Security in International Relations J

Total Page:16

File Type:pdf, Size:1020Kb

Security in International Relations J Security in international relations J. Jackson-Preece IR3140, 2790140 2011 Undergraduate study in Economics, Management, Finance and the Social Sciences This is an extract from a subject guide for an undergraduate course offered as part of the University of London International Programmes in Economics, Management, Finance and the Social Sciences. Materials for these programmes are developed by academics at the London School of Economics and Political Science (LSE). For more information, see: www.londoninternational.ac.uk This guide was prepared for the University of London International Programmes by: Jennifer Jackson-Preece, Senior Lecturer in Nationalism in Europe, European Institute and Department of International Relations, London School of Economics and Political Science. This is one of a series of subject guides published by the University. We regret that due to pressure of work the author is unable to enter into any correspondence relating to, or arising from, the guide. If you have any comments on this subject guide, favourable or unfavourable, please use the form at the back of this guide. The University of London International Programmes Publications Office Stewart House 32 Russell Square London WC1B 5DN United Kingdom Website: www.londoninternational.ac.uk Published by: University of London © University of London 2011 The University of London asserts copyright over all material in this subject guide except where otherwise indicated. All rights reserved. No part of this work may be reproduced in any form, or by any means, without permission in writing from the publisher. We make every effort to contact copyright holders. If you think we have inadvertently used your copyright material, please let us know. Contents Contents Introduction ............................................................................................................ 1 Aims ............................................................................................................................. 1 Learning outcomes ........................................................................................................ 1 How to use this subject guide ........................................................................................ 2 Structure of the guide .................................................................................................... 2 Essential reading ........................................................................................................... 4 Further reading .............................................................................................................. 4 Additional resources ...................................................................................................... 7 Online study resources ................................................................................................... 7 Useful websites ............................................................................................................. 8 Examination structure .................................................................................................. 10 Examination advice...................................................................................................... 10 Syllabus ....................................................................................................................... 12 List of abbreviations used in this subject guide ............................................................. 12 Chapter 1: The idea of security ............................................................................. 13 Aims of the chapter ..................................................................................................... 13 Learning outcomes ...................................................................................................... 13 Essential reading ......................................................................................................... 13 Further reading ............................................................................................................ 13 Additional resources .................................................................................................... 13 The value of security .................................................................................................... 14 Key assumptions of security ......................................................................................... 15 Security of the state and security of the person ............................................................. 17 Three paradigms of security ........................................................................................ 19 A reminder of your learning outcomes .......................................................................... 22 Sample examination questions ..................................................................................... 22 Chapter 2: The state as a security arrangement .................................................. 23 Aims of the chapter ..................................................................................................... 23 Learning outcomes ...................................................................................................... 23 Essential reading ......................................................................................................... 23 Further reading ............................................................................................................ 23 Origins of the state as a security arrangement .............................................................. 24 Security of the prince ................................................................................................... 24 Security of the people .................................................................................................. 25 Nation states and national security .............................................................................. 26 A reminder of your learning outcomes .......................................................................... 27 Sample examination questions ..................................................................................... 27 Chapter 3: National security: current issues and contemporary application ...... 29 Aims of the chapter ..................................................................................................... 29 Learning outcomes ...................................................................................................... 29 Essential reading ......................................................................................................... 29 Further reading ............................................................................................................ 29 National security as a reciprocal arrangement .............................................................. 30 National security policies ............................................................................................. 30 i 140 Security in international relations Nationali security and deterrence .................................................................................. 31 National security and the war on terror ........................................................................ 31 National security in authoritarian states ....................................................................... 32 Security in weak, failed or quasi-states ......................................................................... 33 A reminder of your learning outcomes .......................................................................... 34 Sample examination questions ..................................................................................... 34 Chapter 4: International society as a security arrangement ................................ 35 Aims of the chapter ..................................................................................................... 35 Learning outcomes ...................................................................................................... 35 Essential reading ......................................................................................................... 35 Further reading ............................................................................................................ 35 International society and the problem of disorder ......................................................... 36 International security ................................................................................................... 37 The balance of power and the concert of great powers ................................................. 37 A reminder of your learning outcomes .......................................................................... 38 Sample examination questions ..................................................................................... 39 Chapter 5: International security: current issues and contemporary application 41 Aims of the chapter ..................................................................................................... 41 Learning outcomes ...................................................................................................... 41 Essential reading ......................................................................................................... 41 Further reading ...........................................................................................................
Recommended publications
  • BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE
    Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15
    [Show full text]
  • Course Syllabus
    The University of Oklahoma College of Continuing Education Advanced Programs – Course Syllabus Course Title: National Security Leadership Course Number: IAS 5940-108 Course Description: National Security Leadership is a course designed to focus the student both on the policy process and its substance. To that end, we will look at how the national security policymaking process developed from the National Security Act of 1947 through the Goldwater-Nichols DOD Reorganization Act of 1986 to the present. This will entail a thorough examination of the US interagency process both in theory and how it works in practice. In terms of substance, we will consider the products beginning with NSC 68 and continuing up to the current National Security Strategy of the United States. We will also examine a series of case studies beginning with the 1989 invasion of Panama up to and including the current conflicts in Iraq and Afghanistan. In this regard, we will pay particular attention to the Iraq situation from 2006 to the present with a hard look at the “surge” strategy and how it came into being. As a counterpoint to the major cases we will consider the variety of “low intensity” national security conflicts that have involved the US since the end of World War II. The culminating exercise of the course will be a day long crisis action simulation that will take place in real time. Class Dates, Location and Hours: Dates: August 14 – 20, 2017 Location: Hurlburt Field, Florida. Class will be held in Bldg. 90220, 221 Lukasik Ave. Hours: Monday - Friday 6:00 p.m.-9:30 p.m.; Saturday 8:00 a.m.-4:30 p.m.; Sunday 8:00 a.m.-12:00 p.m.
    [Show full text]
  • DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
    An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • Fedramp SECURITY ASSESSMENT FRAMEWORK
    FedRAMP SECURITY ASSESSMENT FRAMEWORK Version 2.4 November 15, 2017 EXECUTIVE SUMMARY This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP is a Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services. FedRAMP uses a “do once, use many times” framework that intends to save costs, time, and staff required to conduct redundant Agency security assessments and process monitoring reports. FedRAMP was developed in collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), and the Department of Homeland Security (DHS). Many other Government Agencies and working groups participated in reviewing and standardizing the controls, policies and procedures. | i DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR Major revision for NIST SP 800-53 Revision 4. 06/06/2014 2.0 All FedRAMP PMO Includes new template and formatting changes. Formatting changes throughout. Clarified distinction 12/04/2015 2.1 All between 3PAO and IA. Replaced Figures 2 and 3, and FedRAMP PMO Appendix C Figures with current images. 06/06/2017 2.2 Cover Updated logo FedRAMP PMO Removed references to CSP Supplied Path to 11/06/2017 2.3 All Authorization and the Guide to Understanding FedRAMP PMO FedRAMP as they no longer exist. 11/15/2017 2.4 All Updated to the new template FedRAMP PMO HOW TO CONTACT US Questions about FedRAMP or this document should be directed to [email protected]. For more information about FedRAMP, visit the website at http://www.fedramp.gov.
    [Show full text]
  • Security Studies
    SECURITY STUDIES POSTGRADUATE CERTIFICATE POSTGRADUATE DIPLOMA MASTER OF SCIENCE INVESTIGATING THE KEY ISSUES AND EMERGING PARADIGMS OF SECURITY, INTELLIGENCE ANALYSIS AND CRIMINOLOGY AT LOCAL, NATIONAL AND INTERNATIONAL LEVELS In Partnership with www.security-studies.com [email protected] UK +44 (0)20 7017 4483 INTRODUCTION Dear Prospective Student, Security is one of the fastest growing areas of concern in the academic, corporate and public domains. This is due not only to the threats of war and terrorism but also issues related to crime, safety, global strategy and political upheaval. More than ever before, national governments, international agencies and major corporations recognise the need for personnel with a strong grasp of intelligence and security issues who can also demonstrate exceptional skills of research and analysis. This postgraduate Security Studies programme will give you a solid understanding of the many problems facing the international community today, with flexible study options of a PGCert, PGDip and MSc. The programme examines key themes and debates shaping the concepts of security and security studies. It addresses critical areas of contemporary concern within security studies, covering issues stretching from foreign policy through to the role of radicalisation in international politics to the evolving dangers of financial crime all within and including the background of the cyber or digital dimension. The Security Studies programme will not only equip you to analyse these types of problems but will also help you to place them in the context of broader military, strategic and political considerations. You will gain a solid academic grounding in criminology, terrorism studies and intelligence studies.
    [Show full text]
  • Global Terrorism: IPI Blue Paper No. 4
    IPI Blue Papers Global Terrorism Task Forces on Strengthening Multilateral Security Capacity No. 4 2009 INTERNATIONAL PEACE INSTITUTE Global Terrorism Global Terrorism Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 4 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. suggested citation: International Peace Institute, “Global Terrorism,” IPI Blue Paper No. 4, Task Forces on Strengthening Multilateral Security Capacity, New York, 2009. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge for Multilateral Counterterrorism. .6 Ideas for Action. 18 I. strengThen Political SupporT For The un’S role In CounTerIng Terrorism ii. enhanCe straTegic CommunicationS iii. deePen relationShips BeTween un head- quarTerS and national and regIonal parTnerS Iv.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • Bounding Power: Republican Security Theory from the Polis to the Global Village, Daniel H
    Reviews Bounding Power: Republican Security Theory from the Polis to the Global Village, Daniel H. Deudney (Princeton, N.J.: Princeton University Press, 2006), 384 pp., $35 cloth, $24.95 paper. With Bounding Power, Daniel Deudney Long in gestation, Bounding Power is a makes a masterly contribution to the ren- vigorously argued and sophisticated book, aissance of classical political theory in which contains a number of important contemporary thought about world poli- strands of discussion that combine to tics; in this regard he follows Michael make the case for what Deudney labels ‘‘re- Doyle and others in demonstrating how a publican security theory.’’ One important fresh reading of the historical traditions strand of the book is its reconstruction of that lie behind contemporary theoretical the concepts of anarchy (an absence of formulations can generate new per- authoritative order) and hierarchy (order spectives on both theory and practice. In established through subordination), and the case of Doyle’s work, a key theme has their reorientation around Deudney’s new been exploring the intellectual roots of formulation, ‘‘negarchy,’’ characterized by liberalism in international relations and the presence of mutual restraints with a thecontoursofliberalpeacetheory—the primary role in generating ordered rela- idea that liberal democracies are not tionships. Two of the heroes of Deudney’s disposed to go to war against each other. intellectual reconstruction are Hobbes and For Deudney, meanwhile, the central Locke. Hobbes develops his argument for subject is republicanism, and in particular sovereign power as a means by which to the idea that the republican tradition depart from anarchy, whereas Locke ar- of thought about security—with its re- gues for the need to enhance freedom cognition of the interplay of changing without jeopardizing law and order.
    [Show full text]
  • Department of Security Studies 1
    Department of Security Studies 1 DEPARTMENT OF SECURITY STUDIES About Chair: Nadav Morag ([email protected]) Contact Information: (936) 294-1646; Vivian Carlson ([email protected]) Website: Department of Security Studies (http://www.shsu.edu/academics/criminal-justice/departments/security-studies/) Mission Homeland Security (HS) is an emerging and evolving discipline that continues to have a significant impact on the public and private sectors. Terrorism, natural disasters, cyber-attacks against critical infrastructures, public health emergencies, and large-scale organized crime, and similar issues all present challenges in terms of the ability of society, the economy, and the government to function when such events occur. Moreover, despite the fact that these are very different types of threats, they will require many of the same tools in order to cope with them. For example, prevention of terrorism and prevention of cyber-attacks require that law enforcement and intelligence agencies cooperate, share information, and design integrated strategies to track down and apprehend such threats domestically (or in concert with the military when the threat is based overseas). Similarly, critical infrastructure targets and industries must share information and engage in joint planning across their respective industries, with governmental authorities. This same type of information-sharing and joint planning is important in preparing for, and responding to, natural disasters such as Hurricane Harvey and environmental disasters such as Deepwater Horizon.
    [Show full text]
  • International Security Studies After the Cold War: an Agenda for the Future
    INTERNATIONAL SECURITY STUDIES AFTER THE COLD WAR: AN AGENDA FOR THE FUTURE SEAN M. LYNN-JONES 91-11 DECEMBER 1991 CITATION AND REPRODUCTION This document appears as Discussion Paper 91-11 of the Center for Science and International Affairs. CSIA Discussion papers are works in progress. Comments are welcome and may be directed to the author in care of the Center. This paper may be cited as: Sean M. Lynn-Jones, International Security Studies after the Cold War: An Agenda for the Future. CSIA Discussion Paper 91-11, Kennedy School of Government, Harvard University, December 1991. The views expressed in this paper are those of the authors and publication does not imply their endorsement by CSIA and Harvard University. This paper may be reproduced for personal and classroom use. Any other reproduction is not permitted without written permission of the Center for Science and International Affairs, Publications, 79 JFK Street, Cambridge, MA 02138, telephone (617) 495-3745 or telefax (617) 495-5776. Introduction* The field of international security studies has always examined important public policy problems, and its scholars and analysts often have been drawn to prominent current issues. At the dawn of the atomic age, scholars tried to understand the implications of "the absolute weapon" for the United States and the world. In the 1950s, the thermonuclear revolution led to an explosion of work on deterrence theory and the conundrum of how to make the hydrogen bomb militarily and politically useful. In the 1970s, the Vietnam War and U.S.-Soviet détente reduced interest in military questions. Later in that decade strategic parity prompted increased attention to problems of conventional deterrence and defense.
    [Show full text]
  • Nils W. Metternich: Curriculum Vitae
    Curriculum Vitae Nils W. Metternich University College London Department of Political Science Phone: +44 20-7679-4974 The Rubin Building Mobile: +44 79-6424-5536 29-31 Tavistock Square Email: [email protected] London, WC1H 9QU Website: ucl.ac.uk/∼uctqnm0 United Kingdom Research Interests Civil Wars, Military Interventions, Rebel Organizations, Democratization, Health and Civil War, Priva- tization of Warfare, Formal Modeling, Quantitative Methods, Forecasting. Positions October 2017-Current. Reader in International Relations. Department of Political Science, University College London. October 2015-September 2017. Senior Lecturer in International Relations. Department of Political Science, University College London. January 2013-September 2015. Lecturer in International Relations. Department of Political Science, University College London. January 2011-December 2012. Visiting Assistant Professor/Post-doc. Department of Political Science, Duke University, Prof. Michael Ward. August 2008-September 2010. Research Officer. Department of Government, University of Essex, "Disaggregating Civil Wars" funded by the European Science Foundation, Prof. Han Dorussen and Prof. Kristian Skrede Gleditsch. February-December 2007. Research Associate. Free University of Berlin, Research Centre "Governance in Areas of Limited Statehood", Project "Armed Conflict and (In-)Security in Areas of Limited State- hood", Prof. Sven Chojnacki. August 2005-January 2007. Student Research Assistant. Free University of Berlin, Department for Peace and Security Studies, Prof. Sven Chojnacki. June 2004-August 2004. Student Research Assistant. Social Science Research Centre Berlin, Department for International Politics, Prof. Sven Chojnacki. Education Degree coursework October 2007- January 2011. PhD Political Science, University of Essex. October 2003-December 2006. Diplom (equivalent to M.Sc.) Political Science, Free University of Berlin. Nils W.
    [Show full text]
  • Security Studies • This Is General Advising Information for Security Studies Majors
    The BA/BS in Multidisciplinary Studies: Security Studies • This is general advising information for Security Studies majors. Please consult with your academic advisor regarding any questions or concerns you have about major requirements and your specific situation. Faculty Advisor Dr. Armin Krishnan Director of the Security Studies Program [email protected] What Is Security Studies? Wars, insurgency, terrorism, transnational organized crime, WMD, arms races, weapons proliferation, cyberwar, diminishing resources, climate change, peacekeeping, conflict resolution, economic collapse, genocide, and pandemics – these are all complex security issues that shape international politics today. ECU’s Security Studies program explores all of the aforementioned security challenges from an interdisciplinary perspective and it equips our students with the knowledge and analytical skills for a career in national security, law enforcement, and foreign affairs. We offer courses in: • Homeland Security • International Relations • National and International Security What Is Security Studies? • Security Studies started out as a specialization in the discipline of International Relations, which is itself a specialization in the discipline of Political Science. • It is now an interdisciplinary field that seeks to develop analytical tools for understanding the problem of security. • In its essence, security is about survival. Career Options With a Security Studies Degree • Armed Forces • Law Enforcement • Intelligence Agencies • Private Security Sector • International
    [Show full text]