Category Archives: conflict

Counter-terrorism in Africa: a few constraints

Counter-terrorism in Africa remains a concern and the latest events testify of the increasing level of the threat. Indeed, in March 2017, 03 major West African terrorist organizations (Ansardin, Aqmi, and Al Mourabitoun), decided to merge and pledged allegiance to Al Qaida. The advent of armed groups, within the framework of this fight is a major handicap for states already facing multiple fronts as it is the case for Nigeria, Cameroon, Mali and Niger. Then, the problem becomes the following one: how can the African countries victims of terrorism overcome the diverse constraints impacting on their efficiency? Following the merger of those 3 African terrorist groups, many attacks occurred in Mali, Niger and Burkina Faso. This merger conveyed 2 messages, a political and a military one. The military message is clear, the mutualization of the all resources to reach a common objective. The limits in the antiterrorist action in Africa, are at the same time endogenous and exogenous. Thus we identified several constraints that impact this action at a national level but especially a regional level:

1/ The strategic and conceptual limit: several African states involved in counter-terrorism, have a defense or national security policy unfortunately unsuitable for the terrorist threat, because they undermine the terrorist and extremism challenges. Indeed, the lack of consistency in the process of elaboration of a national strategy against terrorism leaves the field open, in any form of interpretation and actions often inevitably coordinating and suffering from an insufficiency of coherence. Without quoting any precise example, thus it seems obvious that fighting against terrorism requires a realistic approach to the problem, by integrating the local factors which favor the emergence of any forms of radicalization, leading to violent extremism or to terrorism. The absence of national strategy, thus is a major weakness for an effective action against the terrorist groups, because not putting clearly the stakes and the answers adapted to the threat. A strategy is an unavoidable road map for any actions to be carried out. It is a prerequisite registering the threat in a national dimension and an African contextual reality with its strengths and weaknesses. The conceptual approach becomes, the road map to be followed in order to reach the expected results.

2/ The limit of the military and security programming: the inclusion of the military effort in time allows a rationalization of the investments and a coherence of the security expenditure in particular in equipment, infrastructures and armament. Security and military programming laws of the African countries when they exist, do not automatically integrate the expenses bound to counter-terrorism despite the evolving nature of terrorism. Following the example of Mali and Ivory Coast which passed military programming laws (Mali in 2015 and Ivory Coast in 2016), other countries would gain to rationalize their spending specific to this terrorist threat which is unpredictable. Why not anticipate a specific law against terrorism with a chapter dedicated to a special financial programming? Ivory Coast already has a law carrying repression of terrorism but it does not have a specific financial aspect.

3/ The limit of the regional and joint answer: African member states of regional organizations such as ECOWAS, are active in a regional or sub-regional effort to counter terrorism as in the example of G5 Sahel. These regional and inclusive initiatives often suffer from an effective implementation of road maps adopted in a consensual way. The limit of the commitment of states often absorbed by expensive national realities, comes to press heavily on the execution of the joint directives. The creation of several sub-regional mechanisms of early warning and prevention of threats, also suffers from a heavy redundancy and a lack of clarity in the implementation. Finally, the budgetary inadequacies and the non-payment of the contributions of states overshadows the momentum for an integrated and effective answer.

4/ The capacity limit: the fight against terrorism is clearly expensive financially but it is even more costly on a capacity point of view of security forces. Indeed, the specificity of the threat requires the creation of specialized national mechanisms and especially the existence of specialized units, trained, equipped and hardened regarding asymmetric warfare. The imbalance between the African states having specialized units and those who do not have any, is such that the vulnerability of some states is at a critical level. Kenya, Ivory Coast, Tunisia, Chad and Nigeria, to quote only those, are examples of countries whose specialized units are references because having been confronted militarily to terrorist groups in fights. The capacity building of Special Forces, should be more than ever a priority for African states.  Only prevention mechanisms and specialized units, can overcome such a threat. Finally, the ultimate capacity weakness remains the military intelligence to be perfected, because suffering from a hardening in equipment and skills.

5/ The limit of sensitization: the African states invest little in a communication and an offensive sensitization policy against terrorism. This insufficiency explains the increasing radicalization risks and the exposure of badly informed communities. Indeed, many states do not sensitize their population on the risks of radicalization and often underestimate this risk by not speaking about it. A few states such as Senegal, are today models regarding communication and regarding sensitization on the subject. The acts of deterrence, prevention and repression stemming from the commitment of President Macky Sall are not to be any more demonstrated.

6/ The limit of the permeability of the borders: the porosity of the African borders adds to their vulnerability within the framework of counter-terrorism because of the lack of control of migration flows. Thus the African states would gain to strengthen their strategies on the borders, to limit the traffic of weapons and materials used in the preparation of explosive devices.

To conclude, this brief examination of the constraints linked to counter-terrorism in Africa easily demonstrates the necessity of a complete revision at a national, sub-regional and regional level. An in-depth revision of the strategies and current mechanisms is a necessity, to strengthen the preventive and repressive response. We shall not insist enough on the importance of prevention regarding counter-terrorism, as well as the accent to be put on a robust regional cooperation in intelligence.

By Jean Francois CURTIS

Moving On – SCID Blog Developments

It is with mixed feelings that I write this post to announce changes in this Blog. It is difficult to be reminded of the wonderful SCID community we built together, now that I am working on a different programme. However, I intend to maintain this Blog for everyone associated with SCID and for anyone with an interest in conflict resolution, peacebuilding and development. I hope, therefore, that my departure to Monash University will broaden the networks, discussion and action on issues related to security, conflict and international development. Nonetheless, it has been difficult to formally leave SCID.
img_7780I was solely responsible for developing the SCID programme from scratch over a 2-year period and delivering it since its inception in 2012. I am very attached to it for this reason and also because of the inspirational students I had the pleasure of working with – immensely hard working (mostly working in difficult jobs in conflict-affected environments and still finding time to complete a Master’s degree); dedicated to giving their all to addressing the challenges of conflict and to continue learning and progressing; uncomplaining (even when the harsh realities of working in conflict zones hit home); and brilliant in their insights, compassion and commitment. I am also attached to the programme because of the wonderful people that comprise the SCID Panel of Experts, a large group of leading international experts in conflict resolution and peacebuilding. I established the Panel of Experts in 2013 in order to enrich the learning experience of students and bridge the gap that often exists between academia and practice. It has been a pleasure and an honour to work with such wonderful, dynamic and gifted people, who have added enormous value to the SCID programme. It was also great to work with Professor Adrian Beck, whose brilliant and innovative ideas (not least to develop the SCID App), tenacity, diplomacy, and unwavering support were inspiring and meant a great deal to me. Lastly, but by no means least, the Course Administrators, notably Val Findlay, were the backbone of the course; endlessly providing support, guidance and help to students, Panel members and staff (i.e. me!) whenever needed.

img_7798My main motivation in developing the SCID course was to deliver the type of course I would have wanted to do while I was a practitioner, equipping me with the skills and knowledge that would have benefitted me, in a way that would have kept my attention and enabled me to continue working in the field while studying. I hope the course has also enabled useful networks to be developed, as well as underscored the importance of bridging the worlds of academia, policy and practice. Moreover, my motivation was to develop a course focussed on building security after conflict which integrated human rights issues, demonstrating the intrinsic relationship between human rights and security – a course which showed that often those engaged in protecting and promoting human rights issues are on the same page and addressing the same issues as those engaged in the security sector. I hoped that, as a result, the course would have an impact on the field, as a result of the continued work of SCID graduates. While working in the field I was often frustrated that the differences rather than the similarities between these two groups of actors were often focussed upon, to the detriment of what we were mostly all trying to do. It has therefore meant a great deal to me that many of the excellent Master’s theses written by SCID graduates, who are primarily middle-to-senior management level security professionals, have been on subjects related to human rights, gender equality and security sector governance.

img_7808I am, therefore, sad to no longer work on the SCID programme or with the wonderful people associated with it. I am happy, however, to be in a place which encourages innovation, academia-industry links, and impact in the field. I also consider the move to Monash University to be an opportunity to broaden the networks that have already been established through SCID, its students and the Panel of Experts. This Blog will therefore become a resource where people can keep in touch and share thoughts on issues related to security, conflict and international development – and it will continue to be open to anyone to follow and contribute to. I will also be encouraging my new students on the Master in International Development Practice (MIDP) to follow and contribute, in due course. I expect some very interesting discussions will follow and networks will usefully broaden.

Thanks to all former and current SCID students and members of the Panel of Experts for making my work so enjoyable and worthwhile – and I hope we continue to keep in touch, not least through this Blog. I look forward to reading your posts and hearing your news – please do post updates and reflections; I know I am not alone in wanting to hear from you. I hope you are all keeping safe and well.

Best wishes, Eleanor

img_7738Photos: Melbourne’s White Night (Feb 2017) – a celebration of creativity with four creative pillars: Inclusion, Accessibility, Engagement and Innovation.

‘Night, the beloved. Night, when words fade and things come alive.  When the destructive analysis of day is gone, and all that is truly important becomes whole and sound again.’ Antoine de Saint-Exupéry.

Student Position Paper – Civil society oversight role in SSR – Donatella Rostagno

In post-conflict contexts, it is vital to develop a coherent Security Sector Reform (SSR) in order to build sustainable peace. In order to be coherent and successful, SSR should be context specific and should respond to the principle of local ownership of all the stakeholders, including both the providers of security services and the beneficiaries (population and civil society) (DCAF-ISSAT, 2014). If external donors want to proactively and coherently support the development of democratic, transparent and accountable security institutions, then particular attention and efforts should be put on enhancing Security Sector Governance (SSG) thus creating the right conditions for the development of security institutions that respond to democratic oversight and control. SSR programmes have to be developed and implemented to enhance change and improve SSG (Schroeder, 2010).

It is widely recognized that SSR should be people-centered and locally owned, in order to allow people and civil society organisations to hold security and justice institutions accountable. It is only by ensuring the active participation of the people most affected by either the improvement or the deterioration of the security and justice sectors, that their oversight role is strengthened and trust in state security and justice institutions is reinforced.

However, the international community has too often embraced a technical approach by focusing on equipping and training security institutions and on the operational effectiveness of security providers. In the Democratic Republic of Congo (DRC), for example, donors have invested in short-term operational objectives, especially to deal with the crisis in the East of the country. Not enough resources have been invested in longer-term initiatives aimed at changing the way security is managed enhancing therefore the role of civil society and the parliamentary security and defence committee (Boshoff et al., 2010). Our NGO therefore calls the international community to ensure that security institutions actually operate under democratic control and are accountable to the population. Resources allocated to building the capacity of parliamentary security and defense committees and civil society organisations should be increased and better structured.

In many contexts, the international community has invested a great deal of resources in SSR in order to ensure security throughout the country and create the right conditions for development. However often progress is quite slow and weak and although it is widely recognized that the effectiveness of the security sector depends on accountability, programmes lack the necessary focus on making sure that civilians and civil society organisations can actually play the oversight role.

Our NGO calls on the international community to make sure that civil society is aware of the particular role it should play, is trained to understand SSR in their context and develops the right knowledge and skills to make security forces accountable. This people-centered approach is needed in order to develop an understanding of local communities’ security needs and priorities as well as the dynamics and trust or distrust in formal security actors.

In their cooperation with security institutions and support to SSR programmes, international donors should communicate the importance of enhancing SSG in order to make sure that the goal of developing effective, inclusive and accountable security institutions and contribute to international peace and security and sustainable development is achieved. Our NGO is convinced that developing programmes aiming at strengthening democratic oversight and control is the only way to ensure that rights and interest of the citizens but also of the people who are employed in the security sector are protected.

In order to achieve the objective of strengthening civil society’s oversight role, coherence and harmonization of donors policies is needed and unfortunately these are often not coordinated and sometimes even opposed (Wulf, 2004). Although at a conceptual and policy level there seem to be widespread agreement among the members of the international community on the basic elements of SSR, on the ground coherence among different stakeholders has been much less apparent (Bryden, 2015). Unfortunately, the lack of coordination and overlapping or contradictory mandates can easily result in a lack of clear priorities and in a lack of optimization of how resources are allocated. Clearly, the lack of coherence has translated into an incapacity of international donors to assist all stakeholders in reforming the security sector and in supporting the capacity building of civil society to play the oversight role.

In conclusion, investments in SSR should aim at enhancing SSG ad make sure that security institutions serve the interests of the population and enjoy the trust and confidence of the population. In order to achieve this objective, civil society must have the means and develop the capacity to monitor security forces and take part in the political debate on security policy and reform since the very early stage of the process (Department of criminology, 2015).

Postscript

It is generally acknowledged that good SSR has to do with “democratic forms of accountability, transparent decision-making processes and security apparatus that is fully subordinated under the control of a civilian authority” (Schroeder, 2010: 11).

Mark Sedra (2010: 6) identifies a number of key norms and fundamental principles of SSR according to which the participation of civil society organisations (being them media, human rights NGOs or grassroots organisations) exercise a control role on SSR policies and practices. Moreover institutional mechanisms should be created with a role of control over the way SSR is carried on in terms of human rights record and financial management.

There are different dimensions to a good SSR (local ownership, effectiveness, accountability and political sensitivity) but often the international community supporting SSR programmes prefers to concentrate on elements measurable in the short-term such as training and logistic support. Accountability is a difficult dimension to be measured and it requires work with security institutions to make sure that ownership of SSR is not only meant as elites’ ownership but also non-state actors and the wider society.

Engaging civil society in the security sector can prove to be difficult: in post-conflict environments civil-society can be quite weak and fragmented, it is not easy to identify who from civil society should take part in SSR programmes, civil society can often lack trust in the government and from the government. For all these reasons often donors find it difficult to concretise civil society participation in SSR. However better coordination and coherence of donor’s policies would be needed in order to develop programmes that focus on all stakeholders’ capacity building and that in turn, would enhance the participation of civil society in SSR at all levels.

Building Security and Justice After Conflict – Student Position Papers

 

At the end of the SCID Course, students are asked to reflect upon the whole Course and write a position paper (of about 750 words). The paper should be on an issue related to building security and justice in post-conflict environments that they feel most passionate about which requires attention by, at least an element of, the international community. The postscript to the paper summarises reasons why effective action has not been taken to date. Students are asked to draw on their own experience and knowledge as well as academic material, with the aim of persuading the reader to agree with the position put forward and, if necessary, to act, while displaying academic writing and analytical skills.

Those papers that secured a Merit or Distinction (i.e. above 60%) are reproduced on this Blog (below and on a new page entitled Building Security and Justice after Conflict – Student Position Papers). Congratulations to all students who did so well and to everyone in the March 2015 intake for completing the whole course – and all the very best with your dissertations.

I hope you enjoy reading the following position papers as much as I did. Please share, like, and comment.

Best wishes, Eleanor

Dividing the Threat Multiplier: An Argument for Effective International Prosecution Against Grand Corruption and Kleptocratic Regimes – Maren Moon

The release of the Panama Papers by the International Consortium of Investigative Journalists (ICIJ) has fuelled spectacular revelations regarding the scale of grand corruption and the wider system which enables it (ICIJ, 2016: np).  The scandal is exposing involvement by the very people and institutions who should feel morally and legally compelled to act with the highest integrity but who instead participate in a system all too frequently perpetrating wholesale crime, undue privilege, and the global erosion of security.  (Wolf, 2014: 3). They are doing so with impunity, and they are doing so while the world’s watchdogs cannot help but possess full knowledge that ‘the link between grand corruption and mass human rights violations is undeniable’ (Freedom House, 2014, and also Woodrow Wilson Center, 2016: np., and Transparency International: 2008, ).

No less than heads of states and global financial institutions linked to London, New York and Switzerland have now been connected to an enormous shadow economy responsible for: hiding assets; exercising bribery; facilitating tax evasion; practicing financial fraud; enabling drug trafficking; and participating in sexploitation. (See ICIJ, 2016 and Huffington Post a, 2016, Huffington Post b, 2016: np, and BBCb, 2016: np ). And no fewer than 11 million documents have laid bare the global elite’s participation in a system purposefully rigged to increase the gap between the absurdly wealthy and the tragically poor.  The international community would do well to note too that this is a system which facilitates crime in desperate and conflict-vulnerable settings while arming the insurgents and terrorists who operate from within such settings (Patrick, 2009 and Napoleoni, 2003). We should also recall the system intentionally erodes democratic principles of transparency, fair taxation, the right to peaceful protest, and the exercise of free speech (Woodrow Wilson Center, 2016: np and Wolf, 2014: 5-8).  In short, this is a system wherein leaders and criminals alike actively undermines everything to which the international community aspires, and for which it ultimately endeavours; sometimes selflessly and in conditions of great hardship.

It should not go unrecognised that the responses of those who have been unveiled as both witting and unwitting participants in the darker aspects of this economy, all too consistently reiterate a mantra which should give each of us a moment’s pause for reflection – that lawyers and financial experts alike still possess the legal means of perpetrating unfair, corrupt, and increasingly unfair and corrupting practices. Vested interests in lofty positions have suggested big businesses, and their high-flying personnel, need to work in the shadow economy even when it lowers opportunities for smaller businesses and honest entrepreneurs.  They argue further that legislation against bribery ‘puts British companies at a competitive disadvantage’ (Barrington, 2016: 4). And yet still too, others have intoned that society needs to tacitly accommodate unethical practices in the financial sector on the grounds that businesses in their countries are too big to fail, or too important to risk having relocate to another country. But in making these accommodations we will be enabling the capture of entire governments by organisations whose interests do not include the common citizens who eke by and sustain the infrastructure enjoyed by those who have rigged the system against them (Johnson, 2009: np).  Such accommodation could only serve to entrench profit for the few at the cost of the many. We are, in effect, now experiencing parallel attacks on democracy by the licit and illicit economies alike – both of whom are seemingly melding into a deeper, more committed relationship in an increasingly shady capacity and whose political-economy will forever thwart the international community’s efforts in bringing peace and security.

Those who evade tax legally are allowed to escape criminality by conveniently structured legal technicalities. This phenomena is relatively easy to rectify. But the Big King Kleptocrats who knowingly act outside the law, do so understanding that successful prosecution against their acts is nearly unheard of. History and statistics remain firmly on their side. This is occurring regardless of corruption’s increasingly evident role in destabilising entire continents such as Africa, the Middle East, Asia, and Central and South America (Carnegie, 2015).  These actors smile comfortably while insinuating that exposure of their misdeeds might expose a larger, darker reality in which too many purportedly clean-skinned actors may also be complicit.

And while they may not be kind, they most certainly are proving wise.

Indeed, these same kleptocrats, and their advisors, will have followed closely the freedom and riches once more enjoyed by Egypt’s Hosni Mubarak who has now escaped charges of corruption and murder on a mere technicality (Reuters, 2015: np). Mubarak was a kleptocratic despot whose legacy includes death, blood, fear, and a deeply troubled country. He did not operate in a vacuum, and he was aided by the most powerful regimes in the world. But that does not excuse the outcome – nor does it justify the continuance of such behaviour. Those choosing to play in the dirty sandbox of blood and money in today’s shadow economy will have either dismissed the importance of the Arab Spring’s impact on security and human rights or cynically regarded the situation as yet another opportunity from which to leverage additional millions.  I argue that humanity can no longer afford such cynicism.

I further assert these same actors will have understood President Goodluck Jonathan’s dismissal of his bank governor following the well-intended public servant’s disclosure to the ‘Nigerian Senate that the treasury was missing billions of dollars in expected oil revenue’ (Wolf, 2014: 5). Indeed, Jonathan and his cronies seemed content to turn a blind eye to the networks which channelled money and arms to Boko Haram while leaving security forces ill equipped to quell an uprising which has now left more than 10,000 civilians and security personnel dead at the hands of Islamist savagery (Foreign Policy, 2015: np).

The kleptocrats will have further monitored the toppling of corrupt regimes in Tunisia and the Ukraine and reacted like narcissistic sociopaths unable to emotionally register the gravity of their actions, while concurrently making plans to fly to safety while maintaining access to their ill-gotten gains if the same danger knocks on their door.

The impunity enjoyed by this cohort, and structured into our globalised economy, has paved the way for much of the harm we see unfolding on the world’s stage. It has also provided resonant and compelling reasons from which the so called Islamic State, Boko Haram, and the Taliban find a seemingly endless supply of recruits (Chayes, 2007: 22, and Woodrow Wilson Center, 2016: np, and Schirch as cited in Mertus and Helsing, 2009: 68).

Whether knowingly or not, every last player in the shadow economy has contributed to an encroaching threat against humanity and which serves as nothing short of a security threat multiplier. It is of epic and global proportions.

The 2014 Ebola crisis in West Africa provides an immediate example of how easily corruption might impact security on a global scale. UN donor contributions topping $5.2bn were dispersed to Sierra Leone, Liberia and Guinea.  Almost all of it vanished, and only a fraction of the disbursement was ever audited. ‘In all three countries, no individual has been tried, much less convicted, for their role in the mismanagement of money meant to save the lives of the dying’ (Al Jazeera, 2016: np.).  These funds were also intended to contain the outbreak and prevent its spread.  The UN’s Global Ebola Response data refers to the outbreak’s nature as having been of ‘widespread and intense transmission’ (UN, 2014: np). But to date, the myriad pages and resources on their website speak only of a level of need and the current status of the situation.  Their silence of the flagrant misappropriation of funds perpetuates impunity.  And such complicit behaviour could very well facilitate a new pandemic of Ebola or some other virus, which experts warn could be incredibly difficult, if not impossible, to halt if not contained early, and with the utmost care; care which could never result in the face of another round of missing but badly needs funds (Oxford Martin School, 2012: np).

Grand Corruption further impacts security by destabilising regions in concussive shock waves. As migrants flee corrupt regimes and insurgencies (again, simultaneously fostered by the shadow economy), we see communities decimated, resentments grow, borders close, and trust diminish. (BBCa 2015: np,). Actions originating thousands of miles away from Europe’s shores are now threatening the cohesiveness of European states and the long architected interdependence of the EU.   The Schengen Agreement is further threatened as once ceded sovereignty is being repossessed by politicians seeking to erect borders and control the influx of desperate people fleeing the regimes which grand corruption has enabled.

Finally, kleptocracy feeds the thickening of the crime-conflict nexus as human traffickers, arms dealers, and smugglers share mutually beneficial relationships with terrorists, insurgents and the ruling elite. The nexus will continue to thicken so long as the chaotic conditions and lack of governance resulting from unabated kleptocracy ensures the conditions favourable to its growth.  (see Patrick, 2009,  and Lacher, 2012, and McMullin, 2009, and Jesperson, 2015 and Sloan and Cockayne, 2011).

And it is for these reasons, and so many more, that we must strive to end impunity for grand corruption – and the shadow economy in which it thrives.   Such a task will require concerted, relentless multilateral efforts and incredible political will.  But it can, and must be done.

We can begin by seizing opportunity from the momentum gathering in the wake of the Panama Papers and the associated Unaoil scandals in current headlines.  We can further reach out across the international community and form inter-organisational working teams to apply pressure on host-countries, the Bretton Woods institutions, and home governments.   We can institute training programs which dispel the activities which remain shrouded in mystery but whose reality can be unpacked in simple terms.  But most of all, we must challenge the sovereignty of those countries who refuse to participate in fair trade and good governance – and we must have an international court with both the will and capacity to challenge the problem.  And that court must somehow operate separately from the arbitrary and political interests of the United Nations Permanent 5.

But it has to start. Impunity has to end. And accountability must follow. And never has there been a more pressing time.

Post-script

As a post-script to my previous position piece, I would like to gently assert that the International Community has understandably tolerated grand corruption in the theatres of peacekeeping and peacebuilding operations. The conditions in many of these theatres have necessitated that our precious resources be used first to protect lives and second to institute the ground-level security needed to maintain sufficient equilibrium from which to begin the long, hard institutionalisation of security sector reform, transitional justice, and micro-development projects.  But this too provides another reason why the solution to grand corruption requires an international effort outside the influence of the P5 (whose own members might be guilty of grand corruption or geopolitics).  We must seek a solution which can pre-empt the looting of banks and act independently of outside political agendas which might situate a vulnerable country between winning and losing scenarios as powerful countries battle for control by proxy. We need a solution which sends a clear signal to corrupt elites across the entire world, and not simply those situated in areas of conflict, that corruption will no longer be tolerated, nor paid for by blood of innocent people.  But we, the donor countries, must see to our own houses first.  We must ensure our hands are clean and that any authority we exercise is comprised of substance and never hollow in its nature. We must lead from the front, and from genuine experience.  But we simply cannot afford to turn away from this issue – at home or abroad.  People are dying by guns and by starvation; and they are dying by torture when taking action to stop the atrocity at hand while having inadequate support behind and beside them.  We must be that support.

References

Al Jazeera Media (2016) The plunder of west Africa Ebola funds. Available at: http://www.aljazeera.com/indepth/opinion/2016/01/plunder-west-africa-ebola-funds-160125140155872.html (Accessed: 6 April 2016).

BBC (2016) Migration and citizenship, start the week – BBC radio 4. Available at: http://www.bbc.co.uk/programmes/b06ybg7h (Accessed: 3 April 2016).

BBC (2016) Panama papers: What the documents reveal. Available at: http://www.bbc.com/news/world-35956055 (Accessed: 6 April 2016).

Barrington, R. (2016) ‘Spot the Difference: Corruption Research, Academies and NGOs’, British Academy: British Academy. pp. 1–7.

Carnegie Endowment for International Peace (2014) Corruption: The Unrecognized Threat to International Security. Available at: http://carnegieendowment.org/files/corruption_and_security.pdf (Accessed: 14 March 2015).

Chayes, S. (2007) ‘Days of Lies and Roses: Selling Out Afghanistan’, Boston Review, , pp. 21–23.

Foreign Policy (2015) In Nigeria, $2 Billion in Stolen Funds is Just a Drop in the Corruption Bucket. Available at: http://foreignpolicy.com/2015/11/18/in-nigeria-2-billion-in-stolen-funds-is-just-a-drop-in-the-corruption-bucket/ (Accessed: 20 November 2015).

Freedom House (2014) ‘Combating Impunity: Transnational Justice and Anti-Corruption’, Washington, DC: Freedom House. pp. 1–10.

Huffington Post (2016) Big Banks Aided Firm at Center of International Bribery Scandal. Available at: http://www.huffingtonpost.com/entry/unaoil-citibank-hsbc_us_56feba02e4b0daf53aefa1da (Accessed: 6 April 2016).

Huffington Post (2016) There’s A huge new corporate corruption scandal. Here’s why everyone should care. Available at: http://www.huffingtonpost.com/entry/unaoil-bribery-scandal-corruption_us_56fa2b06e4b014d3fe2408b9 (Accessed: 6 April 2016).

ICIJ (2016) Giant leak of offshore financial records exposes global array of crime and corruption. Available at: https://panamapapers.icij.org/20160403-panama-papers-global-overview.html (Accessed: 6 April 2016).

ICIJ (2016) The Panama papers. Available at: https://panamapapers.icij.org/ (Accessed: 6 April 2016).

Jesperson, S. (2015) ‘Development Engagement with Organized Crime: a Necessary Shift or Further Securitisation?’, Conflict, Security, & Development, 15(1), pp. 23–50.

Johnson, S. (2009) The Quiet Coup. Available at: http://www.theatlantic.com/magazine/archive/2009/05/the-quiet-coup/307364/ (Accessed: 6 April 2016).

Lacher, W. (2012) Organized Crime and Conflict in the Sahel-Sahara Region.

McMullin, J. (2009) ‘Organised Criminal Groups and Conflicts: The Nature and Consequences of Interdependence’, Civil Wars, 11(1), pp. 75–102.

Napoleoni, L. (2003) Modern Jihad: Tracing the Dollars Behind the Terror Networks. London: Pluto Press.

Oxfam International (2015) Richest 1% will own more than all the rest by 2016. Available at: https://www.oxfam.org/en/pressroom/pressreleases/2015-01-19/richest-1-will-own-more-all-rest-2016 (Accessed: 6 April 2016).

Oxford Martin School (2012) Pandemics – can we eliminate major worldwide epidemics? | videos. Available at: http://www.oxfordmartin.ox.ac.uk/videos/view/208 (Accessed: 4 April 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security. Oxford: Oxford University Press.

Reuters (2015) Egypt’s high court overturns last conviction against Mubarak. Available at: http://www.reuters.com/article/us-egypt-mubarak-idUSKBN0KM0O620150113 (Accessed: 6 April 2016).

Schirch, L. (2006) Human Rights & Conflict: Exploring the Links between Rights, Law, and Peacebuilding. Edited by Julie A Mertus and Jeffrey W Helsing. Washington, DC: United States Institute of Peace.

Sloan, B. and Cockayne, J. (2011) ‘Terrorism, Crime, and Conflict: Exploiting the Differences Among Transnational Threats?’, Policy Brief, , pp. 1–11.

Transparency International (2008) ‘Human Rights and Corruption’, Working Paper, 05, pp. 1–6.

United Nations (2014) Global Ebola crisis response | data. Available at: http://www.un.org/ebolaresponse/data.shtml (Accessed: 6 April 2016).

Wolf, M.L. (2014) ‘The Case for an International Anti-Corruption Court’, Governance Studies at Brookings, July, pp. 1–15.

Woodrow Wilson Center (2016) Combatting grand corruption internationally. Available at: https://www.youtube.com/watch?v=GN6HDEgiSc8 (Accessed: 6 April 2016).

Demobilisation, Disarmament and Rehabilitation Programmes – Martin Rix

It is vital that in post-conflict planning adequate provision is given Demobilisation, Disarmament and Rehabilitation (DDR) programmes. Ensuring combatants and weapons are no longer in the field, coupled with effective reintegration – as those alienated from their communities may eventually decide to re-take arms – has consistently proven to reduce the possibility of hostilities resuming. Additionally, DDR assists in creating a secure space in which wider post-conflict reconstruction can take place to ensure long-term security and economic development.

However, DDR programmes can often be too narrow in focus or attempt a one-size-fits-all approach (Wessells, 2015), ignoring the differences between male, female and child-focused programmes. In many cases programmes may only provide tokenism (Gordon, Cleland Welch and Roos, 2015), which creates an illusion of inclusion – often to appease donors – but fails to provide the assistance actually required.

Our NGO is committed to a fully encompassing DDR that, while developing bespoke programmes for male, female and child ex-combatants, does so equally, acknowledging the similar and different requirements each of these groups have to allow appropriate planning and implementation.

Distinction between these three groups is vital, as each may require niche elements. For example, the longevity of adult and child programmes differ widely (Muggah, 2010), with child-focused programmes requiring long-term commitment that may not produce immediately measurable results (Save The Children, 2005), while careful consideration is required regarding the different levels of stigma received by male and female ex-combatants over their involvement in armed conflict – as well as requirements regarding childcare or the provision of traditional clothing (Bouta, 2005; World Bank, 2013).

We believe that timings are also key. Prolonging the commencement of programmes may test ex-combatants’ commitment to peace, while adult-focused programmes should begin at the earliest opportunity to ensure that ex-combatants are disarmed and re-assimilated into society before post-conflict democratic processes begin (Banholzer, 2014). Failure to ensure ex-combatants are reintegrated in order to partake in elections may result in further marginalisation and the re-emergence of old grievances. Equally, for child-focused DDR it is important to ensure participants are included on educational programmes as soon as possible.

We view the provision of education as integral. For children this should consist of school education and life skills. For example, programmes in Liberia focused on reading, writing and mathematics but also included practical skills in ‘agriculture…mechanics, carpentry, cosmetology, masonry, tailoring and baking’ (UNICEF, 2006). Adult-focused programmes should primarily focus on vocational training, but, depending on literacy levels, may include reading and writing education, which would utilise existing teaching contacts and resources.

We recognise that many of the foundations required for effective DDR programmes equate across all programme types. Regardless of age or sex, ex-combatants alienated from society may decide to re-take arms, so there must be education and training to raise awareness within wider society, promoting understanding of why ex-combatants require assistance and how programmes may differ in structure and design. These outreach programmes should be delivered by local politicians, business owners, teachers and religious leaders (Nilsson, 2005). It may also be perceived that those who perpetrated crimes during the conflict are taking jobs in a limited market (World Bank, 2013; Wessells, 2015) or are receiving funding, so print media, radio and television campaigns should be designed (World Bank, 2013) to reach a wider audience.

Our NGO also believes in shaping programmes to provide the support that ex-combatants actually require, not what it’s perceived they do. Every conflict zone is different and may involve a range of cultures or religions. To ensure our programmes effectively reflect this guidance and advice should be sought from male, female and child ex-combatants at each stage of the process (Wessells, 2015), from initial planning through to implementation, to ensure that programmes provide the correct support and are constantly improved.

Finally, no single element of a DDR programme can function without support from donors. Our NGO requires support from external and internal donors to ensure programmes provide a complete level of support for ex-combatants (Nilsson, 2005). It is vital that donors recognise that without providing adequate and equal resources for DDR programmes for men, women and children the risks of a resumption of violence increases.

DDR has consistently proved to be an effective tool in post-conflict rebuilding, however, programmes designed for only a selection of ex-combatants will not produce sufficient results. Providing bespoke DDR for men, women and children is pivotal for ensuring post-conflict security and that all ex-combatants are successfully reintegrated into society.

Postscript

Demobilisation, Disarmament and Rehabilitation (DDR) programmes have become integral to post-conflict development, however, while boasting many successes they have also failed in a number of key areas.

DDR is a three-step process, but often planners only focus on demobilisation. For example, during Sierra Leone’s 2003 programme 72,490 combatants were disarmed and 71,043 demobilised (Kaldor and Vincent, 2006) and while this helped ensure security, the process was, effectively, one of demobilisation, with estimates that only 2-10 percent of weapons in the country were collected (Kaldor and Vincent, 2006).

As men make up the majority of armed personnel, programmes often place the focus upon them, with requirements for women and children becoming an afterthought. There can be a general reluctance amongst female ex-combatants to register for DDR (Nilsson, 2005) as planners often fail to provide women-only centres and solutions to women’s issues, such as difficulty in securing work in traditional societies where the woman’s role is perceived to be in the home (World Bank, 2013).

For child-focused DDR, a lack of funding is a common problem. In 2004, former UN Secretary General Kofi Annan reported that donors had generally failed to fund children’s programmes to the same extent as other projects (Save The Children, 2005). It is argued that child DDR funding should not be reliant on adult programmes, as any setbacks will affect it (Muggah, 2010), but subsequently means planners overlook child-focused programmes as they can contradict donor priorities and may not provide headline results, particularly due to longer timescales.

References

Banholzer, L. (2014) When Do Disarmament, Demobilisation and Reintegration Programmes Succeed?, Bonn: German Development Institute, https://www.die-gdi.de/uploads/media/DP_8.2014.pdf, (accessed 25th September 2016)

Bouta, T. (2005) Gender and Disarmament, Demobilisation and Reintegration: Building Blocs for Dutch Policy, http://www.oecd.org/derec/netherlands/35112187.pdf, (accessed 13th August 2015).

Gordon, E., Cleland Welch, A. and Roos, E. (2015) Security Sector Reform and the Paradoxical Tension between Local Ownership and Gender Equality, University of Leicester, https://lra.le.ac.uk/bitstream/2381/33542/4/SSR%20Gender%20and%20LO%20-%20final%20draft%20-%20published%20version.pdf, (accessed 21st March 2016).

Kaldor, M. and Vincent, J. (2006) Evaluation of UNDP Assistance to Conflict-Affected Countries: Case Study Sierra Leone, http://web.undp.org/evaluation/documents/thematic/conflict/sierraleone.pdf, (accessed 3 September 2015).

Muggah, R. (2010) ‘Disarmament, Demobilization and Reintegration’ in V. Chetail (ed.) Post-conflict Peacebuilding: A Lexicon, Oxford: Oxford University Press, 123-137.

Nilsson, A. (2005) Reintegrating Ex-Combatants in Post-Conflict Societies, http://www.pcr.uu.se/digitalAssets/67/67211_1sida4715en_ex_combatants.pdf, (accessed 13th August 2015).

Save The Children (2005) Protecting Children in Emergencies: Escalating Threats To Children Must Be Addressed, http://www.savethechildren.org/atf/cf/%7B9def2ebe-10ae-432c-9bd0-df91d2eba74a%7D/policy_brief_final.pdf, (accessed 2nd May 2016).

UNICEF (2006) Protecting Children During Armed Conflict, http://www.unicef.org/chinese/protection/files/Armed_Conflict.pdf, (accessed 26th April 2016).

Wessells, M. (2015) Children and Armed Conflict. [Podcast] The Clarke Forum. 17th Feb 2016, https://itunes.apple.com/us/itunes-u/clarke-forum-for-contemporary/id719533242?mt=10, (accessed 7th May 2016).

World Bank (2013) Female Ex-Combatants Find Livelihoods and Acceptance in Burundi, https://www.youtube.com/watch?v=QPYpJMuqQFA, (accessed 13th August 2015).

Cyber Warfare – Olivier Dubois

Surprisingly enough, the SCID program is relatively silent on cyber warfare. It is briefly referred to in relation with the so-called new terrorism: terrorist groups would have the ability to carry out ‘electronic terrorist attack targeting critical infrastructure’ (Department of Criminology, 2013). This is a very narrow part of what constitutes nowadays cyber warfare and by no means does it capture the stakes of the current cyber arm race.

As with many new concepts, there is no universal accepted definition of the term. Most definitions underline the use of computers and digital means in a coordinated manner by a government or a non-state group with a purpose of causing disruption and/or damage (Sakharian, 2013; Andress, 2013). The target of a cyberwar is computers, networks and digitally controlled devices. If the objective may not be destructing physical infrastructure or killing people, the impacts of cyber operations cannot be contained to the digital world. It is not solely about offering a bloodless military superiority or an economic advantage (Kirsch, 2012). To the contrary, the US department of defence’s Laws of War manual (DoD, 2015) is explicit in recognising that certain cyber operation do constitute use of force in the meaning of Art. 2 § 4 of the UN charter. It cites Operations ‘ that: (1) trigger a nuclear plant meltdown; (2) open a dam above a populated area, causing destruction; or (3) disable air traffic control services, resulting in airplane crashes’ (DoD, 2015: 989). It is reported that more than 100 States are developing some forms of cyberwar capacity (Limnell, 2016).

As in our daily lives, the frontier between the digital and physical world is increasingly becoming difficult to identify. Cyber operations are equally challenging legal and policy boundaries. From a legal standpoint, the fact that a major military power like USA explicitly consider that cyber operations are submitted to both Jus ad Bellum and Jus in Bello (IHL) does not solve everything. Recognising a cyber operation as an act of war is important as it may influence the type of counter measure the victims may consider. It may as well contain policy makers in taking aggressive actions (Lin 2012). However, this restraining frame may be completely ineffective as the imputability or the attribution of a cyber operation to its perpetrator remains extremely difficult (Dortmans 2015, Lin 2012). As a result, waging an cyber attack is extremely low-cost and risk-free compared to the pay off (Limnell, 2016). States have still to learn to operate an adapted range of countermeasures to cyber attack in avoiding to make mistake that could jeopardise their political credit or cause an unwanted escalation in the conflict (Limnell, 2016). The danger of unwanted escalation is real. As a technological arm race is ongoing, states have little time to properly assess the effect of the arsenal and could be nevertheless tempted to unleash it.

The layers are at a loss. Applying IHL rules on the conduct of hostilities to cyber attack is thus extremely difficult and efforts of experts who have proposed to NATO the Tallinn Manual on the International Law applicable to Cyber Warfare is not entirely convincing (Schmitt, 2013). In the absence of precise knowledge on the offensive capacities of cyber weapons, it is very difficult to operationalise and respect the principles of distinction, proportionality and precautions (Droege, 2012). There is an urgent need for a new treaty banning certain cyber weapons and/or creating new regulatory and surveillance authority such as the one existing for chemical weapons or for atomic energy.

Political scientists are at bay, too. Policy framework and guidance have to be adapted to this new reality to ensure that cyberspace is not transformed in a wild battlefield. Regional or collective early warning system for aggressive cyber activity are inexistent. Cybersecurity and cyber warfare are ‘team sport’ where international cooperation is key. Old times alliances created for responding to threats in the physical world need to be shaken up to meet the challenge. International commission of investigation or international fact-finding missions on alleged cyber warfare activities are yet to be created or even suggested in the corridors of New York. Is it so utopian to imagine negotiating cyber cease-fire and mandating cyber observers, to be nicknamed the “Blue Tablets”, as modern peacekeepers for monitoring it? The new wars of the nineties have shaken the whole approach to peacebuilding. Cyber warfare offers a similar shift of paradigm. Let us not wait a ‘Cyber-Srebrenica’. Let us prevent it by thinking and acting out of the box now.

References

Andress, J. (2013) Cyber Warfare Techniques, Tactics and Tools for Security Practitioners, 2nd ed., Burlington: Elsevier Science.

Department of Criminology (2013), SCID module 6 Unit 3, Resource 1, Leicester: University of Leicester.

Department of Defence (2015) Law of War Manual, Washington DC: Department of Defence, available at http://www.defense.gov/Portals/1/Documents/DoD_Law_of_War_Manual-June_2015_Updated_May_2016.pdf (last accessed 21 September 2016).

Dortmans, P., Thakur, N. and Ween, A. (2015) ‘Conjectures for framing cyberwarfare’ Defense & Security Analysis 31(3): 172-184.

Droege, C. (2012) ‘Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians’ International Review Of The Red Cross 94(886): 533-578.

Kirsch, C. (2012) ‘Science fiction no more: cyber warfare and the United States’ Denver Journal of International Law and Policy 40(4): 620-686.

Limnéll, J. (2016) ‘The cyber arms race is accelerating- what are the consequences?’ Journal of Cyber Policy, (1)1: 50-60.

Lin, H. (2012) ‘Cyber conflict and international humanitarian law’ International Review of the Red Cross, 94(886): 515-531.

Shakarian, P. (2013) Introduction to Cyber-Warfare A Multidisciplinary Approach, Burlington: Elsevier Science.

Schmitt, M. (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.