Category Archives: SCID Course

Moving On – SCID Blog Developments

It is with mixed feelings that I write this post to announce changes in this Blog. It is difficult to be reminded of the wonderful SCID community we built together, now that I am working on a different programme. However, I intend to maintain this Blog for everyone associated with SCID and for anyone with an interest in conflict resolution, peacebuilding and development. I hope, therefore, that my departure to Monash University will broaden the networks, discussion and action on issues related to security, conflict and international development. Nonetheless, it has been difficult to formally leave SCID.
img_7780I was solely responsible for developing the SCID programme from scratch over a 2-year period and delivering it since its inception in 2012. I am very attached to it for this reason and also because of the inspirational students I had the pleasure of working with – immensely hard working (mostly working in difficult jobs in conflict-affected environments and still finding time to complete a Master’s degree); dedicated to giving their all to addressing the challenges of conflict and to continue learning and progressing; uncomplaining (even when the harsh realities of working in conflict zones hit home); and brilliant in their insights, compassion and commitment. I am also attached to the programme because of the wonderful people that comprise the SCID Panel of Experts, a large group of leading international experts in conflict resolution and peacebuilding. I established the Panel of Experts in 2013 in order to enrich the learning experience of students and bridge the gap that often exists between academia and practice. It has been a pleasure and an honour to work with such wonderful, dynamic and gifted people, who have added enormous value to the SCID programme. It was also great to work with Professor Adrian Beck, whose brilliant and innovative ideas (not least to develop the SCID App), tenacity, diplomacy, and unwavering support were inspiring and meant a great deal to me. Lastly, but by no means least, the Course Administrators, notably Val Findlay, were the backbone of the course; endlessly providing support, guidance and help to students, Panel members and staff (i.e. me!) whenever needed.

img_7798My main motivation in developing the SCID course was to deliver the type of course I would have wanted to do while I was a practitioner, equipping me with the skills and knowledge that would have benefitted me, in a way that would have kept my attention and enabled me to continue working in the field while studying. I hope the course has also enabled useful networks to be developed, as well as underscored the importance of bridging the worlds of academia, policy and practice. Moreover, my motivation was to develop a course focussed on building security after conflict which integrated human rights issues, demonstrating the intrinsic relationship between human rights and security – a course which showed that often those engaged in protecting and promoting human rights issues are on the same page and addressing the same issues as those engaged in the security sector. I hoped that, as a result, the course would have an impact on the field, as a result of the continued work of SCID graduates. While working in the field I was often frustrated that the differences rather than the similarities between these two groups of actors were often focussed upon, to the detriment of what we were mostly all trying to do. It has therefore meant a great deal to me that many of the excellent Master’s theses written by SCID graduates, who are primarily middle-to-senior management level security professionals, have been on subjects related to human rights, gender equality and security sector governance.

img_7808I am, therefore, sad to no longer work on the SCID programme or with the wonderful people associated with it. I am happy, however, to be in a place which encourages innovation, academia-industry links, and impact in the field. I also consider the move to Monash University to be an opportunity to broaden the networks that have already been established through SCID, its students and the Panel of Experts. This Blog will therefore become a resource where people can keep in touch and share thoughts on issues related to security, conflict and international development – and it will continue to be open to anyone to follow and contribute to. I will also be encouraging my new students on the Master in International Development Practice (MIDP) to follow and contribute, in due course. I expect some very interesting discussions will follow and networks will usefully broaden.

Thanks to all former and current SCID students and members of the Panel of Experts for making my work so enjoyable and worthwhile – and I hope we continue to keep in touch, not least through this Blog. I look forward to reading your posts and hearing your news – please do post updates and reflections; I know I am not alone in wanting to hear from you. I hope you are all keeping safe and well.

Best wishes, Eleanor

img_7738Photos: Melbourne’s White Night (Feb 2017) – a celebration of creativity with four creative pillars: Inclusion, Accessibility, Engagement and Innovation.

‘Night, the beloved. Night, when words fade and things come alive.  When the destructive analysis of day is gone, and all that is truly important becomes whole and sound again.’ Antoine de Saint-Exupéry.

Student Position Paper – Civil society oversight role in SSR – Donatella Rostagno

In post-conflict contexts, it is vital to develop a coherent Security Sector Reform (SSR) in order to build sustainable peace. In order to be coherent and successful, SSR should be context specific and should respond to the principle of local ownership of all the stakeholders, including both the providers of security services and the beneficiaries (population and civil society) (DCAF-ISSAT, 2014). If external donors want to proactively and coherently support the development of democratic, transparent and accountable security institutions, then particular attention and efforts should be put on enhancing Security Sector Governance (SSG) thus creating the right conditions for the development of security institutions that respond to democratic oversight and control. SSR programmes have to be developed and implemented to enhance change and improve SSG (Schroeder, 2010).

It is widely recognized that SSR should be people-centered and locally owned, in order to allow people and civil society organisations to hold security and justice institutions accountable. It is only by ensuring the active participation of the people most affected by either the improvement or the deterioration of the security and justice sectors, that their oversight role is strengthened and trust in state security and justice institutions is reinforced.

However, the international community has too often embraced a technical approach by focusing on equipping and training security institutions and on the operational effectiveness of security providers. In the Democratic Republic of Congo (DRC), for example, donors have invested in short-term operational objectives, especially to deal with the crisis in the East of the country. Not enough resources have been invested in longer-term initiatives aimed at changing the way security is managed enhancing therefore the role of civil society and the parliamentary security and defence committee (Boshoff et al., 2010). Our NGO therefore calls the international community to ensure that security institutions actually operate under democratic control and are accountable to the population. Resources allocated to building the capacity of parliamentary security and defense committees and civil society organisations should be increased and better structured.

In many contexts, the international community has invested a great deal of resources in SSR in order to ensure security throughout the country and create the right conditions for development. However often progress is quite slow and weak and although it is widely recognized that the effectiveness of the security sector depends on accountability, programmes lack the necessary focus on making sure that civilians and civil society organisations can actually play the oversight role.

Our NGO calls on the international community to make sure that civil society is aware of the particular role it should play, is trained to understand SSR in their context and develops the right knowledge and skills to make security forces accountable. This people-centered approach is needed in order to develop an understanding of local communities’ security needs and priorities as well as the dynamics and trust or distrust in formal security actors.

In their cooperation with security institutions and support to SSR programmes, international donors should communicate the importance of enhancing SSG in order to make sure that the goal of developing effective, inclusive and accountable security institutions and contribute to international peace and security and sustainable development is achieved. Our NGO is convinced that developing programmes aiming at strengthening democratic oversight and control is the only way to ensure that rights and interest of the citizens but also of the people who are employed in the security sector are protected.

In order to achieve the objective of strengthening civil society’s oversight role, coherence and harmonization of donors policies is needed and unfortunately these are often not coordinated and sometimes even opposed (Wulf, 2004). Although at a conceptual and policy level there seem to be widespread agreement among the members of the international community on the basic elements of SSR, on the ground coherence among different stakeholders has been much less apparent (Bryden, 2015). Unfortunately, the lack of coordination and overlapping or contradictory mandates can easily result in a lack of clear priorities and in a lack of optimization of how resources are allocated. Clearly, the lack of coherence has translated into an incapacity of international donors to assist all stakeholders in reforming the security sector and in supporting the capacity building of civil society to play the oversight role.

In conclusion, investments in SSR should aim at enhancing SSG ad make sure that security institutions serve the interests of the population and enjoy the trust and confidence of the population. In order to achieve this objective, civil society must have the means and develop the capacity to monitor security forces and take part in the political debate on security policy and reform since the very early stage of the process (Department of criminology, 2015).

Postscript

It is generally acknowledged that good SSR has to do with “democratic forms of accountability, transparent decision-making processes and security apparatus that is fully subordinated under the control of a civilian authority” (Schroeder, 2010: 11).

Mark Sedra (2010: 6) identifies a number of key norms and fundamental principles of SSR according to which the participation of civil society organisations (being them media, human rights NGOs or grassroots organisations) exercise a control role on SSR policies and practices. Moreover institutional mechanisms should be created with a role of control over the way SSR is carried on in terms of human rights record and financial management.

There are different dimensions to a good SSR (local ownership, effectiveness, accountability and political sensitivity) but often the international community supporting SSR programmes prefers to concentrate on elements measurable in the short-term such as training and logistic support. Accountability is a difficult dimension to be measured and it requires work with security institutions to make sure that ownership of SSR is not only meant as elites’ ownership but also non-state actors and the wider society.

Engaging civil society in the security sector can prove to be difficult: in post-conflict environments civil-society can be quite weak and fragmented, it is not easy to identify who from civil society should take part in SSR programmes, civil society can often lack trust in the government and from the government. For all these reasons often donors find it difficult to concretise civil society participation in SSR. However better coordination and coherence of donor’s policies would be needed in order to develop programmes that focus on all stakeholders’ capacity building and that in turn, would enhance the participation of civil society in SSR at all levels.

Building Security and Justice After Conflict – Student Position Papers

 

At the end of the SCID Course, students are asked to reflect upon the whole Course and write a position paper (of about 750 words). The paper should be on an issue related to building security and justice in post-conflict environments that they feel most passionate about which requires attention by, at least an element of, the international community. The postscript to the paper summarises reasons why effective action has not been taken to date. Students are asked to draw on their own experience and knowledge as well as academic material, with the aim of persuading the reader to agree with the position put forward and, if necessary, to act, while displaying academic writing and analytical skills.

Those papers that secured a Merit or Distinction (i.e. above 60%) are reproduced on this Blog (below and on a new page entitled Building Security and Justice after Conflict – Student Position Papers). Congratulations to all students who did so well and to everyone in the March 2015 intake for completing the whole course – and all the very best with your dissertations.

I hope you enjoy reading the following position papers as much as I did. Please share, like, and comment.

Best wishes, Eleanor

Dividing the Threat Multiplier: An Argument for Effective International Prosecution Against Grand Corruption and Kleptocratic Regimes – Maren Moon

The release of the Panama Papers by the International Consortium of Investigative Journalists (ICIJ) has fuelled spectacular revelations regarding the scale of grand corruption and the wider system which enables it (ICIJ, 2016: np).  The scandal is exposing involvement by the very people and institutions who should feel morally and legally compelled to act with the highest integrity but who instead participate in a system all too frequently perpetrating wholesale crime, undue privilege, and the global erosion of security.  (Wolf, 2014: 3). They are doing so with impunity, and they are doing so while the world’s watchdogs cannot help but possess full knowledge that ‘the link between grand corruption and mass human rights violations is undeniable’ (Freedom House, 2014, and also Woodrow Wilson Center, 2016: np., and Transparency International: 2008, ).

No less than heads of states and global financial institutions linked to London, New York and Switzerland have now been connected to an enormous shadow economy responsible for: hiding assets; exercising bribery; facilitating tax evasion; practicing financial fraud; enabling drug trafficking; and participating in sexploitation. (See ICIJ, 2016 and Huffington Post a, 2016, Huffington Post b, 2016: np, and BBCb, 2016: np ). And no fewer than 11 million documents have laid bare the global elite’s participation in a system purposefully rigged to increase the gap between the absurdly wealthy and the tragically poor.  The international community would do well to note too that this is a system which facilitates crime in desperate and conflict-vulnerable settings while arming the insurgents and terrorists who operate from within such settings (Patrick, 2009 and Napoleoni, 2003). We should also recall the system intentionally erodes democratic principles of transparency, fair taxation, the right to peaceful protest, and the exercise of free speech (Woodrow Wilson Center, 2016: np and Wolf, 2014: 5-8).  In short, this is a system wherein leaders and criminals alike actively undermines everything to which the international community aspires, and for which it ultimately endeavours; sometimes selflessly and in conditions of great hardship.

It should not go unrecognised that the responses of those who have been unveiled as both witting and unwitting participants in the darker aspects of this economy, all too consistently reiterate a mantra which should give each of us a moment’s pause for reflection – that lawyers and financial experts alike still possess the legal means of perpetrating unfair, corrupt, and increasingly unfair and corrupting practices. Vested interests in lofty positions have suggested big businesses, and their high-flying personnel, need to work in the shadow economy even when it lowers opportunities for smaller businesses and honest entrepreneurs.  They argue further that legislation against bribery ‘puts British companies at a competitive disadvantage’ (Barrington, 2016: 4). And yet still too, others have intoned that society needs to tacitly accommodate unethical practices in the financial sector on the grounds that businesses in their countries are too big to fail, or too important to risk having relocate to another country. But in making these accommodations we will be enabling the capture of entire governments by organisations whose interests do not include the common citizens who eke by and sustain the infrastructure enjoyed by those who have rigged the system against them (Johnson, 2009: np).  Such accommodation could only serve to entrench profit for the few at the cost of the many. We are, in effect, now experiencing parallel attacks on democracy by the licit and illicit economies alike – both of whom are seemingly melding into a deeper, more committed relationship in an increasingly shady capacity and whose political-economy will forever thwart the international community’s efforts in bringing peace and security.

Those who evade tax legally are allowed to escape criminality by conveniently structured legal technicalities. This phenomena is relatively easy to rectify. But the Big King Kleptocrats who knowingly act outside the law, do so understanding that successful prosecution against their acts is nearly unheard of. History and statistics remain firmly on their side. This is occurring regardless of corruption’s increasingly evident role in destabilising entire continents such as Africa, the Middle East, Asia, and Central and South America (Carnegie, 2015).  These actors smile comfortably while insinuating that exposure of their misdeeds might expose a larger, darker reality in which too many purportedly clean-skinned actors may also be complicit.

And while they may not be kind, they most certainly are proving wise.

Indeed, these same kleptocrats, and their advisors, will have followed closely the freedom and riches once more enjoyed by Egypt’s Hosni Mubarak who has now escaped charges of corruption and murder on a mere technicality (Reuters, 2015: np). Mubarak was a kleptocratic despot whose legacy includes death, blood, fear, and a deeply troubled country. He did not operate in a vacuum, and he was aided by the most powerful regimes in the world. But that does not excuse the outcome – nor does it justify the continuance of such behaviour. Those choosing to play in the dirty sandbox of blood and money in today’s shadow economy will have either dismissed the importance of the Arab Spring’s impact on security and human rights or cynically regarded the situation as yet another opportunity from which to leverage additional millions.  I argue that humanity can no longer afford such cynicism.

I further assert these same actors will have understood President Goodluck Jonathan’s dismissal of his bank governor following the well-intended public servant’s disclosure to the ‘Nigerian Senate that the treasury was missing billions of dollars in expected oil revenue’ (Wolf, 2014: 5). Indeed, Jonathan and his cronies seemed content to turn a blind eye to the networks which channelled money and arms to Boko Haram while leaving security forces ill equipped to quell an uprising which has now left more than 10,000 civilians and security personnel dead at the hands of Islamist savagery (Foreign Policy, 2015: np).

The kleptocrats will have further monitored the toppling of corrupt regimes in Tunisia and the Ukraine and reacted like narcissistic sociopaths unable to emotionally register the gravity of their actions, while concurrently making plans to fly to safety while maintaining access to their ill-gotten gains if the same danger knocks on their door.

The impunity enjoyed by this cohort, and structured into our globalised economy, has paved the way for much of the harm we see unfolding on the world’s stage. It has also provided resonant and compelling reasons from which the so called Islamic State, Boko Haram, and the Taliban find a seemingly endless supply of recruits (Chayes, 2007: 22, and Woodrow Wilson Center, 2016: np, and Schirch as cited in Mertus and Helsing, 2009: 68).

Whether knowingly or not, every last player in the shadow economy has contributed to an encroaching threat against humanity and which serves as nothing short of a security threat multiplier. It is of epic and global proportions.

The 2014 Ebola crisis in West Africa provides an immediate example of how easily corruption might impact security on a global scale. UN donor contributions topping $5.2bn were dispersed to Sierra Leone, Liberia and Guinea.  Almost all of it vanished, and only a fraction of the disbursement was ever audited. ‘In all three countries, no individual has been tried, much less convicted, for their role in the mismanagement of money meant to save the lives of the dying’ (Al Jazeera, 2016: np.).  These funds were also intended to contain the outbreak and prevent its spread.  The UN’s Global Ebola Response data refers to the outbreak’s nature as having been of ‘widespread and intense transmission’ (UN, 2014: np). But to date, the myriad pages and resources on their website speak only of a level of need and the current status of the situation.  Their silence of the flagrant misappropriation of funds perpetuates impunity.  And such complicit behaviour could very well facilitate a new pandemic of Ebola or some other virus, which experts warn could be incredibly difficult, if not impossible, to halt if not contained early, and with the utmost care; care which could never result in the face of another round of missing but badly needs funds (Oxford Martin School, 2012: np).

Grand Corruption further impacts security by destabilising regions in concussive shock waves. As migrants flee corrupt regimes and insurgencies (again, simultaneously fostered by the shadow economy), we see communities decimated, resentments grow, borders close, and trust diminish. (BBCa 2015: np,). Actions originating thousands of miles away from Europe’s shores are now threatening the cohesiveness of European states and the long architected interdependence of the EU.   The Schengen Agreement is further threatened as once ceded sovereignty is being repossessed by politicians seeking to erect borders and control the influx of desperate people fleeing the regimes which grand corruption has enabled.

Finally, kleptocracy feeds the thickening of the crime-conflict nexus as human traffickers, arms dealers, and smugglers share mutually beneficial relationships with terrorists, insurgents and the ruling elite. The nexus will continue to thicken so long as the chaotic conditions and lack of governance resulting from unabated kleptocracy ensures the conditions favourable to its growth.  (see Patrick, 2009,  and Lacher, 2012, and McMullin, 2009, and Jesperson, 2015 and Sloan and Cockayne, 2011).

And it is for these reasons, and so many more, that we must strive to end impunity for grand corruption – and the shadow economy in which it thrives.   Such a task will require concerted, relentless multilateral efforts and incredible political will.  But it can, and must be done.

We can begin by seizing opportunity from the momentum gathering in the wake of the Panama Papers and the associated Unaoil scandals in current headlines.  We can further reach out across the international community and form inter-organisational working teams to apply pressure on host-countries, the Bretton Woods institutions, and home governments.   We can institute training programs which dispel the activities which remain shrouded in mystery but whose reality can be unpacked in simple terms.  But most of all, we must challenge the sovereignty of those countries who refuse to participate in fair trade and good governance – and we must have an international court with both the will and capacity to challenge the problem.  And that court must somehow operate separately from the arbitrary and political interests of the United Nations Permanent 5.

But it has to start. Impunity has to end. And accountability must follow. And never has there been a more pressing time.

Post-script

As a post-script to my previous position piece, I would like to gently assert that the International Community has understandably tolerated grand corruption in the theatres of peacekeeping and peacebuilding operations. The conditions in many of these theatres have necessitated that our precious resources be used first to protect lives and second to institute the ground-level security needed to maintain sufficient equilibrium from which to begin the long, hard institutionalisation of security sector reform, transitional justice, and micro-development projects.  But this too provides another reason why the solution to grand corruption requires an international effort outside the influence of the P5 (whose own members might be guilty of grand corruption or geopolitics).  We must seek a solution which can pre-empt the looting of banks and act independently of outside political agendas which might situate a vulnerable country between winning and losing scenarios as powerful countries battle for control by proxy. We need a solution which sends a clear signal to corrupt elites across the entire world, and not simply those situated in areas of conflict, that corruption will no longer be tolerated, nor paid for by blood of innocent people.  But we, the donor countries, must see to our own houses first.  We must ensure our hands are clean and that any authority we exercise is comprised of substance and never hollow in its nature. We must lead from the front, and from genuine experience.  But we simply cannot afford to turn away from this issue – at home or abroad.  People are dying by guns and by starvation; and they are dying by torture when taking action to stop the atrocity at hand while having inadequate support behind and beside them.  We must be that support.

References

Al Jazeera Media (2016) The plunder of west Africa Ebola funds. Available at: http://www.aljazeera.com/indepth/opinion/2016/01/plunder-west-africa-ebola-funds-160125140155872.html (Accessed: 6 April 2016).

BBC (2016) Migration and citizenship, start the week – BBC radio 4. Available at: http://www.bbc.co.uk/programmes/b06ybg7h (Accessed: 3 April 2016).

BBC (2016) Panama papers: What the documents reveal. Available at: http://www.bbc.com/news/world-35956055 (Accessed: 6 April 2016).

Barrington, R. (2016) ‘Spot the Difference: Corruption Research, Academies and NGOs’, British Academy: British Academy. pp. 1–7.

Carnegie Endowment for International Peace (2014) Corruption: The Unrecognized Threat to International Security. Available at: http://carnegieendowment.org/files/corruption_and_security.pdf (Accessed: 14 March 2015).

Chayes, S. (2007) ‘Days of Lies and Roses: Selling Out Afghanistan’, Boston Review, , pp. 21–23.

Foreign Policy (2015) In Nigeria, $2 Billion in Stolen Funds is Just a Drop in the Corruption Bucket. Available at: http://foreignpolicy.com/2015/11/18/in-nigeria-2-billion-in-stolen-funds-is-just-a-drop-in-the-corruption-bucket/ (Accessed: 20 November 2015).

Freedom House (2014) ‘Combating Impunity: Transnational Justice and Anti-Corruption’, Washington, DC: Freedom House. pp. 1–10.

Huffington Post (2016) Big Banks Aided Firm at Center of International Bribery Scandal. Available at: http://www.huffingtonpost.com/entry/unaoil-citibank-hsbc_us_56feba02e4b0daf53aefa1da (Accessed: 6 April 2016).

Huffington Post (2016) There’s A huge new corporate corruption scandal. Here’s why everyone should care. Available at: http://www.huffingtonpost.com/entry/unaoil-bribery-scandal-corruption_us_56fa2b06e4b014d3fe2408b9 (Accessed: 6 April 2016).

ICIJ (2016) Giant leak of offshore financial records exposes global array of crime and corruption. Available at: https://panamapapers.icij.org/20160403-panama-papers-global-overview.html (Accessed: 6 April 2016).

ICIJ (2016) The Panama papers. Available at: https://panamapapers.icij.org/ (Accessed: 6 April 2016).

Jesperson, S. (2015) ‘Development Engagement with Organized Crime: a Necessary Shift or Further Securitisation?’, Conflict, Security, & Development, 15(1), pp. 23–50.

Johnson, S. (2009) The Quiet Coup. Available at: http://www.theatlantic.com/magazine/archive/2009/05/the-quiet-coup/307364/ (Accessed: 6 April 2016).

Lacher, W. (2012) Organized Crime and Conflict in the Sahel-Sahara Region.

McMullin, J. (2009) ‘Organised Criminal Groups and Conflicts: The Nature and Consequences of Interdependence’, Civil Wars, 11(1), pp. 75–102.

Napoleoni, L. (2003) Modern Jihad: Tracing the Dollars Behind the Terror Networks. London: Pluto Press.

Oxfam International (2015) Richest 1% will own more than all the rest by 2016. Available at: https://www.oxfam.org/en/pressroom/pressreleases/2015-01-19/richest-1-will-own-more-all-rest-2016 (Accessed: 6 April 2016).

Oxford Martin School (2012) Pandemics – can we eliminate major worldwide epidemics? | videos. Available at: http://www.oxfordmartin.ox.ac.uk/videos/view/208 (Accessed: 4 April 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security. Oxford: Oxford University Press.

Reuters (2015) Egypt’s high court overturns last conviction against Mubarak. Available at: http://www.reuters.com/article/us-egypt-mubarak-idUSKBN0KM0O620150113 (Accessed: 6 April 2016).

Schirch, L. (2006) Human Rights & Conflict: Exploring the Links between Rights, Law, and Peacebuilding. Edited by Julie A Mertus and Jeffrey W Helsing. Washington, DC: United States Institute of Peace.

Sloan, B. and Cockayne, J. (2011) ‘Terrorism, Crime, and Conflict: Exploiting the Differences Among Transnational Threats?’, Policy Brief, , pp. 1–11.

Transparency International (2008) ‘Human Rights and Corruption’, Working Paper, 05, pp. 1–6.

United Nations (2014) Global Ebola crisis response | data. Available at: http://www.un.org/ebolaresponse/data.shtml (Accessed: 6 April 2016).

Wolf, M.L. (2014) ‘The Case for an International Anti-Corruption Court’, Governance Studies at Brookings, July, pp. 1–15.

Woodrow Wilson Center (2016) Combatting grand corruption internationally. Available at: https://www.youtube.com/watch?v=GN6HDEgiSc8 (Accessed: 6 April 2016).

Deployment of Police Officers for United Nations Peace Operations – Samveka Tadius

Societies emerging from conflict face a myriad of security threats from extremists and other criminal organisations (Gowlland-Debbas and Pergantis, 2009). However, indigenous capacity by local security institutions to meet these challenges is always inadequate and sometimes non-existent (Dobbins, et al, 2007). Deployment of police officers on peace operations has been one of instrumental ways that has been used by United Nations to re-establish rule of law. With non-executive mission mandate, the police among other things, provide expert assistance, conduct operational assessments and train and develop host country policing capacity while in executive mandate police protects law and order while also building up national police capacity. These tasks require deployment of officers who have the best skills and knowledge in conducting police duties specific to the mission. However, this is not the case as observed by some authors and also through personal experience as a peacekeeper with the United Nations Mission in Liberia (UNMIL).

Dobbins, et al (2007) observe that international police have different policing techniques and understanding on human rights and democratic policing. Besides, policing is always understood from national perspective (Hills, 2009:65) and that there is no agreement to what constitutes appropriate policing. Bellamy and Williams (2010) also note that there is great demand in the role and responsibilities of UN Police but laments that most contributing countries are reluctant to send their most qualified officers for peacekeeping operations. This has resulted in ‘unqualified, inexperienced and underperforming officers to be deployed in the mission’ (Serafino, 2004:14). This was witnessed at Sanniquellie Police Station also at the UNMIL Police Division Headquarters between 2006 and 2007. Most officers lacked requisite skills to carry out the task of transferring skills to a ‘police force riddled with corruption, lack of professionalism and accountability’ (Human Rights Watch, 2013: 2).

Co-location, a strategy that required international police to work side by side with local police did not yield intended results because some of the UN Police Officers had little experience and knowledge compared to the local police officers. This happened for, example, in the area of community policing since this policing strategy was not known to police officers from some countries. This observation was also made by Smith, et al. (2007) who state that ‘the majority of candidates in the UNMIL mission failed to meet basic UN standards with little knowledge of international norms and standards for democratic policing with some having less professional experience and competence than the local police’. This lack of experience will be analysed through experience with some officers in Malawi when applying for peacekeeping duties especially at the time of preparing the Personal History (PH-11) forms.

When officers are preparing the PH-11 forms, they are guided by officers assigned to work in the Peace Support Operations Office who know the kind of skills that are required in particular mission area. Consequently, officers tailor their ‘experiences’ to meet the requirements of the mission. This finds officers who have served all their time in the police service as anti-riot officers, for instance, indicating working in community policing roles because they know that this is one key experience required in the specific mission. However, the problem of not having the right officers in peace operations can be resolved if the suggestions indicated below can be implemented.

The assessment that is made through the Selection Assistance Team to select officers eligible to go to peace operations should test requisite police function skills rather than mere comprehension, listening, report writing and driving abilities. Pre-deployment training is one tool used to bridge this gap in skills. The training should address specific issues such as democratic and community policing including legal systems applicable in the mission area and that this should be assessed through formal examination. Marking of the examinations be done by independent people rather than trainers and only those that pass with some level of proficiency be deployed.

In addition, regional bodies such as the African Union should have robust training for officers on deployment roster and such training should not be confined to the two weeks period they take. Inculcating professional knowledge and skills necessary for a post-conflict environment requires adequate time if these officers would be of relevance rather just being in the mission to get the Daily Subsistence Allowance which most officers focus on rather than transforming the local police.

There should also be a way of providing an incentive to member states that provide the best officers by promulgating them through such forum as United Nations General Assembly or any other means of appreciating their unreserved support. This would help to avert the problem of providing below standard officers.

It has been established that some officers that are sent on peace operations do not have required skills necessary for post-conflict environments. This can be rectified if appropriate measures can be put in place from selection criteria to pre-deployment training. This will assist the indigenous police to handle security issues that affect environments emerging from conflict through appropriate skills transfer.

Postscript

The problem of sending some unqualified or officers without requisite skills for a post-conflict environment has not been resolved for a number of reasons. Budgetary constraints by the organisations responsible for the deployed officers is key among the reasons. The United Nations is the main organisation deploying officers but it has been noted that all it does is sending officers to assist in the selection process of officers to be on the roster for deployment. The selection process only focuses on listening, comprehension and report writing which are not the only skills that police officers require in the mission.

The quality of officers deployed has also been compromised because training institutions conducting pre-deployment training use the number of officers trained as their performance indicator. The performance indicator should change from the number of officers trained to level of understanding of policing requirements in environments emerging from conflicts. Therefore, those who do not satisfactorily show understanding of the needs of the police in the mission should not be allowed to be deployed in the mission area.

Another reason is that strict measures are not followed from the selection process to training because of the fear that it will reduce number of available officers for deployment taking into consideration the fact that already the demand for officers is higher than supply by member states. It may be important to focus on the quality rather than the quantity because apart from inefficiencies by the officers lacking required skills, the UN spends its money on officers that do not provide any value in assisting the indigenous police officers.

References

Bellamy, A.J., and Williams, P.D. (2010) Understanding Peacekeeping. Cambridge: Polity.

Dobbins, J., Jones, S.G., Crane, K. and DeGrasse, B.C. (2007) The Beginner’s Guide to Nation-Building. Arlington: Rand Corporations.

Gowlland-Debbas, V. and Pergantis, V. (2009) ‘Rule of Law’ in V. Chetail (Ed) Post-Conflict Peacekeeping: A lexicon. Oxford: Oxford University Press.

Hills, A. (2009) Policing in Post-Conflict Cities. New York: Zed Books Limited.

Human Rights Watch (2013) No Money No Justice: Police Corruption and Abuse in Liberia [Online]. Available at: https://www.hrw.org/sites/default/files/reports/liberia0813_forUpload_0.pdf   [Accessed on 30 December 2015].

Serafino, N. (2004) Policing in Peacekeeping and Stability Operations: Problems and Proposed Solutions. Washington DC: Library of Congress Library.

Smith, J.G., Holt, V.K. and Dutch, W.J. (2007) From Timor Leste to Darfur: New Initiative for Enhancing UN Civilian Policing Capacity. Washington DC: Henry L. Stimson Centre. Issue Brief, August.

 

Demobilisation, Disarmament and Rehabilitation Programmes – Martin Rix

It is vital that in post-conflict planning adequate provision is given Demobilisation, Disarmament and Rehabilitation (DDR) programmes. Ensuring combatants and weapons are no longer in the field, coupled with effective reintegration – as those alienated from their communities may eventually decide to re-take arms – has consistently proven to reduce the possibility of hostilities resuming. Additionally, DDR assists in creating a secure space in which wider post-conflict reconstruction can take place to ensure long-term security and economic development.

However, DDR programmes can often be too narrow in focus or attempt a one-size-fits-all approach (Wessells, 2015), ignoring the differences between male, female and child-focused programmes. In many cases programmes may only provide tokenism (Gordon, Cleland Welch and Roos, 2015), which creates an illusion of inclusion – often to appease donors – but fails to provide the assistance actually required.

Our NGO is committed to a fully encompassing DDR that, while developing bespoke programmes for male, female and child ex-combatants, does so equally, acknowledging the similar and different requirements each of these groups have to allow appropriate planning and implementation.

Distinction between these three groups is vital, as each may require niche elements. For example, the longevity of adult and child programmes differ widely (Muggah, 2010), with child-focused programmes requiring long-term commitment that may not produce immediately measurable results (Save The Children, 2005), while careful consideration is required regarding the different levels of stigma received by male and female ex-combatants over their involvement in armed conflict – as well as requirements regarding childcare or the provision of traditional clothing (Bouta, 2005; World Bank, 2013).

We believe that timings are also key. Prolonging the commencement of programmes may test ex-combatants’ commitment to peace, while adult-focused programmes should begin at the earliest opportunity to ensure that ex-combatants are disarmed and re-assimilated into society before post-conflict democratic processes begin (Banholzer, 2014). Failure to ensure ex-combatants are reintegrated in order to partake in elections may result in further marginalisation and the re-emergence of old grievances. Equally, for child-focused DDR it is important to ensure participants are included on educational programmes as soon as possible.

We view the provision of education as integral. For children this should consist of school education and life skills. For example, programmes in Liberia focused on reading, writing and mathematics but also included practical skills in ‘agriculture…mechanics, carpentry, cosmetology, masonry, tailoring and baking’ (UNICEF, 2006). Adult-focused programmes should primarily focus on vocational training, but, depending on literacy levels, may include reading and writing education, which would utilise existing teaching contacts and resources.

We recognise that many of the foundations required for effective DDR programmes equate across all programme types. Regardless of age or sex, ex-combatants alienated from society may decide to re-take arms, so there must be education and training to raise awareness within wider society, promoting understanding of why ex-combatants require assistance and how programmes may differ in structure and design. These outreach programmes should be delivered by local politicians, business owners, teachers and religious leaders (Nilsson, 2005). It may also be perceived that those who perpetrated crimes during the conflict are taking jobs in a limited market (World Bank, 2013; Wessells, 2015) or are receiving funding, so print media, radio and television campaigns should be designed (World Bank, 2013) to reach a wider audience.

Our NGO also believes in shaping programmes to provide the support that ex-combatants actually require, not what it’s perceived they do. Every conflict zone is different and may involve a range of cultures or religions. To ensure our programmes effectively reflect this guidance and advice should be sought from male, female and child ex-combatants at each stage of the process (Wessells, 2015), from initial planning through to implementation, to ensure that programmes provide the correct support and are constantly improved.

Finally, no single element of a DDR programme can function without support from donors. Our NGO requires support from external and internal donors to ensure programmes provide a complete level of support for ex-combatants (Nilsson, 2005). It is vital that donors recognise that without providing adequate and equal resources for DDR programmes for men, women and children the risks of a resumption of violence increases.

DDR has consistently proved to be an effective tool in post-conflict rebuilding, however, programmes designed for only a selection of ex-combatants will not produce sufficient results. Providing bespoke DDR for men, women and children is pivotal for ensuring post-conflict security and that all ex-combatants are successfully reintegrated into society.

Postscript

Demobilisation, Disarmament and Rehabilitation (DDR) programmes have become integral to post-conflict development, however, while boasting many successes they have also failed in a number of key areas.

DDR is a three-step process, but often planners only focus on demobilisation. For example, during Sierra Leone’s 2003 programme 72,490 combatants were disarmed and 71,043 demobilised (Kaldor and Vincent, 2006) and while this helped ensure security, the process was, effectively, one of demobilisation, with estimates that only 2-10 percent of weapons in the country were collected (Kaldor and Vincent, 2006).

As men make up the majority of armed personnel, programmes often place the focus upon them, with requirements for women and children becoming an afterthought. There can be a general reluctance amongst female ex-combatants to register for DDR (Nilsson, 2005) as planners often fail to provide women-only centres and solutions to women’s issues, such as difficulty in securing work in traditional societies where the woman’s role is perceived to be in the home (World Bank, 2013).

For child-focused DDR, a lack of funding is a common problem. In 2004, former UN Secretary General Kofi Annan reported that donors had generally failed to fund children’s programmes to the same extent as other projects (Save The Children, 2005). It is argued that child DDR funding should not be reliant on adult programmes, as any setbacks will affect it (Muggah, 2010), but subsequently means planners overlook child-focused programmes as they can contradict donor priorities and may not provide headline results, particularly due to longer timescales.

References

Banholzer, L. (2014) When Do Disarmament, Demobilisation and Reintegration Programmes Succeed?, Bonn: German Development Institute, https://www.die-gdi.de/uploads/media/DP_8.2014.pdf, (accessed 25th September 2016)

Bouta, T. (2005) Gender and Disarmament, Demobilisation and Reintegration: Building Blocs for Dutch Policy, http://www.oecd.org/derec/netherlands/35112187.pdf, (accessed 13th August 2015).

Gordon, E., Cleland Welch, A. and Roos, E. (2015) Security Sector Reform and the Paradoxical Tension between Local Ownership and Gender Equality, University of Leicester, https://lra.le.ac.uk/bitstream/2381/33542/4/SSR%20Gender%20and%20LO%20-%20final%20draft%20-%20published%20version.pdf, (accessed 21st March 2016).

Kaldor, M. and Vincent, J. (2006) Evaluation of UNDP Assistance to Conflict-Affected Countries: Case Study Sierra Leone, http://web.undp.org/evaluation/documents/thematic/conflict/sierraleone.pdf, (accessed 3 September 2015).

Muggah, R. (2010) ‘Disarmament, Demobilization and Reintegration’ in V. Chetail (ed.) Post-conflict Peacebuilding: A Lexicon, Oxford: Oxford University Press, 123-137.

Nilsson, A. (2005) Reintegrating Ex-Combatants in Post-Conflict Societies, http://www.pcr.uu.se/digitalAssets/67/67211_1sida4715en_ex_combatants.pdf, (accessed 13th August 2015).

Save The Children (2005) Protecting Children in Emergencies: Escalating Threats To Children Must Be Addressed, http://www.savethechildren.org/atf/cf/%7B9def2ebe-10ae-432c-9bd0-df91d2eba74a%7D/policy_brief_final.pdf, (accessed 2nd May 2016).

UNICEF (2006) Protecting Children During Armed Conflict, http://www.unicef.org/chinese/protection/files/Armed_Conflict.pdf, (accessed 26th April 2016).

Wessells, M. (2015) Children and Armed Conflict. [Podcast] The Clarke Forum. 17th Feb 2016, https://itunes.apple.com/us/itunes-u/clarke-forum-for-contemporary/id719533242?mt=10, (accessed 7th May 2016).

World Bank (2013) Female Ex-Combatants Find Livelihoods and Acceptance in Burundi, https://www.youtube.com/watch?v=QPYpJMuqQFA, (accessed 13th August 2015).

The Need to Negotiate – Suzanne Fenton

‘Let us never negotiate out of fear, but let us never fear to negotiate.’ So said John F. Kennedy in his inaugural address as President in 1961. It is a sentiment that could have significant and positive repercussions today given the protracted conflicts that we see in the Middle East in particular and the increasing rise of refugees and Internally Displaced Persons (IDPs).

This position paper will focus on the lessons that may be learned from past conflicts and countries living in negative peace. It will attempt to explain why it is time for states involved in current conflicts to sit at the negotiating table and jointly develop a framework for peace.

In the case of Palestine, arguably the world’s most protracted conflict, Abu-Nimer and Kaufman (2006) argue that basic rights of Palestinians are violated on a daily basis. At the same time, it is important to acknowledge the ‘other’; in this case, the Israelis who are equally in fear of Palestinian suicide attacks so both the perceived and actual security of both sides is continuously violated. Peace and understanding has no hope of succeeding in such as atmosphere of mistrust and a vicious cycle of violence. Any future political agreement must tackle these issues in a more effective, pragmatic way. As human needs of identity, security and access to political power are at the core of protracted communal conflicts, Abu-Nimer and Kaufman support a human rights framework combined with the Dual Concern Model whereby a party must consider the rights and needs of the ‘other’. “Addressing the psychological dimension of protracted social conflict is key to its resolution,” argue Abu-Nimer and Kaufman.

It is a subject that Powell (2014), chief broker of the Northern Ireland peace deal, is familiar with, and a principle he has applied in practice. He stresses the need to speak with the enemy, saying there can be no purely military solution to a political problem. Powell acknowledges the issue that, for many, talking to terrorists may give them legitimacy. A case in point is the world’s response to ISIS thus far is an emotional one, a human one of horror and disgust, and therefore the very notion of negotiating with ISIS, the act of reaching out, is abhorrent to most. However, it is impossible to generate any form of peace in Iraq and Syria, without negotiations forming part of the action plan. However, this is easier said than done. Both parties must be willing to lay out also to directly address the grievances of Sunnis who were marginalised for years by Baghdad. For some Sunnis therefore, ISIS is an improvement and there is simply no viable alternative currently (Collard 2015). Referring to peacebuilding in Afghanistan, Duffield (2007) argues that politics is now at the forefront of peacebuilding efforts. In the case of ISIS then, the political solution is to first understand it.

Yet still there are many civilians and politicians that recoil at the thought of negotiating with illegitimate groups that commit such horrific acts. While this is human nature, it is important to understand that ethically speaking, talking to terrorists may eventually help save lives. What politicians have done so far has had almost no effect. Surely it is worth trying a method that has proved instrumental in the past and one that could transform not only the political landscape of the Middle East, but also the lives of its people.

Unless this is done in a practical and immediate way, there will never be an end to the many conflicts we see today. We owe it to future generations to start talking.

Postscript

Powell notes that actions such as setting false deadlines can cause already-fragile negotiations to fail in the past. Successful actions of focusing negotiations is to have the common goal of agreeing general principles or framework agreement. Having a skeleton agreement in place in Northern Ireland, while causing initial upset, actually helped to make the Good Friday agreement possible by including issues and demands and ruling out others.

Another key issue that often causes a barrier to negotiating is explaining to the public that the government is talking to terrorists. Given the current political climate and the fact that ISIS commits such atrocious acts and in the full glare of the world’s media, this would be a challenge today.

The move towards a real peace deal is when both sides can see a viable political way forward. There must also be a shift from the military faction to the political. Without the move from military to political, peace is not possible. With the conflict in Iraq and Syria still in the hands of the military, there is still a definite political element at play.

References

Abu-Nimer, M. and Kaufman, E. (2006) ‘Bridging Conflict and Transformation and Human Rights: Lessons from the Israeli-Palestinian Process’ in J. Mertus and J. Helsing [Eds] Human Rights & Conflict: Exploring the Links between Rights, Law and Peacebuilding, Washington: USIP, 277-307

Collard, R. (2015) ‘What We Have Learned Since ISIS Declared A Caliphate One Year Ago’, TIME magazine. Available at http://time.com/3933568/isis-caliphate-one-year/. Accessed on 20 June 2016

Duffield, M. (2007) Development, Security and Unending War: Governing the World of Peoples, Cambridge: Polity Press.

Kennedy, J.F. (1961) ‘Inaugural address of President John F. Kennedy’, available at https://www.jfklibrary.org/Research/Research-Aids/Ready-Reference/JFK-Quotations/Inaugural-Address.aspx

Powell, J. (2014) ‘How to talk to terrorists’, The Guardian. Available at https://www.theguardian.com/world/2014/oct/07/-sp-how-to-talk-to-terrorists-isis-al-qaida. Accessed on 19 June 2016.

Powell, J. (2014) Talking to Terrorists: How to end armed conflicts, London: The Bodley Head

Cyber Warfare – Olivier Dubois

Surprisingly enough, the SCID program is relatively silent on cyber warfare. It is briefly referred to in relation with the so-called new terrorism: terrorist groups would have the ability to carry out ‘electronic terrorist attack targeting critical infrastructure’ (Department of Criminology, 2013). This is a very narrow part of what constitutes nowadays cyber warfare and by no means does it capture the stakes of the current cyber arm race.

As with many new concepts, there is no universal accepted definition of the term. Most definitions underline the use of computers and digital means in a coordinated manner by a government or a non-state group with a purpose of causing disruption and/or damage (Sakharian, 2013; Andress, 2013). The target of a cyberwar is computers, networks and digitally controlled devices. If the objective may not be destructing physical infrastructure or killing people, the impacts of cyber operations cannot be contained to the digital world. It is not solely about offering a bloodless military superiority or an economic advantage (Kirsch, 2012). To the contrary, the US department of defence’s Laws of War manual (DoD, 2015) is explicit in recognising that certain cyber operation do constitute use of force in the meaning of Art. 2 § 4 of the UN charter. It cites Operations ‘ that: (1) trigger a nuclear plant meltdown; (2) open a dam above a populated area, causing destruction; or (3) disable air traffic control services, resulting in airplane crashes’ (DoD, 2015: 989). It is reported that more than 100 States are developing some forms of cyberwar capacity (Limnell, 2016).

As in our daily lives, the frontier between the digital and physical world is increasingly becoming difficult to identify. Cyber operations are equally challenging legal and policy boundaries. From a legal standpoint, the fact that a major military power like USA explicitly consider that cyber operations are submitted to both Jus ad Bellum and Jus in Bello (IHL) does not solve everything. Recognising a cyber operation as an act of war is important as it may influence the type of counter measure the victims may consider. It may as well contain policy makers in taking aggressive actions (Lin 2012). However, this restraining frame may be completely ineffective as the imputability or the attribution of a cyber operation to its perpetrator remains extremely difficult (Dortmans 2015, Lin 2012). As a result, waging an cyber attack is extremely low-cost and risk-free compared to the pay off (Limnell, 2016). States have still to learn to operate an adapted range of countermeasures to cyber attack in avoiding to make mistake that could jeopardise their political credit or cause an unwanted escalation in the conflict (Limnell, 2016). The danger of unwanted escalation is real. As a technological arm race is ongoing, states have little time to properly assess the effect of the arsenal and could be nevertheless tempted to unleash it.

The layers are at a loss. Applying IHL rules on the conduct of hostilities to cyber attack is thus extremely difficult and efforts of experts who have proposed to NATO the Tallinn Manual on the International Law applicable to Cyber Warfare is not entirely convincing (Schmitt, 2013). In the absence of precise knowledge on the offensive capacities of cyber weapons, it is very difficult to operationalise and respect the principles of distinction, proportionality and precautions (Droege, 2012). There is an urgent need for a new treaty banning certain cyber weapons and/or creating new regulatory and surveillance authority such as the one existing for chemical weapons or for atomic energy.

Political scientists are at bay, too. Policy framework and guidance have to be adapted to this new reality to ensure that cyberspace is not transformed in a wild battlefield. Regional or collective early warning system for aggressive cyber activity are inexistent. Cybersecurity and cyber warfare are ‘team sport’ where international cooperation is key. Old times alliances created for responding to threats in the physical world need to be shaken up to meet the challenge. International commission of investigation or international fact-finding missions on alleged cyber warfare activities are yet to be created or even suggested in the corridors of New York. Is it so utopian to imagine negotiating cyber cease-fire and mandating cyber observers, to be nicknamed the “Blue Tablets”, as modern peacekeepers for monitoring it? The new wars of the nineties have shaken the whole approach to peacebuilding. Cyber warfare offers a similar shift of paradigm. Let us not wait a ‘Cyber-Srebrenica’. Let us prevent it by thinking and acting out of the box now.

References

Andress, J. (2013) Cyber Warfare Techniques, Tactics and Tools for Security Practitioners, 2nd ed., Burlington: Elsevier Science.

Department of Criminology (2013), SCID module 6 Unit 3, Resource 1, Leicester: University of Leicester.

Department of Defence (2015) Law of War Manual, Washington DC: Department of Defence, available at http://www.defense.gov/Portals/1/Documents/DoD_Law_of_War_Manual-June_2015_Updated_May_2016.pdf (last accessed 21 September 2016).

Dortmans, P., Thakur, N. and Ween, A. (2015) ‘Conjectures for framing cyberwarfare’ Defense & Security Analysis 31(3): 172-184.

Droege, C. (2012) ‘Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians’ International Review Of The Red Cross 94(886): 533-578.

Kirsch, C. (2012) ‘Science fiction no more: cyber warfare and the United States’ Denver Journal of International Law and Policy 40(4): 620-686.

Limnéll, J. (2016) ‘The cyber arms race is accelerating- what are the consequences?’ Journal of Cyber Policy, (1)1: 50-60.

Lin, H. (2012) ‘Cyber conflict and international humanitarian law’ International Review of the Red Cross, 94(886): 515-531.

Shakarian, P. (2013) Introduction to Cyber-Warfare A Multidisciplinary Approach, Burlington: Elsevier Science.

Schmitt, M. (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.

Human Rights based Counter Terrorism Strategy – Mark Dixon

There is a compelling argument to revise the prevailing Counter Terrorism (CT) strategies in order to move away from ones that undermine Human Rights (HR). The Institute for Economics and Peace Global Terrorism Index (GTI) (2016) reports fatalities from terrorist attacks have increased nine fold since 2000, arguably impacting on the pre text of counter terrorism (CT) strategies of many countries. The GTI also highlights 78% of all terrorist attack fatalities occur in five countries namely Iraq, Nigeria, Afghanistan, Pakistan and Syria with only 2.6% occurring in the West. Despite the realities of the terrorist threat in the West we have witnessed increases in CT budget’s and strategies that undermine HR. This has lead to criticisms of both military action in Afghanistan and other locations and domestic legislation in many Western countries. An example of controversial legislation would be the control order provisions of the UK Prevention of Terrorism Act (2005), which was later repealed. Walker (2007) suggesting whilst such UK legislation was an attempt to fulfil a duty to protect, significant elements of the UK CT legislative framework was constitutionally deficient, lacking accountability and breaching HR.

President Obama’s Executive Order 13491 (2009) banning the U.S. government’s use of torture was also a rebuke to the Bush administration policies following the 9/11 attacks which authorised the use of ‘enhanced interrogation techniques’. The Senate Select Committee on Intelligence (SCCI) (2014) reporting the CIA’s interrogation program had not produced unique or valuable intelligence, this was immediately countered by ex CIA officials by means of the CIA Saved Lives (2014) web site on which it was stated the interrogation program had disrupted terrorist plots. However, both parties’ arguments focus on the validity of the tactic being dependant on the veracity of the information obtained, completely ignoring the human, legal and social consequences of torture. The reality is increases in budgets, militarised activity, legislative enactments allowing breaches of HR, and other gross breaches of HR in the name of CT has not reduced the threat level. Schulz (2001) suggests any CT policy that does not respect HR is counter productive, advocating not only is a HR orientated CT strategy morally correct but would be more affective than the prevailing approach.

It would be argued Western CT strategies have focused on quick fix operational aims rather than strategic impact. As a result the impact on; the trajectory of the ‘war on terror’, inciting further extremism, the relationship between the US its allies and the wider Islamic global population, the West’s ability to legitimately promote democracy, human rights globally and security in post conflict or fragile states have not been considered. Western governments have failed to understand ideologies that manifest, as terrorism created as a consequence of real or perceived injustices cannot be resolved using traditional military interventions. A HR centred CT approach would be better equipped to challenge the ideologies that fuel terrorism across the globe. It is an understanding of political, social and economic grievances and an acknowledgement that not all terrorists or terrorist motivations are the same that is the key to undermining terrorism.

A starting point when considering a HR approach to CT would be HR are not a luxury we can enjoy during times of peace. Paust (2006) argues CT strategies that impact on civil liberties and limit democracy do more damage to HR than the acts of terrorism they seek to prevent. He cites the use of collective punishment tactics by Israeli authorities against families when one family member is allegedly involved in terrorist acts. He argues not only has this done nothing to reduce Palestinian terrorist attacks but has provided opportunity for those supporting violence to promote and reinforce their ideologies. It would be suggested CT strategies that have a human security focus based on HR principles rather than that of national security, would be better equipped to tackle the causes of terrorism. Whilst it is not being suggested attack planning plots should be ignored CT strategies that focuses exclusively on the violent outcomes of terrorist acts will have little success in reducing the threat as the grievances that drive the ideologies remain. This is a view held by the former head of the British Security Service, Baroness Manningham-Buller, (2011) who suggests states should seek political solutions and reconciliation in the context of terrorism as foreign policy directly affects conciliation efforts. She adds it is her belief that the UK involvement in the invasion of both Iraq and Afghanistan contributed to the radicalisation of some UK citizens and did little to assist the security of the UK.

HR based CT strategies need to be coordinated transnationally and delivered with international consensus. They need to mobilise and engender national and international support, with particular emphasis in those areas of the globe that are disproportionately affected by terrorism. They should also support the advancement of international law and HR thus in turn promoting peace, security, and the rule of law globally particular within post conflict environments and locations experiencing fragile governance. This would encourage and enhance democracy and provide the supporting conditions needed for a reduction in the grievances that manifest as terrorism and promote effective conflict transformation and state building.

Post Script

In the immediate aftermath of 9/11 the Bush administration quickly framed the issues within the context of a ‘war on terror’ inferring some form of end game with winners and losers. This view failed to acknowledge terrorism itself is a tactic that can be potentially undermined or reduced but not eradicated. The response from the West was to adopt tactics suited to conventional military activity, leaving little space for any assessment of the grievances or motivations that was being represented through violent terrorist acts. The absence of any meaningful assessment exploring the broader implications of CT strategies that undermine HR resulting in a continuation of the prevailing attitudes.

Those who advocated human rights should not take precedents over the need to prevent terrorist attacks have opposed any debate suggesting the strategy adopted was an overreaction that could create social and political tensions and increase opportunities for radicalisation. This resulted in the absence of any meaningful dialogue and assessment of how a HR based approach to CT would be complementary to the ultimate aim of making people safe.

In the post 9/11 era immediate media reporting and globalisation has fuelled the popular misconception that international terrorism is one of the major threats to the West. However according to the World Economic Forum (2016) terrorism has not featured as a top ten global threat during the last ten years of reporting. Yet governments have chosen the option of immediate action focusing on operational aims rather than strategic outcomes. As a consequence we have seen a lack of international consensus and coordination in joint CT strategies that address the drivers of terrorism with emphasis rather on joint enforcement/military operations. Partnership working at an international level has been further complicated when considering that sovereign states have primary responsibility to protect their own citizens and combat terrorism in their county. However, when countries appear unwilling or unable to deliver against this and the threat posed is transnational in nature, challenges exist to both the international community and individual states in considering thresholds for intervention. The favoured option in these circumstances being military interventions for the purposes of expediency and short term gains.

References

Manningham-Buller, E. (2011) BCC Freedom, Securing Freedom: 2011 (episode 5), The Reith Lectures, London: BBC (44 mins) [online] available at http://www.bbc.co.uk/programmes/b014pxnq (accessed on 19/07/2016).

CIA Saved Lives (2014) [online] available at https://ciasavedlives.com (accessed on 08/09/2016).

Institute for Economics and Peace (2016) Global Terrorism Index 2015 [online] available at http://economicsandpeace.org/wp-content/uploads/2015/11/Global-Terrorism-Index-2015.pdf (accessed on 14/08/2016).

Paust J, J. (2006) ‘Human Rights, Terrorism and Efforts to Combat Terrorism’ in: J. Mertus and J. Helsing (eds.). Human Rights and Conflict. Exploring the Links between Rights, Law and Peacebuilding. Washington DC: United States Institute of Peace Press.

Senate Select Committee on Intelligence (SCCI) (2014) Study on CIA Detention and Interrogation Program [online] available at http://www.feinstein.senate.gov/public/index.cfm/senate-intelligence-committee-study-on-cia-detention-and-interrogation-program (accessed on 08/09/2016).

Schulz, W, F. (2001) In Our Own Interest: How Defending Human Rights Benefits Us All, Boston: Beacon Press.

The National Archives UK Legislation (2005) Prevention of Terrorism Act (2005) [online] available at http://www.legislation.gov.uk/ukpga/2005/2/contents (accessed on 14/08/2016).

The White House President Barack Obama (2009) [online] available at Executive Order 13491 — Ensuring Lawful Interrogations https://www.whitehouse.gov/the-press-office/ensuring-lawful-interrogations (accessed on 09/09/2016).

Walker, C. (2007) ‘Keeping control of terrorists without losing control of constitutionalism’, Stanford Law Review, 59(5): 1395.

World Economic Forum (2016) Insight Report Global Risks 2016, 11th Edition, Geneva: World Economic Forum, [online] available at http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf (accessed on 30/06/2016).

Afghanistan’s Endemic Corruption – Iain Blackwood

The author has elected out of all the subject matter taught on the Security, Conflict and International Development course to discuss ‘corruption’. Although the subject matter is discussed, the author has first hand experience of corruption, which other individuals who work in conflict zones will undoubtedly have experience of and will have to contend with.  As the author has been working and living in Afghanistan for a number of years and has experienced corruption in his daily business dealings and within his own organisation, which diverted funds allocated in assisting Afghanistans humanitarian needs.  Furthermore, corruption within Afghanistan is not only a problem but is happening on endemic proportions and is not just limited to the capital Kabul, but reaches every element of Afghan society.

To give an indication of how endemic corruption is within Afghanistan, the 2015 Asia foundation report, reported that the local Afghan population sees corruption as inescapable, which they encounter daily, and 89.9 percent of Afghans reporting corruption as thee foremost problem in their day-to-day lives and 91.2 percent, when dealing with varying levels of the Afghan government (Asia Foundation, 2015).  These high levels of corruption in the daily lives of the Afghan peoples can be seen as further exacerbating an already troubled emerging fragile state and the newly formed Afghan government it appears has done little in the way of countering the endemic proportions of corruption within Afghanistan.

Corruption in Afghanistan can be all encompassing and encountered in various forms from the man in the street buying bread, to prices being inflated to include extra charges to fuel prices, or government officials wanting their share of the price of registering an Armoured vehicle. Although some of the added fees may be insignificant in size and terms of profit margins, this is corruption and certainly, the sums being asked by Government officials are large and often blatant corruption.  This occurs to local Afghans and International actors and Non-Governmental Organisations (NGOs), alike.  Higher costs are incurred for International organisations as well as local Afghans but Internationals are perceived as being rich and capable of handing over ‘Baksheesh’ a bribe; to officials in order bypass the myriad rules and regulations, get paper work signed and officiated.

According to Transparency International (2015), Afghanistan is ranked 166 out of 168 and third worst country in the world for corruption. Therefore, corruption may emerge from necessity because of low wages or from the lack of education or just a way of Afghan life.  However, corruption is a way of life in Afghanistan and as previously mentioned encountered daily.  Although there have only been a handful of high profile prosecutions over the past decade these have principally involved money laundering through the  ‘hawala’ transfer system, which is an unofficial money system used to transfer proceeds both monetary and physical goods through normal merchant transactions to laundering the proceeds from Afghanistans pervasive opium industry (Ahmed, 2016).  Money laundering through the informal ‘hawala’ black market money transfer system is a major contributing factor in supporting criminality (Maimbo, 2003). This criminality within Afghanistan can further exacerbate an already fragile emerging failed state such as Afghanistan.  It is also known that criminal networks thrive in fragile and conflict states due to the disorganization of state infrastructures as well as other internal and external state dysfunction.  Still the Afghan government has done little prior to the election of Ashraf Ghani in cracking down and where clear cases of corruption have come to light, few cases have been investigated or prosecutions followed (FinTRACA, 2016). This is caused by a number of factors including complicit officials; weak financial polices, a weak government, which lacks both the expertise and will power to enforce its policies and follow through with its prosecution mechanisms Singh, (2015).

Additionally, according to Ashraf Ghani, criminal networks ‘often use formal government positions to promote criminal networks, as a result of which government offices degenerate into little more than a springboard for organized looting’, (Ghani and Lockhart, 2009: 80). To fight corruption it is necessary to initiate and populate educational elimination and reduction strategies together with new broad reaching law-enforcement measures, which would be considered a positive step, forward in fighting Afghanistan’s ongoing corruption and educating its population as to the harm corruption does. However in order to achieve its aims in crime reduction it also has to consider it conflict reduction programmes as crime and conflict go hand in hand in failed states. Although this is a tall order considering its curent unstable political climate and ongoing current counter insurgency (Banfield, 2014).

Postscript

Corruption is a human condition based on personal choice, coercion or group dynamics and has been recorded as far back as biblical times. Public officials have abused their offices for personal gain while populations have taken advantage by corrupting those holding power.  Corruption persists in countries that are susceptible to crime through weak and failed systems and ongoing conflicts where procedures and policies are lacking or do not exist.  It is therefore difficult to respond and prosecute offenders; this in part may be due to the fact that individuals lack the motivation to follow though investigations, or due to the Afghan judicial system having a entrenched corruption problem.

To counter corruption, anti-corruption measures must be embedded within institutions and organisations must be held accountable to higher offices. To do this simple crime reduction measures can be emplaced to deter individuals or groups of attempting to commit corruption, through such measures of having monitoring systems in place, greater transparency which may deter corruption, more surveillance and internal checks and greater prosecution and investigative checks.

Yet, these measures can also be implemented and adjusted to fit the means and the contextual factors involved. For example, greater monitoring, transparency, and internal checks could lead to those individuals in offices of importance to resist such measures for fear of revealing further malpractices of office or position.  Additionally, only when normal anti-corruption practices are in place and individuals are willing to work within these practices can crime reduction measures and campaigns be successful and ultimately eradicate the problem, however in Afghanistans case that may take some time yet due to the pervasiveness of it.

References

Ahmed, J. (2016) ‘Dirty Money in Afghanistan: How Kabul is Cleaning up the Illicit Economy’, Foreign Affairs, avaialable at https://www.foreignaffairs.com/articles/afghanistan/2016-09-07/dirty-money-afghanistan, (accessed 24th September 2016).

Asia Foundation (2015) ‘Afghanistan in 2015: A Survey of the Afghan People’, San Francisco: Asia Foundation.

FinTRACA (2016) Financial Transactions and Reports Analysis Center of Afghanistan (FinTRACA): Home Page, avaialable at http://www.fintraca.gov.af, (accessed 24th September 2016).

Ghani, A. and Lockhart, C. (2009) Fixing Failed States: A Framework for Rebuilding a Fractured World, Oxford: Oxford University Press.

High Office for Oversight and Anti-corruption (2016) Anti-Corruption Laws & Strategy, available at http://anti-corruption.gov.af/en/page/8477, (accessed 24th September 2016).

Maimbo, S. M. (2003) ‘The Money Exchange Dealers of Kabul: A Study of the Hawala System in Afghanistan’, World Bank Working Paper Series; No: 13, Washington, DC: World Bank, available at http://documents.worldbank.org/curated/en/335241467990983523/The-money-exchange-dealers-of-Kabul-a-study-of-the-Hawala-system-in-Afghanistan, (accessed 24th September 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security, New York: Oxford University Press.

Singh, D. (2015) ‘Explaining varieties of corruption in the Afghan Justice Sector’, Journal of Intervention and Statebuilding, 9:(2): 231-255.

Transparency International (2015) Corruption Perception Index 2015, avaialable at http://www.transparency.org/cpi2015#results-table, (accessed 24th September 2016).

Addressing current security threats through intelligence-led peacekeeping – Celine Demeyer

In the context of rapidly changing context and the growing number of actors involved in the security sector, harmonising international responses will be paramount to stabilising countries facing security various and complex security threats. The end of the Cold War brought along a new set of challenges for peacekeeping. In this context, the Brahimi report (UN, 2000) advocated for wider peacekeeping mandates allowing missions to better address a large range of challenges on the ground. The different nature of conflicts now requires an understanding of a range of conflict drivers, including political, security and socio- economic ones. This poses serious challenges for peacekeeping missions in terms of information- gathering and necessitates structural reform.

In order to effectively contribute to stabilisation in the context of civil wars, terrorism and other complex security threats such as transnational organised crime and terrorism, UN peacekeeping operations should adopt an intelligence- led methodology. The need for such a capability is recognised and has been reflected in various structural changes implemented within a larger UN peacekeeping reform, including the establishment of a Joint Mission Analysis Centre (JMAC) and a Joint Operations Centre (JOC) to conduct information gathering using military, police and civilian sources (UN, 2016).

While this has been an important step, various challenges remain. The objectives of intelligence activities should for example be more clearly defined. Contrary to purely military operations, intelligence in peacekeeping should aim at a political settlement conflicts, requiring information relating to a broad range of conflict drivers and thus necessitates a human resources capacity combining military and civilian competencies. Secondly, relevant and useful information can only be gathered when done in a structured manner and respecting ethical limitations. Standard operating procedures and organisational structures should therefore be established, allowing military, civilian and police components to contribute to intelligence gathering. Also in this regard, information systems should be implemented that can allow for secure storage and transmission of data as well as to improve their analysis. Once such a capacity is established operating procedures should be established to allow sharing of analysis with the relevant mission components and other decision makers (Abilova and Novosseloff, 2016).

In the framework of upcoming discussions with member states on the development of a policy framework it is recommended that existing initiatives such as the All Source Information Fusion Unit (ASIFU), established within the UN Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), should be analysed in a detailed manner and a lessons learned document presented to the member states for further discussion. Such a discussion should serve a twofold purpose. First, it should contribute to raising awareness among reluctant member states to grant sufficiently strong mandates to peacekeeping missions in order to allow them to deploy an adequate intelligence capacity tailored to a changing security environment and second, it should contribute to capitalising on existing knowledge as well as to mobilise member states to provide human and financial resources as well as technical expertise to further develop such a system.

Postscript:

From the start the term “intelligence” has been controversial as it is essentially opposed to the open and transparent nature of the UN and its work, leading to a quasi- avoidance of the term by the organisation. The problem is thus in essence one of confidentiality, as the UN is supposed to act as a neutral actor in conflict resolution. In addition, the issue of multilateralism versus unilateralism and thus the existence of political interests of certain UN member states prevents and will continue to prevent the development of a robust intelligence and information- sharing capability for UN Peacekeeping Operations (Diaz, 2007). On the operational level, the reluctance of states to contribute troops has led to low levels of expertise on the ground. There have however been a few exceptions, such as the case of MINUSMA where European countries in particular are providing expertise to enhance the information collection capacity of the mission. This is however the result of the interest of those countries in stabilising the Sahel region as it poses an indirect security threat to Europe, rather than a willingness to strengthen UN intelligence capacity in general.

Sources:

Abilova, O. and Novosseloff, A. (2016). Demystifying Intelligence in UN Peace Operations: Toward an Organizational Doctrine. Available at: https://www.ipinst.org/2016/07/demystifying-intelligence-in-un-peace-ops (Accessed on 15 September 2016).

Diaz, G. (2007). Intelligence at the United Nations for peace operations. UNISCI Discussion Papers, 13. Available at: https://www.ucm.es/data/cont/media/www/pag-72528/Gustavo13a.pdf (Accessed on 15 September 2016).

Karlsrud, J. and Smith, A. (2015). Europe’s Return to UN Peacekeeping in Africa? Lessons from Mali. Available at: http://www.ipinst.org/2015/07/europes-return-to-un-peacekeeping-in-africa-lessons-from-mali. (Accessed on 15 September 2016).

UN (2000). Report of the Panel on UN Peace operations (Brahimi report), A/55/305-S/2000/809. New York: United Nations.

UN (2016). Reform of peacekeeping. Available at: http://www.un.org/en/peacekeeping/operations/reform.shtml (Accessed on 15 September 2016).

 

UN International Day of Peace

dan-smithOn the occasion of the UN International Day of Peace, Dan Smith (Director of the Stockholm International Peace Research Institute, Professor of Peace and Conflict Studies at the University of Manchester, and former Secretary General of International Alert) has uploaded an excellent blog post on the current state of global armed conflict and progress towards peace. There are some clear correlations with the conflict predictions and factors which are said to contribute to conflict risks, which are currently being posted to the Blackboard Discussion Board by newly-enrolled SCID students. I would suggest that while Colombia is one of the most positive current examples of how peace can be found in the most intractable of conflicts, there are still significant risks present in Colombia (notably high levels of organised crime and corruption, and massive socio-economic inequalities) which are not adequately addressed by the peace agreement and, if left unaddressed, may compromise the peacebuilding process.

This post also includes SIPRI’s summary reflection on conflict and peace building in 2016, which is also very informative –

 

 

 

SCID Alumni

Hi everyone

Just to encourage all current and former SCID students to stay in contact after you graduate, not least to remain part of the excellent network we have of those affiliated to the SCID programme. As mentioned on the alumni page of this Blog, do let me know if you would like to be part of the formal SCID alumni and broader alumni of the Department of Criminology (email me on eg132@le.ac.uk with your name and email address). Also let me know if you want to be on the JISCMail group after you graduate and continue being signed up as an author to the SCID Blog.

You might also want to join the SCID (University of Leicester) LinkedIn Group – https://www.linkedin.com/groups/8491050 and the Department of Criminology Students and Alumni LinkedIn Group – https://www.linkedin.com/groups/7470047/profile.

For further details, please see the poster recently developed to profile SCID Alumni within the Department in Leicester. Thank you very much to Tim Ford and Ishaq Ibrahim who very kindly responded to a request for information and who are featured on an Alumni poster which will be displayed in the Department.alumni

Studying and Working in the Field

Iain Blackwood and Conor FoleyWith kind permission of Iain Blackwood (SCID student March 15 intake) and Conor Foley (member of the SCID Panel of Experts), here is an excellent photo of both of them when they recently met a couple of months ago in Kabul, Afghanistan. Coincidentally, they have met a couple of times while they were both working in Afghanistan, and spoke about the SCID Course and SCID-related topics. It is also credit to Conor that Iain decided to choose the SCID MSc course, after talking to Conor about which Master’s course to pursue when they met early last year. It’s a small world and great to hear how often the paths cross of those affiliated to the SCID Course. Thank you very much for sending the photo, Iain, and for advocating on behalf of the SCID Course, Conor.

It’s great to hear such stories and also see photos of SCID students, alumni and Panel members in the field or meeting together – so please do continue to send and I’ll upload them to the SCID Blog as I’m sure others are equally delighted to see them.

Thanks again and best wishes, Eleanor

Building Security and Justice After Conflict – Student Position Papers

At the end of the SCID Course, students are asked to reflect upon the whole Course and write a position paper (of about 750 words). The paper should be on an issue related to building security and justice in post-conflict environments that they feel most passionate about which requires attention by, at least an element of, the international community. The postscript to the paper summarises reasons why effective action has not been taken to date. Students are asked to draw on their own experience and knowledge as well as academic material, with the aim of persuading the reader to agree with the position put forward and, if necessary, to act, while displaying academic writing and analytical skills.

Those papers that secured a Merit or Distinction (i.e. above 60%) are reproduced on this Blog (below and on a new page entitled Building Security and Justice after Conflict – Student Position Papers). Congratulations to all students who did so well and to everyone in the September 2014 intake for completing the whole course – and all the very best with your dissertations.

Best wishes, Eleanor

Dividing the Threat Multiplier: An Argument for Effective International Prosecution Against Grand Corruption and Kleptocratic Regimes – Maren Moon

The release of the Panama Papers by the International Consortium of Investigative Journalists (ICIJ) has fuelled spectacular revelations regarding the scale of grand corruption and the wider system which enables it (ICIJ, 2016: np).  The scandal is exposing involvement by the very people and institutions who should feel morally and legally compelled to act with the highest integrity but who instead participate in a system all too frequently perpetrating wholesale crime, undue privilege, and the global erosion of security.  (Wolf, 2014: 3). They are doing so with impunity, and they are doing so while the world’s watchdogs cannot help but possess full knowledge that ‘the link between grand corruption and mass human rights violations is undeniable’ (Freedom House, 2014, and also Woodrow Wilson Center, 2016: np., and Transparency International: 2008, ).

No less than heads of states and global financial institutions linked to London, New York and Switzerland have now been connected to an enormous shadow economy responsible for: hiding assets; exercising bribery; facilitating tax evasion; practicing financial fraud; enabling drug trafficking; and participating in sexploitation. (See ICIJ, 2016 and Huffington Post a, 2016, Huffington Post b, 2016: np, and BBCb, 2016: np ). And no fewer than 11 million documents have laid bare the global elite’s participation in a system purposefully rigged to increase the gap between the absurdly wealthy and the tragically poor.  The international community would do well to note too that this is a system which facilitates crime in desperate and conflict-vulnerable settings while arming the insurgents and terrorists who operate from within such settings (Patrick, 2009 and Napoleoni, 2003). We should also recall the system intentionally erodes democratic principles of transparency, fair taxation, the right to peaceful protest, and the exercise of free speech (Woodrow Wilson Center, 2016: np and Wolf, 2014: 5-8).  In short, this is a system wherein leaders and criminals alike actively undermines everything to which the international community aspires, and for which it ultimately endeavours; sometimes selflessly and in conditions of great hardship.

It should not go unrecognised that the responses of those who have been unveiled as both witting and unwitting participants in the darker aspects of this economy, all too consistently reiterate a mantra which should give each of us a moment’s pause for reflection – that lawyers and financial experts alike still possess the legal means of perpetrating unfair, corrupt, and increasingly unfair and corrupting practices. Vested interests in lofty positions have suggested big businesses, and their high-flying personnel, need to work in the shadow economy even when it lowers opportunities for smaller businesses and honest entrepreneurs.  They argue further that legislation against bribery ‘puts British companies at a competitive disadvantage’ (Barrington, 2016: 4). And yet still too, others have intoned that society needs to tacitly accommodate unethical practices in the financial sector on the grounds that businesses in their countries are too big to fail, or too important to risk having relocate to another country. But in making these accommodations we will be enabling the capture of entire governments by organisations whose interests do not include the common citizens who eke by and sustain the infrastructure enjoyed by those who have rigged the system against them (Johnson, 2009: np).  Such accommodation could only serve to entrench profit for the few at the cost of the many. We are, in effect, now experiencing parallel attacks on democracy by the licit and illicit economies alike – both of whom are seemingly melding into a deeper, more committed relationship in an increasingly shady capacity and whose political-economy will forever thwart the international community’s efforts in bringing peace and security.

Those who evade tax legally are allowed to escape criminality by conveniently structured legal technicalities. This phenomena is relatively easy to rectify. But the Big King Kleptocrats who knowingly act outside the law, do so understanding that successful prosecution against their acts is nearly unheard of. History and statistics remain firmly on their side. This is occurring regardless of corruption’s increasingly evident role in destabilising entire continents such as Africa, the Middle East, Asia, and Central and South America (Carnegie, 2015).  These actors smile comfortably while insinuating that exposure of their misdeeds might expose a larger, darker reality in which too many purportedly clean-skinned actors may also be complicit.

And while they may not be kind, they most certainly are proving wise.

Indeed, these same kleptocrats, and their advisors, will have followed closely the freedom and riches once more enjoyed by Egypt’s Hosni Mubarak who has now escaped charges of corruption and murder on a mere technicality (Reuters, 2015: np). Mubarak was a kleptocratic despot whose legacy includes death, blood, fear, and a deeply troubled country. He did not operate in a vacuum, and he was aided by the most powerful regimes in the world. But that does not excuse the outcome – nor does it justify the continuance of such behaviour. Those choosing to play in the dirty sandbox of blood and money in today’s shadow economy will have either dismissed the importance of the Arab Spring’s impact on security and human rights or cynically regarded the situation as yet another opportunity from which to leverage additional millions.  I argue that humanity can no longer afford such cynicism.

I further assert these same actors will have understood President Goodluck Jonathan’s dismissal of his bank governor following the well-intended public servant’s disclosure to the ‘Nigerian Senate that the treasury was missing billions of dollars in expected oil revenue’ (Wolf, 2014: 5). Indeed, Jonathan and his cronies seemed content to turn a blind eye to the networks which channelled money and arms to Boko Haram while leaving security forces ill equipped to quell an uprising which has now left more than 10,000 civilians and security personnel dead at the hands of Islamist savagery (Foreign Policy, 2015: np).

The kleptocrats will have further monitored the toppling of corrupt regimes in Tunisia and the Ukraine and reacted like narcissistic sociopaths unable to emotionally register the gravity of their actions, while concurrently making plans to fly to safety while maintaining access to their ill-gotten gains if the same danger knocks on their door.

The impunity enjoyed by this cohort, and structured into our globalised economy, has paved the way for much of the harm we see unfolding on the world’s stage. It has also provided resonant and compelling reasons from which the so called Islamic State, Boko Haram, and the Taliban find a seemingly endless supply of recruits (Chayes, 2007: 22, and Woodrow Wilson Center, 2016: np, and Schirch as cited in Mertus and Helsing, 2009: 68).

Whether knowingly or not, every last player in the shadow economy has contributed to an encroaching threat against humanity and which serves as nothing short of a security threat multiplier. It is of epic and global proportions.

The 2014 Ebola crisis in West Africa provides an immediate example of how easily corruption might impact security on a global scale. UN donor contributions topping $5.2bn were dispersed to Sierra Leone, Liberia and Guinea.  Almost all of it vanished, and only a fraction of the disbursement was ever audited. ‘In all three countries, no individual has been tried, much less convicted, for their role in the mismanagement of money meant to save the lives of the dying’ (Al Jazeera, 2016: np.).  These funds were also intended to contain the outbreak and prevent its spread.  The UN’s Global Ebola Response data refers to the outbreak’s nature as having been of ‘widespread and intense transmission’ (UN, 2014: np). But to date, the myriad pages and resources on their website speak only of a level of need and the current status of the situation.  Their silence of the flagrant misappropriation of funds perpetuates impunity.  And such complicit behaviour could very well facilitate a new pandemic of Ebola or some other virus, which experts warn could be incredibly difficult, if not impossible, to halt if not contained early, and with the utmost care; care which could never result in the face of another round of missing but badly needs funds (Oxford Martin School, 2012: np).

Grand Corruption further impacts security by destabilising regions in concussive shock waves. As migrants flee corrupt regimes and insurgencies (again, simultaneously fostered by the shadow economy), we see communities decimated, resentments grow, borders close, and trust diminish. (BBCa 2015: np,). Actions originating thousands of miles away from Europe’s shores are now threatening the cohesiveness of European states and the long architected interdependence of the EU.   The Schengen Agreement is further threatened as once ceded sovereignty is being repossessed by politicians seeking to erect borders and control the influx of desperate people fleeing the regimes which grand corruption has enabled.

Finally, kleptocracy feeds the thickening of the crime-conflict nexus as human traffickers, arms dealers, and smugglers share mutually beneficial relationships with terrorists, insurgents and the ruling elite. The nexus will continue to thicken so long as the chaotic conditions and lack of governance resulting from unabated kleptocracy ensures the conditions favourable to its growth.  (see Patrick, 2009,  and Lacher, 2012, and McMullin, 2009, and Jesperson, 2015 and Sloan and Cockayne, 2011).

And it is for these reasons, and so many more, that we must strive to end impunity for grand corruption – and the shadow economy in which it thrives.   Such a task will require concerted, relentless multilateral efforts and incredible political will.  But it can, and must be done.

We can begin by seizing opportunity from the momentum gathering in the wake of the Panama Papers and the associated Unaoil scandals in current headlines.  We can further reach out across the international community and form inter-organisational working teams to apply pressure on host-countries, the Bretton Woods institutions, and home governments.   We can institute training programs which dispel the activities which remain shrouded in mystery but whose reality can be unpacked in simple terms.  But most of all, we must challenge the sovereignty of those countries who refuse to participate in fair trade and good governance – and we must have an international court with both the will and capacity to challenge the problem.  And that court must somehow operate separately from the arbitrary and political interests of the United Nations Permanent 5.

But it has to start. Impunity has to end. And accountability must follow. And never has there been a more pressing time.

Postscript

As a post-script to my previous position piece, I would like to gently assert that the International Community has understandably tolerated grand corruption in the theatres of peacekeeping and peacebuilding operations. The conditions in many of these theatres have necessitated that our precious resources be used first to protect lives and second to institute the ground-level security needed to maintain sufficient equilibrium from which to begin the long, hard institutionalisation of security sector reform, transitional justice, and micro-development projects.  But this too provides another reason why the solution to grand corruption requires an international effort outside the influence of the P5 (whose own members might be guilty of grand corruption or geopolitics).  We must seek a solution which can pre-empt the looting of banks and act independently of outside political agendas which might situate a vulnerable country between winning and losing scenarios as powerful countries battle for control by proxy. We need a solution which sends a clear signal to corrupt elites across the entire world, and not simply those situated in areas of conflict, that corruption will no longer be tolerated, nor paid for by blood of innocent people.  But we, the donor countries, must see to our own houses first.  We must ensure our hands are clean and that any authority we exercise is comprised of substance and never hollow in its nature. We must lead from the front, and from genuine experience.  But we simply cannot afford to turn away from this issue – at home or abroad.  People are dying by guns and by starvation; and they are dying by torture when taking action to stop the atrocity at hand while having inadequate support behind and beside them.  We must be that support.

References

Al Jazeera Media (2016) The plunder of west Africa Ebola funds. Available at: http://www.aljazeera.com/indepth/opinion/2016/01/plunder-west-africa-ebola-funds-160125140155872.html (Accessed: 6 April 2016).

BBC (2016) Migration and citizenship, start the week – BBC radio 4. Available at: http://www.bbc.co.uk/programmes/b06ybg7h (Accessed: 3 April 2016).

BBC (2016) Panama papers: What the documents reveal. Available at: http://www.bbc.com/news/world-35956055 (Accessed: 6 April 2016).

Barrington, R. (2016) ‘Spot the Difference: Corruption Research, Academies and NGOs’, British Academy: British Academy. pp. 1–7.

Carnegie Endowment for International Peace (2014) Corruption: The Unrecognized Threat to International Security. Available at: http://carnegieendowment.org/files/corruption_and_security.pdf (Accessed: 14 March 2015).

Chayes, S. (2007) ‘Days of Lies and Roses: Selling Out Afghanistan’, Boston Review, , pp. 21–23.

Foreign Policy (2015) In Nigeria, $2 Billion in Stolen Funds is Just a Drop in the Corruption Bucket. Available at: http://foreignpolicy.com/2015/11/18/in-nigeria-2-billion-in-stolen-funds-is-just-a-drop-in-the-corruption-bucket/ (Accessed: 20 November 2015).

Freedom House (2014) ‘Combating Impunity: Transnational Justice and Anti-Corruption’, Washington, DC: Freedom House. pp. 1–10.

Huffington Post (2016) Big Banks Aided Firm at Center of International Bribery Scandal. Available at: http://www.huffingtonpost.com/entry/unaoil-citibank-hsbc_us_56feba02e4b0daf53aefa1da (Accessed: 6 April 2016).

Huffington Post (2016) There’s A huge new corporate corruption scandal. Here’s why everyone should care. Available at: http://www.huffingtonpost.com/entry/unaoil-bribery-scandal-corruption_us_56fa2b06e4b014d3fe2408b9 (Accessed: 6 April 2016).

ICIJ (2016) Giant leak of offshore financial records exposes global array of crime and corruption. Available at: https://panamapapers.icij.org/20160403-panama-papers-global-overview.html (Accessed: 6 April 2016).

ICIJ (2016) The Panama papers. Available at: https://panamapapers.icij.org/ (Accessed: 6 April 2016).

Jesperson, S. (2015) ‘Development Engagement with Organized Crime: a Necessary Shift or Further Securitisation?’, Conflict, Security, & Development, 15(1), pp. 23–50.

Johnson, S. (2009) The Quiet Coup. Available at: http://www.theatlantic.com/magazine/archive/2009/05/the-quiet-coup/307364/ (Accessed: 6 April 2016).

Lacher, W. (2012) Organized Crime and Conflict in the Sahel-Sahara Region.

McMullin, J. (2009) ‘Organised Criminal Groups and Conflicts: The Nature and Consequences of Interdependence’, Civil Wars, 11(1), pp. 75–102.

Napoleoni, L. (2003) Modern Jihad: Tracing the Dollars Behind the Terror Networks. London: Pluto Press.

Oxfam International (2015) Richest 1% will own more than all the rest by 2016. Available at: https://www.oxfam.org/en/pressroom/pressreleases/2015-01-19/richest-1-will-own-more-all-rest-2016 (Accessed: 6 April 2016).

Oxford Martin School (2012) Pandemics – can we eliminate major worldwide epidemics? | videos. Available at: http://www.oxfordmartin.ox.ac.uk/videos/view/208 (Accessed: 4 April 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security. Oxford: Oxford University Press.

Reuters (2015) Egypt’s high court overturns last conviction against Mubarak. Available at: http://www.reuters.com/article/us-egypt-mubarak-idUSKBN0KM0O620150113 (Accessed: 6 April 2016).

Schirch, L. (2006) Human Rights & Conflict: Exploring the Links between Rights, Law, and Peacebuilding. Edited by Julie A Mertus and Jeffrey W Helsing. Washington, DC: United States Institute of Peace.

Sloan, B. and Cockayne, J. (2011) ‘Terrorism, Crime, and Conflict: Exploiting the Differences Among Transnational Threats?’, Policy Brief, , pp. 1–11.

Transparency International (2008) ‘Human Rights and Corruption’, Working Paper, 05, pp. 1–6.

United Nations (2014) Global Ebola crisis response | data. Available at: http://www.un.org/ebolaresponse/data.shtml (Accessed: 6 April 2016).

Wolf, M.L. (2014) ‘The Case for an International Anti-Corruption Court’, Governance Studies at Brookings, July, pp. 1–15.

Woodrow Wilson Center (2016) Combatting grand corruption internationally. Available at: https://www.youtube.com/watch?v=GN6HDEgiSc8 (Accessed: 6 April 2016).

Small Arms Control – Jonathan Bradbeer

One of the great challenges facing the world today is the widespread availability of small arms. Deaths related to Small Arms account for large proportion of the average of 52,000 battle deaths per year, along with the average of 500,000 non combat violent deaths per year (Krause 2010 p.4).

The destruction of Small Arms often occurs during a disarmament, demobilization and reintegration (DDR) process at the end of conflict, a process that aims to ensure that combatants return to civilian life and do not return to armed conflict. Whilst human combatants can have alternate occupations, weapons do not, as they are designed and built to kill people. Destruction of weapons guarantees they will not kill again.

Whilst the production of Small Arms is unlikely to cease, the destruction of exisiting surplus firearms should remain a priority for the international community, for the simple reason that it is a way to reduce violence: it is more difficult to raise and arm a violent group if there are no guns available.

Vast stockpiles of weapons exist in the world today, often insecurely stored and vulnerable to theft. A large majority of these weapons are still potentially lethal, but are outmoded in terms of design or calibre, and are thus unlikely to be carried by frontline troops in modern armies. Many of these weapons are Soviet designs from the 1950’s and 1960’s, and are of extremely robust construction, meaning that once they find their way into a conflict zone, they are liable to remain in circulation for at least half a century. These weapons, typically assault rifles and sometimes smaller calibre sub-machine guns, have a high rate of fire and a very high destructive capability, but are relatively cheap, owing to their obselescence and large numbers (Collier 2009).

Many armed groups today consist of ill-trained recruits under the age of eighteen who cannot expect to be paid a wage, but instead rely on rentseeking activities from populations that live in areas that have seen a breakdown in state authority (Kaldor 2012). Africa, and the Great Lakes Region in particular, have suffered from the curse of a surplus of small arms in widespread circulation, exacerbating conflict and adding to civilian deaths. Ownership or use of an automatic weapon itself often holds appeal, as it can be used endow the owner with a sense of power and threat (Munkler 2006).

Central to any policy in reducing Small arms needs to be the tracing of the movements of small arms and tighter regulation of all small arms transfers internationally. Progress has been made at the international level in reaching agreements for the creation of linked databases to aid in the tracing of weapons, along with innovations in the marking of weapons to assist in tracing (McDonald 2015). Some progress has also been made in reducing government stockpiles in Eastern Europe, a positive development as surpluses such as these can end up being sold to third world governments.

However, the pysical destruction of weapons must remain a central focus, and it is worth considering whether this process could be streamlined and be made more efficient. On the ground, methods of disposal of weapons often remain very basic, with ritualised burnings of weapons in ceremonies, crushing of weapons with heavy vehicles and the manual destruction of weapons on lathes. This destruction process is lengthy and difficult and time consuming, as is the procedure of collecting weapons and storing them until actual destruction occurs.

One proposed solution to this could be the creation of mobile crushing units, consisting of a crushing machine that can shred steel, set on the back of a middle-weight truck, with the shredded material being conveyed on a slide to a neighbouring dump-truck type vehicle. Systems such as this could speed up one aspect of the DDR process and thus contribute to a peacebuilding process, for example meaning that once the details of a weapon are recorded, it can be destroyed immediately, without the need to collect, store and guard weapons until such time as the destruction process is begun. This does not mean that a ceremony cannot be held with select weapons at a given time, only that immediate disposal options are available. Although there are no easy ways to dispose of ammunition other than traditional demolition methods, the instantaneous destruction of small arms could already be a first step in speeding up a disarmament process.

The case for an accelerated pace in the collection and destruction of Small Arms has notably been made by events in Libya in recent years, where rebels captured huge stockpiles of weapons amassed by the Qaddafi regime and these weapons have begun to be disperesed accross Africa. These weapons have already been shown to have helped fuel the ongoing conflict in Mali (Anders 2015), and will no doubt continue to be found in Africa and beyond for years to come.

Postscript

The UN has made slow but steady progress in helping to coordinate international policies regarding Small Arms and the latest Biennial Meeting of States produced a document in the form of BMS5, which features important recommendations on stockpile management, weapons marking, record keeping as well as tracing, with the progress in the latter category being a useful step forward (McDonald 2015).

However, little discussion was devoted to  weapons disposal, and possible ways forward here needs to be discussed more widely, to see what can be done to raise awareness and thus funding for projects that involve DDR. The physical destruction of weapons component of the DDR is perhaps the easiest to address and is easy to enact, and makes a simple platform to appeal from during fundraising activities, either at the regional or international level. Until this time, it seems that insufficient press has been given to DDR activities, and weapons disposal in particular, a situation which should be remedied as soon as possible since raising awareness of DDR can also raise awareness of conflict and the political choices wich can affect conflict.

References

Anders, H. (2015) ‘Expanding Arsenal: Insurgent Arms in Northern Mali’ in Small Arms Survey 2015, Cambridge: Cambridge University Press.

Collier, P. (2009) Wars, Guns and Votes: Democracy in Dangerous Places. Vintage:London

Kaldor, M.(2012) New and Old Wars: Organised Violence in a Global Era (3rd Ed.). Polity Press: Stanford

Krause,K.(ed.)(2010) Armed Groups and Contemporary Conflict: Challenging the Weberian State. Oxford: Routledge

McDonald, G. (2015) ‘One Meeting After Another: UN process Update’ in Small Arms Survey 2015, Cambridge: Cambridge University Press

Munkler, H.(2005) The New Wars. Polity Press:Cambridge.

Where are all the women? – Jane Townsley

Across the World there continue to be lost opportunities to build security and justice in post conflict environments by the marginalisation of women. It doesn’t make sense not to include those who can represent the needs and expectations of half the population. In the words of US Secretary of State John Kerry “no team can possibly win leaving half of the team on the bench” (Kerry, 2014 n.p.).

Women play a key role in our societies, they know what is happening within local communities and in many cases are able to influence others, including within traditional societies, where mothers have an important role to play in guiding the future path of their children. So when post conflict reform programs are being designed women need to be included in that process and in their subsequent delivery. There is evidence that when security actors take into account the differing needs of both men and women the likelihood of achieving their objectives is increased (Whiteman & O’Neill, 2012).

Focusing in particular on police reform the lack of involvement of women in certain environments particularly post conflict is shameful. According to Abbas (2016) the expansion of women’s role in law enforcement as well as the broader criminal justice system ‘Is the key necessary element to open the doors of peace and harmony around the globe. It is especially so in conflict zones and regions facing socioeconomic turbulence and instability”.

Gender responsive policing is about ensuring the needs of men and women, boys and girls are taken into account equally when delivering policing services as well as the needs of those men and women working within the police. In most cases the creation of a fully gender responsive police service within a post conflict environment requires not only increasing the number of women but also ensuring all officers are professionally trained and equipped to provide the best services to the communities they are there to protect. This does not mean that women should be restricted to non operational back office roles or that they alone should deal with women and children victims. Women officers can make a valuable contribution to operational roles, just their presence in hostile situations can defuse tensions. It is essential that male officers too have an awareness of the needs and expectations of women within society if trust and confidence is to be built for sustainable security and justice.  As stated by Bastick (2008:5) ”SSR efforts should, however not treat young men primarily as a security risk and women and girls primarily as victims”.

The status of women in law enforcement and governance is reflective of the status of women in communities which, in turn, determines a government’s ability to respond effectively to conflict (Bird, Townsley, 2015). Increasing access to justice for victims of gender based violence, something that is often prolific following conflict and disproportionately effects women and girls, is another benefit of gender responsive policing. In post-conflict societies it is far more likely that female victims would be dealt with by male officers, probably at police stations where there are no victim friendly facilities. More women officers can provide victims with the courage to take their first steps into the justice system however they need relevant training. For example, just staffing violence against women units with women officers who have had no specific training will do nothing to increase trust and confidence. Equally, professionally trained male officers can provide the necessary support and understanding required.

Where the numbers of women have been increased in policing within post-conflict environments they often are subject to discriminatory practices. In Pakistan, female officers make up less than 1% of police numbers and lack basic equipment, they are also discriminated against when it comes to nominations for training (Peters, Chughtai, 2014). In Afghanistan, where there is only 1 female officer for every 10,000 women (OXFAM, 2013) policewomen are often side lined into demeaning roles, abused and even killed (IAWP, 2014) “If you cannot safeguard women in the police, how can you possibly improve the situation for women in the community?” (IAWP, 2014: 1).

There is a disproportionate impact from conflict on women and girls when it comes to security and justice, yet they continue to be excluded from many post-conflict reform programs. Despite many advocates that the inclusion of women is essential for lasting peace, progress continues to be slow. Within security reform recruiting more women to the police alone will not solve the problem, policies and procedures need revising to create a fully inclusive police service. In order to achieve ‘real’ change, gender mainstreaming need to be replicated across the entire criminal justice system.

Postscript:

Why hasn’t effective action been taken to address the issues outlined above? A number of reasons exist but the overriding one is a lack of accountability. Who can hold governments to account? In post-conflict settings there is often at the start of reform and rebuilding processes institutions and government structures are broken if not totally collapsed. International actors including UN Peacekeepers can become involved but even then where does the true accountability lie? The only United Nations body with any ‘authority’ is the security council yet still atrocities persist across the globe, sometimes right under the noses of UN Peacekeepers such as in Rwanda and Bosnia.

The UNSC Resolution 1325 (2000) is specific about the role women should play in peacekeeping and peace building yet where is the accountability when so many member states still do not have National Action Plans 16 years after 1325 was accepted? Still only 60 member states have produced their plans (Institute for Inclusive Security, 2016n.p.). The achievement of the Millennium Development Goals did not succeed by 2015, again who holds governments to account? We now have the Sustainable Development Goals #16 ‘Peace, Justice and Strong Institutions’ (UN, 2016) being the most relevant to this paper. How will they be monitored and governments held to account? The UN Security Council was established following the end of WWII yet the World is a different place now and perhaps the make up of the permanent members of the security council is overdue a review something even Kofi Annan recognised whilst he was the UN Secretary General (Annan, 2013:142) as he stated, “For the Security Council to enjoy legitimacy in the twenty-first century, it needs to be not only effective but also representative” He went on to state, “The problem will not be that such countries will actively oppose the Security Council. It’s that they will ignore it” (Annan, 2013: 142).

References

Abbas, H. (2016) ‘Women Fighting for Peace: Lessons for Today’s Conflicts’ Committee on Foreign Affairs United States House of Representatives, Washington D.C.: USA, 22nd March 2016.

Annan, K. (2013) Interventions: A Life in War and Peace, New York: Penguin.

Bastick, M. (2008) Integrating Gender in Post-Conflict Security Sector Reform Policy Paper 29, Geneva: Geneva Centre for Democratic Control of Armed Forces (DCAF).

Bird, E. and Townsley, J. (2015) ‘Background’ Gender Agenda International, Sheffield: Flinch Design.

IAWP (International Association of Women Police) (2014) ‘Police Women in Afghanistan’ IAWP Campaign Briefing Paper, http://www.iawp.org/campaigns/Afghanistan/IAWPAfghanistanCampaign.pdf  (accessed 4th April 2016).

Institute for Inclusive Security (2016) National Action Plan Resource Centre http://actionplans.inclusivesecurity.org (accessed 4th Aril 2016).

Kerry, J. (2014) ‘Closing Remarks’ at Global Summit to End Sexual Violence in Conflict, London: Excel Centre, London, UK, 13th June 2014.

OXFAM (2013) Women and the Afghan Police – Why a law enforcement agency that respects and protects females is crucial for progress, OXFAM Briefing Paper 173 http://www.oxfam.org/en/policy/women-afghan-police (accessed 4th April 2016).

Peters, A. and Chughtai, H. (2014) ‘Why Pakistan Needs a Few More Good Women’ Foreign Policy http://foreignpolicy.com/2014/07/29/why-pakistan-needs-a-few-more-good-women/ (accessed 4th April 2016).

United Nations Security Council Resolution 1325 (2000) S/Res/1325 (2000), New York: United Nations.

United Nations (2016) 2030 Agenda for Sustainable Development and the Sustainable Development Goals http://sustainabledevelopment.un.org (accessed 4th April 2016).

Whiteman, T. and O’Neill, J. (2012) Attention to Gender Increases Security in Operations: Examples from the North Atlantic Treaty Organisation (NATO), Washington D.C.: The Institute for Inclusive Security.

The Responsibility to Protect doctrine – Mario Torre Alvarez

Considered as a core principle for human security, the Responsibility to Protect doctrine, henceforward R2P, has gained momentum as a toolbox used to protect civilians from suffering mass human-induced violence. The formulation of the norm was catalyzed by two key events, the genocide in Rwanda in 1994 and the Kosovo war in 1999. The R2P doctrine, which represents and evolution of the thinking of human rights, was embraced by the United Nations (UN) during the 2005 World Summit and endorsed by the UN General Assembly the same year during the 60th session (UN, 2005).

Throughout its three pillars, the R2P attributes the international community the obligation to ensure that the sovereign states exercises their citizen’s protection responsibilities in a timely and effective manner. The norm is aiming to fill any gap of compliance with the duty of protecting civilians by the sovereign states. The R2P doctrine reshaped the concept of sovereignty, by establishing a set of principles for the international intervention should a violation of any of the four protected core crimes be committed (ICISS, 2001).

In addition to its claimed potential corrosive effects, the R2P doctrine has received many critics over the years and continues being controversial. In many occasions, a misconception of the norm mixed with the different intervention criteria and structural problems have polarized opinions. In this context, the intervention in Libya vs the non-intervention in Syria has catalyzed an intense debate about the efficacy of the R2P doctrine, generating different levels of adherence to the norm within the international community. While the intervention in Libya demonstrated the R2P’s capacity to gather support and quickly mobilize a force, the non-intervention in Syria just highlighted the limitations of the norm (Keeler, 2011).

Indeed, the debate around the intervention in Syria was not about how to apply the humanitarian principles aim to prevent harm to civilians but about the self-interest of Russia and China using their veto power to torpedo Security Council resolutions on Syria. In this context, a significant number of academics claim that the different principles applied by the Security Council in both interventions have been led by hidden political agendas with marked positions. (Silander, 2013).

Likewise, the permanent five members continue to prioritize their geopolitical national interests over the protection of human rights. The possibility to tilt the delicate balance power in the region has overcome the atrocities committed in Syria. Like this, despite that the 5 years of conflict over 260,000 people have been killed, 13.5 million Syrians are in need of humanitarian assistance and the conflict shows no sign of abating, the United Nations is yet struggling to respond to the challenge. Although, as noted by Petrasek, the R2P is more than a doctrine for military intervention and provide the Security Council has not taken any step to enforce other coercive measures available (Petrasek, 2013). For instance, the mass atrocities committed in Syria by President Assad could have been referred to the International Criminal Court, in addition, to explore the possibility to impose arms embargoes or no fly zones.

The facts above only stress one of the R2P’s structural problems. As witnessed in Libya, the notion of an intervention is difficult to imagine without a country’s self-interests behind, at the same time these very same hidden agendas complicate the task of preventive interventions. Although the war in Syria has reached by far the threshold of requirements established in the R2P doctrine, the mechanisms triggering the response to the violations are lost in a series of politicized decisions unable to build enough consensus to act. Perhaps, as a result to the intervention in Libya where a resolution that was based on humanitarian grounds turned out to be only a change of regime.

Generally speaking, although detractors have decline over the years, the R2P’s intent to equal the importance of the individual and the state sovereignty has not met yet the large expectations. It could be concluded that the R2P ability’s to effect a neutral intervention has been lost due to its slow and selective implementation. Nowadays, the use of the veto power is inconsistent with the core value of saving lives embedded in the R2P doctrine.

Postscript

The following reasons have been identified as key factors preventing appropriate or effective action to address the issue:

  1. The hidden political agendas embedding geographical interest and different regional strategies. It is necessary to develop political commitment through a security sector reform and a much needed reform of the Security Council’s the veto system.
  2. The different criteria when applying the R2P principles. The norm should be promoted outside the existing framework policies. It is paramount to develop alternatives to the military intervention such as economic sanctions, no fly zones or a deeper involvement of the International Criminal Court.
  3. The lack of effective early warning system and capabilities specifically allocated have prevented an effective and efficient response.

References

International Commission on Intervention and State Sovereignty (2001) The Responsibility to Protect, Ottawa: ICISS.

Keeler, C. (2011) ‘The End of the Responsibility to Protect?’, Foreign Policy Journal, 12th October: 11.

Petrasek, D. (2013) ‘R2P – hindrance not a help in the Syrian crisis’, https://www.opendemocracy.net/openglobalrights/david-petrasek/r2p-%E2%80%93-hindrance-not-help-in-syrian-crisis, (accessed 4th April 2016).

Silander, D. (2013) ‘R2P-Principle and Practice The UNSC in Libya’, Journal of Applied Security Research, 25th March: 13.

United Nations (2005) A/RES/60/01 2005 World Summit Outcome New York: UNGA.

A position paper highlighting the need for better monitoring and evaluation of projects in the security and justice sectors following conflict – Jo Panayiotou

The Issue

The other day I agreed to read through an evaluation report written by a colleague following some training he had facilitated in Nigeria. Headline comment was the number of individuals that had completed the training and the capabilities they consequently had. I asked him how he knew the Nigerians would incorporate their training into their work and he looked at me blankly. Browsing through other reports, I found a similar story; evaluation was focusing on output rather than result. When searching for the reason for this I found the initial training requests had been agreed based on numbers trained. With no pressure to justify the effectiveness of the training, we hadn’t bothered. Both sides were ostensibly happy, we could boast about how we were helping to develop the capacity of the Nigerian security sector and they could publicise progress by their willingness to complete internationally recognised courses. Assigning monitoring and evaluation to an afterthought appears to typify the approach taken towards both by many projects and has led to deep concern over the effectiveness of such efforts in helping to ensure projects are meeting their objectives (Anderson, Chigas and Woodrow, 2007).

The aim of monitoring and evaluation is to ascertain the relevance and achievement of objectives, impact and sustainability (Popovic, 2008). Rynn and Hiscock (2009) suggest evaluation of projects in the security and justice sectors is done badly for many reasons. Firstly due to the challenges facing projects in general such as staff finding it burdensome, weak incentives to invest in evaluation, evaluation being poorly funded and donor-driven targets distorting priorities; but there are also challenges faced specifically by security and justice projects. Both sectors are complex thus it can be hard to isolate and evaluate changes, programme objectives can be deliberately vague to allow space to develop, projects can have multiple strands and budgets with little cohesion between the various mandates, actors can have limited understanding of evaluation processes and in fragile environments it can be difficult to gather evaluation evidence. The result is that monitoring and evaluation is frequently not done, and if done, not done well.

What Needs to be Done

What needs to be done is very clear. Yes, there are many challenges involved with monitoring and evaluating projects in post-conflict areas but tools, guidelines and systems already exist for other contexts that just require a bit of adaptation (Organisation for Economic Co-operation and Development, 2011). Rather than being a complex process that is poorly understood and therefore avoided, project managers need to ensure that individuals who are skilled in this area are employed and all other workers understand the importance of carrying out monitoring and evaluation. The best way to make this happen is ensuring monitoring and evaluation is planned for right from the inception stage of a project.

Why

As stated by Vandermoortele (2015), there are two fundamental reasons why security and justice projects need to be adequately monitored and evaluated. Firstly, so we can learn from our failures, indeed without adequate evaluation we may not even realise that we are failing. In Iraq following the 2003 intervention, several organisations ran projects to assist the state in managing its newly organised agricultural sector, seemingly successful in themselves but a lack of monitoring and evaluating impact meant that much needed help for the farmers to grow and distribute their produce was overlooked and consequently produce ended up rotting as people starved (Hassin and Isakhan, 2016). Funding is a finite resource, it is therefore essential that truly successful projects are identified so they can be scaled up or replicated and unsuccessful projects can either be restructured or closed down.

The second fundamental need for monitoring and evaluation is so we can highlight positive achievements (Vandermoortele, 2015). Documented evidence of success obtained through monitoring and evaluation can serve as a catalyst for attracting further funds and help convince recipients of the credibility of the projects. It can also highlight projects that are having similar effects in the same communities and so help refine and deconflict objectives to ensure resources across all projects are having the maximum effect in the targeted communities.

Summary

Monitoring and evaluation needs to be an integral element of all security and justice projects in post-conflict areas as it is the only way to determine if projects are successful or not. To overlook monitoring and evaluation is to risk consigning valuable resources, time and effort to projects that do not work and not learning the valuable lessons from projects that are successful.

Postscript

There are two main reasons why monitoring and evaluation are not done well. First, I believe they are poorly understood. Within my own organisation, the British Army, external evaluation cells across the training establishments were the first to be cut when it came to finding savings because their purpose and value were not understood. The same applies when it comes to the work we do abroad helping to improve the capacity of foreign armies. People are willing to release funds to send across training teams to conduct the training because there are tangible outputs – hands to be shaken, photos to be taken. It becomes extremely difficult to persuade the budget holders to follow up the training with evaluation because it is seen as taking funds away from further training.

This leads on to the second reason, an unwillingness to invest resources. As stated above, monitoring and especially evaluation in post-conflict environments can be challenging. Without having a clear idea of how they could be done effectively, it is easier to do nothing. Additionally, more often than not, projects are competing for funds and are under pressure to demonstrate value for money. Conducting effective evaluation could provide this evidence in the longer term but in the shorter term, it requires resources but may provide no tangible gain to the project. It therefore may seem to be expedient to concentrate all resources towards achieving the maximum results in the short term to procure further funds.

References

Anderson, M., Chigas, D. and Woodrow, P. (2007) Encouraging Effective Evaluation of Conflict Prevention and Peacebuilding, Paris: OECD, http://www.oecd.org/dac/evaluation/dcdndep/39660852.pdf, (accessed 26th March 2016).

Hassin, A. and Isakhan, B. (2016) ‘The Failures of Neo-Liberal State Building in Iraq: Assessing Australia’s Post-Conflict Reconstruction and Development Initiatives’ Australian Journal of Politics and History 62(1): 87-99.

Organisation for Economic Co-operation and Development, (2011) Handbook on Security System Reform, Paris: OECD.

Popovic, N. (2008) ‘Security Sector Reform Assessment, Monitoring and Evaluation and Gender’ in M. Bastick and K. Valasek (eds) Gender and Security Sector Reform Toolkit, Geneva: DCAF, OSCE/ODIHR.

Rynn, S. and Hiscock, D. (2009) Evaluating for Security and Justice, London: Saferworld.

Vandemoortele, A. (2015) Learning from Failure? British and European Approaches to Security and Justice Programming, http://www.ssrresourcecentre.org/2015/03/13/learning-from-failure-british-and-european-approaches-to-security-and-justice-programming/, (accessed 26th March 2016).