Tag Archives: security

African Armies Governance: An expected transformation

Last year I wrote an article emphasizing the climate of uncertainty which prevailed within several African military institutions in particular Chad, Ivory Coast and Somalia, to take only these examples. Several countries being in phase of reconstruction because of successive military and political crises, know difficulties rebuilding their armies and maintaining a certain cohesion or often an exemplary discipline. Gambia, Mali and Burkina Faso, are examples of country among which the armies for diverse reasons, remain fragile in spite of all the efforts of current reconstruction.

One must recognize that, the largest number of countries which armies are fragile, is because of internal crises and because of political manipulation of the military tool. The political instrumentalization for purposes of positioning, remains the main cause of the diverse unrests but you should not either hide the insufficiency of governance of these armies. The case of Chad reminds us of how much the non-payment of bonuses due to soldiers who intervened within a UN framework, is an aberration regarding  the governance of the defense sector. Worse, the Chadian President requested the international financial support, to support the actions of his soldiers in Mali within the framework of the fight against terrorism and it was the object of no reaction. Let us not forget that Chad remains one of the most committed countries in the fight against terror.

How do these countries manage not being able to settle arrears of bonuses promised in a context or an other one? How do they manage not to anticipate these unrests within the armies being regularly transformed into mutinies? It seems that the weaknesses of these countries are at the level of the governance of their armies. A Coherent and active governance of the Defense sector effectively allows to anticipate major crises such as mutinies. The governance of the Defense sector rests essentially on the bodies of the armies in charge of governance, which are  the inspection and control services, contributing to the stability of the military institution. Besides another mechanism of anticipation and governance of the Defense sector is the National Assembly which through democratic control of the armies, provides coherent governance of the military and alerts on possible deficiencies to consider. In fact this is about a major gouvernance watch device based on internal mechanisms to the armies (inspection and control) but also over external mechanisms (Civil society, NGOs, National Assembly, etc.) to anticipate crises which can destabilize the concerned countries.

So, the transformation of African armies on the basis of a sincere commitment of the decision-makers, is imperative more than ever. The general unrest of the armies which very often is only an accumulation of dysfunctions from inheritance, must be handled frontally with realism and political courage. When it turns out to be necessary, a simple revision can settle this discontent through a Security Sector Reform (SSR), in the worst case, a revival (dissolution and reconstruction) of the armies is inevitable. In any case, a brave political will matched by a consequent defence budget, determines the success of such an initiative, wether it is about restructuring, revision, or dissolution with the aim of reconstruction.

Outside the African continent, several countries experimented the dissolution of the armies with mixed results (Costa Rica, Haiti and Panama). For Costa Rica and Panama, the effort was put on a well equipped police force and Defense agreements, as for Haiti, which had dissolved its army in 1996, reconstruction was engaged since 2014. We thus recommend on the basis of this observation of general unrest of the African armies, that the African Union ( AU) can convene an emergency meeting to examine this thorny question and to establish an African special program for armies reconstruction of countries wishing it. This program could be financed by the AU countries themselves but also with the bilateral and multilateral cooperations. Finally, A fund raising campaign could support this vast continental program.

Building Security and Justice After Conflict – Student Position Papers

 

At the end of the SCID Course, students are asked to reflect upon the whole Course and write a position paper (of about 750 words). The paper should be on an issue related to building security and justice in post-conflict environments that they feel most passionate about which requires attention by, at least an element of, the international community. The postscript to the paper summarises reasons why effective action has not been taken to date. Students are asked to draw on their own experience and knowledge as well as academic material, with the aim of persuading the reader to agree with the position put forward and, if necessary, to act, while displaying academic writing and analytical skills.

Those papers that secured a Merit or Distinction (i.e. above 60%) are reproduced on this Blog (below and on a new page entitled Building Security and Justice after Conflict – Student Position Papers). Congratulations to all students who did so well and to everyone in the March 2015 intake for completing the whole course – and all the very best with your dissertations.

I hope you enjoy reading the following position papers as much as I did. Please share, like, and comment.

Best wishes, Eleanor

Dividing the Threat Multiplier: An Argument for Effective International Prosecution Against Grand Corruption and Kleptocratic Regimes – Maren Moon

The release of the Panama Papers by the International Consortium of Investigative Journalists (ICIJ) has fuelled spectacular revelations regarding the scale of grand corruption and the wider system which enables it (ICIJ, 2016: np).  The scandal is exposing involvement by the very people and institutions who should feel morally and legally compelled to act with the highest integrity but who instead participate in a system all too frequently perpetrating wholesale crime, undue privilege, and the global erosion of security.  (Wolf, 2014: 3). They are doing so with impunity, and they are doing so while the world’s watchdogs cannot help but possess full knowledge that ‘the link between grand corruption and mass human rights violations is undeniable’ (Freedom House, 2014, and also Woodrow Wilson Center, 2016: np., and Transparency International: 2008, ).

No less than heads of states and global financial institutions linked to London, New York and Switzerland have now been connected to an enormous shadow economy responsible for: hiding assets; exercising bribery; facilitating tax evasion; practicing financial fraud; enabling drug trafficking; and participating in sexploitation. (See ICIJ, 2016 and Huffington Post a, 2016, Huffington Post b, 2016: np, and BBCb, 2016: np ). And no fewer than 11 million documents have laid bare the global elite’s participation in a system purposefully rigged to increase the gap between the absurdly wealthy and the tragically poor.  The international community would do well to note too that this is a system which facilitates crime in desperate and conflict-vulnerable settings while arming the insurgents and terrorists who operate from within such settings (Patrick, 2009 and Napoleoni, 2003). We should also recall the system intentionally erodes democratic principles of transparency, fair taxation, the right to peaceful protest, and the exercise of free speech (Woodrow Wilson Center, 2016: np and Wolf, 2014: 5-8).  In short, this is a system wherein leaders and criminals alike actively undermines everything to which the international community aspires, and for which it ultimately endeavours; sometimes selflessly and in conditions of great hardship.

It should not go unrecognised that the responses of those who have been unveiled as both witting and unwitting participants in the darker aspects of this economy, all too consistently reiterate a mantra which should give each of us a moment’s pause for reflection – that lawyers and financial experts alike still possess the legal means of perpetrating unfair, corrupt, and increasingly unfair and corrupting practices. Vested interests in lofty positions have suggested big businesses, and their high-flying personnel, need to work in the shadow economy even when it lowers opportunities for smaller businesses and honest entrepreneurs.  They argue further that legislation against bribery ‘puts British companies at a competitive disadvantage’ (Barrington, 2016: 4). And yet still too, others have intoned that society needs to tacitly accommodate unethical practices in the financial sector on the grounds that businesses in their countries are too big to fail, or too important to risk having relocate to another country. But in making these accommodations we will be enabling the capture of entire governments by organisations whose interests do not include the common citizens who eke by and sustain the infrastructure enjoyed by those who have rigged the system against them (Johnson, 2009: np).  Such accommodation could only serve to entrench profit for the few at the cost of the many. We are, in effect, now experiencing parallel attacks on democracy by the licit and illicit economies alike – both of whom are seemingly melding into a deeper, more committed relationship in an increasingly shady capacity and whose political-economy will forever thwart the international community’s efforts in bringing peace and security.

Those who evade tax legally are allowed to escape criminality by conveniently structured legal technicalities. This phenomena is relatively easy to rectify. But the Big King Kleptocrats who knowingly act outside the law, do so understanding that successful prosecution against their acts is nearly unheard of. History and statistics remain firmly on their side. This is occurring regardless of corruption’s increasingly evident role in destabilising entire continents such as Africa, the Middle East, Asia, and Central and South America (Carnegie, 2015).  These actors smile comfortably while insinuating that exposure of their misdeeds might expose a larger, darker reality in which too many purportedly clean-skinned actors may also be complicit.

And while they may not be kind, they most certainly are proving wise.

Indeed, these same kleptocrats, and their advisors, will have followed closely the freedom and riches once more enjoyed by Egypt’s Hosni Mubarak who has now escaped charges of corruption and murder on a mere technicality (Reuters, 2015: np). Mubarak was a kleptocratic despot whose legacy includes death, blood, fear, and a deeply troubled country. He did not operate in a vacuum, and he was aided by the most powerful regimes in the world. But that does not excuse the outcome – nor does it justify the continuance of such behaviour. Those choosing to play in the dirty sandbox of blood and money in today’s shadow economy will have either dismissed the importance of the Arab Spring’s impact on security and human rights or cynically regarded the situation as yet another opportunity from which to leverage additional millions.  I argue that humanity can no longer afford such cynicism.

I further assert these same actors will have understood President Goodluck Jonathan’s dismissal of his bank governor following the well-intended public servant’s disclosure to the ‘Nigerian Senate that the treasury was missing billions of dollars in expected oil revenue’ (Wolf, 2014: 5). Indeed, Jonathan and his cronies seemed content to turn a blind eye to the networks which channelled money and arms to Boko Haram while leaving security forces ill equipped to quell an uprising which has now left more than 10,000 civilians and security personnel dead at the hands of Islamist savagery (Foreign Policy, 2015: np).

The kleptocrats will have further monitored the toppling of corrupt regimes in Tunisia and the Ukraine and reacted like narcissistic sociopaths unable to emotionally register the gravity of their actions, while concurrently making plans to fly to safety while maintaining access to their ill-gotten gains if the same danger knocks on their door.

The impunity enjoyed by this cohort, and structured into our globalised economy, has paved the way for much of the harm we see unfolding on the world’s stage. It has also provided resonant and compelling reasons from which the so called Islamic State, Boko Haram, and the Taliban find a seemingly endless supply of recruits (Chayes, 2007: 22, and Woodrow Wilson Center, 2016: np, and Schirch as cited in Mertus and Helsing, 2009: 68).

Whether knowingly or not, every last player in the shadow economy has contributed to an encroaching threat against humanity and which serves as nothing short of a security threat multiplier. It is of epic and global proportions.

The 2014 Ebola crisis in West Africa provides an immediate example of how easily corruption might impact security on a global scale. UN donor contributions topping $5.2bn were dispersed to Sierra Leone, Liberia and Guinea.  Almost all of it vanished, and only a fraction of the disbursement was ever audited. ‘In all three countries, no individual has been tried, much less convicted, for their role in the mismanagement of money meant to save the lives of the dying’ (Al Jazeera, 2016: np.).  These funds were also intended to contain the outbreak and prevent its spread.  The UN’s Global Ebola Response data refers to the outbreak’s nature as having been of ‘widespread and intense transmission’ (UN, 2014: np). But to date, the myriad pages and resources on their website speak only of a level of need and the current status of the situation.  Their silence of the flagrant misappropriation of funds perpetuates impunity.  And such complicit behaviour could very well facilitate a new pandemic of Ebola or some other virus, which experts warn could be incredibly difficult, if not impossible, to halt if not contained early, and with the utmost care; care which could never result in the face of another round of missing but badly needs funds (Oxford Martin School, 2012: np).

Grand Corruption further impacts security by destabilising regions in concussive shock waves. As migrants flee corrupt regimes and insurgencies (again, simultaneously fostered by the shadow economy), we see communities decimated, resentments grow, borders close, and trust diminish. (BBCa 2015: np,). Actions originating thousands of miles away from Europe’s shores are now threatening the cohesiveness of European states and the long architected interdependence of the EU.   The Schengen Agreement is further threatened as once ceded sovereignty is being repossessed by politicians seeking to erect borders and control the influx of desperate people fleeing the regimes which grand corruption has enabled.

Finally, kleptocracy feeds the thickening of the crime-conflict nexus as human traffickers, arms dealers, and smugglers share mutually beneficial relationships with terrorists, insurgents and the ruling elite. The nexus will continue to thicken so long as the chaotic conditions and lack of governance resulting from unabated kleptocracy ensures the conditions favourable to its growth.  (see Patrick, 2009,  and Lacher, 2012, and McMullin, 2009, and Jesperson, 2015 and Sloan and Cockayne, 2011).

And it is for these reasons, and so many more, that we must strive to end impunity for grand corruption – and the shadow economy in which it thrives.   Such a task will require concerted, relentless multilateral efforts and incredible political will.  But it can, and must be done.

We can begin by seizing opportunity from the momentum gathering in the wake of the Panama Papers and the associated Unaoil scandals in current headlines.  We can further reach out across the international community and form inter-organisational working teams to apply pressure on host-countries, the Bretton Woods institutions, and home governments.   We can institute training programs which dispel the activities which remain shrouded in mystery but whose reality can be unpacked in simple terms.  But most of all, we must challenge the sovereignty of those countries who refuse to participate in fair trade and good governance – and we must have an international court with both the will and capacity to challenge the problem.  And that court must somehow operate separately from the arbitrary and political interests of the United Nations Permanent 5.

But it has to start. Impunity has to end. And accountability must follow. And never has there been a more pressing time.

Post-script

As a post-script to my previous position piece, I would like to gently assert that the International Community has understandably tolerated grand corruption in the theatres of peacekeeping and peacebuilding operations. The conditions in many of these theatres have necessitated that our precious resources be used first to protect lives and second to institute the ground-level security needed to maintain sufficient equilibrium from which to begin the long, hard institutionalisation of security sector reform, transitional justice, and micro-development projects.  But this too provides another reason why the solution to grand corruption requires an international effort outside the influence of the P5 (whose own members might be guilty of grand corruption or geopolitics).  We must seek a solution which can pre-empt the looting of banks and act independently of outside political agendas which might situate a vulnerable country between winning and losing scenarios as powerful countries battle for control by proxy. We need a solution which sends a clear signal to corrupt elites across the entire world, and not simply those situated in areas of conflict, that corruption will no longer be tolerated, nor paid for by blood of innocent people.  But we, the donor countries, must see to our own houses first.  We must ensure our hands are clean and that any authority we exercise is comprised of substance and never hollow in its nature. We must lead from the front, and from genuine experience.  But we simply cannot afford to turn away from this issue – at home or abroad.  People are dying by guns and by starvation; and they are dying by torture when taking action to stop the atrocity at hand while having inadequate support behind and beside them.  We must be that support.

References

Al Jazeera Media (2016) The plunder of west Africa Ebola funds. Available at: http://www.aljazeera.com/indepth/opinion/2016/01/plunder-west-africa-ebola-funds-160125140155872.html (Accessed: 6 April 2016).

BBC (2016) Migration and citizenship, start the week – BBC radio 4. Available at: http://www.bbc.co.uk/programmes/b06ybg7h (Accessed: 3 April 2016).

BBC (2016) Panama papers: What the documents reveal. Available at: http://www.bbc.com/news/world-35956055 (Accessed: 6 April 2016).

Barrington, R. (2016) ‘Spot the Difference: Corruption Research, Academies and NGOs’, British Academy: British Academy. pp. 1–7.

Carnegie Endowment for International Peace (2014) Corruption: The Unrecognized Threat to International Security. Available at: http://carnegieendowment.org/files/corruption_and_security.pdf (Accessed: 14 March 2015).

Chayes, S. (2007) ‘Days of Lies and Roses: Selling Out Afghanistan’, Boston Review, , pp. 21–23.

Foreign Policy (2015) In Nigeria, $2 Billion in Stolen Funds is Just a Drop in the Corruption Bucket. Available at: http://foreignpolicy.com/2015/11/18/in-nigeria-2-billion-in-stolen-funds-is-just-a-drop-in-the-corruption-bucket/ (Accessed: 20 November 2015).

Freedom House (2014) ‘Combating Impunity: Transnational Justice and Anti-Corruption’, Washington, DC: Freedom House. pp. 1–10.

Huffington Post (2016) Big Banks Aided Firm at Center of International Bribery Scandal. Available at: http://www.huffingtonpost.com/entry/unaoil-citibank-hsbc_us_56feba02e4b0daf53aefa1da (Accessed: 6 April 2016).

Huffington Post (2016) There’s A huge new corporate corruption scandal. Here’s why everyone should care. Available at: http://www.huffingtonpost.com/entry/unaoil-bribery-scandal-corruption_us_56fa2b06e4b014d3fe2408b9 (Accessed: 6 April 2016).

ICIJ (2016) Giant leak of offshore financial records exposes global array of crime and corruption. Available at: https://panamapapers.icij.org/20160403-panama-papers-global-overview.html (Accessed: 6 April 2016).

ICIJ (2016) The Panama papers. Available at: https://panamapapers.icij.org/ (Accessed: 6 April 2016).

Jesperson, S. (2015) ‘Development Engagement with Organized Crime: a Necessary Shift or Further Securitisation?’, Conflict, Security, & Development, 15(1), pp. 23–50.

Johnson, S. (2009) The Quiet Coup. Available at: http://www.theatlantic.com/magazine/archive/2009/05/the-quiet-coup/307364/ (Accessed: 6 April 2016).

Lacher, W. (2012) Organized Crime and Conflict in the Sahel-Sahara Region.

McMullin, J. (2009) ‘Organised Criminal Groups and Conflicts: The Nature and Consequences of Interdependence’, Civil Wars, 11(1), pp. 75–102.

Napoleoni, L. (2003) Modern Jihad: Tracing the Dollars Behind the Terror Networks. London: Pluto Press.

Oxfam International (2015) Richest 1% will own more than all the rest by 2016. Available at: https://www.oxfam.org/en/pressroom/pressreleases/2015-01-19/richest-1-will-own-more-all-rest-2016 (Accessed: 6 April 2016).

Oxford Martin School (2012) Pandemics – can we eliminate major worldwide epidemics? | videos. Available at: http://www.oxfordmartin.ox.ac.uk/videos/view/208 (Accessed: 4 April 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security. Oxford: Oxford University Press.

Reuters (2015) Egypt’s high court overturns last conviction against Mubarak. Available at: http://www.reuters.com/article/us-egypt-mubarak-idUSKBN0KM0O620150113 (Accessed: 6 April 2016).

Schirch, L. (2006) Human Rights & Conflict: Exploring the Links between Rights, Law, and Peacebuilding. Edited by Julie A Mertus and Jeffrey W Helsing. Washington, DC: United States Institute of Peace.

Sloan, B. and Cockayne, J. (2011) ‘Terrorism, Crime, and Conflict: Exploiting the Differences Among Transnational Threats?’, Policy Brief, , pp. 1–11.

Transparency International (2008) ‘Human Rights and Corruption’, Working Paper, 05, pp. 1–6.

United Nations (2014) Global Ebola crisis response | data. Available at: http://www.un.org/ebolaresponse/data.shtml (Accessed: 6 April 2016).

Wolf, M.L. (2014) ‘The Case for an International Anti-Corruption Court’, Governance Studies at Brookings, July, pp. 1–15.

Woodrow Wilson Center (2016) Combatting grand corruption internationally. Available at: https://www.youtube.com/watch?v=GN6HDEgiSc8 (Accessed: 6 April 2016).

Cyber Warfare – Olivier Dubois

Surprisingly enough, the SCID program is relatively silent on cyber warfare. It is briefly referred to in relation with the so-called new terrorism: terrorist groups would have the ability to carry out ‘electronic terrorist attack targeting critical infrastructure’ (Department of Criminology, 2013). This is a very narrow part of what constitutes nowadays cyber warfare and by no means does it capture the stakes of the current cyber arm race.

As with many new concepts, there is no universal accepted definition of the term. Most definitions underline the use of computers and digital means in a coordinated manner by a government or a non-state group with a purpose of causing disruption and/or damage (Sakharian, 2013; Andress, 2013). The target of a cyberwar is computers, networks and digitally controlled devices. If the objective may not be destructing physical infrastructure or killing people, the impacts of cyber operations cannot be contained to the digital world. It is not solely about offering a bloodless military superiority or an economic advantage (Kirsch, 2012). To the contrary, the US department of defence’s Laws of War manual (DoD, 2015) is explicit in recognising that certain cyber operation do constitute use of force in the meaning of Art. 2 § 4 of the UN charter. It cites Operations ‘ that: (1) trigger a nuclear plant meltdown; (2) open a dam above a populated area, causing destruction; or (3) disable air traffic control services, resulting in airplane crashes’ (DoD, 2015: 989). It is reported that more than 100 States are developing some forms of cyberwar capacity (Limnell, 2016).

As in our daily lives, the frontier between the digital and physical world is increasingly becoming difficult to identify. Cyber operations are equally challenging legal and policy boundaries. From a legal standpoint, the fact that a major military power like USA explicitly consider that cyber operations are submitted to both Jus ad Bellum and Jus in Bello (IHL) does not solve everything. Recognising a cyber operation as an act of war is important as it may influence the type of counter measure the victims may consider. It may as well contain policy makers in taking aggressive actions (Lin 2012). However, this restraining frame may be completely ineffective as the imputability or the attribution of a cyber operation to its perpetrator remains extremely difficult (Dortmans 2015, Lin 2012). As a result, waging an cyber attack is extremely low-cost and risk-free compared to the pay off (Limnell, 2016). States have still to learn to operate an adapted range of countermeasures to cyber attack in avoiding to make mistake that could jeopardise their political credit or cause an unwanted escalation in the conflict (Limnell, 2016). The danger of unwanted escalation is real. As a technological arm race is ongoing, states have little time to properly assess the effect of the arsenal and could be nevertheless tempted to unleash it.

The layers are at a loss. Applying IHL rules on the conduct of hostilities to cyber attack is thus extremely difficult and efforts of experts who have proposed to NATO the Tallinn Manual on the International Law applicable to Cyber Warfare is not entirely convincing (Schmitt, 2013). In the absence of precise knowledge on the offensive capacities of cyber weapons, it is very difficult to operationalise and respect the principles of distinction, proportionality and precautions (Droege, 2012). There is an urgent need for a new treaty banning certain cyber weapons and/or creating new regulatory and surveillance authority such as the one existing for chemical weapons or for atomic energy.

Political scientists are at bay, too. Policy framework and guidance have to be adapted to this new reality to ensure that cyberspace is not transformed in a wild battlefield. Regional or collective early warning system for aggressive cyber activity are inexistent. Cybersecurity and cyber warfare are ‘team sport’ where international cooperation is key. Old times alliances created for responding to threats in the physical world need to be shaken up to meet the challenge. International commission of investigation or international fact-finding missions on alleged cyber warfare activities are yet to be created or even suggested in the corridors of New York. Is it so utopian to imagine negotiating cyber cease-fire and mandating cyber observers, to be nicknamed the “Blue Tablets”, as modern peacekeepers for monitoring it? The new wars of the nineties have shaken the whole approach to peacebuilding. Cyber warfare offers a similar shift of paradigm. Let us not wait a ‘Cyber-Srebrenica’. Let us prevent it by thinking and acting out of the box now.

References

Andress, J. (2013) Cyber Warfare Techniques, Tactics and Tools for Security Practitioners, 2nd ed., Burlington: Elsevier Science.

Department of Criminology (2013), SCID module 6 Unit 3, Resource 1, Leicester: University of Leicester.

Department of Defence (2015) Law of War Manual, Washington DC: Department of Defence, available at http://www.defense.gov/Portals/1/Documents/DoD_Law_of_War_Manual-June_2015_Updated_May_2016.pdf (last accessed 21 September 2016).

Dortmans, P., Thakur, N. and Ween, A. (2015) ‘Conjectures for framing cyberwarfare’ Defense & Security Analysis 31(3): 172-184.

Droege, C. (2012) ‘Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians’ International Review Of The Red Cross 94(886): 533-578.

Kirsch, C. (2012) ‘Science fiction no more: cyber warfare and the United States’ Denver Journal of International Law and Policy 40(4): 620-686.

Limnéll, J. (2016) ‘The cyber arms race is accelerating- what are the consequences?’ Journal of Cyber Policy, (1)1: 50-60.

Lin, H. (2012) ‘Cyber conflict and international humanitarian law’ International Review of the Red Cross, 94(886): 515-531.

Shakarian, P. (2013) Introduction to Cyber-Warfare A Multidisciplinary Approach, Burlington: Elsevier Science.

Schmitt, M. (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge: Cambridge University Press.

Human Rights based Counter Terrorism Strategy – Mark Dixon

There is a compelling argument to revise the prevailing Counter Terrorism (CT) strategies in order to move away from ones that undermine Human Rights (HR). The Institute for Economics and Peace Global Terrorism Index (GTI) (2016) reports fatalities from terrorist attacks have increased nine fold since 2000, arguably impacting on the pre text of counter terrorism (CT) strategies of many countries. The GTI also highlights 78% of all terrorist attack fatalities occur in five countries namely Iraq, Nigeria, Afghanistan, Pakistan and Syria with only 2.6% occurring in the West. Despite the realities of the terrorist threat in the West we have witnessed increases in CT budget’s and strategies that undermine HR. This has lead to criticisms of both military action in Afghanistan and other locations and domestic legislation in many Western countries. An example of controversial legislation would be the control order provisions of the UK Prevention of Terrorism Act (2005), which was later repealed. Walker (2007) suggesting whilst such UK legislation was an attempt to fulfil a duty to protect, significant elements of the UK CT legislative framework was constitutionally deficient, lacking accountability and breaching HR.

President Obama’s Executive Order 13491 (2009) banning the U.S. government’s use of torture was also a rebuke to the Bush administration policies following the 9/11 attacks which authorised the use of ‘enhanced interrogation techniques’. The Senate Select Committee on Intelligence (SCCI) (2014) reporting the CIA’s interrogation program had not produced unique or valuable intelligence, this was immediately countered by ex CIA officials by means of the CIA Saved Lives (2014) web site on which it was stated the interrogation program had disrupted terrorist plots. However, both parties’ arguments focus on the validity of the tactic being dependant on the veracity of the information obtained, completely ignoring the human, legal and social consequences of torture. The reality is increases in budgets, militarised activity, legislative enactments allowing breaches of HR, and other gross breaches of HR in the name of CT has not reduced the threat level. Schulz (2001) suggests any CT policy that does not respect HR is counter productive, advocating not only is a HR orientated CT strategy morally correct but would be more affective than the prevailing approach.

It would be argued Western CT strategies have focused on quick fix operational aims rather than strategic impact. As a result the impact on; the trajectory of the ‘war on terror’, inciting further extremism, the relationship between the US its allies and the wider Islamic global population, the West’s ability to legitimately promote democracy, human rights globally and security in post conflict or fragile states have not been considered. Western governments have failed to understand ideologies that manifest, as terrorism created as a consequence of real or perceived injustices cannot be resolved using traditional military interventions. A HR centred CT approach would be better equipped to challenge the ideologies that fuel terrorism across the globe. It is an understanding of political, social and economic grievances and an acknowledgement that not all terrorists or terrorist motivations are the same that is the key to undermining terrorism.

A starting point when considering a HR approach to CT would be HR are not a luxury we can enjoy during times of peace. Paust (2006) argues CT strategies that impact on civil liberties and limit democracy do more damage to HR than the acts of terrorism they seek to prevent. He cites the use of collective punishment tactics by Israeli authorities against families when one family member is allegedly involved in terrorist acts. He argues not only has this done nothing to reduce Palestinian terrorist attacks but has provided opportunity for those supporting violence to promote and reinforce their ideologies. It would be suggested CT strategies that have a human security focus based on HR principles rather than that of national security, would be better equipped to tackle the causes of terrorism. Whilst it is not being suggested attack planning plots should be ignored CT strategies that focuses exclusively on the violent outcomes of terrorist acts will have little success in reducing the threat as the grievances that drive the ideologies remain. This is a view held by the former head of the British Security Service, Baroness Manningham-Buller, (2011) who suggests states should seek political solutions and reconciliation in the context of terrorism as foreign policy directly affects conciliation efforts. She adds it is her belief that the UK involvement in the invasion of both Iraq and Afghanistan contributed to the radicalisation of some UK citizens and did little to assist the security of the UK.

HR based CT strategies need to be coordinated transnationally and delivered with international consensus. They need to mobilise and engender national and international support, with particular emphasis in those areas of the globe that are disproportionately affected by terrorism. They should also support the advancement of international law and HR thus in turn promoting peace, security, and the rule of law globally particular within post conflict environments and locations experiencing fragile governance. This would encourage and enhance democracy and provide the supporting conditions needed for a reduction in the grievances that manifest as terrorism and promote effective conflict transformation and state building.

Post Script

In the immediate aftermath of 9/11 the Bush administration quickly framed the issues within the context of a ‘war on terror’ inferring some form of end game with winners and losers. This view failed to acknowledge terrorism itself is a tactic that can be potentially undermined or reduced but not eradicated. The response from the West was to adopt tactics suited to conventional military activity, leaving little space for any assessment of the grievances or motivations that was being represented through violent terrorist acts. The absence of any meaningful assessment exploring the broader implications of CT strategies that undermine HR resulting in a continuation of the prevailing attitudes.

Those who advocated human rights should not take precedents over the need to prevent terrorist attacks have opposed any debate suggesting the strategy adopted was an overreaction that could create social and political tensions and increase opportunities for radicalisation. This resulted in the absence of any meaningful dialogue and assessment of how a HR based approach to CT would be complementary to the ultimate aim of making people safe.

In the post 9/11 era immediate media reporting and globalisation has fuelled the popular misconception that international terrorism is one of the major threats to the West. However according to the World Economic Forum (2016) terrorism has not featured as a top ten global threat during the last ten years of reporting. Yet governments have chosen the option of immediate action focusing on operational aims rather than strategic outcomes. As a consequence we have seen a lack of international consensus and coordination in joint CT strategies that address the drivers of terrorism with emphasis rather on joint enforcement/military operations. Partnership working at an international level has been further complicated when considering that sovereign states have primary responsibility to protect their own citizens and combat terrorism in their county. However, when countries appear unwilling or unable to deliver against this and the threat posed is transnational in nature, challenges exist to both the international community and individual states in considering thresholds for intervention. The favoured option in these circumstances being military interventions for the purposes of expediency and short term gains.

References

Manningham-Buller, E. (2011) BCC Freedom, Securing Freedom: 2011 (episode 5), The Reith Lectures, London: BBC (44 mins) [online] available at http://www.bbc.co.uk/programmes/b014pxnq (accessed on 19/07/2016).

CIA Saved Lives (2014) [online] available at https://ciasavedlives.com (accessed on 08/09/2016).

Institute for Economics and Peace (2016) Global Terrorism Index 2015 [online] available at http://economicsandpeace.org/wp-content/uploads/2015/11/Global-Terrorism-Index-2015.pdf (accessed on 14/08/2016).

Paust J, J. (2006) ‘Human Rights, Terrorism and Efforts to Combat Terrorism’ in: J. Mertus and J. Helsing (eds.). Human Rights and Conflict. Exploring the Links between Rights, Law and Peacebuilding. Washington DC: United States Institute of Peace Press.

Senate Select Committee on Intelligence (SCCI) (2014) Study on CIA Detention and Interrogation Program [online] available at http://www.feinstein.senate.gov/public/index.cfm/senate-intelligence-committee-study-on-cia-detention-and-interrogation-program (accessed on 08/09/2016).

Schulz, W, F. (2001) In Our Own Interest: How Defending Human Rights Benefits Us All, Boston: Beacon Press.

The National Archives UK Legislation (2005) Prevention of Terrorism Act (2005) [online] available at http://www.legislation.gov.uk/ukpga/2005/2/contents (accessed on 14/08/2016).

The White House President Barack Obama (2009) [online] available at Executive Order 13491 — Ensuring Lawful Interrogations https://www.whitehouse.gov/the-press-office/ensuring-lawful-interrogations (accessed on 09/09/2016).

Walker, C. (2007) ‘Keeping control of terrorists without losing control of constitutionalism’, Stanford Law Review, 59(5): 1395.

World Economic Forum (2016) Insight Report Global Risks 2016, 11th Edition, Geneva: World Economic Forum, [online] available at http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf (accessed on 30/06/2016).

Afghanistan’s Endemic Corruption – Iain Blackwood

The author has elected out of all the subject matter taught on the Security, Conflict and International Development course to discuss ‘corruption’. Although the subject matter is discussed, the author has first hand experience of corruption, which other individuals who work in conflict zones will undoubtedly have experience of and will have to contend with.  As the author has been working and living in Afghanistan for a number of years and has experienced corruption in his daily business dealings and within his own organisation, which diverted funds allocated in assisting Afghanistans humanitarian needs.  Furthermore, corruption within Afghanistan is not only a problem but is happening on endemic proportions and is not just limited to the capital Kabul, but reaches every element of Afghan society.

To give an indication of how endemic corruption is within Afghanistan, the 2015 Asia foundation report, reported that the local Afghan population sees corruption as inescapable, which they encounter daily, and 89.9 percent of Afghans reporting corruption as thee foremost problem in their day-to-day lives and 91.2 percent, when dealing with varying levels of the Afghan government (Asia Foundation, 2015).  These high levels of corruption in the daily lives of the Afghan peoples can be seen as further exacerbating an already troubled emerging fragile state and the newly formed Afghan government it appears has done little in the way of countering the endemic proportions of corruption within Afghanistan.

Corruption in Afghanistan can be all encompassing and encountered in various forms from the man in the street buying bread, to prices being inflated to include extra charges to fuel prices, or government officials wanting their share of the price of registering an Armoured vehicle. Although some of the added fees may be insignificant in size and terms of profit margins, this is corruption and certainly, the sums being asked by Government officials are large and often blatant corruption.  This occurs to local Afghans and International actors and Non-Governmental Organisations (NGOs), alike.  Higher costs are incurred for International organisations as well as local Afghans but Internationals are perceived as being rich and capable of handing over ‘Baksheesh’ a bribe; to officials in order bypass the myriad rules and regulations, get paper work signed and officiated.

According to Transparency International (2015), Afghanistan is ranked 166 out of 168 and third worst country in the world for corruption. Therefore, corruption may emerge from necessity because of low wages or from the lack of education or just a way of Afghan life.  However, corruption is a way of life in Afghanistan and as previously mentioned encountered daily.  Although there have only been a handful of high profile prosecutions over the past decade these have principally involved money laundering through the  ‘hawala’ transfer system, which is an unofficial money system used to transfer proceeds both monetary and physical goods through normal merchant transactions to laundering the proceeds from Afghanistans pervasive opium industry (Ahmed, 2016).  Money laundering through the informal ‘hawala’ black market money transfer system is a major contributing factor in supporting criminality (Maimbo, 2003). This criminality within Afghanistan can further exacerbate an already fragile emerging failed state such as Afghanistan.  It is also known that criminal networks thrive in fragile and conflict states due to the disorganization of state infrastructures as well as other internal and external state dysfunction.  Still the Afghan government has done little prior to the election of Ashraf Ghani in cracking down and where clear cases of corruption have come to light, few cases have been investigated or prosecutions followed (FinTRACA, 2016). This is caused by a number of factors including complicit officials; weak financial polices, a weak government, which lacks both the expertise and will power to enforce its policies and follow through with its prosecution mechanisms Singh, (2015).

Additionally, according to Ashraf Ghani, criminal networks ‘often use formal government positions to promote criminal networks, as a result of which government offices degenerate into little more than a springboard for organized looting’, (Ghani and Lockhart, 2009: 80). To fight corruption it is necessary to initiate and populate educational elimination and reduction strategies together with new broad reaching law-enforcement measures, which would be considered a positive step, forward in fighting Afghanistan’s ongoing corruption and educating its population as to the harm corruption does. However in order to achieve its aims in crime reduction it also has to consider it conflict reduction programmes as crime and conflict go hand in hand in failed states. Although this is a tall order considering its curent unstable political climate and ongoing current counter insurgency (Banfield, 2014).

Postscript

Corruption is a human condition based on personal choice, coercion or group dynamics and has been recorded as far back as biblical times. Public officials have abused their offices for personal gain while populations have taken advantage by corrupting those holding power.  Corruption persists in countries that are susceptible to crime through weak and failed systems and ongoing conflicts where procedures and policies are lacking or do not exist.  It is therefore difficult to respond and prosecute offenders; this in part may be due to the fact that individuals lack the motivation to follow though investigations, or due to the Afghan judicial system having a entrenched corruption problem.

To counter corruption, anti-corruption measures must be embedded within institutions and organisations must be held accountable to higher offices. To do this simple crime reduction measures can be emplaced to deter individuals or groups of attempting to commit corruption, through such measures of having monitoring systems in place, greater transparency which may deter corruption, more surveillance and internal checks and greater prosecution and investigative checks.

Yet, these measures can also be implemented and adjusted to fit the means and the contextual factors involved. For example, greater monitoring, transparency, and internal checks could lead to those individuals in offices of importance to resist such measures for fear of revealing further malpractices of office or position.  Additionally, only when normal anti-corruption practices are in place and individuals are willing to work within these practices can crime reduction measures and campaigns be successful and ultimately eradicate the problem, however in Afghanistans case that may take some time yet due to the pervasiveness of it.

References

Ahmed, J. (2016) ‘Dirty Money in Afghanistan: How Kabul is Cleaning up the Illicit Economy’, Foreign Affairs, avaialable at https://www.foreignaffairs.com/articles/afghanistan/2016-09-07/dirty-money-afghanistan, (accessed 24th September 2016).

Asia Foundation (2015) ‘Afghanistan in 2015: A Survey of the Afghan People’, San Francisco: Asia Foundation.

FinTRACA (2016) Financial Transactions and Reports Analysis Center of Afghanistan (FinTRACA): Home Page, avaialable at http://www.fintraca.gov.af, (accessed 24th September 2016).

Ghani, A. and Lockhart, C. (2009) Fixing Failed States: A Framework for Rebuilding a Fractured World, Oxford: Oxford University Press.

High Office for Oversight and Anti-corruption (2016) Anti-Corruption Laws & Strategy, available at http://anti-corruption.gov.af/en/page/8477, (accessed 24th September 2016).

Maimbo, S. M. (2003) ‘The Money Exchange Dealers of Kabul: A Study of the Hawala System in Afghanistan’, World Bank Working Paper Series; No: 13, Washington, DC: World Bank, available at http://documents.worldbank.org/curated/en/335241467990983523/The-money-exchange-dealers-of-Kabul-a-study-of-the-Hawala-system-in-Afghanistan, (accessed 24th September 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security, New York: Oxford University Press.

Singh, D. (2015) ‘Explaining varieties of corruption in the Afghan Justice Sector’, Journal of Intervention and Statebuilding, 9:(2): 231-255.

Transparency International (2015) Corruption Perception Index 2015, avaialable at http://www.transparency.org/cpi2015#results-table, (accessed 24th September 2016).

Addressing current security threats through intelligence-led peacekeeping – Celine Demeyer

In the context of rapidly changing context and the growing number of actors involved in the security sector, harmonising international responses will be paramount to stabilising countries facing security various and complex security threats. The end of the Cold War brought along a new set of challenges for peacekeeping. In this context, the Brahimi report (UN, 2000) advocated for wider peacekeeping mandates allowing missions to better address a large range of challenges on the ground. The different nature of conflicts now requires an understanding of a range of conflict drivers, including political, security and socio- economic ones. This poses serious challenges for peacekeeping missions in terms of information- gathering and necessitates structural reform.

In order to effectively contribute to stabilisation in the context of civil wars, terrorism and other complex security threats such as transnational organised crime and terrorism, UN peacekeeping operations should adopt an intelligence- led methodology. The need for such a capability is recognised and has been reflected in various structural changes implemented within a larger UN peacekeeping reform, including the establishment of a Joint Mission Analysis Centre (JMAC) and a Joint Operations Centre (JOC) to conduct information gathering using military, police and civilian sources (UN, 2016).

While this has been an important step, various challenges remain. The objectives of intelligence activities should for example be more clearly defined. Contrary to purely military operations, intelligence in peacekeeping should aim at a political settlement conflicts, requiring information relating to a broad range of conflict drivers and thus necessitates a human resources capacity combining military and civilian competencies. Secondly, relevant and useful information can only be gathered when done in a structured manner and respecting ethical limitations. Standard operating procedures and organisational structures should therefore be established, allowing military, civilian and police components to contribute to intelligence gathering. Also in this regard, information systems should be implemented that can allow for secure storage and transmission of data as well as to improve their analysis. Once such a capacity is established operating procedures should be established to allow sharing of analysis with the relevant mission components and other decision makers (Abilova and Novosseloff, 2016).

In the framework of upcoming discussions with member states on the development of a policy framework it is recommended that existing initiatives such as the All Source Information Fusion Unit (ASIFU), established within the UN Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), should be analysed in a detailed manner and a lessons learned document presented to the member states for further discussion. Such a discussion should serve a twofold purpose. First, it should contribute to raising awareness among reluctant member states to grant sufficiently strong mandates to peacekeeping missions in order to allow them to deploy an adequate intelligence capacity tailored to a changing security environment and second, it should contribute to capitalising on existing knowledge as well as to mobilise member states to provide human and financial resources as well as technical expertise to further develop such a system.

Postscript:

From the start the term “intelligence” has been controversial as it is essentially opposed to the open and transparent nature of the UN and its work, leading to a quasi- avoidance of the term by the organisation. The problem is thus in essence one of confidentiality, as the UN is supposed to act as a neutral actor in conflict resolution. In addition, the issue of multilateralism versus unilateralism and thus the existence of political interests of certain UN member states prevents and will continue to prevent the development of a robust intelligence and information- sharing capability for UN Peacekeeping Operations (Diaz, 2007). On the operational level, the reluctance of states to contribute troops has led to low levels of expertise on the ground. There have however been a few exceptions, such as the case of MINUSMA where European countries in particular are providing expertise to enhance the information collection capacity of the mission. This is however the result of the interest of those countries in stabilising the Sahel region as it poses an indirect security threat to Europe, rather than a willingness to strengthen UN intelligence capacity in general.

Sources:

Abilova, O. and Novosseloff, A. (2016). Demystifying Intelligence in UN Peace Operations: Toward an Organizational Doctrine. Available at: https://www.ipinst.org/2016/07/demystifying-intelligence-in-un-peace-ops (Accessed on 15 September 2016).

Diaz, G. (2007). Intelligence at the United Nations for peace operations. UNISCI Discussion Papers, 13. Available at: https://www.ucm.es/data/cont/media/www/pag-72528/Gustavo13a.pdf (Accessed on 15 September 2016).

Karlsrud, J. and Smith, A. (2015). Europe’s Return to UN Peacekeeping in Africa? Lessons from Mali. Available at: http://www.ipinst.org/2015/07/europes-return-to-un-peacekeeping-in-africa-lessons-from-mali. (Accessed on 15 September 2016).

UN (2000). Report of the Panel on UN Peace operations (Brahimi report), A/55/305-S/2000/809. New York: United Nations.

UN (2016). Reform of peacekeeping. Available at: http://www.un.org/en/peacekeeping/operations/reform.shtml (Accessed on 15 September 2016).

 

The Perils of Security Policy Making in the 21st Century

security-perils-blog

If I were to chose an epigraph for a book on the topic of challenges faced by security sector today, this quote from the recent book of Wilhelm Agrell and Gregory Treverton would say it all: ‘We are living in a social environment transcended by growing security and intelligence challenges, while at the same time the traditional narrow intelligence concept is becoming increasingly insufficient for coping with diffuse, complex, and transforming threats.’ [1]

Below is my take on the issue, on the example of UK’s anti-terrorism and anti-extremism strategies. This post aims at sharing opinion on certain themes and generating a cross-disciplinary discussion (ideally with the involvement of both practitioners and scholars), without pretending to present any comprehensive, all-encompassing analysis of the intelligence. [2] It serves as an introduction to a series of episode studies/essays I am writing on security policy (employing, to extent possible, the knowledge from various social sciences), namely on the UK Government’s strategies to counter the threats posed by militant Islamists. [3]

Rethinking Security, Realistically

A few month ago, a group of British charitable organisations and think-tanks, The Ammerdown Group, has published a discussion paper on the UK’s security doctrine and strategy. Written by academics and practitioners having first-hand experience working with communities affected by conflict all over the world, Rethinking Security offers valuable insights into the present state of affairs in the field of preventing crises, responding to threats, and building peace. The paper points to a number of factors impeding a change from ‘heavily militarised’ approach towards civilian instruments of peace building, such as influence of powerful social elites and business interests on the policy-making, institutional inertia and politicisation, and preference for values associated with dominance.

In conclusion, it recommends a new strategic approach where instead of interventions based on military power the UK ‘would develop non-military response capabilities, such as early resort to state and civil capacities for violence prevention, conflict transformation, diplomacy and peacemaking, as well as cooperatively devised, civilian-based violence reduction interventions’.

Welcoming the publication of this well-thought-out and timely discussion paper and agreeing with the analysis findings and general direction of recommendations therein, I still have certain reservations with regards to abandoning intelligence and military altogether in favour of soft measures, such as passionately building community cohesion through shared responsibility and common action. I am convinced that the change is necessary, even imperative, but with security sector in the equation (and not only in the US and UK, but in many other countries across the globe which need more effective and more democratically controlled security forces) – a new security sector, adapted to realities of the day and capable of effectively fighting security risks that have resulted from globalisation, such as global terrorism, cyber threats, cross-border human trafficking, and organised transnational crime.

Four features, three themes

Security sector in the twenty-first century faces a number of unprecedented challenges, both by their scope and complexity. One set of contributing factors relates to globalisation. The nature and pace of technological advancements, and especially the revolution called Web 2.0, have exerted enormous influence on all aspects of life. Security environment being by definition dominated by uncertainty, nowadays becomes increasingly volatile—it is multifaceted, nuanced, filled with potentially large-impact surprises, and is very dynamic and rapidly changing. This makes planning, collecting and processing intelligence, and making decisions immensely difficult.

On the top of it, militant Islam has evolved over the last three-and-half decades into a kind of security threat that the world has not encountered before; it keeps evolving through the mutually reinforcing relations between its political and religious causes and economic, political and social contexts as within certain countries, so regionally and globally. By the way things are developing it is clear that at present neither states nor societies are prepared to deal effectively with such a threat.

Western liberal democracies, in particular, are ill-prepared to counter modern extremism, due to certain limitations inherent to them as a governance system; moreover, they are showing reluctance to reform the established practices and procedures and to introduce more flexibility into security policy making. Societies, in turn, are undergoing a painful generational process which is characterised by declining trust towards governments but also deepening divisions between various social, cultural and religious communities.

[*I am particularly interested in exploring social and cultural adaptation of migrants (and possibly newly arriving refugees) from the conflict-torn countries: (unmet) expectations, stereotypes on both sides (hosts and incomers), group identities – all this creates a fertile ground for misunderstanding, isolation, animosity, radicalisation, hate and violence.]

There have been various explanations offered in the literature, to democratic governments’ weakness in handling security sector issues. Four features of the present day decision making, which relate to the national security policy, deserve a close look. First is the sensitivity of issues dealt with by intelligence. Second feature is the urgency of the action required by citizens, from the state. These correlate and I will consider them in tandem, under the ‘pressing circumstances’ below. The third feature is an inherently political nature of the policy making, which in the case of security policy turns to be quite problematic (briefly addressed under the ‘political constraints’). And the fourth is the policy’s reactive rather than proactive positioning against the extremists, especially with regards to their very aggressive propaganda campaign (under ‘communication: a reactive stance’).

Under pressing circumstances

It is well known that in a daily life some people are ready to pay more for a quick gain instead of waiting a bit for getting it at a nominal cost. However, things change when we as individuals, communities, society feel endangered.  If there is a perceived threat to our lives and well-being or that of our beloved ones, we react sharply and our immediate gratification mood spirals with an enormous magnitude. At this moment of collective anxiety we are ready to overpay significantly (actually, no one even thinks about costs) and tend to put a massive pressure on the decision makers to act promptly and effectively.

The state’s reaction to public pressure in the aftermath of the Paris terrorist attacks in November 2015 can serve as a textbook case: Initial shock gave place to the public outrage, then intensive media reporting took off and this followed by a panic that we were the next target of militant Islamists—all in all, for the officials finding themselves under huge pressure to make last minute amendments to the Strategic Defence and Intelligence Review, pledging significant additional human, technological and financial resources committed to the security strategy (additional investment of £2.5 billion and employment of 1,900 more staff) and then to hastily pass a decision on joining the airstrikes of the ISIL’s targets in Syria.

In this case, the Government’s actions did not seem rational but rather emotionally charged, under the intensity of public outrage. Such decisions tend to result in immediate gains at the expense of long-term priorities. They are also costly. A few days after the publication of the Defence Review and the reports on first airstrikes by RAF planes in Syria, there was no panic anymore. No one thought about the cost of the response.  Obviously, those funds will be taken from some other budgetary items, if not borrowed, and the society will bear the cost of it in the years to come.

Political constraints

Key features of intelligence, such as fragmented knowledge and lack of timely and complete information, as well as difficulty gauging the progress make decision making in security sector notoriously complicated. The uncertainty of the environment where security policy operates partly explains one known weakness of democratic governments—that is, their indecisiveness in taking difficult decisions, also known as the ‘lack of political will’ to act on complex and sensitive problems. At the same time, there are situations when governments tend to act on security issues swiftly and with minimal hesitation. At least two political factors can be distinguished as contributing to this phenomenon.

Decision making in democracies is in many ways defined by electoral cycle, what limits politicians to implementing only those policies that can produce visible results in short time. Taking bold decisions is always difficult, as the cost of risk taking might be prohibitive, and hence, the time must be ripe. For example, the decision to launch the military campaign against al-Qaeda and their hosts, the Taliban regime in Afghanistan, was only possible because of conducive environment created by September 2001 terrorist attacks in New York and the declaration of the ‘war on terror’.

Similarly, the UK Government’s decision to join airstrikes in Syria was long on the agenda of the Prime Minister, but got the real chance to pass through the Parliament (without damaging his and the Conservative party’s image by the humiliation of possible defeat) in the aftermath of the Paris attacks, when the emotional tension was high and thus, conditions were favourable to overcome the opposition.

By its nature the policy making inevitably brings about change which affects the interests of various stakeholders. In foreign, defence and security policy domain, along with domestic interest groups (such as government ministries and agencies, and state and private contractors and providers of products and services) there are international (governmental, inter-governmental, international public and private) actors who have vested interests in the government taking this or another course of action under external obligations.

Government ministries/agencies elsewhere are constantly competing for funding, in a bid driven by the consideration of the scope and quality of work and, partly, by their political ambition to grow strong and exert more influence. For example, the Government’s reaction to Paris attacks, along with airstrikes, resulted in significant additional public funds pledged by the Prime Minister. This being a precedent, right after the terrorist attacks in Jakarta in January 2016, Scotland Yard went ahead announcing quite considerable increase in the number of trained marksmen (by more than 27 percent) in a move that cost £2.5 million of taxpayers’ money.

On the other hand, international allies put additional pressure on decision makers, either supporting or discouraging them, and not necessarily in the best interest of the nation but rather for the sake of the common good (NATO and European Union related policies stand as an example). Today, Syria and Iraq are not merely a battlefield where the war with ISIL, al-Qaeda, and other militants is fought. It is also the place where local actors (national governments vs. diverse opposition groups in Syria and Sunni tribes and former Ba’athists in Iraq), backed on either side by key regional players (Saudi Arabia vs. Iran) and global powers (US and allies vs. Russia)—all collide in their contest over exerting larger influence in the Middle East theatre, in a dramatic, complicated geopolitical stand-off.

Therefore, statements by some British pundits and politicians in justifying the airstrikes, that ‘we must show our solidarity with France’ or ‘we must go out there and prevent this threat from coming and hitting us next’ sound at the very least as naive (or misleading). Britain must join the fight because, first, that is what her allies demand of her; and two, that is the place to be, if you want to be regarded as an influential global player.

In their turn, the policy makers attempt at putting political pressure, or unduly intervening, in the intelligence process (which is there to provide an impartial specialist advice in support of the policy making).  This politicisation of intelligence may take various forms, from ‘soft’ framing to ‘hard’ manipulation of evidence and/or simply imposition of pre-formulated constructs, disregarding the intelligence advice. To these I would add another type, when policy makers simply reject the intelligence offered to them and rely on other information or their own reasoning. Given the degree of secrecy in decision making on the national security issues, we never actually know for sure how certain decisions were made and which type of politicisation was applied (if any at all).

Strategic communications: A reactive stance

The Government counter-terrorism strategy’s protective function is implemented by specialised forces quite effectively: the fact that there has been no successful attack by militant Islamists on the British soil in more than ten years stands as a proof. However, the responsive stance taken by the state enables militants dictate the pace, location and even the format of engagement. It is obvious when it comes to the terrorist propaganda: the state, the society, and the media are not doing well in countering it as could have been expected. This gives the Islamist extremists a possibility to manipulate individual perceptions and public opinion, media coverage, and eventually the decision making.

Aggressive propaganda undertaken by militants, first of all, targets the young Muslims and serves to justify violence. Traditional themes exploited are jihad (interpreted strictly as ‘just war’) and the protection of the Muslim lands from ‘infidel’ invaders. Their interpretation allows for preemptive attacks and killing civilians—to silence the critics among the Muslim community, of the methods they use. The propaganda also aims at glorification of the images of Islamist fighters (take, for example, Mohammed Emwazi aka ‘Jihadi John’), to promote the case of martyrdom and afterlife heaven. As for non-Muslims, through various video footages, particularly those with execution of hostages, militants intend at inflicting mayhem, so that to put additional pressure and diminish the resistance of targeted states/societies.

One of communication techniques used by militant Islamists is about imposing certain messages and symbols to influence the target audiences’ associations and perceptions. For example, the organisation which has its formal name as Islamic State of Iraq and the Levant, instead of being called by its acronym ISIL is frequently referred to in public discourse and in the official documents as Islamic State. No one seems to pay attention to this fact, but that is exactly what they want—to be seen as the state. And the attributes of the state, as known from classical definition, include an ‘exclusive authority to use violence for establishing law and order within its borders.’

Consider this (for conclusion)

You have already noticed that I used the case of the British Government’s hastily taking decision on amending the strategy and joining the airstrikes over Syria, under different thematic parts of this post. In one part, the decisions are explained by the desire to calm down the public anxiety (‘availability cascade’), in another it suggests that the decisions might be the result of political maneuvering of the Prime Minister, or the successful lobbying of political elites and military and intelligence agencies. It is also implied that this might have been the result of pressures from the allies, in the geopolitical struggle over the Middle East.

All these explanations seem equally plausible, and I believe that more than one (if not all, to various degree though) have contributed to the decision in question. Think about it. And think about other similar instances (in any country) and their consequences. I will try to elaborate in the future posts, too. Especially from the point of what could be done to minimize the politicisation of intelligence and to increase the transparency and accountability in the defence and security policy domain.

Notes

[1] Wilhelm Argell and Gregory F. Treverton, National Intelligence and Science:Beyond the Great Divide in Analysis and Policy (New York: Oxford University Press, 2015), p. 196

[2] I owe my understanding of the sector’s present-day developments and challenges to a number of excellent works produced recently by the leading authors in this field, such as: Loch K. Johnson (ed.), Handbook of Intelligence Studies (Abingdon: Routledge, 2007); Loch K. Johnson (ed.), The Oxford Handbook of National Security Intelligence (Oxford: Oxford University Press, 2010); Mark M. Lowenthal, Intelligence: From Secrets to Policy, 3rd ed. (Washington, DC: CQ Press, 2006); Peter Gill and Mark Phythian, Intelligence in an Insecure World, 2nd ed. (Cambridge: Polity Press, 2012); and Wilhelm Argell and Gregory F. Treverton,National Intelligence and Science: Beyond the Great Divide in Analysis and Policy (New York: Oxford University Press, 2015)

[3] There is no globally agreed terminology, but depending on the context (whether related to terrorism or to extremism) the most recent UK Government strategies and policy documents employ the ‘Islamist terrorism’ and ‘Islamist extremism’ phrases. I will use the ‘militant Islam’ alongside these two, as an overarching phrase. See: David Anderson Q.C., The Terrorism Acts 2014, Report of the Independent Reviewer on the Operation of the Terrorism Act 2000 and Part 1 of the Terrorism Act 2006, September 2015; and Counter-Extremism Strategy, October 2015, Cm9148

 

Building Peace and Democracy in Myanmar, Brick by Brick

A series of posts on Democracy and Conflict: Real-life Solutions vs Models:

“Locally owned democratic reforms and peace building processes may not look as logical and attractive as externally promoted/imposed models, but they are effective — not the least because they derive from and are built in local culture, contexts, institutions.”

myanmar-conference-2016

21st Century Panglong Conference in Nay Pyi Taw, Myanmar 31 August, 2016. REUTERS

In this commentary on Myanmar’s recent progress toward establishing democratic governance and ending decades-long civil war, I will try to look beyond the known facts into the background of Burmese politics that frames, directs and conditions the course of developments, but is also continuously influenced by them. That is why this environment is neither static nor monolithic or heterogeneous. I will pick up some pieces of this dynamic puzzle to better understand what is happening in Myanmar and, more importantly, why it happens as it does.

Another milestone

In the course of four days, from 31 August to 4 September 2016, the government and military of Myanmar held a peace conference with rebel groups over the country’s future political and administrative set-up. The conference in the capital Nay Pyi Taw was the first broad based, inclusive of (almost) all stakeholders event dedicated to this issue in nearly seventy years, since gaining the independence in 1948.

The importance of this event is difficult to overestimate. It was the largest and most representative forum bringing together government officials, members of parliament, political party representatives, military officers, and representatives of ethnic armed groups in decades. Its significance is twofold, given that it demonstrated the legitimacy and credibility of the first democratically elected government and set the course toward the implementation of the negotiated peace that shall result in a new, federal political and administrative organisation of the Burmese State.

It was not perfect (what is in political realm?), for it did not live up to (rather elevated) expectations of achieving tangible outcomes except for demonstrating commitment, formally launching the process, and offering all the sides an opportunity to share their opinion. But that is already a firm step forward, in a manner that appears to be characteristic of political processes in Myanmar—testing ground and moving from one milestone to the next as conditions allow.

Conditions must be ripe for making a move to another milestone toward peace and democracy in Myanmar, and they grew so gradually over a number of recent years of painstakingly building momentum, to be ready by this point in time.

This kind of decision making based on ecological rationality (that is when inferences are made through exploiting the structure of information and the environment to arrive at adaptively useful outcomes) shows itself in many instances in Myanmar, including the timing of holding the conference. Many external observes grew impatient over the prolonged negotiations and the delay with holding this landmark event; they missed the point, I am afraid. The conditions must be ripe for making the move toward another milestone, and they grew so gradually over a number of recent years of painstakingly building momentum, to be ready by this point in time:

— The military have made another step on their ‘roadmap’, by allowing the democratically elected government to take public office; in so doing they retained their power and control of certain decision-making domains (such as defence, police and border control where they continue appointing the ministers and their deputies).

— The government is fresh and its de facto leader, Aung San Suu Kyi commands respect internally and internationally and enjoys credibility with majority of population; thus hopes and willingness to cooperate are high for the time being (this is not going to be always like that, because there will be unavoidable delays and failures in addressing the mounting problems that will eventually lead to certain frustration and disillusionment).

— The rebels are exhausted and they realise that they have achieved maximum of what they could have secured through the armed conflict. It is not a secret to either side that violence leads to more violence which only aggravates the situation but does not bring any result in and by itself. Since the signing of National Ceasefire Agreement in October 2015 all but three rebel groups in the north have put the arms down.

— This explains why all the rebel groups (even those who did not sign the agreement) agreed to its text last year. And in fact accepting the peace agreement is being kept firmly by the government and military, as a precondition for participating in the follow-up peace- and state-building process. On the other hand, the negotiation process was long enough (it took four years) for all the parties to hold internal consultations and to weigh all the pros and cons. In turn, the military’s powerful commander-in-chief, Senior General Min Aung Hlaing, and his deputy signing the agreement in person had demonstrated their commitment.

— And finally, the process has got high level of attention and support from the international community. At the moment it is at its pick, which means strong political backing but also availability of financial and technical aid which are much needed to revitalise the economy and to address Myanmar’s numerous social problems (this should be taken with caution though, first, because of ever important to Myanmar strategic goal of balancing its relations with China, and second, recalling the waste in supply and spending when the country first opened for the external assistance in 2011, after the sanctions imposed back in the 1990s).

The fact that the agreement signing ceremony last year was attended by ambassadors of forty-five countries, the UN and World Bank in presence and co-signed by six international witnesses (among them the most important politically and economically neighbours China and India, along with Japan, Thailand, UN and the European Union) already speaks for itself. This year, the UN Secretary-General Ban Ki-moon addressed the conference, while the former SG Kofi Annan will head a commission for examining the situation with Rohingya Muslims and offering recommendations.

Recognizing the complexity of Burmese society

Any society represents a complex system due to broad variety of societal groups which constitute it and the diversity of their interests and intra-group and inter-group interactions (as stakeholders in an array of issues). Complex systems, as a rule, are characterized by the interaction of their components and therefore the resulting ‘emergent’ properties of the system as a whole cannot be derived from generalized quality of its components but reflect the properties of those numerous and multidimensional interactions between its constituent parts. Those interactions, in turn, tend to constantly change in their dynamics, directions, forms and magnitude. That is why it is so difficult to categorize any society, even when assessed against the criteria of one given category (for example, using political rights and civil liberties for judging the degree of democratic freedom).

Now imagine how complex is society where one-third of population is comprised of ethnic minorities. Moreover, there are more than a hundred of those minorities living together in these territories literally for ages. Add seven decades of most recent violent confrontation between them and the government led by military junta (of ethnic majority)—a civil war resulting in further erosion of social fabric and deeply running mistrust, physical destruction, economic backwardness, poverty, massive scale human rights abuses, hundreds of thousands of refugees abroad and displaced people in-country, and more than one hundred thousand of fighters belonging to a dozen-and-half of armed rebel groups spread across the land (which are linked to each other but do not form a single cohesive entity, thus may act independently).

Democracy and Peacemaking. It is impossible to meaningfully achieve one goal without attaining the other: there cannot be a democracy without equality and fundamental human rights and rights of minorities respected, and democracy seems to be the only system that can guarantee those rights to the Burmese society’s diverse populations. 

There are two processes running simultaneously in Myanmar, since its independence day. One is the process of political transformation (presumably toward democratic governance, but in a localised fashion). Another is civil war between the ethnic majority and minorities. In the shadows of it is taking place another localised violent conflict, driven by religious divides. These processes are intertwined, although may vary independently, and what happens is that only a solution (or rather, a set of solutions) that addresses core issues at the heart of them has a chance to be effective and sustainable. It is impossible to meaningfully achieve one goal without attaining the other: there cannot be a democracy without equality and fundamental human rights and rights of minorities respected, and democracy seems to be the only system that cannot guarantee those rights to the Burmese society’s diverse populations.

A REBEL SHAN SOLDIER GUARDS A MOBILE CAMP OF THE REBEL SHAN STATE ARMY IN NORTHEASTERN MYANMAR.

A rebel Shan soldier guards the heights of a hill outside a mobile camp of the Rebel Shan State Army (SSA) in north eastern Myanmar. PDN/TAN/JDP

Understanding the local contexts and institutions

This is a sketchy present-day portrait of Myanmar, formerly known as Burma, set within the country’s unique contextual features and underlying institutions. Take just some of them, most prominent ones, and you will see the random events, individuals and groups as parts and parcels of political processes occurring in their natural environment.

The country has a long history of statehood—existed as an independent kingdom, at times strongly centralised, for centuries (since the mid of 11th century until British colonization in the end of 19th century). Therefore, sense of nationalism and pride of own history and traditions, in each ethnic group and nation-wide, runs very deep. Perhaps this is one reason that in spite of violent infighting, almost all the rebel ethnicity centred groups do not seek to secede but strive to have equal rights and autonomy thorough building a federal state within the present borders. They take pride of the fact that Burma did not join the Commonwealth because they ‘refused to accept the British sovereign as head of state’.

On the other hand, the colonial rule not only disrupted the continuity of sovereign rule but also exacerbated and exposed the country’s major social vulnerability by stressing its inter-communal ethnicity based differences. This was recognised at the time of gaining the independence, and political equality was reflected in an agreement of domestic forces. Unfortunately this agreement was not implemented, thus effectively leading to armed conflict between the ruling majority and ethnic minorities.

Religion (Buddhism) has been one of distinctive building blocks of identity in Burma over the course of its long history, and has greatly influenced the individual, group, and inter-community behaviour and relations. However, group identity is not a permanent ‘solid enduring fact’ but rather a ‘situational construct’ which, first, has many layers and, second, evolves as part of the advancement strategy in response to changing circumstances (for example, by changing the hierarchy of its ingredient parts/layers). Therefore the Buddhist identity has not always played a dominant or unifying role in inter-communal relations, especially in the framework of the civil war unfolding.

In addition to ethnic diversity, there is a religious minority of Muslim population living in compact pockets; they are seen as aliens and discriminated against by nationalist Buddhists, at times brutally. In the western state of Rakhine, about hundred and twenty thousand Rohingya Muslims are living in displacement camps after being driven from their communities four years ago (it is also indicative that no one represented them at the peace conference).

Economic inequality has been another driver of the conflict, since the minorities live in most remote and underdeveloped areas but also have been neglected by the central government for long. Decades of civil war have devastated the country’s resources and destroyed its economy’s productive infrastructure while creating the opportunities for illicit economic activities, especially drug related, thus contributing to the conflict’s sustainability.

The change from within

Myanmar has demonstrated that by following its own path it slowly by surely progresses toward the end goal. The goal itself is broadly defined; it is shaped and reshaped along the journey, with multiple intermediary milestones determining the pace, the direction and the current and possible future settlement formats. Its smooth transition from military rule to democratically elected government (even though with the power and special position of military constitutionally guaranteed) took too long in the eyes of many observers, but what is important is that it worked out and already started delivering its first results. Another process, of ending the civil war, has too, entered its maturity phase after many attempts, iterations, and prolonged negotiations.

It well may be that, after decades of dominating mostly grim news Myanmar is about presenting to the world a lesson on how internal differences could be overcome. Whatever comes in the end (both in terms of governance and peace), is going to be a Burmese product, a local model that may not (and most probably because of that won’t) fit into Western or any other models of democratic government and peacemaking or work as a model for replication elsewhere.

Revitalisation of a troubled society must come from within if there is to be a meaningful fulfilment of its various communities’ needs and aspirations and a workable mechanism to accommodate their diverse relationships.

I am convinced that the Burmese (and similar) experiences of dealing with their problems deserve to be closely studied and learnt from. I see the success factors of this approach in its domestically-driven energy and localised solutions, built with recognition of political culture, traditions and institutions, with adjustments made to local contexts and, through this interaction, influencing those contexts to allow the change occurring and taking root. The revitalisation of a troubled society must come from within if there is to be a meaningful fulfilment of its various communities’ needs and aspirations and a workable mechanism for their diverse relationships.

The country makes cautious steps in progression and there is a long way to go. But one thing is clear today is that they do it their own way in Myanmar, and even if it does not match everyone’s expectations or standards abroad, it may work well for their people. And that’s what matters in the end.

This article originally appeared as a blog on PolicyLabs under the headline ‘Myanmar: Building Peace and Democracy Brick by Brick’

About the Author: Dr. Elbay Alibayov is an international development professional specialising in state-building and political processes in post-conflict countries. He has worked in Iraq, Afghanistan, Bosnia and Herzegovina, and Azerbaijan. Being posted in the field (such as office in Srebrenica) and headquarters of international projects and missions, he has designed, implemented and overseen a broad range of strategies and local and nation-wide initiatives, and have chaired and participated in the work of civil-military groups, political coordination boards at all levels.

SCID Panel of Experts – Online Guest Lecture – Steven Smith MBE – The Global Humanitarian Harm from Improvised Explosive Devices (IEDs)

This is the 14th Online Guest Lecture by members of the SCID Panel of Experts. Steven Smith MBE presents a lecture entitled The Global Humanitarian Harm from Improvised Explosive Devices (IEDs).

steven smithSteven Smith is the Chief Executive of Action on Armed Violence (AOAV), a UK-based, international NGO. In this role, he has overseen a broad range of activities, including agricultural training for former combatants in Liberia, landmine clearance in Western Sahara, arms control measures in Sierra Leone, and armed violence reduction programmes in Burundi.

In this Lecture, Steve talks about the role of his organisation, AOAV, in mine action and the global threat posed by IEDs. Steve discusses the number of casualties and how casualty rates compare over time, in different countries, and according to the type of weapon used. The Lecture also considers the different users and primary target locations, as well as detonation methods (for example, suicide attack or victim-activated). The Lecture refers to various incidents (such as the Moon Market bombings in Lahore and suicide bombings in Nigeria).

Steve’s analysis shows that IEDs are the weapon of choice for non-state actors, civilians are casualties more often than armed actors, and that the worst attacks happen in populated areas. Steve also underscores that behind each statistic is a person killed or injured. Steve also draws attention to the fact that harm is not just physical: commerce, infrastructure, education, and families all suffer from the use of IEDs.

Steve draws the Lecture to a close by analysing what can be done to address the threat posed by IEDs, concluding that key preventative measures include stigmatisation, control of precursor materials, and security of military stockpiles.

Click below to access Steve’s Lecture. NB Should the presentation not run automatically or the audio not work, please click ‘Save As’ (and then open once you have saved on your computer) rather than ‘Open’. Alternatively try a different browser (Firefox rather than Internet Explorer).

The Global Humanitarian Harm from Improvised Explosive Devices – SCID Lecture Apr 2016 – Steven Smith MBE – Show

Please submit any questions or comments within the next two weeks for Steve’s attention and/or discussion by other SCID Panel members, students and staff.

Studying and Working in the Field

Iain Blackwood and Conor FoleyWith kind permission of Iain Blackwood (SCID student March 15 intake) and Conor Foley (member of the SCID Panel of Experts), here is an excellent photo of both of them when they recently met a couple of months ago in Kabul, Afghanistan. Coincidentally, they have met a couple of times while they were both working in Afghanistan, and spoke about the SCID Course and SCID-related topics. It is also credit to Conor that Iain decided to choose the SCID MSc course, after talking to Conor about which Master’s course to pursue when they met early last year. It’s a small world and great to hear how often the paths cross of those affiliated to the SCID Course. Thank you very much for sending the photo, Iain, and for advocating on behalf of the SCID Course, Conor.

It’s great to hear such stories and also see photos of SCID students, alumni and Panel members in the field or meeting together – so please do continue to send and I’ll upload them to the SCID Blog as I’m sure others are equally delighted to see them.

Thanks again and best wishes, Eleanor

Building Security and Justice After Conflict – Student Position Papers

At the end of the SCID Course, students are asked to reflect upon the whole Course and write a position paper (of about 750 words). The paper should be on an issue related to building security and justice in post-conflict environments that they feel most passionate about which requires attention by, at least an element of, the international community. The postscript to the paper summarises reasons why effective action has not been taken to date. Students are asked to draw on their own experience and knowledge as well as academic material, with the aim of persuading the reader to agree with the position put forward and, if necessary, to act, while displaying academic writing and analytical skills.

Those papers that secured a Merit or Distinction (i.e. above 60%) are reproduced on this Blog (below and on a new page entitled Building Security and Justice after Conflict – Student Position Papers). Congratulations to all students who did so well and to everyone in the September 2014 intake for completing the whole course – and all the very best with your dissertations.

Best wishes, Eleanor

Dividing the Threat Multiplier: An Argument for Effective International Prosecution Against Grand Corruption and Kleptocratic Regimes – Maren Moon

The release of the Panama Papers by the International Consortium of Investigative Journalists (ICIJ) has fuelled spectacular revelations regarding the scale of grand corruption and the wider system which enables it (ICIJ, 2016: np).  The scandal is exposing involvement by the very people and institutions who should feel morally and legally compelled to act with the highest integrity but who instead participate in a system all too frequently perpetrating wholesale crime, undue privilege, and the global erosion of security.  (Wolf, 2014: 3). They are doing so with impunity, and they are doing so while the world’s watchdogs cannot help but possess full knowledge that ‘the link between grand corruption and mass human rights violations is undeniable’ (Freedom House, 2014, and also Woodrow Wilson Center, 2016: np., and Transparency International: 2008, ).

No less than heads of states and global financial institutions linked to London, New York and Switzerland have now been connected to an enormous shadow economy responsible for: hiding assets; exercising bribery; facilitating tax evasion; practicing financial fraud; enabling drug trafficking; and participating in sexploitation. (See ICIJ, 2016 and Huffington Post a, 2016, Huffington Post b, 2016: np, and BBCb, 2016: np ). And no fewer than 11 million documents have laid bare the global elite’s participation in a system purposefully rigged to increase the gap between the absurdly wealthy and the tragically poor.  The international community would do well to note too that this is a system which facilitates crime in desperate and conflict-vulnerable settings while arming the insurgents and terrorists who operate from within such settings (Patrick, 2009 and Napoleoni, 2003). We should also recall the system intentionally erodes democratic principles of transparency, fair taxation, the right to peaceful protest, and the exercise of free speech (Woodrow Wilson Center, 2016: np and Wolf, 2014: 5-8).  In short, this is a system wherein leaders and criminals alike actively undermines everything to which the international community aspires, and for which it ultimately endeavours; sometimes selflessly and in conditions of great hardship.

It should not go unrecognised that the responses of those who have been unveiled as both witting and unwitting participants in the darker aspects of this economy, all too consistently reiterate a mantra which should give each of us a moment’s pause for reflection – that lawyers and financial experts alike still possess the legal means of perpetrating unfair, corrupt, and increasingly unfair and corrupting practices. Vested interests in lofty positions have suggested big businesses, and their high-flying personnel, need to work in the shadow economy even when it lowers opportunities for smaller businesses and honest entrepreneurs.  They argue further that legislation against bribery ‘puts British companies at a competitive disadvantage’ (Barrington, 2016: 4). And yet still too, others have intoned that society needs to tacitly accommodate unethical practices in the financial sector on the grounds that businesses in their countries are too big to fail, or too important to risk having relocate to another country. But in making these accommodations we will be enabling the capture of entire governments by organisations whose interests do not include the common citizens who eke by and sustain the infrastructure enjoyed by those who have rigged the system against them (Johnson, 2009: np).  Such accommodation could only serve to entrench profit for the few at the cost of the many. We are, in effect, now experiencing parallel attacks on democracy by the licit and illicit economies alike – both of whom are seemingly melding into a deeper, more committed relationship in an increasingly shady capacity and whose political-economy will forever thwart the international community’s efforts in bringing peace and security.

Those who evade tax legally are allowed to escape criminality by conveniently structured legal technicalities. This phenomena is relatively easy to rectify. But the Big King Kleptocrats who knowingly act outside the law, do so understanding that successful prosecution against their acts is nearly unheard of. History and statistics remain firmly on their side. This is occurring regardless of corruption’s increasingly evident role in destabilising entire continents such as Africa, the Middle East, Asia, and Central and South America (Carnegie, 2015).  These actors smile comfortably while insinuating that exposure of their misdeeds might expose a larger, darker reality in which too many purportedly clean-skinned actors may also be complicit.

And while they may not be kind, they most certainly are proving wise.

Indeed, these same kleptocrats, and their advisors, will have followed closely the freedom and riches once more enjoyed by Egypt’s Hosni Mubarak who has now escaped charges of corruption and murder on a mere technicality (Reuters, 2015: np). Mubarak was a kleptocratic despot whose legacy includes death, blood, fear, and a deeply troubled country. He did not operate in a vacuum, and he was aided by the most powerful regimes in the world. But that does not excuse the outcome – nor does it justify the continuance of such behaviour. Those choosing to play in the dirty sandbox of blood and money in today’s shadow economy will have either dismissed the importance of the Arab Spring’s impact on security and human rights or cynically regarded the situation as yet another opportunity from which to leverage additional millions.  I argue that humanity can no longer afford such cynicism.

I further assert these same actors will have understood President Goodluck Jonathan’s dismissal of his bank governor following the well-intended public servant’s disclosure to the ‘Nigerian Senate that the treasury was missing billions of dollars in expected oil revenue’ (Wolf, 2014: 5). Indeed, Jonathan and his cronies seemed content to turn a blind eye to the networks which channelled money and arms to Boko Haram while leaving security forces ill equipped to quell an uprising which has now left more than 10,000 civilians and security personnel dead at the hands of Islamist savagery (Foreign Policy, 2015: np).

The kleptocrats will have further monitored the toppling of corrupt regimes in Tunisia and the Ukraine and reacted like narcissistic sociopaths unable to emotionally register the gravity of their actions, while concurrently making plans to fly to safety while maintaining access to their ill-gotten gains if the same danger knocks on their door.

The impunity enjoyed by this cohort, and structured into our globalised economy, has paved the way for much of the harm we see unfolding on the world’s stage. It has also provided resonant and compelling reasons from which the so called Islamic State, Boko Haram, and the Taliban find a seemingly endless supply of recruits (Chayes, 2007: 22, and Woodrow Wilson Center, 2016: np, and Schirch as cited in Mertus and Helsing, 2009: 68).

Whether knowingly or not, every last player in the shadow economy has contributed to an encroaching threat against humanity and which serves as nothing short of a security threat multiplier. It is of epic and global proportions.

The 2014 Ebola crisis in West Africa provides an immediate example of how easily corruption might impact security on a global scale. UN donor contributions topping $5.2bn were dispersed to Sierra Leone, Liberia and Guinea.  Almost all of it vanished, and only a fraction of the disbursement was ever audited. ‘In all three countries, no individual has been tried, much less convicted, for their role in the mismanagement of money meant to save the lives of the dying’ (Al Jazeera, 2016: np.).  These funds were also intended to contain the outbreak and prevent its spread.  The UN’s Global Ebola Response data refers to the outbreak’s nature as having been of ‘widespread and intense transmission’ (UN, 2014: np). But to date, the myriad pages and resources on their website speak only of a level of need and the current status of the situation.  Their silence of the flagrant misappropriation of funds perpetuates impunity.  And such complicit behaviour could very well facilitate a new pandemic of Ebola or some other virus, which experts warn could be incredibly difficult, if not impossible, to halt if not contained early, and with the utmost care; care which could never result in the face of another round of missing but badly needs funds (Oxford Martin School, 2012: np).

Grand Corruption further impacts security by destabilising regions in concussive shock waves. As migrants flee corrupt regimes and insurgencies (again, simultaneously fostered by the shadow economy), we see communities decimated, resentments grow, borders close, and trust diminish. (BBCa 2015: np,). Actions originating thousands of miles away from Europe’s shores are now threatening the cohesiveness of European states and the long architected interdependence of the EU.   The Schengen Agreement is further threatened as once ceded sovereignty is being repossessed by politicians seeking to erect borders and control the influx of desperate people fleeing the regimes which grand corruption has enabled.

Finally, kleptocracy feeds the thickening of the crime-conflict nexus as human traffickers, arms dealers, and smugglers share mutually beneficial relationships with terrorists, insurgents and the ruling elite. The nexus will continue to thicken so long as the chaotic conditions and lack of governance resulting from unabated kleptocracy ensures the conditions favourable to its growth.  (see Patrick, 2009,  and Lacher, 2012, and McMullin, 2009, and Jesperson, 2015 and Sloan and Cockayne, 2011).

And it is for these reasons, and so many more, that we must strive to end impunity for grand corruption – and the shadow economy in which it thrives.   Such a task will require concerted, relentless multilateral efforts and incredible political will.  But it can, and must be done.

We can begin by seizing opportunity from the momentum gathering in the wake of the Panama Papers and the associated Unaoil scandals in current headlines.  We can further reach out across the international community and form inter-organisational working teams to apply pressure on host-countries, the Bretton Woods institutions, and home governments.   We can institute training programs which dispel the activities which remain shrouded in mystery but whose reality can be unpacked in simple terms.  But most of all, we must challenge the sovereignty of those countries who refuse to participate in fair trade and good governance – and we must have an international court with both the will and capacity to challenge the problem.  And that court must somehow operate separately from the arbitrary and political interests of the United Nations Permanent 5.

But it has to start. Impunity has to end. And accountability must follow. And never has there been a more pressing time.

Postscript

As a post-script to my previous position piece, I would like to gently assert that the International Community has understandably tolerated grand corruption in the theatres of peacekeeping and peacebuilding operations. The conditions in many of these theatres have necessitated that our precious resources be used first to protect lives and second to institute the ground-level security needed to maintain sufficient equilibrium from which to begin the long, hard institutionalisation of security sector reform, transitional justice, and micro-development projects.  But this too provides another reason why the solution to grand corruption requires an international effort outside the influence of the P5 (whose own members might be guilty of grand corruption or geopolitics).  We must seek a solution which can pre-empt the looting of banks and act independently of outside political agendas which might situate a vulnerable country between winning and losing scenarios as powerful countries battle for control by proxy. We need a solution which sends a clear signal to corrupt elites across the entire world, and not simply those situated in areas of conflict, that corruption will no longer be tolerated, nor paid for by blood of innocent people.  But we, the donor countries, must see to our own houses first.  We must ensure our hands are clean and that any authority we exercise is comprised of substance and never hollow in its nature. We must lead from the front, and from genuine experience.  But we simply cannot afford to turn away from this issue – at home or abroad.  People are dying by guns and by starvation; and they are dying by torture when taking action to stop the atrocity at hand while having inadequate support behind and beside them.  We must be that support.

References

Al Jazeera Media (2016) The plunder of west Africa Ebola funds. Available at: http://www.aljazeera.com/indepth/opinion/2016/01/plunder-west-africa-ebola-funds-160125140155872.html (Accessed: 6 April 2016).

BBC (2016) Migration and citizenship, start the week – BBC radio 4. Available at: http://www.bbc.co.uk/programmes/b06ybg7h (Accessed: 3 April 2016).

BBC (2016) Panama papers: What the documents reveal. Available at: http://www.bbc.com/news/world-35956055 (Accessed: 6 April 2016).

Barrington, R. (2016) ‘Spot the Difference: Corruption Research, Academies and NGOs’, British Academy: British Academy. pp. 1–7.

Carnegie Endowment for International Peace (2014) Corruption: The Unrecognized Threat to International Security. Available at: http://carnegieendowment.org/files/corruption_and_security.pdf (Accessed: 14 March 2015).

Chayes, S. (2007) ‘Days of Lies and Roses: Selling Out Afghanistan’, Boston Review, , pp. 21–23.

Foreign Policy (2015) In Nigeria, $2 Billion in Stolen Funds is Just a Drop in the Corruption Bucket. Available at: http://foreignpolicy.com/2015/11/18/in-nigeria-2-billion-in-stolen-funds-is-just-a-drop-in-the-corruption-bucket/ (Accessed: 20 November 2015).

Freedom House (2014) ‘Combating Impunity: Transnational Justice and Anti-Corruption’, Washington, DC: Freedom House. pp. 1–10.

Huffington Post (2016) Big Banks Aided Firm at Center of International Bribery Scandal. Available at: http://www.huffingtonpost.com/entry/unaoil-citibank-hsbc_us_56feba02e4b0daf53aefa1da (Accessed: 6 April 2016).

Huffington Post (2016) There’s A huge new corporate corruption scandal. Here’s why everyone should care. Available at: http://www.huffingtonpost.com/entry/unaoil-bribery-scandal-corruption_us_56fa2b06e4b014d3fe2408b9 (Accessed: 6 April 2016).

ICIJ (2016) Giant leak of offshore financial records exposes global array of crime and corruption. Available at: https://panamapapers.icij.org/20160403-panama-papers-global-overview.html (Accessed: 6 April 2016).

ICIJ (2016) The Panama papers. Available at: https://panamapapers.icij.org/ (Accessed: 6 April 2016).

Jesperson, S. (2015) ‘Development Engagement with Organized Crime: a Necessary Shift or Further Securitisation?’, Conflict, Security, & Development, 15(1), pp. 23–50.

Johnson, S. (2009) The Quiet Coup. Available at: http://www.theatlantic.com/magazine/archive/2009/05/the-quiet-coup/307364/ (Accessed: 6 April 2016).

Lacher, W. (2012) Organized Crime and Conflict in the Sahel-Sahara Region.

McMullin, J. (2009) ‘Organised Criminal Groups and Conflicts: The Nature and Consequences of Interdependence’, Civil Wars, 11(1), pp. 75–102.

Napoleoni, L. (2003) Modern Jihad: Tracing the Dollars Behind the Terror Networks. London: Pluto Press.

Oxfam International (2015) Richest 1% will own more than all the rest by 2016. Available at: https://www.oxfam.org/en/pressroom/pressreleases/2015-01-19/richest-1-will-own-more-all-rest-2016 (Accessed: 6 April 2016).

Oxford Martin School (2012) Pandemics – can we eliminate major worldwide epidemics? | videos. Available at: http://www.oxfordmartin.ox.ac.uk/videos/view/208 (Accessed: 4 April 2016).

Patrick, S. (2011) Weak Links: Fragile States, Global Threats, and International Security. Oxford: Oxford University Press.

Reuters (2015) Egypt’s high court overturns last conviction against Mubarak. Available at: http://www.reuters.com/article/us-egypt-mubarak-idUSKBN0KM0O620150113 (Accessed: 6 April 2016).

Schirch, L. (2006) Human Rights & Conflict: Exploring the Links between Rights, Law, and Peacebuilding. Edited by Julie A Mertus and Jeffrey W Helsing. Washington, DC: United States Institute of Peace.

Sloan, B. and Cockayne, J. (2011) ‘Terrorism, Crime, and Conflict: Exploiting the Differences Among Transnational Threats?’, Policy Brief, , pp. 1–11.

Transparency International (2008) ‘Human Rights and Corruption’, Working Paper, 05, pp. 1–6.

United Nations (2014) Global Ebola crisis response | data. Available at: http://www.un.org/ebolaresponse/data.shtml (Accessed: 6 April 2016).

Wolf, M.L. (2014) ‘The Case for an International Anti-Corruption Court’, Governance Studies at Brookings, July, pp. 1–15.

Woodrow Wilson Center (2016) Combatting grand corruption internationally. Available at: https://www.youtube.com/watch?v=GN6HDEgiSc8 (Accessed: 6 April 2016).

Small Arms Control – Jonathan Bradbeer

One of the great challenges facing the world today is the widespread availability of small arms. Deaths related to Small Arms account for large proportion of the average of 52,000 battle deaths per year, along with the average of 500,000 non combat violent deaths per year (Krause 2010 p.4).

The destruction of Small Arms often occurs during a disarmament, demobilization and reintegration (DDR) process at the end of conflict, a process that aims to ensure that combatants return to civilian life and do not return to armed conflict. Whilst human combatants can have alternate occupations, weapons do not, as they are designed and built to kill people. Destruction of weapons guarantees they will not kill again.

Whilst the production of Small Arms is unlikely to cease, the destruction of exisiting surplus firearms should remain a priority for the international community, for the simple reason that it is a way to reduce violence: it is more difficult to raise and arm a violent group if there are no guns available.

Vast stockpiles of weapons exist in the world today, often insecurely stored and vulnerable to theft. A large majority of these weapons are still potentially lethal, but are outmoded in terms of design or calibre, and are thus unlikely to be carried by frontline troops in modern armies. Many of these weapons are Soviet designs from the 1950’s and 1960’s, and are of extremely robust construction, meaning that once they find their way into a conflict zone, they are liable to remain in circulation for at least half a century. These weapons, typically assault rifles and sometimes smaller calibre sub-machine guns, have a high rate of fire and a very high destructive capability, but are relatively cheap, owing to their obselescence and large numbers (Collier 2009).

Many armed groups today consist of ill-trained recruits under the age of eighteen who cannot expect to be paid a wage, but instead rely on rentseeking activities from populations that live in areas that have seen a breakdown in state authority (Kaldor 2012). Africa, and the Great Lakes Region in particular, have suffered from the curse of a surplus of small arms in widespread circulation, exacerbating conflict and adding to civilian deaths. Ownership or use of an automatic weapon itself often holds appeal, as it can be used endow the owner with a sense of power and threat (Munkler 2006).

Central to any policy in reducing Small arms needs to be the tracing of the movements of small arms and tighter regulation of all small arms transfers internationally. Progress has been made at the international level in reaching agreements for the creation of linked databases to aid in the tracing of weapons, along with innovations in the marking of weapons to assist in tracing (McDonald 2015). Some progress has also been made in reducing government stockpiles in Eastern Europe, a positive development as surpluses such as these can end up being sold to third world governments.

However, the pysical destruction of weapons must remain a central focus, and it is worth considering whether this process could be streamlined and be made more efficient. On the ground, methods of disposal of weapons often remain very basic, with ritualised burnings of weapons in ceremonies, crushing of weapons with heavy vehicles and the manual destruction of weapons on lathes. This destruction process is lengthy and difficult and time consuming, as is the procedure of collecting weapons and storing them until actual destruction occurs.

One proposed solution to this could be the creation of mobile crushing units, consisting of a crushing machine that can shred steel, set on the back of a middle-weight truck, with the shredded material being conveyed on a slide to a neighbouring dump-truck type vehicle. Systems such as this could speed up one aspect of the DDR process and thus contribute to a peacebuilding process, for example meaning that once the details of a weapon are recorded, it can be destroyed immediately, without the need to collect, store and guard weapons until such time as the destruction process is begun. This does not mean that a ceremony cannot be held with select weapons at a given time, only that immediate disposal options are available. Although there are no easy ways to dispose of ammunition other than traditional demolition methods, the instantaneous destruction of small arms could already be a first step in speeding up a disarmament process.

The case for an accelerated pace in the collection and destruction of Small Arms has notably been made by events in Libya in recent years, where rebels captured huge stockpiles of weapons amassed by the Qaddafi regime and these weapons have begun to be disperesed accross Africa. These weapons have already been shown to have helped fuel the ongoing conflict in Mali (Anders 2015), and will no doubt continue to be found in Africa and beyond for years to come.

Postscript

The UN has made slow but steady progress in helping to coordinate international policies regarding Small Arms and the latest Biennial Meeting of States produced a document in the form of BMS5, which features important recommendations on stockpile management, weapons marking, record keeping as well as tracing, with the progress in the latter category being a useful step forward (McDonald 2015).

However, little discussion was devoted to  weapons disposal, and possible ways forward here needs to be discussed more widely, to see what can be done to raise awareness and thus funding for projects that involve DDR. The physical destruction of weapons component of the DDR is perhaps the easiest to address and is easy to enact, and makes a simple platform to appeal from during fundraising activities, either at the regional or international level. Until this time, it seems that insufficient press has been given to DDR activities, and weapons disposal in particular, a situation which should be remedied as soon as possible since raising awareness of DDR can also raise awareness of conflict and the political choices wich can affect conflict.

References

Anders, H. (2015) ‘Expanding Arsenal: Insurgent Arms in Northern Mali’ in Small Arms Survey 2015, Cambridge: Cambridge University Press.

Collier, P. (2009) Wars, Guns and Votes: Democracy in Dangerous Places. Vintage:London

Kaldor, M.(2012) New and Old Wars: Organised Violence in a Global Era (3rd Ed.). Polity Press: Stanford

Krause,K.(ed.)(2010) Armed Groups and Contemporary Conflict: Challenging the Weberian State. Oxford: Routledge

McDonald, G. (2015) ‘One Meeting After Another: UN process Update’ in Small Arms Survey 2015, Cambridge: Cambridge University Press

Munkler, H.(2005) The New Wars. Polity Press:Cambridge.

Where are all the women? – Jane Townsley

Across the World there continue to be lost opportunities to build security and justice in post conflict environments by the marginalisation of women. It doesn’t make sense not to include those who can represent the needs and expectations of half the population. In the words of US Secretary of State John Kerry “no team can possibly win leaving half of the team on the bench” (Kerry, 2014 n.p.).

Women play a key role in our societies, they know what is happening within local communities and in many cases are able to influence others, including within traditional societies, where mothers have an important role to play in guiding the future path of their children. So when post conflict reform programs are being designed women need to be included in that process and in their subsequent delivery. There is evidence that when security actors take into account the differing needs of both men and women the likelihood of achieving their objectives is increased (Whiteman & O’Neill, 2012).

Focusing in particular on police reform the lack of involvement of women in certain environments particularly post conflict is shameful. According to Abbas (2016) the expansion of women’s role in law enforcement as well as the broader criminal justice system ‘Is the key necessary element to open the doors of peace and harmony around the globe. It is especially so in conflict zones and regions facing socioeconomic turbulence and instability”.

Gender responsive policing is about ensuring the needs of men and women, boys and girls are taken into account equally when delivering policing services as well as the needs of those men and women working within the police. In most cases the creation of a fully gender responsive police service within a post conflict environment requires not only increasing the number of women but also ensuring all officers are professionally trained and equipped to provide the best services to the communities they are there to protect. This does not mean that women should be restricted to non operational back office roles or that they alone should deal with women and children victims. Women officers can make a valuable contribution to operational roles, just their presence in hostile situations can defuse tensions. It is essential that male officers too have an awareness of the needs and expectations of women within society if trust and confidence is to be built for sustainable security and justice.  As stated by Bastick (2008:5) ”SSR efforts should, however not treat young men primarily as a security risk and women and girls primarily as victims”.

The status of women in law enforcement and governance is reflective of the status of women in communities which, in turn, determines a government’s ability to respond effectively to conflict (Bird, Townsley, 2015). Increasing access to justice for victims of gender based violence, something that is often prolific following conflict and disproportionately effects women and girls, is another benefit of gender responsive policing. In post-conflict societies it is far more likely that female victims would be dealt with by male officers, probably at police stations where there are no victim friendly facilities. More women officers can provide victims with the courage to take their first steps into the justice system however they need relevant training. For example, just staffing violence against women units with women officers who have had no specific training will do nothing to increase trust and confidence. Equally, professionally trained male officers can provide the necessary support and understanding required.

Where the numbers of women have been increased in policing within post-conflict environments they often are subject to discriminatory practices. In Pakistan, female officers make up less than 1% of police numbers and lack basic equipment, they are also discriminated against when it comes to nominations for training (Peters, Chughtai, 2014). In Afghanistan, where there is only 1 female officer for every 10,000 women (OXFAM, 2013) policewomen are often side lined into demeaning roles, abused and even killed (IAWP, 2014) “If you cannot safeguard women in the police, how can you possibly improve the situation for women in the community?” (IAWP, 2014: 1).

There is a disproportionate impact from conflict on women and girls when it comes to security and justice, yet they continue to be excluded from many post-conflict reform programs. Despite many advocates that the inclusion of women is essential for lasting peace, progress continues to be slow. Within security reform recruiting more women to the police alone will not solve the problem, policies and procedures need revising to create a fully inclusive police service. In order to achieve ‘real’ change, gender mainstreaming need to be replicated across the entire criminal justice system.

Postscript:

Why hasn’t effective action been taken to address the issues outlined above? A number of reasons exist but the overriding one is a lack of accountability. Who can hold governments to account? In post-conflict settings there is often at the start of reform and rebuilding processes institutions and government structures are broken if not totally collapsed. International actors including UN Peacekeepers can become involved but even then where does the true accountability lie? The only United Nations body with any ‘authority’ is the security council yet still atrocities persist across the globe, sometimes right under the noses of UN Peacekeepers such as in Rwanda and Bosnia.

The UNSC Resolution 1325 (2000) is specific about the role women should play in peacekeeping and peace building yet where is the accountability when so many member states still do not have National Action Plans 16 years after 1325 was accepted? Still only 60 member states have produced their plans (Institute for Inclusive Security, 2016n.p.). The achievement of the Millennium Development Goals did not succeed by 2015, again who holds governments to account? We now have the Sustainable Development Goals #16 ‘Peace, Justice and Strong Institutions’ (UN, 2016) being the most relevant to this paper. How will they be monitored and governments held to account? The UN Security Council was established following the end of WWII yet the World is a different place now and perhaps the make up of the permanent members of the security council is overdue a review something even Kofi Annan recognised whilst he was the UN Secretary General (Annan, 2013:142) as he stated, “For the Security Council to enjoy legitimacy in the twenty-first century, it needs to be not only effective but also representative” He went on to state, “The problem will not be that such countries will actively oppose the Security Council. It’s that they will ignore it” (Annan, 2013: 142).

References

Abbas, H. (2016) ‘Women Fighting for Peace: Lessons for Today’s Conflicts’ Committee on Foreign Affairs United States House of Representatives, Washington D.C.: USA, 22nd March 2016.

Annan, K. (2013) Interventions: A Life in War and Peace, New York: Penguin.

Bastick, M. (2008) Integrating Gender in Post-Conflict Security Sector Reform Policy Paper 29, Geneva: Geneva Centre for Democratic Control of Armed Forces (DCAF).

Bird, E. and Townsley, J. (2015) ‘Background’ Gender Agenda International, Sheffield: Flinch Design.

IAWP (International Association of Women Police) (2014) ‘Police Women in Afghanistan’ IAWP Campaign Briefing Paper, http://www.iawp.org/campaigns/Afghanistan/IAWPAfghanistanCampaign.pdf  (accessed 4th April 2016).

Institute for Inclusive Security (2016) National Action Plan Resource Centre http://actionplans.inclusivesecurity.org (accessed 4th Aril 2016).

Kerry, J. (2014) ‘Closing Remarks’ at Global Summit to End Sexual Violence in Conflict, London: Excel Centre, London, UK, 13th June 2014.

OXFAM (2013) Women and the Afghan Police – Why a law enforcement agency that respects and protects females is crucial for progress, OXFAM Briefing Paper 173 http://www.oxfam.org/en/policy/women-afghan-police (accessed 4th April 2016).

Peters, A. and Chughtai, H. (2014) ‘Why Pakistan Needs a Few More Good Women’ Foreign Policy http://foreignpolicy.com/2014/07/29/why-pakistan-needs-a-few-more-good-women/ (accessed 4th April 2016).

United Nations Security Council Resolution 1325 (2000) S/Res/1325 (2000), New York: United Nations.

United Nations (2016) 2030 Agenda for Sustainable Development and the Sustainable Development Goals http://sustainabledevelopment.un.org (accessed 4th April 2016).

Whiteman, T. and O’Neill, J. (2012) Attention to Gender Increases Security in Operations: Examples from the North Atlantic Treaty Organisation (NATO), Washington D.C.: The Institute for Inclusive Security.

The Responsibility to Protect doctrine – Mario Torre Alvarez

Considered as a core principle for human security, the Responsibility to Protect doctrine, henceforward R2P, has gained momentum as a toolbox used to protect civilians from suffering mass human-induced violence. The formulation of the norm was catalyzed by two key events, the genocide in Rwanda in 1994 and the Kosovo war in 1999. The R2P doctrine, which represents and evolution of the thinking of human rights, was embraced by the United Nations (UN) during the 2005 World Summit and endorsed by the UN General Assembly the same year during the 60th session (UN, 2005).

Throughout its three pillars, the R2P attributes the international community the obligation to ensure that the sovereign states exercises their citizen’s protection responsibilities in a timely and effective manner. The norm is aiming to fill any gap of compliance with the duty of protecting civilians by the sovereign states. The R2P doctrine reshaped the concept of sovereignty, by establishing a set of principles for the international intervention should a violation of any of the four protected core crimes be committed (ICISS, 2001).

In addition to its claimed potential corrosive effects, the R2P doctrine has received many critics over the years and continues being controversial. In many occasions, a misconception of the norm mixed with the different intervention criteria and structural problems have polarized opinions. In this context, the intervention in Libya vs the non-intervention in Syria has catalyzed an intense debate about the efficacy of the R2P doctrine, generating different levels of adherence to the norm within the international community. While the intervention in Libya demonstrated the R2P’s capacity to gather support and quickly mobilize a force, the non-intervention in Syria just highlighted the limitations of the norm (Keeler, 2011).

Indeed, the debate around the intervention in Syria was not about how to apply the humanitarian principles aim to prevent harm to civilians but about the self-interest of Russia and China using their veto power to torpedo Security Council resolutions on Syria. In this context, a significant number of academics claim that the different principles applied by the Security Council in both interventions have been led by hidden political agendas with marked positions. (Silander, 2013).

Likewise, the permanent five members continue to prioritize their geopolitical national interests over the protection of human rights. The possibility to tilt the delicate balance power in the region has overcome the atrocities committed in Syria. Like this, despite that the 5 years of conflict over 260,000 people have been killed, 13.5 million Syrians are in need of humanitarian assistance and the conflict shows no sign of abating, the United Nations is yet struggling to respond to the challenge. Although, as noted by Petrasek, the R2P is more than a doctrine for military intervention and provide the Security Council has not taken any step to enforce other coercive measures available (Petrasek, 2013). For instance, the mass atrocities committed in Syria by President Assad could have been referred to the International Criminal Court, in addition, to explore the possibility to impose arms embargoes or no fly zones.

The facts above only stress one of the R2P’s structural problems. As witnessed in Libya, the notion of an intervention is difficult to imagine without a country’s self-interests behind, at the same time these very same hidden agendas complicate the task of preventive interventions. Although the war in Syria has reached by far the threshold of requirements established in the R2P doctrine, the mechanisms triggering the response to the violations are lost in a series of politicized decisions unable to build enough consensus to act. Perhaps, as a result to the intervention in Libya where a resolution that was based on humanitarian grounds turned out to be only a change of regime.

Generally speaking, although detractors have decline over the years, the R2P’s intent to equal the importance of the individual and the state sovereignty has not met yet the large expectations. It could be concluded that the R2P ability’s to effect a neutral intervention has been lost due to its slow and selective implementation. Nowadays, the use of the veto power is inconsistent with the core value of saving lives embedded in the R2P doctrine.

Postscript

The following reasons have been identified as key factors preventing appropriate or effective action to address the issue:

  1. The hidden political agendas embedding geographical interest and different regional strategies. It is necessary to develop political commitment through a security sector reform and a much needed reform of the Security Council’s the veto system.
  2. The different criteria when applying the R2P principles. The norm should be promoted outside the existing framework policies. It is paramount to develop alternatives to the military intervention such as economic sanctions, no fly zones or a deeper involvement of the International Criminal Court.
  3. The lack of effective early warning system and capabilities specifically allocated have prevented an effective and efficient response.

References

International Commission on Intervention and State Sovereignty (2001) The Responsibility to Protect, Ottawa: ICISS.

Keeler, C. (2011) ‘The End of the Responsibility to Protect?’, Foreign Policy Journal, 12th October: 11.

Petrasek, D. (2013) ‘R2P – hindrance not a help in the Syrian crisis’, https://www.opendemocracy.net/openglobalrights/david-petrasek/r2p-%E2%80%93-hindrance-not-help-in-syrian-crisis, (accessed 4th April 2016).

Silander, D. (2013) ‘R2P-Principle and Practice The UNSC in Libya’, Journal of Applied Security Research, 25th March: 13.

United Nations (2005) A/RES/60/01 2005 World Summit Outcome New York: UNGA.

A position paper highlighting the need for better monitoring and evaluation of projects in the security and justice sectors following conflict – Jo Panayiotou

The Issue

The other day I agreed to read through an evaluation report written by a colleague following some training he had facilitated in Nigeria. Headline comment was the number of individuals that had completed the training and the capabilities they consequently had. I asked him how he knew the Nigerians would incorporate their training into their work and he looked at me blankly. Browsing through other reports, I found a similar story; evaluation was focusing on output rather than result. When searching for the reason for this I found the initial training requests had been agreed based on numbers trained. With no pressure to justify the effectiveness of the training, we hadn’t bothered. Both sides were ostensibly happy, we could boast about how we were helping to develop the capacity of the Nigerian security sector and they could publicise progress by their willingness to complete internationally recognised courses. Assigning monitoring and evaluation to an afterthought appears to typify the approach taken towards both by many projects and has led to deep concern over the effectiveness of such efforts in helping to ensure projects are meeting their objectives (Anderson, Chigas and Woodrow, 2007).

The aim of monitoring and evaluation is to ascertain the relevance and achievement of objectives, impact and sustainability (Popovic, 2008). Rynn and Hiscock (2009) suggest evaluation of projects in the security and justice sectors is done badly for many reasons. Firstly due to the challenges facing projects in general such as staff finding it burdensome, weak incentives to invest in evaluation, evaluation being poorly funded and donor-driven targets distorting priorities; but there are also challenges faced specifically by security and justice projects. Both sectors are complex thus it can be hard to isolate and evaluate changes, programme objectives can be deliberately vague to allow space to develop, projects can have multiple strands and budgets with little cohesion between the various mandates, actors can have limited understanding of evaluation processes and in fragile environments it can be difficult to gather evaluation evidence. The result is that monitoring and evaluation is frequently not done, and if done, not done well.

What Needs to be Done

What needs to be done is very clear. Yes, there are many challenges involved with monitoring and evaluating projects in post-conflict areas but tools, guidelines and systems already exist for other contexts that just require a bit of adaptation (Organisation for Economic Co-operation and Development, 2011). Rather than being a complex process that is poorly understood and therefore avoided, project managers need to ensure that individuals who are skilled in this area are employed and all other workers understand the importance of carrying out monitoring and evaluation. The best way to make this happen is ensuring monitoring and evaluation is planned for right from the inception stage of a project.

Why

As stated by Vandermoortele (2015), there are two fundamental reasons why security and justice projects need to be adequately monitored and evaluated. Firstly, so we can learn from our failures, indeed without adequate evaluation we may not even realise that we are failing. In Iraq following the 2003 intervention, several organisations ran projects to assist the state in managing its newly organised agricultural sector, seemingly successful in themselves but a lack of monitoring and evaluating impact meant that much needed help for the farmers to grow and distribute their produce was overlooked and consequently produce ended up rotting as people starved (Hassin and Isakhan, 2016). Funding is a finite resource, it is therefore essential that truly successful projects are identified so they can be scaled up or replicated and unsuccessful projects can either be restructured or closed down.

The second fundamental need for monitoring and evaluation is so we can highlight positive achievements (Vandermoortele, 2015). Documented evidence of success obtained through monitoring and evaluation can serve as a catalyst for attracting further funds and help convince recipients of the credibility of the projects. It can also highlight projects that are having similar effects in the same communities and so help refine and deconflict objectives to ensure resources across all projects are having the maximum effect in the targeted communities.

Summary

Monitoring and evaluation needs to be an integral element of all security and justice projects in post-conflict areas as it is the only way to determine if projects are successful or not. To overlook monitoring and evaluation is to risk consigning valuable resources, time and effort to projects that do not work and not learning the valuable lessons from projects that are successful.

Postscript

There are two main reasons why monitoring and evaluation are not done well. First, I believe they are poorly understood. Within my own organisation, the British Army, external evaluation cells across the training establishments were the first to be cut when it came to finding savings because their purpose and value were not understood. The same applies when it comes to the work we do abroad helping to improve the capacity of foreign armies. People are willing to release funds to send across training teams to conduct the training because there are tangible outputs – hands to be shaken, photos to be taken. It becomes extremely difficult to persuade the budget holders to follow up the training with evaluation because it is seen as taking funds away from further training.

This leads on to the second reason, an unwillingness to invest resources. As stated above, monitoring and especially evaluation in post-conflict environments can be challenging. Without having a clear idea of how they could be done effectively, it is easier to do nothing. Additionally, more often than not, projects are competing for funds and are under pressure to demonstrate value for money. Conducting effective evaluation could provide this evidence in the longer term but in the shorter term, it requires resources but may provide no tangible gain to the project. It therefore may seem to be expedient to concentrate all resources towards achieving the maximum results in the short term to procure further funds.

References

Anderson, M., Chigas, D. and Woodrow, P. (2007) Encouraging Effective Evaluation of Conflict Prevention and Peacebuilding, Paris: OECD, http://www.oecd.org/dac/evaluation/dcdndep/39660852.pdf, (accessed 26th March 2016).

Hassin, A. and Isakhan, B. (2016) ‘The Failures of Neo-Liberal State Building in Iraq: Assessing Australia’s Post-Conflict Reconstruction and Development Initiatives’ Australian Journal of Politics and History 62(1): 87-99.

Organisation for Economic Co-operation and Development, (2011) Handbook on Security System Reform, Paris: OECD.

Popovic, N. (2008) ‘Security Sector Reform Assessment, Monitoring and Evaluation and Gender’ in M. Bastick and K. Valasek (eds) Gender and Security Sector Reform Toolkit, Geneva: DCAF, OSCE/ODIHR.

Rynn, S. and Hiscock, D. (2009) Evaluating for Security and Justice, London: Saferworld.

Vandemoortele, A. (2015) Learning from Failure? British and European Approaches to Security and Justice Programming, http://www.ssrresourcecentre.org/2015/03/13/learning-from-failure-british-and-european-approaches-to-security-and-justice-programming/, (accessed 26th March 2016).

Position Paper on the Proliferation and Misuse of Small Arms and Light Weapons in West Africa – Claude Kondor

It has become increasingly clear that as complex security challenges emerge and evolve, old ones still persist. The end of the cold war witnessed the significant proliferation of intrastate conflicts, including guerrilla warfare wherein Small Arms and Light Weapons (SALW) became the preferred choice of warlords to pursue their brutal aspirations (Peace Building Initiatives, 2011a). Saferworld (2011) argues that SALW are desirable because they are highly portable, deadly, easy to conceal and manipulated to kill millions of people.  Therefore, the fundamental issue that requires increased international attention is “The Proliferation and Misuse of Small Arms and Light Weapons in West Africa”, which according to the Department of Criminology (2015) is the most tangible threat that undermines international peace and security. The Department of Criminology (2013) further highlights that the availability of SALW especially in post-conflict environment undermines security and the rule of law, and has adverse effects on the promotion of democracy and good governance, national reconciliation, the protection of human rights, and socio-economic development.

Frey (2004) notes that the global estimated figure of firearms is 640 million which are utilised to kill thousands of people every year. The Small Arms Survey (2003; 2004),  cited in the report of the UN Secretary-General (2008), states that over 1,000 companies in about 100 countries are involved in the manufacture of nearly 8 million small arms annually. It further estimates that at least 300,000 people are killed annually as a result of the misuse of these weapons. For instance, SALW account for between 60 and 90 percent of loss of lives during conflicts in Sierra Leone, Liberia, Guinea Bissau, Cote d’ Ivoire and Mali.  Therefore it is not shocking that they have been described by the former UN Secretary-General Kofi Annan as “weapons of mass destruction in slow motion” (Krause, 2007a:1).

It is against this backdrop that Campaign for Security Everywhere (CASE), a non-governmental organisation working in the areas of security, human rights and justice in Sierra Leone, makes its position very clear in terms of combating the illicit proliferation, circulation and trafficking of SALW, which is in accordance with the 1999 ECOWAS Convention on Small Arms and Light Weapons, their Ammunition and other related Materials (Aning, 2008).    This was well-intentioned by the Authority of Heads of State in order to achieve sustainable peace, stability and development in West Africa. However, ECOWAS has been confronted with numerous challenges, including violent conflicts, in its bid to achieve its initial objective of regional economic integration since its establishment in 1975. It is nevertheless glaring that all these conflicts have been underpinned by the proliferation and misuse of SALW.

To this end, CASE seeks to assist ECOWAS member states in combating the illicit proliferation, circulation and misuse of SALW through advocacy and sensitisation, lobbying of authorities, and also strengthen relevant institutions and civil society actors through capacity building to put an end to this complex and multidimensional phenomenon. The Peace Building Initiative (2011b) suggests tangible ways of regulating the flow and use of illicit SALW including their production and control of movement, regulating civilian possession and use of weapons, and the collection and destruction of weapons as means of getting out of this security conundrum at the national, regional and global levels. Overall, the effective and efficient coordination and collaboration among relevant actors are also quite significant in yielding the synergistic effect of combating the proliferation and misuse of SALW.

Experience has shown that security vacuum frequently follows the end of armed conflict. During this period, people trust SALW for self-protection especially in situations where the security forces are part of the conflict. In addition, some regard their weapons as means of livelihood and are therefore confident in keeping them. The Organisation for Security and Cooperation in Europe (2003) notes that while it is indeed acceptable that licit arms are quite essential in the maintenance of law and order, the uncontrolled proliferation and misuse of such items grossly undermines stability. Consequently, the effective and efficient control of SALW is without doubt a prerequisite for sustainable peace, security and stability in any post-conflict environment.

In a nutshell, the complete eradication of SALW is a significant step in restoring justice and security in post-conflict environments, and therefore should be the utmost priority of the relevant actors including the international community. Arms do not distinguish between sexes, age, tribe, rich, poor, disabled, educated, illiterate, or religious denomination. So let us all join hands together in harmony to completely eradicate this complex reality for the sake of ourselves and posterity.

Postscript

The issue of SALW is transnational in nature which further complicates the matter especially due to cultural and legislative disparities, and lack of political will on the part of member states to end the menace (OECD, 2007). Moreover, Krause (2007b) argues that contextual differences on the issue of SALW pose a major challenge especially in post-conflict situations where the proliferation of SALW undermines peace, security and development.

Additionally, despite clear international standards that have been well articulated, members of the security forces including the police, military, intelligence forces, and other state agents, are in most cases found guilty of committing serious human rights violations using SALW. A typical example of this occurred in Guinea where pro-democracy demonstrators were shot and killed at the stadium on 28th September 2011.   Another fundamental problem in the control of SALW is that actors involved in the sales and trafficking of SALW including terrorist groups, drug barons, and other organised criminal groups are politically and economically powerful, and have the resources to bulldoze their ways to achieve their selfish interests.

In conclusion, the issue of SALW is highly political involving numerous gladiators especially at the strategic level, and the complexities involved make it very difficult to address. However, these are likely surmountable if national accountability, transparency and control mechanisms are strengthened, coupled with strong political will at all levels of implementing the Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects (IPI, 2009).

References

Aning, K. (2008) ‘From ‘voluntary’ to a ‘binding’ process: towards the securitisation of small arms’, Journal of Contemporary African Studies, 26 (2):169-181.

Department of Criminology (2013) Security and Rule of Law in Post-Conflict States, Leicester: Department of Criminology, University of Leicester.

Department of Criminology (updated 2015) Conflict and Global Risks, Leicester: Department of Criminology, University of Leicester.

Frey, B. (2004) ‘Small Arms and Light Weapons: The Tools Used to Violate Human Rights’, Human Rights, Human Security, and Disarmament 3: 37-46.

IPI (2009) ‘Small Arms and Light Weapons: Task Forces on Strengthening Multilateral Security Capacity’, IPI Blue Paper No. 5, New York: IPI, available at http://www.ipacademy.org/media/pdf/publications/salw_epub.pdf.

Krause, K. (2007) ‘Small Arms and Light Weapons: Towards Global Public Policy’, Coping with Crisis Working Paper Series, New York: IPA.

OECD (2007) OECD DAC Handbook of Security System Reform: Supporting Security and Justice, Paris: OECD, available at http://www.oecd.org/dataoecd/43/25/38406485.pdf.

Organization for Security and Cooperation in Europe (2003) Handbook of Best Practices on Small Arms and Light Weapons, Vienna: OSCE, available at http://www.osce.org/fsc/13616.

Peace Building Initiative (2011) Small Arms and Light Weapons, Peace Building Initiative website, accessed on 11 January 2016, available at http://www.peacebuildinginitiative.org/index.cfm?pageId=1732.

Saferworld (2011) Small arms and light weapons, Saferworld website, accessed on 12 January 2016, available at http://www.saferworld.org.uk/what/small-arms-and-light-weapons.

UNSG (2008) ‘Small Arms’, S/2008/258, New York: UN, available at http://www.un.org/disarmament/convarms/SALW/Docs/SGReportonSmallArms2008.pdf.

Corruption – Gregory Pye

Reflecting on the course content carefully, the author has selected corruption as a topic for further discussion. Although included in course content, it is the view of the author that the subject does not have the degree of prominence necessary, to reflect the true reality and importance of corruptive practices, with which individuals working and living in post conflict situations, have to contend on a daily basis. Having lived and worked in Afghanistan for a number of years, the author is confronted by corruptive behaviours, at all levels of society, as an integral part of daily living and working experiences. Beyond the daily expectations of IED,s, Taliban attacks, suicide bombers and hashish fuelled hostility, the single foremost element which generates antagonism, frustration and personal conflict amongst international workers, is the endemic corruption, which prevails across the country. Corruption, by its very nature can be difficult to detect, as the serious Fraud Office indicates (Serious Fraud Office, 2015) the process involves two or more people entering into a secret agreement. Corruption watchdog of transparency International, indicate that corruption can involve abuse of power and resources at any level, within any sector, including businesses, public institutions and the government. (Transparency International global coalition against corruption, 2014). Corruption poses a fundamental threat by diverting public resources into private hands, away from those who should be benefiting directly in post conflict environments and continues to be a major obstacle to poverty alleviation, development and the building of security and justice. The range of activities can be considerable, encompassing as it does, accepting bribes, double dealing, under table transactions, diverting funds, manipulating officials and elections, money laundering and defrauding investors (Investopedia, 2015).

Achieving stability and security is a top priority for any intervention by the international community in an unstable post conflict country. Corruption is potentially fatal to long term stability and security and therefore countering it should be considered a pressing fundamental objective. It is difficult to read accounts about Afghanistan, without reference to multiple references to corruption. Afghanistan remains one of the worst performing countries in Transparency International’s Corruption Perception Index, ranking in the bottom four in 2014, along with Sudan, North Korea and Somalia (Transparency International, 2014). Scandals range from the Kabul Bank misappropriation of 93 million dollars and the suspension of IMF support, (BBC, 2014) to articles concerning provincial and district police chiefs buying their positions for$100,000. Incredulous as these reports may seem, the author can recount numerous occasions where he has had to fight against corruption at great personal threat to his life. For example in March 2014 the Medium Tax office (MTO) , based in Kabul, received $165,000 in ‘consultants tax’, this money never reached the company tax compliance account, it was taken by an MTO employee, who paid off the National Security Directorate (NDS), who then arrested the author and warned him that this matter should be ‘left alone’! A further reality is the need to carry $1000 in a money belt in order to deal with daily confrontations by police and officials. The levels of corruption in the country are extreme. According to a recent Asia Foundation Study, in 2014, 62.4% of Afghans reported that corruption was a major problem (Asia Foundation, 2014)

In 2012, the Afghan population considered corruption, together with insecurity and unemployment, to be one of the principal challenges facing their country, ahead of even poverty, security, external influence and government inefficiency (UNODC, 2012). Afghanistan has national anti corruption plans, laws, executive decrees and Government instruments all devoted to the fight against corruption, particular the High Office of Oversight and Anti Corruption (HOO), is mandated to co-ordinate and implement the national strategy. Inspite of the continuing efforts of this body, together with the Police, courts, Attorney General’s Office and a plethora of other related organisations, corruption continues to escalate unabated.

The causes are variable and complex. In an attempt to determine and analyse underlying processes, an insight into the historical, economy, social structure, cultural and religious practices of the Afghan Nation is elemental. Poverty, illiteracy, unemployment, weak government, drug trafficking and fear, are all instrumental factors in perpetuating an apparently intractable situation. As Lockheart, 2014, suggested, ‘The nexus of security, conflict and international development is new and a comparatively understudied area of work’ (Lockheart, 2014).

The same level of limited academic scrutiny can also be said to exist in the field of corruption research. Solutions are multifaceted, lengthy to implement and many lessons are yet to emerge from work being conducted in combating corruption in a number of post conflict countries, which may be significant in addressing the problems in Afghanistan. However, a positive approach and concerted actions, must be maintained, coupled with the encouragement of greater transparency, surveillance, detection, prosecution and eradication of corrupt norms, at all levels. The work of anti-corruption bodies requires enhanced governmental support, manpower and financial underpinning. This must be married to important associate long term strategies, such as employment creation, increase in public employee wages, reduction in poverty, eradication of drug trafficking, development of robust judicial systems and most crucially the regeneration of trust amongst the populous.

Postscript

Corruption persists in highly corrupt countries because it is not only difficult to monitor and therefore, prosecute, but also, when it is systematically pervasive, people may lack the incentives or initiative, to instigate counter measures. When considering corruption as a deep seated problem, it is perhaps important to examine two sets of dynamics which may be at interplay amongst those contemplating corruptive behaviour. Decisions to indulge in corruption are based on personal choice, coercion or group dynamics and at the same time, surveillance, monitoring, transparency and systems of prosecution, are all variables which may influence an individual’s calculations of whether to engage in corruption.

Anti-corruption activities need to be tailored to context and a thorough understanding of the dynamics of contextual factors is required. For example, greater transparency could be resisted by those in power for fear of exposure of wider pervasive practices.

Individual character, honesty and trust are vitally important, when considering suitability for key appointments. Individuals who are prepared to work within acceptable norms within culture, society, business, legal systems and government Clean up campaigns are only successful when there is a moral consensus behind them.

Measures which will undoubtedly assist in reducing corruption, should be actively engendered. Such measures include inclusiveness, increased dialogue between all stakeholders and continuing review and amendment of anti-corruption plans. Scrutiny should address roles, responsibilities, resourcing and effectiveness. Intractable problems such as corruption cannot always be eliminated completely but with commitment, dedication and resilience, it should be possible over time to contain the problem within acceptable limits.

References

BBC . (2011). Afghan row over failed bank threatens salaries. Available: http//www.bbc.co.uk/newa/world-south-east-asia-13847292). Last accessed 14th February 2015.

Lockheart, C. (2014). Building Security and Justice in Post Conflict Environmen. : A Reader.Proceedings of 2014 Security, Conflict and International Development (SCID) Symposium.. 1 (14), 4-8.

Serious Fraud Office . (2015). Bribery Corruption. Available: http://www.sfo.gov.uk>bribery & corruption. Last accessed 22nd March 2015.

Transparency International. (2014). Transparency International global coalition against corruption. 2014).. Available: http://cpi.trancparency.org/cpi2013/results/). Last accessed 14th February 2015.

UNODC. (2012). Afghanistan: Recent Patterns and Trends. Available: http://anti-corruption.gov.af/en/page/1783/8477.2015). In. Last accessed 15th February 2015.

Prospects for Peace in Colombia: Inequalities, Denial and the Undeserving Poor

In the blog post linked at the end of this paragraph, Nathan Tuffin, Portfolio Manager with the Languages, Literature & International Engagement Section of AHRC talks about the experiences at the Post-Conflict Research Workshop, held in Bogota and Medellin, Colombia last month – Source: A Blog from Colombia – An AHRC perspective.

UK-Colombia Post-Conflict Research Workshop

I attended the Post-Conflict Research Workshop organised jointly by the Research Councils UK (RCUK) and the Government of Colombia, held last month in Colombia. During the Workshop the dynamics of the conflict and the prospective peacebuilding challenges were considered, and priorities were identified in terms of areas where academic researchers can help contribute to addressing these challenges. I thought the blog post linked to above might be of interest to some of you – I will share the identified priorities and outcomes once they are formalised. I also wanted to share some further thoughts on my visit to Colombia, in the hope that some of you will comment (which I would find very helpful) or write short blog posts on your views of a conflict-affected environment you work in, have visited, or have read about.

First Impressions of Colombia – Challenges, Complexity and Capacity

This Workshop and my short visit to Colombia left me with an impression of the enormity of the challenges facing a country that has seen 50 years of conflict. It is also a highly complex conflict, not least in terms of how it has changed over time; the hundreds of thousands of victims; the many different actors involved, their activities and alliances which also fluctuate over time; and the way in which the conflict affects different geographic areas and socio-economic groups differently. Indeed, it seems the only constant factor in the conflict has been that the poor and the marginalised have disproportionately suffered – even in places less afflicted by the conflict – as it often is in conflicts worldwide.

IMG_4916Aside from the enormity of the challenge, I was also struck by the capacity that exists within Colombia to address these challenges. Aside from the institutions (often afflicted by corruption) and the legislative framework (comprehensive but not always adhered to), the strength of civil society was what impressed me the most: the number of human rights defenders, lawyers, academics, journalists, as well as indigenous, Afro-Colombian, peasant farmer and other community leaders – and the quality of their work, their commitment to peace and their courage. While this capacity exists, many are threatened and have been killed by guerrilla and paramilitary groups, especially if their focus of attention is on the activities of powerful or clandestine groups. Colombia has one of the worst records of assassinations of human rights defenders: last year, over 54 human rights defenders were killed (The Inter-American Commission on Human Rights, 2016), which constitutes about a third of all deaths of human rights defenders that year across the world (Front Line Defenders, 2016).

False Positives

I was also left with two other lasting impressions; lasting because what I saw and heard I found hard to make sense of. Firstly, the issue of ‘false positives’: this concerns the routine execution of civilians (generally poor and marginalised males, including homeless people, disabled people, farmers, children) by the Army between 2002 and 2008, who were subsequently dressed up to look like guerrilla fighters. This was in response to pressure on the Army to show more combat kills and further to calls for the success of the Army in the fight against FARC and ELN to be judged in terms of blood shed or rather number of guerrillas killed. While the FARC and ELN were trained guerrilla fighters and, in some cases, in cahoots with the state armed forces, it was often more expedient to kill poor people and then dress them up as FARC or ELN soldiers. People were lured away to remote areas with the promise of jobs and then killed, dressed as guerrilla fighters with weapon placed in hands, and photographed. Evidence could no longer be ignored when photos showed a young disabled man who had been killed who had recently been reported missing in a city far away; he was clearly unable to properly hold let alone shoot a gun (and he, along with most of the other false positives, had never had any association with guerrilla groups). Other photos showed shoes on the wrong feet and uniforms without bullet holes over bodies that had been shot. Over 3,000 people were killed and evidence shows that engagement in extrajudicial killings was systematic and widespread throughout the Army (information from interviews – see also Human Rights Watch, 2015, and the International Federation for Human Rights (FIDH) and the José Alvear Restrepo Lawyers Collective (CAJAR), 2012).

Denial

Secondly, in parts of Colombia it is easy to overlook the fact that a conflict is on-going, and in parts of Bogota it is even easy to imagine there is no insecurity, violence or hardship. This is part psycho-social, part geo-political and part communications strategy employed by the Government. In Zona Rosa (Bogota’s Pink Zone) there are many malls, designer shops and restaurants. Only a kilometre or so away are slums and large, highly impoverished communities. It is from these communities that many men were taken away and killed and presented as fallen guerrilla fighters by the state armed forces. People living and working in Zona Rosa and similar privileged areas are more likely to believe Government rhetoric and media reportage of terrorists rather than guerrilla fighters, and the undeserving rather than victimised poor, precisely because they see little evidence of insecurity, injustice or conflict. They are less inclined to be supportive of the peace process, believing it constitutes negotiating with terrorists. They might also be assumed to be less supportive of an eventual peace process, if the voices of victims are to be heard, if history is to be examined and memorialised, and if financial support in the form of increased taxes is to be sought to pay for the necessary peacebuilding programmes (land restitution, transitional justice, DDR etc.).

Psychologically and socio-politically, it is very difficult to move beyond oppression, victimisation and atrocity without an acceptance that is has occurred and was wrong. In his outstanding book, Stanley Cohen (2001) talks about ‘states of denial’, which is when people, governments and societies know about atrocities but ignore them. To assume responsibility for not taking action, or taking a stand when it could have been taken, is very difficult at the individual level: narratives and stories are constructed, histories re-written, and blame reassigned, to avoid dealing with the pain or discomfort. In Colombia it was clear there was general awareness of the massive socio-economic inequalities that existed. I was also told that many members of the Army killed poor people not because they themselves were threatened if they did not but because they would be rewarded with a bonus, extra leave days or promotion. There was no denial of what was happening, and seemingly no insurmountable pressure to commit such atrocities; but there was a reconstruction of the poor as undeserving, as lesser, as not ‘the good ones’ (as I was told was the phrase used in Colombia) and thus seemingly dispensable and irrelevant.

Prospects for Peace

Coupled with the stranglehold of organised crime on Colombian society, it is hard to envisage effective peacebuilding where there are such inequalities and injustices and little evidence that there is the political will to address these – no matter whether an Accord can grapple with the challenges of land ownership and restitution, DDR and ‘concentration zones’, and bottom-up peacebuilding (paz territorial).

When there is such inequality and such apparent disregard of the suffering of the poor and marginalised, it is hard to envisage how there can be a stable platform upon which successful peacebuilding can occur. Of fundamental importance to successful peacebuilding is the need to address structural inequalities if the dynamics which lead to conflict, violence and insecurity are to be changed: those dynamics which create the conditions for further victimisation and which also compound grievances. If there is a reluctance to acknowledge the injustice of massive disparities in wealth and opportunity, to witness the crimes suffered by the poor and dispossessed, and to acknowledge personal responsibility in contributing to a better society for everyone, there is little hope for building a more peaceful society. There can be no peace, if large sections of the population live without security, justice and opportunity. Moreover, if some, privileged groups do not acknowledge that there is a conflict (but only see terrorists and criminals and the undeserving poor) it is hard to envisage that there will be little commitment to the means necessary to resolve the conflict and build peace. To resolve conflict and build peace it is first necessary, of course, to accept that there has been a conflict – and from there begin to unpick the causes of that conflict.

Best wishes, Eleanor

References:

Front Line Defenders (2016) Annual Report 2016, Dublin: Front Line, the International Foundation for the Protection of Human Rights Defenders, available at https://www.frontlinedefenders.org/en/resource-publication/2016-annual-report.

Human Rights Watch (HRW) (2015) On Their Watch: Evidence of Senior Army Officers’ Responsibility for False Positive Killings in Colombia, New York: HRW, available at https://www.hrw.org/report/2015/06/24/their-watch/evidence-senior-army-officers-responsibility-false-positive-killings.

Inter-American Commission on Human Rights (IACHR) (2016) ‘IACHR Condemns Killings and Threats Directed against Human Rights Defenders in Colombia’, Press Release, 25 February 2015, available at http://www.oas.org/en/iachr/media_center/PReleases/2016/021.asp.

International Federation for Human Rights (FIDH) and the José Alvear Restrepo Lawyers Collective (CAJAR) (2012) Colombia: The War is Measured in Litres of Blood, FIDH and CAJAR, available at https://www.fidh.org/IMG/pdf/rapp_colombie__juin_2012_anglais_def.pdf.