuela, Libya
of the necessary economic and social reforms,
(1962), the United Arab Emirates (1967),
including the regulation policies in the area of
Algeria (1969), Nigeria (1971), Ecuador (1973),
energy. Energy security will be strengthened by
Gabon (1975), Angola (2007), Equatorial
increasing the production of oil and natural gas,
Guinea (2017), Congo (2018).
reducing dependence on imports gas and oil
products. As such, the energy supply will be more
diversified with increased generation of renewable In the last 60 years, the oil market has
sources such as solar, wind, and biomass (World remained adequately supplied thanks to OPEC.
Energy Council, 2018b). The organization has responded, in the interests
of a stable, secure and well-managed oil industry,
to market developments and unforeseen shocks.
OPEC has become an established member of the
global energy community, and today it cooperates
with other stakeholders in the energy sector.
“OPEC rose to international prominence during
the 1970s, as its Member Countries took control of
their domestic petroleum industries and acquired
a major say in the pricing of crude oil on world
markets” (www.gnpoc.com). On two occasions, oil
prices rose steeply in a volatile market, triggered by
the Arab oil embargo in 1973 and the outbreak of
the Iranian Revolution in 1979.
The global economy posed a major risk to
the oil market in the early 2010s, “as global
macroeconomic uncertainties and heightened risks
surrounding the international financial system
weighed on economies. Escalating social unrest
Figure 7.4 2016 World Energy Congress in Istanbul, in many parts of the world affected both supply
Turkey.
and demand throughout the first half of the
decade, although the market remained relatively
Source: https://www.worldenergy.org/news-and-
balanced. Prices were stable between 2011 and
media/2016-world-energy-congress-in-pictures/
mid-2014, before a combination of speculation
and oversupply caused them to fall in 2014. Trade
196
7
International Security
patterns continued to shift, with demand growing security of supply, long-term policy, information
further in Asian countries and generally shrinking “transparency”, energy and the environment,
in the OECD. The world’s focus on multilateral research and development and international energy
environmental matters began to sharpen, with relations (IEA, 2018a).
expectations for a new UN-led climate change The IEA has evolved and expanded over the
agreement. OPEC continued to seek stability decades. “Today, the IEA is at the heart of global
in the market, and looked to further enhance its dialogue on energy, providing authoritative
dialogue and cooperation with consumers and analysis through a wide range of publications,
non-OPEC producers” (OPEC, 2018). including the flagship World Energy Outlook and
the IEA Market Reports; data and statistics, such as
The International Energy Agency Key World Energy Statistics and the Monthly Oil
Data Service; and a series of training and capacity
(IEA)
building workshops, presentations, and resources”
The IEA “works to ensure reliable, affordable (IEA, 2018b).
and clean energy for its 30 member countries and
beyond. Its mission is guided by four main areas
of focus: energy security, economic development,
environmental awareness and engagement
worldwide. The history of the IEA began with
the 1973-1974 Middle East War crisis and
its immediate aftermath. While oil producing
countries appeared relatively well organized to
utilize their new oil based economic and political
power, many OECD countries found themselves
inadequately equipped with the information and
organization necessary to meet the corresponding
challenges” (IEA, 2018b).
“For the most part, these countries permitted
excessive and even wasteful and inefficient use of
energy - and of oil in particular. Energy conservation
measures were woefully underdeveloped and oil
production potential was not fully realized, nor was
sufficient investment devoted to the development
of alternative energy sources. They had also yet to
devise a workable system for responding to serious
disruptions in oil supply and their organizational
arrangements for co-operation could not enable Figure 7.5 IEA Report Series: Gas 2018
them to cope effectively with the institutional Source: https://webstore.iea.org/market-report-series-
implications of those situations ” (IEA, 2018d). gas-2018
“The policy and institutional lessons of
the crisis led swiftly in November 1974 to the The International Energy Forum
establishment of the IEA with a broad mandate
(IEF)
on energy security and other questions of energy
policy co-operation among Member countries. The The IEF “aims to foster greater mutual
main policy decisions and the Agency framework understanding and awareness of common energy
were firmly anchored in the IEA treaty called the interests among its members. The 72 member
“Agreement on an International Energy Program”, countries of the Forum are signatories to the
and the new Agency was to be hosted at the OECD IEF Charter, which outlines the framework of
in Paris.” The Agency would become the focal the global energy dialogue through this inter-
point for energy co-operation on such issues as: governmental arrangement. Covering all six
197
7
Energy Security
continents and accounting for around 90% of • “the growing weight of developing countries
global supply and demand for oil and gas, the IEF for global energy security,
is unique in that it comprises not only consuming • the “trilemma” between energy security,
and producing countries of the IEA and OPEC, economic development and environmental
but also Transit States and major players outside of protection,
their memberships “(IEF, 2016). • the role of enhanced energy trade for
“The IEF is the neutral facilitator of informal, sustainable development,
open, informed and continuing global energy • the need to promote access to modern
dialogue. Recognizing their interdependence in energy services, energy poverty reduction,
the field of energy, the member countries of the clean technology and capacity building,
IEF co-operate under the neutral framework of the • the need for diversification of energy
Forum to foster greater mutual understanding and sources and routes,
awareness of common energy interests in order to • the role of regional integration of energy
ensure global energy security” (www.ief.org). markets” (International Energy Charter,
2016).
198
7
International Security
areas where it can add value. To this end, NATO The Organization for Security and
seeks to enhance its strategic awareness of energy Co-operation in Europe (OSCE)
developments with security implications; develop
“Economic and environmental activities
its competence in supporting the protection of
incorporate energy security, including the promotion
critical energy infrastructure; and work towards
of renewable energy and energy efficiency. As a pan-
significantly improving the energy efficiency of the
European and trans-Atlantic platform, the OSCE
military” (NATO, 2018).
supports an energy security dialogue among its
“NATO’s role in energy security was first defined participating States and other international bodies
in 2008 at the Bucharest Summit, and since then that deal with energy issues” (www.osce.org). “Energy
this role has been strengthened. Energy security is security requires well-functioning international
a vital element of resilience and has become more energy markets, stable consumer producer relations,
important in the past years due to the new security sustainable production and resilient critical energy
context. Energy efficiency is important not only for networks. The OSCE as the world’s largest regional
logistics and cost-saving in theatres of operation, security organization unites some of the world’s most
but also for the environment” (NATO, 2016). important energy producer, consumer and transit
In the future NATO will seek to further countries” (OSCE, 2018).
enhance the strategic dialogue, both among Allies The OSCE provides “analysis, capacity
and with partner countries, offer more education building, trainings and regional workshops and
and training opportunities, and deepen its ties conferences. It focuses on the protection of critical
with other international organizations (such as energy networks, the promotion of energy security
the International Energy Agency), academia, and dialogue, good governance and transparency in
the private sector. NATO will work to enhance the energy sector, sustainable energy and energy
the resilience of energy infrastructure, notably diplomacy. The OSCE offers national and regional
in hybrid scenarios. With increased awareness of technical assistance seminars for participating
energy risks, enhanced competence to support States on topics related to energy security, such as
infrastructure protection, and enhanced energy energy diplomacy and risk mitigation, protecting
efficiency in the military, NATO will be better energy networks from natural and man-made
prepared to respond to the emerging security disasters, enabling conditions and technology
challenges of the 21st century (NATO, 2018). transfer for renewable energy and energy scenario
planning exercises” (OSCE, 2018).
199
7
Energy Security
200
7
International Security
Development; Statistics; Sub regional activities for ongoing electrification of the world economy and
development; Energy.” supported by strong investment and renewable
ESCAP promotes and develops a number of power in the networks (S&P Global Platts, 2018).
programs and projects aimed at advancing energy The falling costs continue to affect investment
access, renewable energy, and energy efficiency. trends, prices, and fuel competition in various parts
“Furthermore, ESCAP fosters the transition to of the energy sector. The advance in technologies
a sustainable energy system through regional and the plans made by governments facilitate the
cooperation and supports member States in economies of scale of new projects in some energy
identifying energy challenges and generating markets.
sound policy response measures by providing a “Project economics in the oil and gas sector
platform for dialogue and knowledge exchange” are complex, but costs for conventional oil and
(ESCAP, 2018). gas developments have not followed the trend of
higher oil prices since mid-2016, thanks to cost
Other Energy Related discipline by operators and excess capacity in the
services industry. In the United States shale sector,
Organizations
however, an upswing in activity led to an almost
There are some other organizations that 10% increase in costs in 2017, and a similar rise
deal with the management of energy issues and is expected in 2018. New digital technologies are
contribute to managing energy security. Among increasingly keeping costs under control across the
others, the following organizations stand out: entire energy sector, including in upstream oil and
the United Nations Industrial Development gas” (IEA, 2018c: 11).
Organization (UNIDO), the United Nations
China conquered one-fifth of the global energy
Development Program (UNDP), the United
sum and continued to be the biggest target of the
Nations Environment Program (UNEP), the World
energy inventory. In addition, the US strengthened
Bank Group, the Global Environment Facility
its position as the second largest investor in the oil
(GEF), and the OPEC Fund for International
and natural gas sector, thanks to a sharp rebound
Development (OFID).
in gas-fired plants and electricity networks (USGS,
2018).
Europe’s share in global energy investment was
2 around 15%, and there was a modest increase in
renewable energy investments, with an increase
Make some research on the purposes of in spending on energy efficiency and decreases in
the International Atomic Energy Agency thermal production (EUP2G, 2018).
(IAEA). Investments in new coal-fired power plants fell
by 55% in 2017. As an indication of this, low-carbon
AN OVERVIEW OF ENERGY electricity supply, networks, and energy efficiency
increasingly drive China’s energy investment. In
ISSUES THROUGH GLOBAL India, however, renewable energy investment for
AND REGIONAL REGIMES the first time in 2017 peaked in the production of
In the third year in a row, global energy fossil fuel-based energy (ARB, 2017).
investment decreased, falling to 1.8 trillion US “There was a pause in the shift of investments
Dollars in 2017 – a 2% decline in real terms from towards cleaner sources of energy supply. The share
the previous year. Energy efficiency and investment of fossil fuels, including thermal power generation,
increased in some industries in 2017, including in energy supply investment rose slightly to 59%
upstream oil and natural gas. Nevertheless, capital as spending in upstream oil and gas increased
expenditure in fossil fuel supply remained at two- modestly. The International Energy Agency (IEA)
thirds of 2014 (IEA, 2017). Sustainable Development Scenario (SDS) sees the
The electricity sector was the biggest buyer share of fossil fuels in energy supply investment
in the global energy investment, reflecting the falling to 40% by 2030” (IEA, 2018c: 12).
201
7
Energy Security
Solar Photovoltaic (PV) is a technology that converts sunlight (solar radiation) into direct current
electricity by using semiconductors. When the sun hits the semiconductor within the PV cell, electrons
are freed and form an electric current. Solar PV technology is generally employed on a panel (hence solar
panels). PV cells are typically found connected to each other and mounted on a frame called a module.
Multiple modules can be wired together to form an array, which can be scaled up or down to produce
the amount of power needed (www.studentenergy.org/topics/solar-pv).
The offshore wind energy investment has also reached record levels with the introduction of
approximately 4 gigawatts, mostly in Europe. On the other hand, the investment of the US, China,
Europe, and Brazil in the wind energy has decreased by about 15%. However, one third of this decline was
due to the falling investment costs. Moreover, hydropower investment has declined to its lowest level in
China, Brazil, and South Asia in ten years (ICF, 2016).
The US continued to be the largest market for energy grid investment after China. Toward increasing
the flexibility of energy systems and supporting the integration of renewable resources, investments have
been increased in technologies (IEA, 2016).
“Investments in fossil fuel supply remained stable around USD 790 billion in 2017” (IEA, 2018c).
The decreasing expenditures on coal supply and liquefied natural gas (LNG) compensated for a reasonable
increase in upstream oil and natural gas. Investments in the conventional oil and natural gas sector
continue to decline and the share of greenfield projects in total upstream investment is expected to fall to
about one-third in 2018, to the lowest level in a few years (Şeker, 2017).
The terms upstream and downstream oil and gas production refer to an oil or gas company’s location in the
supply chain. Upstream oil and gas production is conducted by companies who identify, extract, or produce
raw materials. Downstream oil and gas production companies are closer to the end user or consumer and are
often called exploration and production companies. Upstream oil and gas production and operations identify
deposits and drill wells, and recover raw materials from underground. They are also often called exploration
and production companies. This sector also includes related services such as rig operations, feasibility studies,
machinery rental, and extraction of chemical supply (www.investopedia.com).
202
7
International Security
203
7
Energy Security
204
7
International Security
For example, classical realists such as Hans Morgenthau and Reinhold Niebuhr believed that states,
just like human beings, have an innate desire to dominate the “others” that has made conflicts and wars
inevitable in the international system. On the other hand, for neo-realists, (structural realists), the human
nature has little to do with states’ longing for power. Not the human nature but the very anarchical structure
of the international system is responsible for states’ searching for power and dominance (Mearsheimer,
2010, 78). This has implications for energy security. Because it is whether the human nature or the
structure of the international system, there have been forces that create conflictual relationships between
states, especially to reach affordable energy resources.
205
7
Energy Security
economy faced serious problems and depressions countries (and especially former Soviet influence
during the 1990s. For example, the 1998 economic countries) are concerned that by controlling the
crisis that started in Asia negatively affected the national energy infrastructures, Russian energy
Russian economy because of the decline in oil prices. companies may favor certain local businessmen
However, this situation did not continue for a long and politicians and, as such, manipulate domestic
time, and the Russian economy started to show policies (Woehrel, 2010, 404).
significant growth with the election of Vladimir Due to the huge energy import of European
Putin for the Presidency of the Russian Federation. Countries from Russia, many Central and East
Thereafter, the oil revenues contributed to the state European countries fear that Russia may use
budget that in turn dramatically decreased Russia’s this energy dependency as a leverage to interfere
dependence on foreign credits (Viciu, Toma, and in their domestic affairs or force them to make
Tampu, 2013, 163). foreign policy concessions (Woehrel, 2010, 410).
Up until the recent collapse of oil prices, Therefore, the EU has defined some policies toward
although Russia ranked sixth (after Venezuela, Russia to improve the bilateral relations from three
Saudi Arabia, Canada, Iran, Iraq) in terms of total dimensions: political, economic, and normative.
reserves, it took advantage of high energy prices The political dimension aims at reducing the
and was running a current account surplus. This energy import dependency, whereas the economic
allowed paying off all the debts accumulated in dimension aims at achieving to build competitive
the early 1990s. It is clear that oil and natural gas market conditions and sustain reasonable energy
resources are vital for the Russian economy. On the prices (Belyi, 2003, 4, 351). The EU also desires
other hand, this may encourage Russia to follow an to establish a normative dimension in bilateral
aggressive foreign policy. Russia is also the second relations through the international multilateral
largest natural gas producer after the US. However, frameworks for managing energy security issues.
in order to continue its energy leadership, Russia However, despite the efforts of the EU and the
should increase its production in potential regions continuing sanctions on Russia because of the
such as the Arctic. Otherwise, boosting the Crimean conflict (EU, 2014), it has been not the
production in its current locations will result into EU but Russia who steers bilateral relations in
the fast depletion of its reserves (BP, 2018, 12, 26). energy issues. As the Director of the ECFR pointed
The US is planning to meet all its energy needs out, while in the 1990s everybody was talking
from domestic resources by 2035. Toward this about the Russian dependence on Western credits,
objective, the US is increasing its oil and natural now everyone talks about Western dependence on
gas production (BP, 2018, 28). In fact, the USA Russian gas (Leonard and Popescu, 2007, 7).
achieved a 5.6 % increase in oil production and Given the Russian energy policies toward
recently it has become the largest oil producer (BP, the EU countries, it is clear that Russia has had
2018, 14). However, the significant amount of specific energy policies for each member state.
undiscovered oil and natural gas reserves presents a As the European countries are the primary
challenge for the Russian-US relations. export market for Russia, it has developed several
The Russian petroleum companies make the strategies and scenarios such as fast development
largest contribution to the Russian government’s of gas production and pipeline capacity that is
budget. Moreover, these companies control some mainly associated with its long-term gas strategy.
influential institutions such as banks, industrial However, energy transition via transit routes creates
holdings, and the media. In addition, energy a significant obstacle for Russia. Because Russia
companies of Russia have had an impact on the exports the majority of its energy via pipelines, and
state and the national economy (Kaveshnikov, this makes Russia critically dependent on Ukraine
2010, 594). In other words, the impact of Russian and Belarus for transit. Russia prefers to improve
petroleum companies is quite significant because bilateral relations with the EU member states while
they do not only make financial contribution to the taking advantage of the divisions within the Union
state budget, but also they give direction to both (Kulhanek, 2010, 51). For this reason, Russia
domestic and external politics. Many European wants to achieve greater independence from the
transit countries.
206
7
International Security
207
7
Energy Security
complex and congested than ever before. And many As most states depend on energy imports, they
parts of critical energy infrastructure today are have a vested interest in the security of energy
heavily reliant on cyber systems, which make them infrastructure in the producing countries or transit
vulnerable to cyber-attacks. Moreover, over the countries. Accordingly, sharing best practices on
past years, terrorists and insurgents conducted on the protection of critical energy infrastructure
average about 500 attacks each year against energy- remains an important method for international
related targets. This included the bombing of gas cooperation on energy security. Some countries
and oil pipelines; attacks on fuel trucks; killing and also enhance its competence in cooperation with
kidnapping associated personnel, and disrupting international organizations to help protect the
of electrical power systems. Most of these attacks energy infrastructure. One example is the counter-
are clustered in a few specific regions, such as West piracy operations in the Indian Ocean. Improving
Africa. However, attacks on energy infrastructure the capability of states and organizations toward
can reverberate far beyond their point of origin. ensuring the freedom of navigation matters for the
As energy markets are volatile, even a single attack security of the energy infrastructure.
can lead to global price spikes. Terrorism can drive
up insurance premiums. And the interruption of
the flow of energy-even if only briefly-can have 4
multiple ripple effects, both economically and
psychologically. In short, energy infrastructure will Make some research on the emergency oil
remain a tempting target” (www.nato.int). stocks.
208
7
International Security
The International Energy Agency, which works for the energy security in the world, defines
energy security as the access to uninterrupted energy sources at affordable prices. In a similar
way, Baumann describes energy security as the energy at a reasonable price with reliable energy
supply. Therefore, energy security encompasses all economic, political, and environmental
processes from the production of energy to the distribution of energy to final consumers.
Summary
LO 2 Recount important institutions for energy
security.
Among the international institutions that contribute to the management of energy security,
the following ones stand out: The Group of Seven (G7), The Group of 20 (G-20), The World
Energy Council, The Organization of the Petroleum Exporting Countries (OPEC), The
International Energy Agency (IEA), The International Energy Forum (IEF), The International
Renewable Energy Agency (IRENA), The International Energy Charter, The Energy
Community, The North Atlantic Treaty Organization (NATO), The Organization for Security
and Co-operation in Europe (OSCE), The International Atomic Energy Agency (IAEA),
UN-Energy, The United Nations Economic Commission for Europe (UNECE), The United
Nations Economic and Social Commission for Asia and the Pacific (ESCAP).
In the third year in a row, global energy investment decreased, falling to 1.8 trillion US Dollars
in 2017 – a 2% decline in real terms from the previous year. Energy efficiency and investment
increased in some industries in 2017, including upstream oil and natural gas. Nevertheless,
capital expenditure in fossil fuel supply remained at two-thirds of 2014. The electricity sector
was the biggest buyer in the global energy investment, reflecting the ongoing electrification of
the world economy and supported by strong investment and renewable power in the networks.
The falling costs continue to affect investment trends, prices, and fuel competition in various
parts of the energy sector. The advance in technologies and the plans made by governments
facilitate the economies of scale of new projects in some energy markets. Investments in new
coal-fired power plants fell by 55% in 2017. In 2018, global investments both in shale gas
and LNG are expected to reach almost a quarter of total upstream costs. At the same time,
oil and gas companies are increasing their investments outside the upstream sector. For the
first time in recent years, the United States has been the country that invested the most in
petrochemicals.
209
7
Energy Security
During the second half of the 20th century, the structure of the international system went
through significant changes. The most influential ones in terms of geopolitics can be listed as
follows: the emergence of the “energy security” concept in 1970s, the disappearance of the Soviet
Union from the international arena in 1991, and finally, the advancement of globalization at
a very quick pace. All these have created a direct impact on the classical concepts of power,
politics, security, economics, and even ways/methods to use military force. Energy security is
becoming a truly strategic issue, with numerous implications for international security. Even
Summary
without the concerns arose by the current crises, the political, economic and security challenges
surrounding the energy supply of many countries are profound. Europe’s dependency on oil
and gas imports is increasing, as are the energy needs of rising powers such as China and
India. Moreover, the political instability haunts many energy-producing and transit states.
Furthermore, the quest for energy and other resources has sparked territorial disputes in several
parts of the world. Terrorist attacks and cyber-attacks against refineries, pipelines, and power
plants are common in many countries, as is piracy along critical maritime choke points. Over
the past years, however, state’s energy security agenda has become more systematic and focused
on the following three major areas: raising strategic awareness of energy developments that
have security implications, contributing to the protection of critical energy infrastructure, and
enhancing energy efficiency in the military.
210
7
International Security
1 Which of the following is not one of the UN- 6 Which of the following is geostrategically and
related energy institutions? geopolitically less important in the power struggle
among states to ensure their energy security?
A. UN-Energy
A. Sea lines of communications (SLOCS)
Test yourself
B. ESCAP
C. UNIDO B. Choke points
D. OFID C. Pipelines
E. UNECE D. Energy transportation lines
E. Livestock and crops
2 The oldest energy-related global organization is---
7 As a social value, security has historically
Which of the following options correctly com- been an antidote of ---
pletes the sentence above?
Which of the following options correctly comple-
A. The World Energy Council tes the sentence above?
B. OPEC
A. global warming
C. IEA
B. hunger
D. IEF
C. disorder
E. IAEA
D. immigration
E. piracy
3 G7 is promoting all of the following except---
Which of the following options correctly completes the 8 Which of the following is not a crucial part
sentence above? of the energy security?
A. gas security A. Security of the energy supply
B. opening of new pipeline interconnections B. Energy supply-demand equilibrium
C. an increase in oil production C. Energy demand security
D. the market liquidity and diversity D. Safety of the energy
E. new gas supply corridors E. Safety of the transfer
4 Contemporary definition of energy security 9 LNG is a clear, colorless and non-toxic liquid
does not include the notion of--- that forms when natural gas is cooled down to---
Which of the following options correctly comple- Which of the following options correctly comple-
tes the sentence above? tes the sentence above?
A. acceptability A. -52ºC
B. reliability B. -72ºC
C. supplies C. -110ºC
D. viscosity D. -132ºC
E. interruptions E. -162ºC
5 Which of the following is not a current or 10 In which of the following regions is the off-
potential threat to energy security? shore wind energy the most common?
A. The Russian-US energy rivalry A. North America
B. Nuclear energy under the control of IAEA B. Central Asia
C. The EU’s energy dependency on the Russian C. The Far East
Federation D. Europe
D. China’s demand for an increase in natural gas E. Africa
usage
E. Natural and man-made disasters
211
7
Energy Security
1. D If your answer is not correct, review the 6. E If your answer is not correct, review
section on “International Institutions and the section on “The Concept of Energy
Managing the Energy Security” section. Security” section.
Answer Key for “Test Yourself”
2. A If your answer is not correct, review the 7. C If your answer is not correct, review
section on “International Institutions and the section on “The Concept of Energy
Managing the Energy Security” section. Security” section.
3. C If your answer is not correct, review the 8. B If your answer is not correct, review
section on “International Institutions and the section on “The Concept of Energy
Managing the Energy Security” section. Security” section.
If your answer is not correct, review the If your answer is not correct, review the
5. B 10. D section on “An Overview of Energy Issues
section on “Threats to Energy Security”
section. through Global and Regional Regimes”
section.
Suggested Answers for “Your Turn”
Although the continuity of energy services falls in the scope of energy security,
the Asia Pacific Energy Research Center (APERC) has made an effective
attempt to determine the components of energy security. In a 2007 study, it
listed these components as follows: energy efficiency, availability, accessibility,
affordability, and sustainability. There has been some discussion on these
components; however, the APERC’s approach has been widely accepted in
academic circles (Cherp and Jewell, 2014: 420). The concept of availability
refers to the presence of energy resources and sustaining the “demand and
your turn 1 supply equilibrium” of the world energy resources. Accessibility is important for
ensuring the continuous flow of energy within the technological means. As for
the concept of affordability, while a competitive energy market with an energy
supply-demand equilibrium is significant, it is also critical to provide energy at
low cost and affordable prices. It is important to make sure that the marginal
utility of the energy to be produced by investments be higher than its marginal
cost. Sustainability means that the requested energy can be supplied without
any disruption as long as the energy is needed (APERC, 2017).
212
7
International Security
“According to the statute of the IAEA, the agency “shall seek to accelerate
“Over the last 200 years, an ever-increasing proportion of our energy has
come from nonrenewable sources such as oil and coal. While demand for
energy rises, these resources are running out and scientists are exploring the
potential of renewable sources of energy for the future. All life on earth is
sustained by energy from the sun. Plants and animals can store energy and
some of this energy remains with them when they die. It is the remains
of these ancient animals and plants that make up fossil fuels. Fossil fuels
are non-renewable because they will run out one day. Burning fossil fuels
generates greenhouse gases and relying on them for energy generation is
unsustainable. Hence the need to find more renewable, sustainable ways of
generating energy. Renewable or infinite energy resources are sources of power
your turn 3 that quickly replenish themselves and can be used again and again. Estimates
from international organizations suggest that if the world’s demand for energy
from fossil fuels continues at the present rate, oil and gas reserves may run
out within some of our lifetimes. The estimated length of time left for oil is
50 years, while for natural gas it is 70 years. Coal is expected to last longer,
about 250 years. Renewable energy is the energy derived from resources
that are regenerative or for all practical purposes cannot be depleted. Types
of renewable energy resources include moving water (hydro, tidal and wave
power), thermal gradients in ocean water, biomass, geothermal energy, solar
energy, and wind energy. Municipal solid waste (MSW) is also considered to
be a renewable energy resource” (Szabo, 2016).
213
7
Energy Security
214
7
International Security
References
ANL (Argonne National Laboratory). (2018). Batpac: CoalSwarm. (2018). Global coal plant tracker.
A Lithium-ion Battery Performance and Cost Model Available at: http://coalswarm.org/trackers/india-
for Electric-drive Vehicles. Available at: www.cse. coal-plant-tracker-map-and-table/
anl.gov/batpac/index.html
Correa, H. (2001). “Game theory as an instrument
APERC (Asia Pacific Energy Research Center) (2017). for the analysis of international relations.”
APEC Energy Overview 2017. Singapore. Ritsumeikan Annual Review of International
ARB (Assessment Review Board). (2017). Air Resources Studies, Vol. 14(2): 187-208.
Board: Carbon Capture and Sequestration Program Crawford, B. and Lipschutz, R. (1997). “Discourses
Concept Paper. Environmental tribunals of Ontario. of war: Security and the case of Yugoslavia.” In K.
Available at: www.arb.ca.gov/cc/ccs/documents/ Krause and M. Williams (Eds.), Critical security
CCS_Concept_Paper_April_2017.pdf studies: Concepts and cases. Minnesota: University
Baumann, F. (2008). Energy Security as of Minnesota Press, pp. 149-186.
Multidimensional Concept. Munich: Center for Ducaru, S. D. (2017). “The security of critical energy
Applied Policy Research. infrastructure in the age of multiple attack vectors:
Belyi, A. (2003). “New dimensions of energy security NATO’s multi-faceted approach.” Europolity,
of the enlarging EU and their impact on relations Vol.11(1): 5-20.
with Russia.” Journal of European Integration, Vol. ECO (Environmental Commissioner of Ontario).
25(4): 351-369. (2017). Low-carbon procurement in Ontario’s
BP. (2018). BP statistical review of world energy. climate act from plan to progress: Annual
London. greenhouse gas progress report 2017 (236-253).
Canada: Environmental Commissioner of
Burchill, S., Linklater, A., Devetak, R., Donnelly, J., Ontario. Available at: http://docs.assets.eco.
Paterson, M., Reus-Smit, C. and True, J. (2005). on.ca/reports/climate-change/2017/From-Plan-
Theories of International Relations. Hampshire, to-Progress-08.pdf
UK: Palgrave Macmillan, 3rd ed.
EIA (U.S. Energy Information Administration)
Buttler, A. and Spliethoff, H. (2018). Current status
(2018). U.S. crude oil and natural gas proved
of water electrolysis for energy storage, grid
reserves, year-end 2017. Washington: U.S.
balancing and sector coupling via power-to-gas
Department of Energy.
and power-to-liquids: A review. Renewable and
Sustainable Energy Reviews, Vol. 82: 2440-2454. Energy Community (2017). Who We Are. Available
at: https://www.energy-community.org/aboutus/
Buzan, B. (2008). “The changing agenda of military
whoweare.html
security.” Globalization and Environmental
Challenges, Vol. 3: 553-560. ESCAP (Economic and Social Commission for Asia
Cherp, A. and Jewell, J. (2011). “The three and the Pacific). (2018). Energy for Sustainable
perspectives on energy security: Intellectual Development. Available at: https://www.unescap.
history, disciplinary roots and the potential for org/our-work/energy
integration.” Current Opinion in Environmental EU (European Union). (2014). EU Restrictive Measures
Sustainability, Vol. 3(4): 202-212. in View of the Situation in Eastern Ukraine and the
Cherp, A. and Jewell, J. (2014). “The concept of Illegal Annexation of Crimea. Brussels.
energy security: Beyond the four As.” Energy EUP2G (European Power to Gas) (2018). Power-to-
Policy, Vol. 75: 415-421. gas (demonstration) projects in Europe. Available
Cherp, A., Adenikinju, A., Goldthau, A., Hernandez, at: http://europeanpowertogas.com/projects-in-
F., Hughes, L., Jewell, J., Vakulenko, S. (2012). europe/
“Energy and security.” In T. B. Johansson, N. G7 (2017). Rome energy ministerial meeting, energy
Nakicenovic, and A. Patwardan (Eds.), Global security: From Rome 2014 to Rome 2017. Italy.
energy assessment: Toward a sustainable future.
Cambridge University Press, pp. 325-383.
215
7
Energy Security
G7 (2018). Canada’s 2018 G7 presidency. Available at: IEA (International Energy Agency). (2018c), World
https://g7.gc.ca/en/ energy investment 2018. Paris: OECD/IEA.
Available at: https://webstore.iea.org/download/
G20 (2018). Energy ministers communiqué. Available
summary/1242?fileName=English-WEI-2018-
at: http://www.g20.utoronto.ca/2018/2018-06-
ES.pdf
15-energy_communique.html
IEA (International Energy Agency) (2018d). History.
G20 (2017). G20 Leaders’ declaration: Shaping
Available at: https://www.iea.org/about/history/
an interconnected world. Germany. Available
at: http://europa.eu/rapid/press-release_ IEF (International Energy Forum). (2016). IEF
STATEMENT-17-1960_en.htm overview. Available at: https://www.ief.org/about-
ief/ief-overview.aspx
Gustafson, T. (1981). Energy and the Soviet Bloc.
International Security, Vol. 6(3): 65-89. International Energy Charter. (2016). The
international energy charter. Available at: https://
H.G. Brauch, U. Oswald-Spring, C. Mesjasz, J.
energycharter.org/process/international-energy-
Grin, P. Dunay, N.C. Behera, B. Chourou,
charter-2015/overview/
P. KameriMbote, P.H. Liotta (Eds.). (2008).
Globalization and environmental challenges. Berlin: IRENA (International Renewable Energy Agency).
Springer. (2018). About IRENA. Available at: http://www.
irena.org/aboutirena
Harshe, R. (2005). “Changing profile of imperialism
in global political order/disorder.” Economic and Kaveshnikov, N. (2010). “The issue of energy security
Political Weekly, Vol. 40(20): 2071-2076. in relations between RF and the European Union.”
European Security, Vol. 19(4): 585-605.
HC (Hydrogen Council). (2017). Hydrogen: Scaling
up – A sustainable pathway for the global energy Koivumaa, J. (2013). “New possibilities for the
transition. Available at: http://hydrogencouncil. northern peripheral regions in the Post-Cold War
com/wp-content/uploads/2017/11/Hydrogen- era” in Arctic Year Book: The Arctic of Regions
scaling-up-Hydrogen-Council.pdf vs. The Globalized Arctic. Iceland: The Northern
Research Forum and The University of the Arctic
IAEA (International Atomic Energy Agency) (2018).
Press. Available at: https://arcticyearbook.com/
Department of nuclear energy. Available at: https://
arctic-yearbook/2013/2013-scholarly-papers/41-
www.iaea.org/about/organizational-structure/
new-possibilities-for-the-northern-peripheral-
department-of-nuclear-energy
regions-in-the-post-cold-war-era
ICF. (2016). Innovative financial instruments for
Kulhanek, J. (2010). “The fundamentals of RF’s EU
first-of-a-kind, commercial-scale demonstration
policy.” Problems of Post Communism, Vol. 57(5):
projects in the field of energy. Brussels: European
51-63.
Commission. Available at: http://ec.europa.
eu/research/energy/pdf/innovative_financial_ Leonard, M. and Popescu, N. (2007). A power audit of
instruments_for_FOAK_in_the_field_of_ EU-RF relations. London: European Council on
Energy.pdf Foreign Relations Policy Paper.
IEA (International Energy Agency). (2016). Insights Light, A.R. (1976). “Federalism and the energy crisis:
series 2016-ready for CCS retrofit: The potential A view from the states.” Publius, Vol. 6 (1): 81-96.
for equipping China’s existing coal fleet with carbon
Mearsheimer, J.J. (2010). “Structural realism.” In T.
capture and storage. Paris: OECD/IEA.
Dune, M. Kurki and S. Smith (Eds.), International
IEA (International Energy Agency) (2017). World relations theories: Discipline and diversity. Oxford:
energy outlook 2017. France: IEA Publications. Oxford University Press, pp. 77-94.
Available at: https://webstore.iea.org/download/
Medlock, K. B., Baker, A. J. and Baker, G. S. (2010).
summary/196?fileName=English-WEO-2017-
The impacts of the natural gas shale boom on US
ES.pdf
energy security. Texas: Rice University.
IEA (International Energy Agency). (2018a). Energy
Mesjasz, C. (2004). Security as an analytical concept.
security. Available at: https://www.iea.org/topics/
Pan-European Conference on International Relations
energysecurity/
in the Hague. Available at: http://www.afes-press.
IEA (International Energy Agency). (2018b). Our de/pdf/Hague/Mesjasz_Security_concept.pdf
mission. Available at: https://www.iea.org/about/
216
7
International Security
Morgenthau, H.J. (1966). Politics Among Nations: The Scott, R. (1994). The history of the energy international
Struggle for Power and Peace. New York: Knopf, agency 1974-1994: IEA the first 20 years. Volume
3rd ed. one, origins and structure. Paris: OECD/IEA.
NATO (2016). NATO Summit Guide, Warsaw, Szabo (2016). Technical English for Renewable
8-9 July, 2016. Available at: https://www. Energy: Open Educational Resources for online
n a t o. i n t / n a t o _ s t a t i c _ f l 2 0 1 4 / a s s e t s / p d f / course of technical English for renewable
pdf_2016_07/20160715_1607-warsaw-summit- energy. Available at http://repositori.uji.es/
guide_2016_eng.pdf x m l u i / b i t s t re a m / h a n d l e / 1 0 2 3 4 / 1 6 8 9 6 4 /
O6_Technical%20English%20for%20RES.
NATO (North Atlantic Treaty Organization). (2018).
pdf?sequence=1&isAllowed=y
NATO’s role in energy security. Available at: https://
www.nato.int/cps/en/natohq/topics_49208.htm Sempa, F.P. (2009). Geopolitics: From the Cold War
to the 21st century. New Jersey: Transaction
Nijman, J. (1992). “The limits of superpower: The
Publishers.
United States and the Soviet Union since World
War II.” Annals of the Association of American Shaw, B. R. (1996). When are environmental issues
Geographers, Vol. 82(4): 681-695. security issues? Report of the Environmental Change
and Security Program of the Woodrow Wilson
Onyeji, I., Bazilian, M. and Bronk, C. (2014). “Cyber
Center, 2: 39-44.
security and critical energy infrastructure.” The
Electricity Journal, Vol. 27(2): 52-60. Shell. (2018). Liquefied Natural Gas (LNG). Available
at https://www.shell.com/energy-and-innovation/
OPEC (Organization of the Petroleum Exporting
natural-gas/liquefied-natural-gas-lng.html
Countries). (2018). Brief history. Available at:
https://www.opec.org/opec_web/en/about_ Streeten P. (2001). Globalization: Threat or opportunity?
us/24.htm Copenhagen: Copenhagen Business School Press.
OSCE (Organization for Security and Co-operation Şeker, B. Ş. (2017). “Investigating emerging energy
in Europe). (2018). Energy security. Available security issues during the 21st century: Maritime
at: https://www.osce.org/resources/factsheets/ transport and alternative modes of liquefied
energy-security?download=true natural gas bunkering.” In Ö. K. Kalkan (Ed.),
Current Debates in International Relations & Law.
Poduval, D. (2014). 2014 Strategic directions: U.S.
London: Ijopec Publication, pp. 159-172.
natural gas industry a Black and Veatch report.
Kansas: Black & Veatch. Thompson, E. (1983). “The rapid transformation of
intergovernmental energy relations.” Publius, Vol.
Renner, M. (2006). Introduction to the concepts of
13(4): 97-111.
environmental security and environmental conflict.
The Netherlands: Institute for Environmental Ullman, R. (1983). “Redefining security.” International
Security. Security, Vol. 8 (1): 129-153.
Rose, G. (1999). “Energy security and the Middle UNECE (United Nations Economic Commission for
East.” In J. Krause and K.R. Spillmann (Eds.), Europe). (2018). Sustainable energy. Available at
Studies Contemporary History and Security Policy. https://www.unece.org/energy.html
Bern: Peter Lang, pp. 235-242.
UN-Energy. (2017). Mission and activities. Available
S&P Global Platts. (2018). World electric power plants at: https://www.un-energy.org/mission-and-
database. Washington, D.C. activities/
Saputra, E. (2017). Growth and opportunities in USCRS (US Congressional Research Service). (2018).
Southeast Asian LNG and power. Edinburgh: The G-20 and international economic cooperation:
Wood Mackenzie Reports. Background and implications for congress.
Washington, D.C. Available at: https://fas.org/
Schmidt, O., Hawks, A., Gambhir, A. and Staffell,
sgp/crs/row/R40977.pdf
I. (2017). “The future cost of electrical energy
storage based on experience rates.” Nature Energy, USDOE (US Department of Energy). (2018).
2(8). Available at: www.nature.com/articles/ Alternative fueling station locator. Washington,
nenergy2017110 D.C. Available at: www.afdc.energy.gov/
stations/#/analyze
217
7
Energy Security
USGS (US Geological Survey). (2018). Lithium. Williams, P. (1989). “USA-Soviet relations: Beyond
Washington: US Department of Interior. the Cold War?” International Affairs, Vol. 65 (2):
Available at: https://minerals.usgs.gov/minerals/ 273-288.
pubs/commodity/lithium/mcs-2018-lithi.pdf
Winzer, C. (2011). Conceptualizing energy security.
Verrastro, F. and Ladislaw, S. (2007). “Providing Cambridge Working Paper in Economics.
energy security in an interdependent world.” The
Woehrel, S. (2010). “Russian energy policy toward
Washington Quarterly, Vol. 30(4): 95-104.
neighboring countries.” Current Politics &
Viciu, T.G., Toma, M. and Tampu, D.L. (2013). Economics of Europe, Vol. 23 (3-4).
“Ongoing economic restructuring in the wake of
Wolfers, A. (1952). “National security as an ambiguous
the latest economic crisis: A Russian perspective.”
symbol.” Political Science Quarterly, Vol. 67 (4):
Procedia Economics and Finance, Vol. 6: 161-168.
481-502.
Viotti, P.R. and Kauppi, M.V. (1999). International
World Energy Council. (2018a). About the World
relations theory: Realism, pluralism, globalism and
Energy Council. Available at: https://www.
beyond. United States: Longman.
worldenergy.org/about-wec/
Walt, S.M. (1998). “International relations: One
World Energy Council. (2018b). World energy issues
world, many theories.” Foreign Policy, No. 110:
monitor. England: World Energy Council.
29-46.
Worldmark (2007). Worldmark Encyclopedia of the
Wang, S. (2018). “Shale gas exploitation: Status,
Nations. Volume 1: United Nations. Detroit:
problems and prospect.” Natural Gas Industry B,
Thomson Gale, 12th ed.
5 (1): 60-74.
Yergin, D. (1991). The Prize: The epic quest for oil,
Wheeler, R. (2014). “Energy security and
money, and power. New York: Touchstone.
intergovernmental organizations.” Oil, Gas &
Energy Law (OGEL), 2. Available at: https://www. Yergin, D. (2006). “Ensuring energy security.” Foreign
ogel.org/article.asp?key=3459 Affairs, Vol. 85 (2): 69-82.
218
Chapter 8 Non-Military Security
After completing this chapter, you will able to:
Learning Outcomes
1 Define the concept of human security. 2 Explain the historical evolution of the concept
of human security.
220
8
International Security
221
8
Non-Military Security
Responsibility to Protect (R2P) is a norm based on states responsibility to protect their own citizens and
the international community’s obligation to protect humans from serious violations such as genocide,
war crimes, and crimes against humanity.
Ad hoc International Criminal Tribunals: are the judicial mechanisms that were established by the
UN Security Council in the framework of Resolution 827 for the former Yugoslavia and Resolution
955 for Rwanda. The International Criminal Tribunal for Rwanda (ICTR) was created in Arusha,
Tanzania to “prosecute persons responsible for genocide and other serious violations of international
humanitarian law committed in the territory of Rwanda and neighboring States, between 1 January
1994 and 31 December 1994” (http://unictr.irmct.org/en/tribunal). The International Criminal
Tribunal for the former Yugoslavia (ICTY) was created to “deal with war crimes that took place during
the conflicts in the Balkans in the 1990s” The ICTR closed its doors in 2015 with 61 convictions and
14 acquittals before the ICTY concluded its mission in 2017 with 83 convictions and 19 acquittals.
222
8
International Security
Both conceptions (the humanitarian conception and the natural rights conception) focus on a specific
dimension of human security. However, the multidimensional aspect of human security is not well
reflected in these interpretations. A relatively broader view, on the other hand, takes into consideration the
multidimensionality of the concept. This broader view encompasses all possible forms of threat to human
security, including political, economic, environmental, and social threats. Moreover, this broader view was
embraced in the 1994 Human Development Report under seven main domains: economic security, food
security, health security, environmental security, personal security, community security, and political security
(UNDP Report, 1994: 24). (See Table 8.1 for the specific examples for these seven domains in the Report).
223
8
Non-Military Security
The Cold War was the rivalry between the United States of America and the Soviet Union as well as
between their respective allies from the end of the Second World War to 1989. This rivalry was based on
the ideological difference between the two superpowers. It never escalated into an actual conflict; it was
rather based on the use of political, economic, bureaucratic, and propaganda tools despite the existence
of proxy wars such as the Korean War (1950-1953), the Vietnam War (1955-1975), and the Soviet-
Afghan War (1979-1989). The Cold War came to an end with the collapse of Communist bloc in 1989
and the dissolution of the USSR in 1991(Dağ, 2005, 93).
Figure 8.2 Soviet tanks at Friedrichstrasse, approximately 150 meters behind the border in East Berlin, 10/28/1961
Source: https://www.archives.gov/research/foreign-policy/cold-war/1961-berlin-crisis/nara-documents.html
Even if the end of Cold War may be considered as the turning point for a new threat perception,
there were developments focused on the individual dimension of security even during the Cold War years
(Bilgin, 2003:203).
224
8
International Security
“The Organization and its Members, in with the academic work of Johan Galtung, the
pursuit of the Purposes stated in Article 1, international society started to debate new kinds
shall act in accordance with the following of violence (besides the physical violence) such as
Principles. 1) The Organization is based on indirect violence or structural violence.
the principle of the sovereign equality of all This expanded conceptualization of violence led
its Members…4) All Members shall refrain to an expansion in the meaning of peace. Galtung
in their international relations from the (1964:2) underlined this expansion through
threat or use of force against the territorial the concepts of “positive peace” and “negative
integrity or political independence of any peace.” While negative peace is related to the
state, or in any other manner inconsistent traditional security approach that is based on the
with the Purposes of the United Nations” absence of war between two states, positive peace
(UN Charter, 1945). refers to the establishment of a socially just system
by taking into consideration all dimensions of
According to Bilgin (2003:203), the bipolar human security. According to Bilgin (2003:205),
system of the Cold War was based on a state- this shift in peace studies led to the emergence
centered security approach. However, the adoption of alternative security conceptions such as Third
of a common security perspective by Mikhail World security approaches.
Gorbachev, the rise of peace studies, and the
In fact, the formation of the Non-Aligned
Third World’s security approaches triggered the
Movement encouraged the emergence of new
transformation in the security understanding- and
approaches that criticized the Cold War structure,
now the focus was not on the state but rather on
which was based on bipolarity.
human beings.
Gorbachev’s common security perspective
heralded the end of the Cold War through efforts The Non-Aligned Movement is an organization
for stopping the arms race and ending the classical created by 29 Asian and African former colonial
security dilemma (Herz, 1950:157). Under countries in Bandung/Indonesia in 1955. All
Gorbachev, the USSR adopted some security these countries strived to follow an independent
policies in a coordinated manner with other states foreign policy from both NATO and the
in an attempt to avoid a nuclear catastrophe. Warsaw Pact and supported the independence
movements. They followed an agenda for
economic development, disarmament, and
Security Dilemma is a situation in which actions economic inequality between countries (Dağ,
taken by a state to increase its own security cause 2005, 330).
reactions from other states, which in turn lead to
a decrease rather than an increase in the original
state’s security (https://www.britannica.com/ Moreover, the Group of Seventy Seven (Group
topic/security-dilemma). of 77), which was established in 1984 in the
framework of the United Nations Conference of
Trade and Development, fought for economic and
Common security (collective security) focuses development security. In other words, non-military
on the interdependence of security on the one dimensions of security became the concern of the
hand and peace studies, on the other hand. It has international community, and the new groupings
initiated a debate on the necessity of a stable peace challenged the Cold War bipolarity in the late
rather than the absence of wars and armed conflicts 1970s.
in the system. Even if the evolution of human security concept
Generally, peace studies were based on an started with these studies in International Relations
understanding of the absence of war and violence during the Cold War, the end of the bipolar system
in the 1950’s. However, with the initiative of the happened to be a turning point for the human
Peace Research Institute in Oslo and especially security approach.
225
8
Non-Military Security
The Post-Cold War Era areas such as gender inequality, human rights,
Post-Cold War developments paved the way for democracy, and economic development. The
the increasing interest of the international society national concerns of the Cold War period left its
in human security. Bilgin (2003:207) underlines place to new dimensions of human security in
all dimensions of human security and lists Post- 1990s (Newman, 2001:242).
Cold War developments as follows:
• growing disparities in economic opportuni- Complex Interdependence is a theory
ties both within and between states; developed by Keohane and Nye (1977) for
• increasing hardships faced by peoples in the explaining economic interdependence between
developing world who found themselves on states. The theory focuses on dependent relations
the margins of a globalizing world economy; between states in all dimension of security and
• diminishing non-renewable resources lead- underlines the importance of cooperation for
international community under the international
ing families and groups to become refugees;
organizations and regimes. Furthermore, it
• rising anti-foreigner feelings and violence assesses the high costs of military security in the
in reaction to migration pressures from the face of institutionalization and cooperation for
developing to the developed world; human security (Işıksal, 2004, 140).
• proliferating intrastate conflicts increasing
public interest in, and pressure for, human-
itarian intervention.” The shift towards human security after the Cold
Ovalı (2006:18) focuses on further political War led to various political efforts by the initiatives
developments for clarifying the shift in the of global commissions, international organizations,
understanding of security. He reflects on the and states. Even if the concept of human
human-based threats, including intrastate security was first mentioned in the 1994 UNDP
conflicts, human rights violations, the state’s loss of Development Report, the Palme Commission
its monopoly on the use of violence, transnational, (1982), the Brandt Commission (Brandt et al.
non-traditional and nonconventional threats as 1980-1983), the Brundtland Commission (1988),
well as technologic innovations. and the Commission on Global Governance
(1995) incorporated similar concepts into their
Newman (2001:241) assesses the increasing
reports (Oberleitner, 2005:185). This led to further
interest of the international society in human
broadening of the traditional security approach.
security following the end of the bipolar system
of the Cold War as well as in such issues as In 1996, Canada integrated the idea of human
globalization and normative changes related to security in its foreign policy formulation. Lloyd
the systemic change. First, upon the end of the Axworhty, Canada’s Minister of Foreign Affairs,
Cold War the state-centric security approach made a speech on human security at the United
came to an end. Consequently, non-traditional Nations General Assembly in an attempt to explain
threats including environmental problems, ethnic the expansion of the security understanding
conflicts, health issues, the weapons of mass through touching on such issues as security against
destruction became prominent in the discussion economic privation, an acceptable quality of life,
of human security. Second, Newman (2001:241) and a guarantee of fundamental human rights
underlines the importance of globalization (which (Axworhty, 1997:184).
altered the structure of the world economy) and Moreover, Canada took the initiative of forming
the complex interdependence, which has made all the Human Security Network in 1998 together
countries dependent on each other economically. with some other countries including Austria, Chile,
Third, normative changes related to the systemic Costa Rica, Greece, Ireland, Jordan, Mali, Norway,
change encompass the internationalization of all Slovenia, Switzerland, and Thailand.
226
8
International Security
227
8
Non-Military Security
• “Its concern is the individual and the community rather than the state;
• Menaces to people’s security include threats and conditions that have not always been classified
as threats to state security;
• The range of actors is expanded beyond the state alone;
• Achieving human security includes not just protecting people but also empowering people to
fend for themselves.”
As summarized in Table 8.2, these four directions reflect the developments in international relations
after the end of the Cold War:
In the first place, from the perspective of human security, the referent object of security is the individual
rather than the state. Second, the understanding of security as external aggression transforms into protecting
human beings from a new generation of threats. This new generation of threats such as climate change,
refugee problems, immigration flows, and ethnic conflicts have relatively direct effects on human beings
than on states. Third, the multiplication of actors in international relations makes it necessary to incorporate
international organizations, nongovernmental organizations, and social movements into any understanding
of security. In other words, the expansion of the security understanding and the emergence new threats have
made it necessary for the students and scholars of IR to take into account the activities of other actors than
the state in order to explain the modern world politics. Finally, security today refers to the security of human
beings which in turn empowers people and societies as indispensable actors toward creating positive peace.
The institutionalization efforts in the framework of the UN continued
after the end of the Cold War. The UN Trust Fund for Human Security
was established in 1999. Later, the Advisory Board on Human Security
was formed by UN Secretary General Kofi Annan in 2003 with a Human 2
Security Branch in the UN Office on Drugs and Crime in Vienna. The
What are the turning points
Human Security Unit was established in 2004 for managing the UN
in the historical evolution of
Trust Fund for Human Security. The first report of the UN on human
human security?
security was published in March 2010. With regard to human security,
the UN has published one report each year since 2010.
228
8
International Security
229
8
Non-Military Security
well documented (Dalby, 2006). Some researchers politics perhaps explains the sudden swell in
have attempted to show that the environmental writing on the environmental security and, in
scarcity is directly related with armed conflicts. particular, on the environmental causes of violent
Accordingly, scarcity causes despair which in turn conflicts (Dalby 1992; Deudney and Matthew
leads to a conflict. 1999; Matthew 2002).
One of the most ardent supporters of the During this period some scholars, represented
environmental security approach has been Thomas by Barry Buzan, attempted to broaden the scope
Homer-Dixon. Homer-Dixon (1991, 1994) and and domain of the concept of security in order to
others have shown a strong correlation between include non-military concerns in the definition
environmental conditions and inter-state warfare. and scope of national and international security.
According to them, environmental pressures may In 1994, the well-known travel author Robert
lead to four major problems: the beginning of these Kaplan used the Toronto Group’s thesis in an
effects is a decline in agricultural production. In essay published in The Atlantic Monthly where he
this sense, food security is assumed to be a serious proclaimed that the environment has been “the
problem for nation states. The economic collapse, national security issue of the early twenty-first
the displacement of the population, and the century” (Kaplan, 1994: 190).
deterioration of social relations are other probable Environmental insecurity is dependent on
effects of environmental problems. the resilience of individuals and societies to
The idea that environmental issues may lead to environmental shocks. This includes possessing
violent conflicts has received substantial attention in the economic robustness necessary to understand
the environmental security literature. Today, several economic downturns with regard to the agricultural
competing approaches to environmental security production, the transportation of goods, or the
exist. The most influential of these approaches production loss caused by the environmental
focuses on the role of environmental scarcity as damage. In addition, the vulnerability of states
an independent variable in violent conflicts. The and local civil governments to crises brought about
so-called Toronto Group under the leadership of by environmental change often has immediate
Thomas Homer-Dixon developed this approach. consequences for local groups and individuals
Since 1989, this group has conducted a series of because of the loss of services or life as well as
case studies (including in Mexico, Pakistan, Gaza, the infrastructures related to public health. This
Rwanda, and South Africa), and advanced the ‘political ecology’ re-visits the premises of security
thesis that when the scarcity of renewable resources and development economy in such a way that
(such as cropland and river waters) interacts with leaves military geopolitics relatively irrelevant in
harsh social effects, conflicts arise. A key concept the 21st century (Burgess, 2008.)
in Homer-Dixon’s work on scarcity-induced However, it is clear from the historical
environmental conflict is the “resource capture,” development that environmental crises have
the idea that “environmental scarcity encourages sometimes been a significant factor in violence
powerful groups to capture valuable environmental and warfare. If this was true in the past, it will be
resources and prompts marginal groups to migrate even truer in the future, because the increasing
to ecologically sensitive areas. These two processes population and economic pressures lead to
in turn reinforce environmental scarcity and raise increasing strains on the ecological system.
potential for social instability (Homer -Dixon,
Environmental changes might lead to a conflict
“The Project on Environment, Population and
and possibly to an international war as a result of
Security”, 46).
“1) Food shortages due to decreases in net global
As a result, security discourse has undergone a agricultural production; 2) Decreased availability
serious transformation since the early 1990s. These and quality of fresh water in key regions due to
initiatives have drawn considerable political and shifted precipitation patterns, causing more
societal attention to the issue of environmental frequent floods and droughts; 3) Disrupted access
change in the early 1990s. This confluence of to energy supplies due to extensive sea ice and
moments in global security and environmental storminess” (Schwartz and Randall 2003: 2).
230
8
International Security
In fact, if we review the incidences of war and conflict, we can easily observe the effects of environmental
factors, which include:
• “Competition for natural resources;
• The overuse and depletion of shared resources by one or more groups in a bio-region, affecting
others who also depend on the resources (often exacerbated by class, ethnic, national, or other
divisions);
• Environmental degradation (e.g. pollution, soil erosion, deforestation, loss of biodiversity) that
impoverishes the living space and undermines a society’s physical, economic, social, and spiritual
quality of life. Although these environmental factors have been listed here separately for reasons
of discussion, in fact they often overlap or are different dimensions of a single ecological problem”
(Mische, 2004: 39).
Figure 8.3 Remains of the Chernobyl Nuclear Power Plant’s 4th reactor is enclosed within the New Safe
Confinement (NSC) which is built on top of the sarcophagus.
Source: https://en.wikipedia.org/wiki/File:NSC-Oct-2017.jpg
231
8
Non-Military Security
The World Commission on Environment and Development, chaired by Norwegian Prime Minister
Gro Harlem Brundtland, published the report entitled Our Common Future in 1987. The report
acknowledged the relationship between the environment and development, with a special emphasis on
sustainable development. Because of the echoes created by the Brundtland Report, the United Nations has
decided to organize a new conference in Rio on the environment and development in 1992. The argument
that environmental change was a security issue pointed out for the first time in 1992 UN Conference on
Environment and Development, which became popularly known as the Rio Earth Summit. The Earth
Summit as the largest conference brought together more than a hundred state leaders and established the
Commission on Sustainable Development, which provided the political basis for the concept of sustainable
development. During the 1992 Rio Earth Summit conference, world leaders highlighted a number of
environmental problems including biodiversity, the growing ozone hole, pollution, desertification, and
climate change.
At this conference, The US and more than 150 other nations also signed the Framework Convention
on Climate Change (UNFCCC) and pledged to cut all Greenhouse gas emissions to 1990 levels by 2000.
From the 1990s onwards, environmental debate increasingly focused on the issue of ‘climate change,’
which is also known as global warming.
Greenhouse gases: Carbon dioxide and other gases that, when concentrated in the atmosphere, act like
the glass in a greenhouse, holding energy in and leading to global warming.
In 1997, nations adopted the Kyoto Protocol, which required the signatory developed countries to
reduce their production of greenhouse gases by the year 2012 by 5.2 percent.
Kyoto Protocol (1997): is the main international treaty on global warming, which entered into effect
in 2005 and mandates cuts in carbon emissions in 2008–2012. Almost all the world’s major countries,
except the United States, are participants.
232
8
International Security
Ten years after the Earth Summit, during the 2002 World Summit on Sustainable Development
convened in Johannesburg/South Africa, the commitment to sustainable development was reaffirmed and
the importance of globalization was emphasized.
In 2012, at the 20th anniversary of the Rio Earth Summit, the Rio+20 UN Conference on
Sustainable Development was held in Rio/Brazil. Members agreed to establish a high-level political
forum for sustainable development. They also decided to launch a process to develop a set of Sustainable
Development Goals (SDGs), which will build upon the Millennium Development Goals.
Table 8.3 Chronology (Baylis J., Smith S. and Owens P. eds., 2011:350)
Chronology
1946 International Convention for the Regulation of Whaling
1956 UK Clean Air Act to combat “smog” in British cities
1958 International Convention for the Prevention of Pollution of the Sea by Oil
1959 Antarctic Treaty
1962 Rachel Carson publishes Silent Spring
1967 Torrey Canyon oil tanker disaster
1969 Greenpeace founded
1971 At the Founex Meeting in Switzerland, Southern experts formulate a link between environment and
development
1972 United Nations Conference on the Human Environment (UNCHE) in Stockholm
Establishment of the United Nations Environment Program (UNEP)
1973 MARPOL Convention on oil pollution from ships
1979 Long-Range Transboundary Air Pollution Convention (LRTAP)
1980 Convention on the Conservation of Antarctic Marine Living Resources
1982 UN Law of the Sea Convention (enters into force in 1994)
1984 Bhopal chemical plant disaster
1985 Vienna Convention for the Protection of Ozone Layer
The Antarctic “ozone hole” confirmed
1986 Chernobyl nuclear disaster
1987 Brundtland Commission Report
Montreal Protocol on Substances that Deplete the Ozone Layer
1988 Establishment of the Intergovernmental Panel on Climate Change (IPCC)
1989 Basel Convention on the Transboundary Movement of Hazardous Wastes
1991 Madrid Protocol (to the Antarctic Treaty) on Environmental Protection 1992 United Nations
Conference on Environment and Development (UNCED) held at Rio de Janerio. Publication of
the Rio Declaration and Agenda 21.United Nations Conventions on Climate Change (UNFCCC)
and Biological Diversity (CBD) both signed. Establishment of the Commission on Sustainable
Development (CSD).
1995 World Trade Organization (WTO) founded
1997 Kyoto Protocol to the UNFCCC
1998 Rotterdam Convention on Hazardous Chemicals to Pesticides
233
8
Non-Military Security
The Atmosphere
Two problems of the atmosphere, namely the global warming and the depletion of the ozone layer, had
long been debated among scientists. The ozone layer has two basic functions for filtering the ultraviolet
rays of the sun and dissipating the atmosphere. The depletion of the ozone layer allows more harmful rays
to reach Earth, resulting in more skin cancer, weakened immune systems, reduced plant yields, damage to
ocean ecosystems, and climate change.
Ozone layer: is the part of the atmosphere that screens out harmful ultraviolet rays from the sun.
Certain chemicals used in industrial economies break the ozone layer down.
In the early 1970s, researchers suggested that nitrogen oxides from fertilizers and chlorofluorocarbons
(CFCs) were breaking apart in the atmosphere and releasing chlorine atoms that were causing the ozone
depletion. International agreements such as Geneva, Vienna, and Montreal Conventions have aimed at
reducing and eventually eliminating CFC production. Particularly in 1987, the Montreal Protocol put
limits on CFC emissions in an effort to phase them out.
The global warming presents states with a triple dilemma. First, there is the dilemma of short-term (and
predictable) costs to gain long-term (and less predictable) benefits. Second, specific constituencies such as
oil companies and industrial workers pay the costs. Third, there is the collective goods dilemma among
states: benefits are shared globally but costs must be extracted from each state individually. The first is the
intrinsic problem that individual states will always tend to put their national interests before the common
good of the international community, as suggested by the idea of the ‘tragedy of the commons’.
234
8
International Security
235
8
Non-Military Security
termed the natural rate of extinction. Unfortunately, The population growth contributes to
the loss of biodiversity is many times higher due to environmental destruction. The tendency of world
land conversion, climate change, pollution, and the population to grow rapidly and overly creates serious
harvesting of natural resources. concerns about the exhaustion of natural resources
Two types of habitat (tropical rain forests and (both renewable and non-renewable resources)
oceans) are especially important to biodiversity and and requires the states to cooperate toward finding
the atmosphere. As many as half the world’s total solutions to environmental problems.
species live in rain forests, which replenish oxygen
and reduce carbon dioxide in the atmosphere. Water Disputes
According to researches, 3 to 10 million animals
The world water use is 35 times higher than
and plant species live on the earth, and 50% to 80%
that of a few centuries ago. It has grown twice as
of them are in tropical forests. Rain forests thus
fast as the world population in the 20th century.
benefit all the states. In less developed countries the
By the mid-1990s, eighty countries, constituting
tropical rain forests were plundered rapidly with
40 percent of the world’s population, suffered
the extreme population growth, poverty, and high
from serious water shortages. According to a study
external debt pressure. For instance, more than
published in 1995 by the World Bank, the “wars of
80% of forests in Ivory Coast and Madagascar have
the next century will be over water” (The Economist
been recently destroyed.
2000: 52). According to The Economist, the Bank’s
experts and most other water scholars believe that
Population Growth the Middle East is the likeliest crucible for future
Although we have noted that a number of factors water wars.
place stress on the global environment, the key- Yet water supplies are relatively unchanging
underlying factor is the growing world population. and are becoming depleted in many places. One-
Some demographers project that within three fifth of the world’s population lacks safe drinking
decades or so world population will have passed water, and 80 countries suffer water shortages.
nine billion. Thomas Malthus (1766–1834), a Water supplies (rivers and other bodies of water)
British political economist, published “An Essay on often cross international boundaries; thus, access
the Principle of Population” in 1798. In the almost to water is increasingly a source of international
two centuries since Malthus made his predictions, conflict (and therefore a legitimate subfield of
world population has grown dramatically from the security studies).
hundreds of millions to more than seven billion Water problems are especially important in
people today. the Middle East. Water scarcity is potentially a
“The current world population of 7.6 billion is very stressful issue in the Middle East, the most
expected to reach 8.6 billion in 2030, 9.8 billion in water-contested region in the world. Besides, the
2050 and 11.2 billion in 2100, according to a new Middle East is already a conflict-ridden region.
United Nations report. With roughly 83 million Cooperation between the neighboring countries is
people being added to the world’s population absolutely needed to deal with the water shortage
every year, the upward trend in population size is problem. Water security is a “high politics” issue
expected to continue, even assuming that fertility in the Middle East and North Africa (the MENA
levels will continue to decline” (www.un.org). region).
236
8
International Security
Figure 8.5 Somalian children refugees fetch water at the new Ifo-extension in Dadaab on August 14, 2011
Gray and Sadoff define water security in non-conflict and humanitarian terms as “the availability of
an acceptable quantity and quality of water for health, livelihoods, ecosystems and production, coupled
with an acceptable level of water-related risks to people, environments and economies”(Grey and Sadoff
2007, p. 545). Homer-Dixon concludes that “environmental scarcity rarely, if ever, causes inter-state war.
Instead, it contributes to chronic and diffuse strife within countries.” However, he also argues that “the
renewable resource most likely to stimulate interstate war is river water” (1996a: 48).
The Ministerial Declaration from the World Water Council (2000)
stated that water security refers to a situation where “fresh-water, coastal and
3
related ecosystems are protected and improved; sustainable development
and political stability are promoted; every person has access to enough safe
How and why has the water at an affordable cost to lead a healthy and productive life; and the
environment developed vulnerable are protected from the risks of water-related hazards.” Perhaps
into a global issue? one of the most well-known definitions of water security comes from the
Global Water Partnership (2000). Accordingly, “water security at any
level, from the household to the global, means that every person has access
to enough safe water at affordable cost to lead a clean, healthy and productive life, while ensuring that the
natural environment is protected and enhanced.”
ECONOMIC SECURITY
237
8
Non-Military Security
During the 1990s, the mainstream security Economic security is also often defined as “the
agenda merged with the mainstream development degree to which individuals are protected against
agenda under the mantle of global governance. hardship-causing economic losses” (Hacker,
Global political changes in the post-Cold War Huber, Nichols, Rehm, Schlesinger, Valletta,
system, the shift in conflicts mainly to poorer Craig, 2012). The UN Development Report 2003
regions of the world (particularly to Africa), the states that “almost across the board, the story is one
scale of humanitarian emergencies, the perceived of stagnation. Economies have not grown, half of
threat of global terrorism, and the deepening Africans live in extreme poverty and one-third in
global economic integration with its inequalities hunger, and about one-sixth of children die before
and political protests created some space for the the age of five – the same as a decade ago” (UNDP,
exploration of the relationship between poverty 2003:37).
and security. Another problem with the notion of economic
Poverty has often been portrayed as a case for security relates to the fact that even though
economic security. Poverty and economic insecurity economic deprivation might represent a severe
can be seen as a ‘non-traditional’ security concern. threat to life, it does not necessarily cast itself
In some societies, poverty and economic disparity as a security issue. Williams (2003) argues that
are sensitive and highly politicized issues, and economic issues are rarely successfully securitized
any move to securitize those issues could provoke because of two reasons: 1) the abstractness of
instability, social unrest, bloody ethno-religious markets, and 2) the individualized and intrinsically
conflict, and national disintegration. risky nature of capitalism.
Economic security is a basis of the national Despite the problems in economic security
security of the state. Ensuring the national as a concept, it is undeniable that economic
security is the primary responsibility of the State. insecurity can trigger survival issues in the societal
This responsibility is being carried out in close and political sectors. Basic economic failures
collaboration with the economic agents of the state. such as famine, negative growth, unemployment
The national security reflects the ability of relevant and market failure may generate ethnic rivalries
political, legal and economic institutions of the state that exploit political antagonism as seen in the
to protect the interests of its key entities in national collapse of Yugoslavia, the bloody ethnic conflicts
economic traditions and values. Buzan et al. (1998: in Rwanda and Burundi, and the social unrest in
95) for example argue that the idea of economic Indonesia.
security is located at the center of “the unresolved and
highly political debates about international political
economy concerning the nature of relationship
Poverty as a Multidimensional
between the political structure of anarchy and Concept
the economic structure of the market.” The main Global political changes in the post-Cold War
problem lies in how we should treat states, societies, era, the shift in conflicts mainly to poorer regions
and markets in our analysis. of the world (particularly Africa), the scale of
Economic security refers to the entitlement of humanitarian emergencies, the perceived threat of
any individual to have a minimum regular income global terrorism, and deepening global economic
that comes from a lucrative activity or, as a last integration with its attendant inequalities and
resort, from a social security trust fund. Taking political protests created space for the exploration
such a view can only mean that only a quarter of the relationship between poverty and security
of the whole world’s population benefits from within mainstream analysis. Poverty has often been
economic security. Even if the problems related to portrayed as a case for economic security.
economic insecurity are greater in the developing While globalization has created new
countries, the developed states also show concern opportunities, it has also generated “political and
for these problems. In this respect, unemployment economic instabilities and conflicts within states.”
is considered as one of the factors that leads to Whereas over 800,000 people a year lose their lives
political tensions and interethnic violence. to violence, about 2.8 billion suffer from poverty,
238
8
International Security
ill health, illiteracy, and other maladies. Human security recognizes the linkage between conflict and
deprivation –the latter provides a causal context to many conflicts. Conversely, conflict increases poverty
and crime and devastates economies. A broad “all-encompassing” and “integrated” approach is therefore
required to account for these complex interconnections (Human Security Now, Commission on Human
Security, 2003).
Nowadays, mainstream academics, diplomats and politicians speak openly of the need to integrate
approaches to poverty and security. Leaders of the G8, the International Monetary Fund (IMF), and the
World Bank, for example, have spoken about a possible link between poverty and conflict. Globally, the
political and economic challenge is defined in limited terms of ‘poverty reduction’ via quantitative targets
set out in the Millennium Development Goals (MDGs).
Putting the issue of poverty in the context of economic security is a stinker. Recent studies of intrastate
conflicts reveal that many protracted bloody ethno-religious conflicts in the 1990s can be associated with
poverty, economic disparity, and unequal distribution of wealth due to majority–minority dichotomy,
racial discrimination, and unfair competition. The desire to reinvigorate the UN Development Programme
led to the unveiling in 2000 of the Millennium Development Goals (see Table 8.4).
239
8
Non-Military Security
The eight Millennium Development Goals growth is exponential (or geometric) while the
(that range from halving extreme poverty to halting growth in the supply of food and other essentials
the spread of HIV/AIDS and providing universal is merely arithmetical. Population growth would
primary education, all by the target date of 2015) therefore always result in famine, disease, and war.
form a blueprint agreed by all countries and all the While some have argued that Malthus’ predictions
world’s leading development institutions. They were fundamentally flawed, as they took no
have galvanized unprecedented efforts to meet the account of improvements in agricultural and
needs of the world’s poorest. However, the UN’s other technologies, others have suggested that his
2009 progress report on the achievement of the predictions have merely been postponed. Because
MDGs concluded that overall progress had been the application of technology to agriculture,
too slow for most of the targets to be met by 2015, particularly in capital-rich countries, has extended
particularly in view of global economic and food the food-production limits of which Malthus wrote
crises. It is clear that both food security and health so pessimistically. However, the world today does
security might be directly undermined by the still suffer from widespread malnutrition and even
generation of economic insecurity. starvation, especially the capital-poor countries.
As the era of Millennium Development Goals Global food crisis can be considered as an
came to a conclusion, we witnessed the introduction essential part of human security. Bryan McDonald
of the 2030 Agenda for Sustainable Development. highlights that “the guarantee of food security
World leaders adopted the 2030 Agenda in can be recognized as a key component of human
September 2015 at a historic UN Summit. security.” He also thought that governments and
international agencies can play a significant role in
ensuring food security.
The concept of food security is a highly
4 complex issue and has been defined in at least 200
ways. Food security emerged as a critical issue in
Discuss the relationship between the mid-1970s in the discussions of international
poverty and security. food problems. According to the 1974 World Food
Summit, food security refers to the “availability
at all times of adequate world food supplies of
FOOD SECURITY basic foodstuffs to sustain a steady expansion of
food consumption and to offset fluctuations in
production and prices”.
Describing the Concept of Food
In the early 1980s, following the seminal
Security work of Amartya Sen on entitlement analysis,
In 2017, an estimated of nearly 821 million the definition of food security used by FAO was
people faced persistent hunger and chronic food expanded to include both physical and economic
deprivation (FAO, 2018). Meanwhile, due to access. According to the Nobel Prize laureate and
conflict-induced emergencies as well as rising economist Amartya Sen, food insecurity is not a
natural disasters, demand for food assistance has problem of food production or availability but
continued to grow. of people’s limited ability to mobilize resources.
Two hundred years ago, the British scholar Sen has made a major contribution to shifting
Thomas Malthus warned that population tends the perception about development away from
to increase faster than food supply and predicted economic models and towards ideas such as
that population growth would limit itself through capacity, freedom, and choice. His works include
famine and disease. Malthus is best known for the Poverty and Famine (1981), Development as
views set out in his pamphlet, later expanded into Freedom (1999) and The Idea of Justice (2009).
a book in many editions, the Essay on Population During the 1990s, the food security literature
(1798). Its key argument was that unchecked has broadened to address market-oriented economic
population growth will always exceed the growth growth, agricultural development, poverty
of the means of subsistence, because population reduction, demographic trends, rising incomes,
240
8
International Security
changing food consumption patterns, gender issues, Utilization refers to food quality and nutritional
and the environment. The most commonly used content. This relates to health, HIV/AIDS, access
definition of food security is the one developed at to water and clean energy sources. FAO considers
the World Food Summit of 1996. The principal the principle of stability as the fourth dimension of
achievement of this summit was a pledge by the 186 food security. This principle is mostly related to the
participating governments to reduce the number of consequences of sudden shocks. Food security is “a
undernourished people worldwide by about one- situation” that does not have to occur a moment,
half to 400 million by the year 2015. a day or a season only but on a permanent basis
According to this definition, at the individual, with sustainability. For food security objectives
household, national, regional and global levels to be realized, all four dimensions must be
food security is achieved “when all people at all fulfilled simultaneously. Moreover, each of these
times have both physical and economic access to components needs to be considered at the level of
sufficient, safe and nutritious food that meets their individuals, households, and global.
dietary needs and food preferences for an active and
healthy life.” This definition has been again refined
in The State of Food Insecurity 2001 by FAO as Food Security
Dimensions
follows: “Food security exits when all people, at all Food Availability
times, have physical, social and economic access to
sufficient, safe and nutritious food that meets their
dietary needs and food preferences for an active
and healthy life.” Food Access
Stability
241
8
Non-Military Security
Food insecurity and economic insecurity as well global food insecurity, driving millions of people
as natural resource scarcities (real or perceived) may into poverty, worsening the state of the world’s
be sources of conflict. When politically dominant most food-insecure regions and threatening long-
groups seize land and food resources, deny access term human security. In conclusion, recent and
to food to other culturally or economically ongoing developments in the Middle East have
marginalized groups, and cause hunger and once again brought the question of food security
scarcities, violence often flares. In Ethiopia, to the forefront of the global security agenda. It
Rwanda, and Sudan the food crises resulting from is the right time for security scholars to take up
drought and mismanagement of agriculture led to the challenge of dealing with the idea of food
a rebellion and the governmental collapse, followed security. Such an effort will inevitably need to be
by even greater food shortfalls in ensuing years of multidisciplinary in nature and extend beyond the
conflict. Reductions in agriculture also threaten a current, underdeveloped inferences made to links
state’s policy of food security even where a country between food security and conflict, and generate
is not as vulnerable to an international embargo a fuller, more comprehensive picture of how food
of food as, for example, Iraq was during the 1990 dynamics intersect with security at the local,
Gulf crisis. regional, and global levels.
The high food prices have pushed 44 million
people into severe poverty and hunger between
June 2010 and February 2011 alone. Surely,
there are a number of structural factors driving 5
food insecurity. The recent rise in food prices Explain the key components of food security.
is one the main causes exacerbating the state of
242
8
International Security
There are three conceptions of human security, natural rights-rule of law conception, humanitarian
conception and broader view conception. Natural rights conception depends on the protection
of humans basic needs like rights to life, liberty, and the security of person as in Article 3 of
Universal Declaration of Human Rights. Humanitarian conception is based on state’s and
international community’s responsibility to protect human beings from human rights violations
such as genocide, crimes against humanity, and crimes against peace. Finally, the broader view
Summary
encompasses all dimensions of human security including economic security, food security, health
security, environmental security, personal security, community security, and political security.
The evolution of human security can be analyzed in two separate periods, during the Cold War and in
the post-Cold War era. During the Cold War, collective security concept of Gorbachev, peace studies
and third world security approaches revealed the different dimensions of human security. Collective
security concept of Gorbachev depends on the cooperation of states for security and ending of
security dilemma and arms race of the Cold War on one hand. On the other hand, the absence of
war began to be defined only as negative peace, and the necessities of positive and real peace were
determined as the establishment of social justice by taking in consideration of all dimensions of
human security. The final one, the third world security approaches put forward economic dimension
of human security for developing countries. The post-Cold War era witnessed major developments
in international relations such as the multiplication of actors, the end of bipolarity, the change of
the referent object of security from state to individual, and technological innovations. Different
dimensions of human security started to be handled separately. Consequently, human security is
codified and institutionalized in the framework of the United Nations.
Environmental Security (ES) has been an interdisciplinary academic field since the mid-1970s.
Ideas on environmental security surfaced in the security discourse in the late 1980s. The Chernobyl
nuclear reactor accident in 1986 and the 1984 Bhopal chemical plant disaster had drawn the
attention to environmental threats. In the 1987 report, Our Common Future, the authors argued
that environmental degradation and shortage of resources would lead to conflict as people fought
over resources. Hence, in the Brundtland Commission report, the need for sustainable development
is partly justified by the fear of conflict. Now, the environment is a transnational issue, and
environmental security is an important dimension of peace and national security. Environmental
problems, such as environmental change, the depletion of the ozone layer, climate change, loss of
biodiversity, transboundary pollution, and water disputes may lead to disagreements among states. In
fact, environmental problems can have a serious and long lasting negative influence on peoples’ living
conditions and this may cause new social conflicts.
243
8
Non-Military Security
Economic security refers to the entitlement of any individual to have a minimum regular income
that comes from a lucrative activity or, as a last resort, from a social security trust fund. Basic
economic security should be a human right, and this should be defined in terms of advancing
the freedom of the individual. Moreover, scholars of public policy have long regarded economic
security in terms of securing the individual (through such means as social security provision)
against sudden income losses and consumption losses. Poverty and unemployment are two of the
Summary
most distinct and urgent issues of economic insecurities. Earlier in the literature, poverty was often
associated with the lack of material supplies that support a person’s life. This includes sufficient
food, decent housing, land, and other assets as well as human capital (education and skills). Later
definitions in the literature have focused on the psychological and social aspects of poverty. Poverty
began to be associated with unheard voices, powerlessness, marginalization, injustice, negligence,
manipulation, and exploitation.
Since the end of the Cold War, the landscape of national and international security threats has
changed. These new security challenges are most often felt in people’s daily lives. Food security
refers to the idea that all people at all times have access to sufficient, safe and nutritious food
that is necessary to lead active and healthy lives. The non-traditional elements of security pose a
greater threat to the state than the traditional ones. One of those elements, the absence of food
security (described as food insecurity that may trouble the peace situation) is a reality for billions
of people, making their lives less secure. Despite the great economic and technological advances,
many people around the world are starving. Ensuring food security has been a central feature
of global-governance efforts to promote peace and prosperity. Many current projections strongly
suggest that global population growth, climate change, and food demand will remain a pressing
concern for individuals, communities, and states in the near future. Take the recent developments
in the wake of the Arab Spring as an example. Unstable food security and the recent international
food price spikes were certainly one of the many grievances in the region.
244
8
International Security
1 When has the human security concept been 6 Which of the following is an environmental
officially used for the first time by the UNDP? problem that is related to the atmosphere?
a. 1990 a. Loss of Biodiversity
b. 1994 b. Overpopulation
c. 2000 c. Climate Change
d. 2001 d. Water Shortages
Test Yourself
e. 2011 e. Acid Rain
2 The conceptions of human security do not 7 Thomas Malthus wrote about the---
cover---
Which of the following options correctly completes
Which of the following options correctly completes the sentence above?
the sentence above?
a. population growth
a. natural rights b. causes of war
b. the security dilemma c. climate change
c. the rule of law d. air pollution
d. a humanitarian understanding e. Cold War
e. a broader approach
8 Which of the following is not one of the
3 Which of the following is not one of the main components of food security?
seven domains of human security?
a. Availability
a. Development b. Accessibility
b. Health c. Utilization
c. International organizations d. Stability
d. Economic issues e. Health
e. Political issues
9 The international initiatives concerned with
4 One can best trace the evolution of the environmental issues include all of the following
human security concept through the historical except the---
periods of ---
Which of the following options correctly completes
Which of the following options correctly completes the sentence above?
the sentence above?
a. 1992 UN Conference on Environment and
a. The Second World War/The Post-Cold War Development
b. The Second World War/ During the Cold War b. 1997 Kyoto Protocol
c. The First World War/The Second World War c. 1986 Chernobyl Disaster
d. During the Cold-War/The Post-Cold War d. 2012 Rio+20
e. The Post-Cold War/ the 21st Century e. 1988 Intergovernmental Panel on Climate
Change
5 Which of the following is not one of the four
issues that human security complements the state 10 Which of the following is not one of the
security approach through its analysis? tasks of FAO?
a. The state sovereignty a. Defeating hunger
b. The multiplication of actors in international b. Improving the standards of living
relations c. Regulating the agricultural productivity
c. The change in the referent object of security d. Creating a common external tariff
d. The occurrence of new threats e. Coordinating the programs for developing
e. The empowerment of human beings agriculture
245
8
Non-Military Security
If your answer is not correct, review the If your answer is not correct, review the
1. b 6. c
section on “The Concept of Human Security.” section on “Environmental Security.”
If your answer is not correct, review the If your answer is not correct, review the
Answer Key for “Test Yourself”
2. b 7. a
section on “The Concept of Human Security.” section on “Environmental Security.”
If your answer is not correct, review the If your answer is not correct, review the
3. c 8. e
section on “The Concept of Human Security.” section on “Food Security”
4. d If your answer is not correct, review the 9. c If your answer is not correct, review the
section on “The Historical Evolution of
section on “Environmental Security.”
Human Security”
5. a If your answer is not correct, review the 10. d If your answer is not correct, review the
section on “The Historical Evolution of
section on “Food Security.”
Human Security.”
What are the turning points in the historical evolution of human security?
The end of the Cold War can be accepted as the main turning point in the
evolution of human security. It led to major developments in international
relations. Different authors assess these developments from various differing
aspects. Bilgin underlines the growing economic inequalities, globalization,
and refugee problems because of diminishing resources, the rising nationalist
your turn 2 feelings and immigration flows, the multiplication of intrastate conflicts and of
the debates on humanitarian intervention. Ovalı’s analysis heralds a shift in the
understanding of security and underlines the changing character of threats as well
as the effect of the technological advance on security. Furthermore, normative
changes in internationals relations pave the way for the internationalization of
national concerns such as democracy, development, and human rights.
246
8
International Security
How and why has the environment developed into a global issue?
The security discourse has undergone a serious of transformation since the early
Poverty and insecurity are closely related. However, poverty is both a cause
and a consequence of insecurity. Poverty is a security issue in that the
lives of poor people are under treat and the eradication of all those risks is
necessary through anti-poverty policies. Violent conflicts caused the death
of many people, displacement of people, and the destruction of property.
Taken together, these problems lead to the destruction of years’ worth of
development efforts and investments- a process that causes insecurity at the
your turn 4 national and international levels. On the other hand, when aspirations are
not met, people may resort to armed struggles which in turn make the lives
of individuals insecure. Those who dismiss the fact that poverty is a major
cause of conflict and insecurity argue that poverty may lead to a conflict
when other factors are also present.
247
8
Non-Military Security
References
Axworthy L. (1997). “Canada and Human Security: Brown L. (1977), “Redefining National Security,”
The Need for Leadership,” International Journal, Worldwatch paper 14. Washington: Worldwatch
Vol.52, No.2: 183-196. Institute.
Axworthy L., Vollebæk K., Kuhnle S., Peou S. (2014). Burgess J.P., (2008), “Non-military security
“Introduction: Human Security at 20 – Lysøen challenges.” Craig A. Snyder (Ed.) Contemporary
Revisited”, Asian Journal of Peacebuilding, Vol.2, Security and Strategy. Basingstoke: Palgrave
No.2: 143-149. Macmillan, 2nd ed.
Barnett, J. (2000). “Destabilizing the Environment– Buzan B., Waever O. and De Wilde J. (1998).
Conflict Thesis,” Review of International Studies, Security: A New Framework for Analysis. Boulder:
26 (2): 271-288. Lynne Rienner.
Baylis J., S. Steve and Owens P. (2011). The Commission for Human Security (2003), “Human
Globalization of World Politics: An Introduction Security Now.” Available at: http://www.un.org/
to International Relations. New York: Oxford humansecurity/sites/www.un.org.humansecurity/
University Press. f i l e s / c h s _ f i n a l _ re p o r t _ - _ e n g l i s h . p d f U N
Millennium Report, 2000.
Bilgin P. (2003). “Individual and Societal Dimensions
of Security,” International Studies Review, Vol.5, Dağ A.E. (2005), Uluslararası İlişkiler ve Diplomasi
No. 2 (June): 203-222. Sözlüğü. İstanbul: Anka Yayınları.
Brauch, H.G., Liotta, P.H., Marquina, A., Rogers, Dalby, S. (1992). “Security, modernity, ecology: the
P., Selim, M.E.-S. (Eds.) (2003). Security and dilemmas of post-cold war security discourse,”
Environment in the Mediterranean Conceptualizing Alternatives, Vol. 17: 95-134.
Security and Environmental Conflicts. Springer-
Verlag Berlin Heidelberg.
248
8
International Security
Dalby, S., (2002). Environmental Security. Işıksal H. (2004). “To What Extend Complex
Minneapolis: University of Minnesota Press. Interdependence Theorists Challenge to Structural
Realist School of International Relations?”
Dalby, S. (2006). Security and Environment Linkages
Alternatives: Turkish Journal of International
Revisited. Singapore: Institute for Defence
Relations, Vol:3, Number:2&3:131-156.
and Strategic Studies, Nanyang Technological
University. Kaplan R.D. (1994). “The Coming Anarchy,” Atlantic
Monthly, Vol. 273 (2): 44-76.
Deudney, D.H. & Matthew R.A. (Eds.) (1999).
Contested grounds: Security and conflict in the new Matthew, R. A. (2002). “In defense of environment
environmental politics. Albany: State University of and security research,” Environmental Change and
New York Press. Security Project Report 8 (Summer): 109–124.
Falk R.A. (1971). This Endangered Planet; Prospects Mische, Patricia M. (2004). “Ecological Security:
and Proposals for Human Survival. New York, New Challenges for Human Learning,” in Anita
Random House. L. Wenden (Ed.), Education for a Culture of Social
and Ecological Peace. Albany, N.Y.: State University
Galtung J. 1969), “Violence, Peace and Peace
of New York Press, pp.31-52.
Research,” Journal of Peace Research, Vol.6, No.3:
167-191. Mayor F. and Droit R. P. (1999). “Letter to Future
Generations, Cultures of Peace.” Paris, UNESCO
Gardiner, S. M. (2006). “A Perfect Moral Storm:
Publishing.
Climate Change, Intergenerational Ethics and the
Problem of Moral Corruption,” Environmental Meadows, D. H., Meadows, D. L., Randers, J. and
Values, Vol. 15: 397-413. Behrens III, W. W. (1974). The Limits to Growth.
London: Pan.
Gleick Peter H. (1993). “Water and Conflict,”
International Security, Vol 18, No 1: 79-112. Myers, N. (1989). “Environment and Security,”
Foreign Policy, Vol. 74: 23-41.
Grey, D., Sadoff, C.W. (2007). “Sink or swim? Water
security for growth and development,” Water Newman E. (2001). “Human Security and
Policy, Vol.9: 545–571. Constructivism,” International Studies Perspectives,
Vol. 2: 239-251.
Hacker, J. S. and Huber, G. and Nichols, A. and
Rehm, P. and Schlesinger, M. and Valletta, R. G. Oberleitner G. (2005). “Human Security: A Challenge
and Craig, S. (2012). “The Economic Security to International Law?” Global Governance, Vol.11,
Index: A New Measure for Research and Policy No.2:185-203.
Analysis”, IZA Discussion Paper No. 6946.
Ovalı A. Ş. (2006). “Ütopya ile Pratik Arasında:
Available at https://ssrn.com/abstract=2167568
Uluslararası İlişkilerde İnsan Güvenliği
Hampson F. O. (2008). “Human Security,” in Williams Kavramsallaştırması,” Uluslararası İlişkiler Dergisi,
P. D. (Ed.), Security Studies: An Introduction. New Cilt 3, Sayı 10: 3-50.
York, NY: Routledge.
Scheffran J., (2012), Climate Change, Human
Herz J.E. (1950). “Idealist Internationalism and the Security and Violent Conflict: Challenges for
Security Dilemma,” World Politics, Vol: 2, Issue 2: Societal Stability, Hexagon Series on Human and
157-180. Environmental Security and Peace. Heidelberg,
New York: Springer Verlag.
Homer-Dixon T.F. (1991). “On the Threshold:
Environmental Changes as a Cause of Acute Sen, A.K. (1981). “Ingredients of Famine Analysis:
Conflic,” International Security, Vol 16: 76-116. Availability and Entitlements,” The Quarterly
Journal of Economics, Vol. 96: 433-464.
Homer-Dixon T.F., J.H. Boutwell and G. Rathjens,
(1993). “Environmental Change and Violent The Economist (2000). “Preventing Conflicts in the
Conflict,” Scientific American, Vol 268, No 2: 16- Next Century,” The World in 2000: 51-52.
23.
Tzifakis N. (2011). “Problematizing Human Security:
Homer-Dixon, T. F. (1994). “Environmental A General/Contextual Conceptual Approach,”
Scarcities and Violent Conflicts: Evidence from Southeast European and Black Sea Studies, Vol.
Cases,” International Security, Vol 19, No. 1: 5-40. 11/4: 353-368.
249
8
Non-Military Security
250