16 Peace and Security

Total Page:16

File Type:pdf, Size:1020Kb

16 Peace and Security >< 04 Types of human security and their threats Types of human security Characteristics Threats/Indicators Availability of basic income from work, the Rising unemployment, drop in real salaries, Economic State or from the family or community. rising inflation, loss of production assets, rising Peace and security security income gap between rich and poor. 16 ALBOAN Food Availability of food and resources to access it. Consumption deterioration, exhaustion of the food reserves, drop in food production and security increased dependency on imports. Foro Rural Mundial Healthy body, healthy environmental, health Rising insalubrity, propagation of epidemics, [ Manuela Mesa Peinado ] Health security care cover. deterioration of the health system and access to CEIPAZ, Culture of Peace Foundation drinking water. ALBOAN Environmental Ecological balance, sustainable development. Deterioration of the local and world ecosystems, security exhaustion of the resources. Traditionally peace has been understood as the absence of violence, positive UNESCO peace was proposed as a complex, medium Absence of physical violence. Increase in different types of physical violence considered as the absence of Personal (political repression, attacks on foreigners, and long-term process linked to human rights, security ethnic or religious conflicts, delinquency, direct violence or war. This gender violence) drug trafficking, etc. development and respect for the environment UNESCO/Loock notion has its origin in the double (see figure 1). Conflict is considered as an Political Respect for individual’s fundamental rights, Increase in political violence, human rights element present in every society produced in democratic guarantees. violations and authoritarianism; break-down of dimension of pax romana, on the security situations where people or social groups seek the nation State due to rivalry. one hand imposing internal order UNESCO/Van Dermeersch or perceive opposing goals, assert conflicting and on the other hand an external values or have differing interests. Conflict is not [ >< ] Source: HEGOA and UNDP military deterrent summarised in itself positive or negative, what is important in the maxim “if you want peace is the way in which these disagreements are regulated or transformed; whether in a destructive prepare for war”. or a constructive manner. Throughout history levels, especially in the Pacific and Caribbean This is the case of water management or the conflicts have been one of the driving forces islands. Frequency and intensity of natural fight against pollution. Environmental issues Dimensions of peace behind social change and an essential creative disasters like cyclones, droughts and flooding, also require local participation and common element in human relations. Peace is a process will have a greater affect on the poorest sense. When this cooperation is achieved In the sixties peace research appeared as a aimed at promoting constructive forms of conflict countries. This situation will have very serious on environmental issues, new areas will be discipline, and some academics, researchers and resolution. implications for human security. created for negotiating other issues which activists advanced towards a broader concept The notion of positive peace has been slowly At the same time some environmental due to political reasons, ethnic differences or of peace related to social justice, equality and consolidated and one of the most relevant issues may provide useful elements in the historical grievances, have become impossible dialogue. As opposed to negative peace, contributions was from Johan Galtung (in conflict transformation and peace construction to resolve. Thus, new scenarios for dialogue will processes. The environmental problems, due be opened which allow disputes to be resolved to their global nature and the interdependence via negotiation. This is how environmental of the ecosystems, force conflicting parties to problems can make an important contribution to 01 Positive peace and negative peace cooperate if they want to obtain greater benefits. the construction of peace. < Negative Peace Positive Peace > Achieve social harmony, justice and equality, as well as Avoid armed conflict. Goal the elimination of structural violence. bibliography and references: > Galtung, J.: Violence, Peace and Peace Research, Journal of Peace Research 27.3., 1969. > Galtung, J.: Sobre paz. Barcelona: Fontamara, 1985. Absence of war or direct violence. Absence of direct, structural and cultural violence. > Lederach, J. P.: Construyendo la paz. Reconciliación sostenible en sociedades divididas. Bilbao: Gernika Gogoratuz, 1998. Characteristics > Martínez-Guzmán, V.: Filosofía para hacer las paces. Barcelona: Icaria, 2001. Established between States and requires military Reduction in the level of direct violence and higher levels > Mayor Zaragoza, F.: La nueva página. Barcelona: Galaxia Gutenberg, Círculo de Lectores. UNESCO, 1994. hardware to guarantee peace. of justice. > Renner, M., French, H. and Assadourian, E.: La situación del Mundo 2005: Redefiniendo la seguridad mundial. Barcelona: Icaria Editorial, 2005. Peace is a process rather than an end in itself. It does > Wolf, A.T.: Water Wars and Water Reality: Conflict and Cooperation along Internacional Waterways. Enviromental Change, Adaptation and “Pacific war” is accepted by imposing economic not involve rejecting conflict. We must learn how to deal Strategies Human Security. Dordrecht. Steve Lonergan, 1999. sanctions, commercial boycotts, etc. with conflicts and to settle them in a pacific and fair manner. > Escola de Cultura de Pau: www.escolapau.org > Foundation Culture of Peace: www.fund-culturadepaz.org [ >< ] Source: Own preparation according to Galtung > War Resisters’ International: www.wri-irg.org centro unesco euskal herria UN Decade of Education for centre unesco pays basque Sustainable Development unesco centre basque country 16 paz y seguridad ingles.indd 2 20/07/2009 10:29:22 02 Analysis of types of violence 03 Historical evolution of the concept of security CLASSIC CONCEPT OF HUMAN SECURITY CONCEPT Direct violence SECURITY Visible Aggression and war Classic realist paradigm which Globalalist or transnational paradigm Born in the 1980s and remains dominant Awareness about new cross-border consolidated in the 1990s, security risks which must be solved linked to the concept of human Focused on military defence of based on international cooperation. development. the State’s sovereignty and territorial integrity against The person as the ultimate Cultural violence Structural violence external aggression (classic subject of security, understood Invisible CRITICAL INFLUENCE Imposing certain values Deriving from oppressive social, war) as the capacity to satisfy basic universal needs through or cultural models political and economic structures Characteristics: everybody’s shared participation - Focused on the State EVOLUTION IN THE 1960s AND 1970s in the benefits of development. - Ignores the citizens [ >< ] Source: Own preparation according to Galtung - Limited to external military Characteristics: threats CRITICAL INFLUENCE - Freedom in relation to basic - Ignores other sources of needs (i.e. that they are insecurity, whether global or covered). internal (e.g. economic or Structural paradigm or paradigm - Freedom from fear (threats, 1969) with his concepts of direct violence, structural Peace is related to human rights and the human right environmental) of dependence repression, etc.). National security is none other than the violence and cultural violence (see figure 2). Direct to peace has been one of the main focuses in recent security of ruling elite. The real Types of security: violence is linked to aggression and has its maximum years for many organisations and bodies. These insecurity of the poor classes lies in - Economic, food, health, expression in war; Structural violence is that which organisations advocate peace being recognised the failure to satisfy their basic needs environmental, personal, derives from oppressive social, political and economic as a right which is denied to many societies as a as a result of inequitable economic and political, provided by the structures which prevent people from fully realising result of, amongst other factors, poverty, the lack of political structures. community. their development potential: for example poverty, freedom or internal wars, as indicated in the Luarca hunger, lack of access to education or health are all Declaration (2007). forms of violence. Cultural violence comes from [ >< ] Source: Own preparation imposing cultural values or criteria, denying cultural Human security diversity and legitimising the use of force as a method of conflict resolution. As such, peace is a process aimed Peace and security are two concepts which are at reducing all of these forms of violence, whether intrinsically linked. Like the concept of peace, the provide protection and ensure their survival. The Threat of environmental degradation direct, structural or cultural. This notion of positive notion of security has been changing and evolving notion of human security was a great step forward peace has considerably broadened the scope of action (see figure 3). The classic concept of security, in how security is understood and in its relationship Amongst these threats it is probably those of researchers, educators and the peace movement the so-called “national security”, is focused on with sustainable human development (see figure related to environmental
Recommended publications
  • BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE
    Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15
    [Show full text]
  • The Security Lexicon from Westphalia to the Present a Cautionary Tale
    THE SECURITY LEXICON FROM WESTPHALIA TO THE PRESENT A CAUTIONARY TALE MAX G. MANWARING, PH.D. A new and dangerous dynamic is at work around the world today. That new dynamic involves the migration of some of the monopoly of political power (i.e., the authoritative allocation of values in a society) from the traditional nation-state to unconventional actors such as the Islamic State (ISIS), transnational criminal organizations, Leninist-Maoist insurgents, tribal militias, pri- vate armies, enforcer gangs and other modern mercenaries. These actors conduct their own political-psychological type of war against various state and other non-state adversaries. These violent politicized non-state actors are being ignored; or, alternatively, are being considered too hard to deal with. That misunderstanding must inevitably result in an epochal transition from traditional Western nation-state systems and their liberal democratic values to something else dependent on the values—good, bad, or non-existent—of the winner.1 To help civilian and military leaders, policy-makers, opinion-makers, and anyone else who might have the responsibility for dealing with modern conflict come to grips analytically with the security dilemma and other realities of the 21st century political-psychological environment, this paper seeks to do three things. In Part One, we outline a bit of essential history that takes us from the Westphalian Peace Treaty of 1648 to the present. In that context, we briefly consider a con- temporary example of the traditional military-centric approach to national and international security that is still alive and well. That is, Chinese military activity in the South China Sea.
    [Show full text]
  • DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
    An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • National Security and Constitutional Rights in Korea
    National Security and Constitutional Rights in Korea - National Security Law, Past and Present Park Won Soon, Human Rights Lawyer Chair, Executive Committee, PSPD Director, Beautiful Foundation As of 25 August, of the 99 political prisoners in detention, 54 were detained on charges under the National Security Law. Of these, the majority were arrested under Article 7, which punishes membership of organizations deemed to "benefit the enemy", improving relations with North Korea prompted debate on reform of the National Security Law. President Kim Dae-Jung apparently encouraged by his award of the Nobel Peace Prize, announced his support for revisions to the National Security Law, but opposition to reform in the National Assembly from both the GNP and the ULD prevented significant revisions. (Amnesty International Report 2001) 1. Introduction De Facto Constitution - The National Security Law The National Security Law (NSL) in Korea has been called as a de facto constitution. It meas the NSL was under no other laws including the Constitution. Even though it is inferior to the Constitution namely, no legal enforcement agencies and the court could not challenge unconstitutionality of the law in reality. Korean peninsula has been one of the powder magazine where small incident could lead to big armed conflict. As a matter of fact, in 1950, there broke out Korean war in which over 3 million people were killed. Since then, national security has been regarded as the most important and senstive agenda among Korean people. Basic freedom and human rights enshrined in the Constitution has been sacrificed in the name of national security.
    [Show full text]
  • Fedramp SECURITY ASSESSMENT FRAMEWORK
    FedRAMP SECURITY ASSESSMENT FRAMEWORK Version 2.4 November 15, 2017 EXECUTIVE SUMMARY This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP is a Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services. FedRAMP uses a “do once, use many times” framework that intends to save costs, time, and staff required to conduct redundant Agency security assessments and process monitoring reports. FedRAMP was developed in collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), and the Department of Homeland Security (DHS). Many other Government Agencies and working groups participated in reviewing and standardizing the controls, policies and procedures. | i DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR Major revision for NIST SP 800-53 Revision 4. 06/06/2014 2.0 All FedRAMP PMO Includes new template and formatting changes. Formatting changes throughout. Clarified distinction 12/04/2015 2.1 All between 3PAO and IA. Replaced Figures 2 and 3, and FedRAMP PMO Appendix C Figures with current images. 06/06/2017 2.2 Cover Updated logo FedRAMP PMO Removed references to CSP Supplied Path to 11/06/2017 2.3 All Authorization and the Guide to Understanding FedRAMP PMO FedRAMP as they no longer exist. 11/15/2017 2.4 All Updated to the new template FedRAMP PMO HOW TO CONTACT US Questions about FedRAMP or this document should be directed to [email protected]. For more information about FedRAMP, visit the website at http://www.fedramp.gov.
    [Show full text]
  • Global Terrorism: IPI Blue Paper No. 4
    IPI Blue Papers Global Terrorism Task Forces on Strengthening Multilateral Security Capacity No. 4 2009 INTERNATIONAL PEACE INSTITUTE Global Terrorism Global Terrorism Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 4 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. suggested citation: International Peace Institute, “Global Terrorism,” IPI Blue Paper No. 4, Task Forces on Strengthening Multilateral Security Capacity, New York, 2009. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge for Multilateral Counterterrorism. .6 Ideas for Action. 18 I. strengThen Political SupporT For The un’S role In CounTerIng Terrorism ii. enhanCe straTegic CommunicationS iii. deePen relationShips BeTween un head- quarTerS and national and regIonal parTnerS Iv.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • ICS Portugal
    Integrated Country Strategy PORTUGAL FOR PUBLIC RELEASE FOR PUBLIC RELEASE Table of Contents I. Chief of Mission Priorities .......................................................................................................... 2 II. Mission Goals and Framework ................................................................................................... 5 III. Mission Objectives ..................................................................................................................... 6 IV. Management Objectives .......................................................................................................... 11 FOR PUBLIC RELEASE Approved: August 6, 2018 1 FOR PUBLIC RELEASE I. Chief of Mission Priorities As we adopt this new Integrated Country Strategy, Portugal is reaping the benefits of a hard- won economic recovery while raising its international profile. The economy has returned to growth, while rating agencies’ elevation of Portuguese debt to investment grade will cut the cost of capital to finance further economic expansion. Effective Portuguese diplomacy has enabled Lisbon to punch above its weight in EU and global affairs. Portugal’s highly professional armed forces are looking forward to gaining new capabilities and to making a greater contribution to European, African, and Asian security through more deployments as Portugal makes the investments necessary to fulfill its Wales pledge to NATO. Coupled with Portugal’s avowed Atlantic orientation, all of these factors paint a picture of opportunity for
    [Show full text]
  • APPENDIX D Common Abbreviations
    ABBREVIATIONS APPENDIX D Common Abbreviations BIS Bureau of Industry and Security (Department of Commerce) BW Biological Weapons or Biological Warfare CBP Customs and Border Protection (Department of Homeland Security) CBRN Chemical, Biological, Radiological and Nuclear Weapons CCDC Collection Concepts Development Center CDC Centers for Disease Control and Prevention CIA Central Intelligence Agency CIFA Counterintelligence Field Activity (Department of Defense) CPD Counterproliferation Division (CIA) CTC Counterterrorist Center CW Chemical Weapons or Chemical Warfare D&D Denial and Deception DCI Director of Central Intelligence DCIA Director of Central Intelligence Agency DHS Department of Homeland Security DIA Defense Intelligence Agency DNI Director of National Intelligence DO Directorate of Operations (CIA) DOD Department of Defense DOE Department of Energy DOJ Department of Justice DS&T Directorate of Science and Technology (CIA) FBI Federal Bureau of Investigation FBIS Foreign Broadcast Information Service FIG Field Intelligence Group (FBI) FISA Foreign Intelligence Surveillance Act HPSCI House Permanent Select Committee on Intelligence HUMINT Human Intelligence IAEA International Atomic Energy Agency IAEC Iraqi Atomic Energy Commission 591 APPENDIX D ICE Immigration and Customs Enforcement (Department of Homeland Security) INC Iraqi National Congress INR Bureau of Intelligence and Research (Department of State) INS Immigration and Naturalization Services IRTPA Intelligence Reform and Terrorism Prevention Act of 2004 ISB Intelligence
    [Show full text]
  • The Interim National Security Strategic Guidance
    March 29, 2021 The Interim National Security Strategic Guidance On March 3, 2021, the White House released an Interim and what the right emphasis - in terms of budgets, priorities, National Security Strategic Guidance (INSSG). This is the and activities—ought to be between the different kinds of first time an administration has issued interim guidance; security challenges. The 2017 Trump Administration NSS previous administrations refrained from issuing formal framed the key U.S. national security challenge as one of guidance that articulated strategic intent until producing the strategic competition with other great powers, notably congressionally mandated National Security Strategy (NSS) China and Russia. While there were economic dimensions (originating in the Goldwater-Nichols Department of to this strategic competition, the 2017 NSS emphasized Defense Reorganization Act of 1986 P.L. 99-433, §603/50 American military power as a key part of its response to the U.S.C §3043). The full NSS is likely to be released later in challenge. 2021 or early 2022. By contrast, the Biden INSSG appears to invert traditional The INSSG states the Biden Administration’s conceptual national security strategy formulations, focusing on approach to national security matters as well as signaling its perceived shortcomings in domestic social and economic key priorities, particularly as executive branch departments policy rather than external threats as its analytic starting and agencies prepare their Fiscal Year (FY) 2022 budget point. The Biden Administration contends that the lines submissions. With respect to the latter, FY2022 will be the between foreign and domestic policy have been blurred to first budget prepared after the expiration of the budget caps the point of near nonexistence.
    [Show full text]
  • 2019 National Intelligence Strategy of the United State
    The National Intelligence Strategy of the United States of America IC Vision A Nation made more secure by a fully integrated, agile, resilient, and innovative Intelligence Community that exemplifies America’s values. IC Mission Provide timely, insightful, objective, and relevant intelligence and support to inform national security decisions and to protect our Nation and its interests. This National Intelligence Strategy (NIS) provides the Intelligence Community (IC) with strategic direction from the Director of National Intelligence (DNI) for the next four years. It supports the national security priorities outlined in the National Security Strategy as well as other national strategies. In executing the NIS, all IC activities must be responsive to national security priorities and must comply with the Constitution, applicable laws and statutes, and Congressional oversight requirements. All our activities will be conducted consistent with our guiding principles: We advance our national security, economic strength, and technological superiority by delivering distinctive, timely insights with clarity, objectivity, and independence; we achieve unparalleled access to protected information and exquisite understanding of our adversaries’ intentions and capabilities; we maintain global awareness for strategic warning; and we leverage what others do well, adding unique value for the Nation. IAL-INTE AT LL SP IG O E E N G C E L A A G N E O I N T C A Y N U N A I IC T R E E D S M TATES OF A From the Director of National Intelligence As the Director of National Intelligence, I am fortunate to lead an Intelligence Community (IC) composed of the best and brightest professionals who have committed their careers and their lives to protecting our national security.
    [Show full text]
  • South Korea's National Security: Concepts, Threat Perceptions and Strategies
    9thBerlin Conference on Asian Security (BCAS) International Dimensions of National (In)Security Concepts, Challenges and Ways Forward Berlin, June 14-16, 2015 A conference jointly organized by Stiftung Wissenschaft und Politik (SWP), Berlin and Konrad-Adenauer -Stiftung (KAS), Berlin Discussion Paper Do Not Cite or Quote without Author’s Permission Session I: National Security – Concepts and Threat Perceptions Seok-soo Lee Research Institute for National Security Affairs Seoul South Korea’s National Security: Concepts, Threat Perceptions and Strategies Seok-soo Lee Introduction The concept of national security began to capture attention since the World War II. Under the Cold war structure, which is defined by the acute military confrontation between the Western and Eastern Block1, security had been understood as military- related. Security is referred to as military security. During the period, strategic studies constituted a mainstream in security discussions. Here, strategic studies mean military security studies. Security was about the survival of sovereign states. State took center stage in security studies as a referent object and an actor to achieve security.’ In the Cold War era, the concept of ‘national security’ was dominantly built on the two elements: state and military threat. With the Cold War over, military threats became diluted and new threats loomed. Against this backdrop, broadening and deepening of security studies gained ground. Broadening has to do with diversification of security threats. The emergence of various
    [Show full text]