[Sample B: Approval/Signature Sheet]

Total Page:16

File Type:pdf, Size:1020Kb

[Sample B: Approval/Signature Sheet] Filozofická fakulta Univerzity Palackého v Olomouci Katedra politologie a evropských studií Mgr. Evan Baun The Evolution of NATO: 2010 Strategic Concept and the Future Security Environment Dizertační práce Olomouc 2016 Prohlašuji, že jsem tuto dizertační práci vypracoval samostatně na základě uvedených pramenů a literatury. V Olomouce, . ….…..2016 ___________________________ Na tomto místě bych rád poděkoval svému školiteli prof. PhDr. Jiři Lachovi, M.A., Ph.D., za rady a komentáře. Děkuji za jeho mimořádně vstřícný přístup. Table of Contents Introduction ......................................................................................................................... 1 1 Theoretical Basis ..........................................................................………........................6 1.1 Methodology ................................................................................................... 13 1.2 Review of Literature ....................................................................................... 18 2 The Strategic Concept .................................................................................................... 27 2.1 1949 – 1957: Three Strategic Concepts that Built an Alliance… ....................28 2.2 1968: The 20 Year Strategic Concept ............................................................. 31 2.3 1991: Alliance Reborn .................................................................................... 33 2.4 1999: A Golden Anniversary Concept ............................................................ 35 2.5 The 2010 Strategic Concept ............................................................................ 37 3 The Multiple Futures Project and the Future Security Environment ............................. 42 3.1 The Multiple Futures Project – Development ................................................. 44 3.2 Multiple Futures Project – Final Report ......................................................... 47 3.2.1 The Multiple Futures.............................................................................. 49 3.2.2 Top Security and Military Implications ................................................. 56 3.2.3 Findings and Recommendations ............................................................ 58 3.3 Other Reports .................................................................................................. 61 3.3.1 Canadian Chief of Force Development Report: FSE 2008 – 2030 ........ 62 3.3.2 USJFCOM – Joint Operating Environment 2007 – 2030 Report .......... 63 3.3.3 RUSI FSE Policy Paper ......................................................................... 64 3.3.4 NDU: All Possible Wars? Toward a Consensus View of the FSE 2001 – 2025 ................................................................................... 66 3.3.5 NIC: Global Trends 2025: A Transformed World ..................................69 3.3.6 Principy obrany České republiky „2030“ .............................................. 71 4 Findings...........................................................................................................................73 4.1 State Conflict .................................................................................................. 76 4.2 Proliferation of WMD/E ................................................................................. 80 4.3 Terrorist and other Criminal Groups ............................................................... 85 4.3.1 International Terrorist and Criminal Groups ......................................... 86 4.3.2 Domestic Terrorism ............................................................................... 90 4.4 Cyber Attacks/Attacks on Critical Infrastructure ........................................... 95 4.5 Resource Constraints and Disruptions .......................................................... 101 4.5.1 Disruption of Communications ............................................................ 101 4.5.2 Disruption of Trade Routes .................................................................. 102 4.5.3 Energy Resources and Energy Security ............................................... 104 4.5.4 Natural Resources ................................................................................ 105 4.6 Climate Change ............................................................................................. 107 4.7 Global Instability .......................................................................................... 110 4.7.1 Failed States ......................................................................................... 111 4.7.2 Economic Conflict ............................................................................... 115 5 Implications and Recommendations ............................................................................ 119 5.1 State Conflict ................................................................................................ 120 5.2 Proliferation of WMD/E ............................................................................... 124 5.3 Terrorist and Other Criminal Groups ............................................................ 126 5.4 Cyber and Critical Infrastructure Protection ................................................. 131 5.5 Resource Constraints and Disruptions .......................................................... 137 5.5.1 Disruption of Communications ........................................................... 137 5.5.2 Disruption of Trade Routes ................................................................. 138 5.5.3 Energy Resources and Energy Security .............................................. 139 5.5.4 Natural Resources ............................................................................... 141 5.6 Climate Change ............................................................................................. 142 5.7 Global Instability .......................................................................................... 146 5.7.1 Failed States ........................................................................................ 147 5.7.2 Economic Conflict .............................................................................. 148 6 Results and Conclusions .............................................................................................. 151 6.1 Concerns ....................................................................................................... 151 6.2 Results ........................................................................................................... 156 Bibliography ................................................................................................................... 163 Annex .............................................................................................................................. 174 Abstract ........................................................................................................................... 183 Summary ..........................................................................................................................185 Introduction “Change is the law of life. And those who look only to the past or present are certain to miss the future.” ~John F. Kennedy If there is one certain truth about the world as known by humanity it is that the future is hardly predictable. This general lack of forward-looking knowledge creates a great deal of fear and stress for experts in many fields, especially those in security. One area that benefits greatly from any possible grasp on what may come in the future is that of international security. Looking back in recent history, being able to predict the actions of possible aggressors such as Adolf Hitler pre-World War II or al-Qaeda with the 9/11 terrorist attacks would have saved much hardship around the world if these threats could have been dealt with beforehand. Even with the foreboding knowledge that existed in these two cases: Hitler’s ramblings in his publication of Mein Kampf or security reports from back in the Clinton administration about al-Qaeda’s intentions up until the last days before the 9/11 attacks; for whatever reason the right people weren’t paying enough attention to the right information at the right time to make the right choices. History shows that this is what happens due to many factors and with the increase in the amounts of information and intelligence out there, it can be easy to get lost in the fray. This however does not mean that it is unnecessary to even try, as a government has the responsibility to protect its people from any form of threat now or in the future. It would be irresponsible to neglect any possibilities in the future that are deemed possible. An example of a collective of states that has formed a security alliance and relatively successfully used this type of planning, the North Atlantic Treaty Organization (NATO), will be analysed as a case study to show how planning for future threats has proven a fruitful endeavour in international security based on their track record. The aim of this study is to look at the current view of the Future Security Environment (FSE) that security organizations, think tanks, education institutions and nations within the Alliance proclaim will be in the coming 1 decades and compare it to NATO’s mechanism of planning, the Strategic Concept. The goal of this is to create a sort of consensus on the FSE and to determine if NATO is planning accordingly. The study will
Recommended publications
  • Italy and Its Traumatic Past
    How to Transform a ‘Place of Violence’ into a ‘Space of Collective Remembering’: Italy and its Traumatic Past Anna Lisa Tota* Abstract: This paper seeks to analyse cultural trauma theories and their consequences as well as their potential applicability to cases of collective trauma where access to the legal arena in the rehabilitation process is not possible. When ‘state terror’ occurs, such as in Latin America, or, more arguably Italy, access to the legal arena is systematically denied through a variety of criminal strategies. In these cases, the cultural working through of trauma takes place on the aesthetic level. What are the consequences of this process both for the inscription of the crucial event in public discourse and for its relationship with justice? Moreover, how do aesthetic codes affect the public definition of justice and a collective understanding of what happened? Introduction1 A new wave of international terrorism has emerged in the wake of the attacks of September 11, March 11 and July 7 affecting our common perceptions of risk, justice and everyday life. These attacks challenged existing ideas about the state, war, torture, prison, human rights and presented a host of new questions for intellectuals, social scientists, artists, politicians and common citizens to consider. The question of how to locate terror in the public space is a complex question but it can be analysed by considering the nature itself of the aesthetic codes used to transform a place of violence into a space of collective remembering. This process of transforming place is shaped by the performative nature of the narratives used in the different national contexts.
    [Show full text]
  • This Electronic Thesis Or Dissertation Has Been Downloaded from Explore Bristol Research
    This electronic thesis or dissertation has been downloaded from Explore Bristol Research, http://research-information.bristol.ac.uk Author: King, Amy Title: Italy’s secular martyrs the construction, role and maintenance of secular martyrdom in Italy from the twentieth century to the present day General rights Access to the thesis is subject to the Creative Commons Attribution - NonCommercial-No Derivatives 4.0 International Public License. A copy of this may be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode This license sets out your rights and the restrictions that apply to your access to the thesis so it is important you read this before proceeding. Take down policy Some pages of this thesis may have been removed for copyright restrictions prior to having it been deposited in Explore Bristol Research. However, if you have discovered material within the thesis that you consider to be unlawful e.g. breaches of copyright (either yours or that of a third party) or any other law, including but not limited to those relating to patent, trademark, confidentiality, data protection, obscenity, defamation, libel, then please contact [email protected] and include the following information in your message: •Your contact details •Bibliographic details for the item, including a URL •An outline nature of the complaint Your claim will be investigated and, where appropriate, the item in question will be removed from public view as soon as possible. Italy’s secular martyrs: the construction, role and maintenance of secular martyrdom in Italy from the twentieth century to the present day Amy King A thesis submitted to the University of Bristol in accordance with the requirements for award of the degree of Doctor of Philosophy in the Faculty of Arts.
    [Show full text]
  • Historical Social Research Historische Sozialforschung
    Historical Social Research The Official Journal Cornel Zwierlein & Beatrice de Graaf (Eds.): of QUANTUM and Security and Conspiracy in History, 16th to 21st Century Historische Sozialforschung INTERQUANT This Special Issue combines both of the recently emerging fields – conspiracy and security history – for the first time by asking how we can conceive their parallel history from the Renaissance to the present. The new situation of international and national security re- gimes after the Cold War has not only placed security studies at the top of the Political Science agenda, but is also currently causing the emergence of a new field of security history. Likewise, Conspiracies and Conspiracy Theories have found a new great interest in the post- Cold War constellation, particularly following 9/11. There has been hitherto no attempt to conceptualize the development of Security and Conspiracy in a longue durée perspective. Remaining sensitive to the ancient and medieval forerunners, we nevertheless assume that both fully developed conspiracy theories and ‘security’ as a lea- ding political aim are phenomena mainly found in modern history. Both can be treated as dispositives in a Foucauldian sense which challenge each other – real or imagined conspiracies are threats to the security of the state or the commonwealth. Both Security and Conspiracy need to be carefully historicized. This Special Issue offers a sketch of the supposed development of the combined dispositives throughout modern history in addition to a theoretical approach. The contributions combine case studies and methodological reflections from the Renaissance to 9/11 with a majority concerning the ‘high’ and ‘late modern’ periods since 1880.
    [Show full text]
  • Cronologia Europea
    Cronologia Europea Questa cronologia vorrebbe essere una prima base per chi intenda studiare la violenza politica e/o il terrorismo europei . La cronologia non ha evidentemente la pretesa di essere esaustiva, ha delimitato il suo campo di indagine alla cosiddetta violenza politica, ovvero agli atti di violenza compiuti per motivi politici o che abbiano avuto rilevanza politica anche al di là delle intenzioni originali. In essa sono stati indicati unicamente gli attentati che hanno provocato vittime mortali. Questa cronologia è per vari motivi incompleta, molti fatti rimangono ignoti mentre altri avrebbero richiesto un lavoro molto più lungo (si pensi per esempio alle migliaia di vittime del conflitto nord-irlandese). Le notizie prelevate dalla stampa quotidiana (fonte fondamentale per un lavoro di questo tipo) sono state verificate attraverso testi specifici e alcuni preziosi e precisi siti internet (entrambi elencati nelle fonti) ma, naturalmente, alcuni fatti possono essere sfuggiti, mentre altri possono contenere inesattezze. Invitiamo, perciò, coloro che consulteranno la cronologia a segnalarci eventuali errori ed omissioni per aiutarci a rendere questo lavoro il più preciso possibile. Si è scelto di partire dal 1969 perché è l’anno in cui in Italia prende il via la strategia della tensione, in Irlanda del nord si moltiplicano i Riots (le rivolte di piazza) e un po’ in tutta Europa incominciano a moltiplicarsi gli atti di violenza politica. Il lavoro termina nel 1989 perché il crollo del muro di Berlino cambia completamente lo scenario di questa ricerca. Da questa cronologia è nata la pubblicazione di Massimiliano Boschi, La violenza politica in Europa, 1969-1989, Modena, Yema, 2005 Massimiliano Boschi 1969 1969 19/1 Cecoslovacchia Lo studente di filosofia Jan Palach si da fuoco in Piazza 19/1 Czechoslovakia.
    [Show full text]
  • A Study of the Restructured Italian Intelligence and Security Services" (1978) and "Contemporary Italian Terrorism: Analysis and Countermeasures" (1979)
    If you have issues viewing or accessing this file contact us at NCJRS.gov. 98th Congress • 2d Session COMMI'M'EE PIUNT TERRORISM AND SECURITY: THE ITALIAN EXPERIENCE REPORT OF THE SUBCOMMITTEE ON SECURITY AND TERRORISM OF THE COMMITTEE ON THE JUDICIARY UNITED STATES SENATE • NOVEMBER 1984 ."jJ U.S. GOVERNMENT PRINTING OFFICE :16·6790 WASHINGTON: 1984 • COMMITTEE ON THE JUDICIARY STROM THURMOND, South Carolina, Chairman .... CHARLES MeC. MATHIAS, JR., Maryland JOSEPH R. BlDEN, JR., Delaware PAUL LAXALT, Nevada EDWARD M, KENNEDY, MlIBBachusetts ORRIN G. HATCH, Utah ROBERT C. BYRD, West Virginia ROBERT DOLE, Kansas HOWARD M. METZENBAUM, Ohio ALAN K. S!MPSON, Wyoming DENNIS D&CONCINI, Arizona JOHN P. EAST, North Carolina PATRICK J. LEAHY, Vermont CHARLES E. GRASSLEY, Iowa MAX BAUCUS, Montana JEREMIAH DENTON, Alabama HOWELL HEFLIN, Alabama ARLEN SPECI'ER, Pennsylvania VINTON DEVANE LIDE, Chief CouTI8eI and Staff Director DEBORAH K. OWEN, General Counsel DEBORAH G. BERNSTEIN, Chief Clerk MARK H. GlTENBTEIN, MillOrity Chkf Counsel SUDCOMMt'M'EE ON SECURITY AND TERRORISM JEREMIAH DENTON, Alabama, Chairman ORRIN G. HATCH. Utah PATRICK J. LEAHY, Vermont JOHN P. EAST, North Carolina HOWARD M. METZENBAUM. Ohio JOEL S. LI8KER, Chief COI/TI8el and Staff Director RICHARD D. HOLCOMB, General Counsel FRANCES R. WERMUTH, Chief Clerk (Ill • 129291 • U,S. Department of Justice Nationallnslitute of Justice This document has been reproduced exactly as received from Ihe person or organization originating it. Points of view or opinions stated in this document are Ihose of the authors and do not necessarily represent the official position or policies of the Natio:1ill Institute of Justice.
    [Show full text]
  • Political Culture and National Identity Thesis Counter-Terrorism in Italy: Can It Still Be Considered a Success?
    M.A. History: Political Culture and National Identity Thesis Counter-Terrorism in Italy: Can it still be considered a success? Pietro d’Arcano S1549626 February 2020 Supervisor: Dr. Joost Augusteijn 1 TABLE OF CONTENTS Table of Contents ……………………………………………………………2 Abstract ………………………………………………………………………3 Introduction ………………………………………………………………….4 Hypothesis ……………………………………………...……………..……..6 Methodology & Sources…………………..…………………………………7 Literature Review ………………….……………………………………….11 From the victim’s perspective: truth, justice and revictimization…………..17 Denial of the status of victim…………….…………………………………18 Unfulfilled expectations in dealing with official agencies …………………20 Unwanted effects of victim-centered initiatives ……………………………26 Social Stigmatization and Exclusion………………………………………..30 Analysis …………………………………………………………………….34 Conclusion …………………………………………………...…………….36 References ………………………………………………………………….40 Word Count: 16304 On the cover: Agnese Moro (left), daughter of ex Prime Minister Aldo Moro with Adriana Faranda, a member of the Brigate Rosse, group that kidnapped and killed Moro’s father. 2 “Laying down arms, today as yesterday, those of lead we did at the time, now it is time to lay down the arms of language”1 (Azzolini in Il libro dell’incontro) Abstract This paper will assess the alleged success of counter-terrorism during the Anni di Piombo in Italy by examining newly available sources with a novel approach. Memoirs recently published by victims of terrorism along with other interviews with victims as well as meetings between victims and ex-perpetrators will be examined through the lense of revictimization, a concept borrowed from criminology as well as conflict resolution, to assess if the Italian state can still be considered successful in its counter-terrorism efforts in light of these new sources and new understandings of what constitutes successful counterterrorism. The paper will outline how while pacification was attained many issues persist to this day: lack of justice and truth, victim politicization, and revictimization.
    [Show full text]
  • „Pubblica Sicurezza“ in the European Context – Italy and the Internationalisation of Counterterrorism Policy (1972-1982)
    IMT School for Advanced Studies, Lucca Lucca, Italy „Pubblica Sicurezza“ in the European context – Italy and the internationalisation of counterterrorism policy (1972-1982) PhD Program in Political History XXIX Cycle By Lisa Bald 2017 The dissertation of Lisa Bald is approved. Program Coordinator: Prof. Dr. Giovanni Orsina, University LUISS-Guido Carli, Roma Supervisor: Prof. Dr. Eckart Conze, Philipps-Universität Marburg Supervisor: Dr. Hagen Schulz-Forberg, Aarhus University Tutor: Dr. Domenico Maria Bruni, University LUISS-Guido Carli, Roma The dissertation of Lisa Bald has been reviewed by: Prof. Dr. Giovanni Mario Ceci, Università degli Studi Roma Tre, Roma Prof. Dr. Guido Panvini, University LUISS-Guido Carli, Roma IMT School for Advanced Studies, Lucca 2017 To Liliane & Sophie Contents 1 Introduction ....................................................................................................................................... 1 1.1. Outline and theoretical framework ................................................................................. 1 1.1.1. Aim and research questions ............................................................................................ 2 1.1.2. Studied time and area ..................................................................................................... 3 1.1.3. State of the art and contribution ..................................................................................... 5 1.1.4. Methodology and concepts ..........................................................................................
    [Show full text]