PowerPoint Template

Download Report

Transcript PowerPoint Template

Enhancing National Security
through Communication
By
E. Remi Aiyede
Department of Political Science
University of Ibadan
[email protected]
Introduction
 The Modern state is a security state
 The changing security Environment, globalisation, revolution in






communication and information technology (ICT) terrorism, the place of
civilians in threats
Volatility of the security sector in Africa in the post-cold war era, coming
from non-state actors aided by ICT
Communication has always been an important element of peace and
conflict management.
In the post-cold war era things have changed affecting the notion of
security.
Thus, this paper explores the concept of national security as it has evolved
over time, with its implactions for security policy and practice.
The mutations in the natutre of security challenges, both man made and
natural disasters
The increasing centrality of communication and communication
infrastructure to security threats, state legitimacy and policy action in the
security sector.
Tracing the Evolution of the Concept of
security
 Traditonal concept of security

In national terms and in relation to the state
 Lipman (1943:25) asserts that “a nation is secure to the extent that it
is not in danger of having to sacrifice her core values, if it wishes to
avoid war, and is able if challenged to maintain them by victory in
such war”.
 In this context threat to national security, comes from the military
power of other states. Security then refers to the ability of the state
to protect itself by military power.
But from the 1960s it became clear that this narrow view is not good
enough because of the linkages of the military with other sectors.
 McNamara (1968:149) argued, that “Any society that seeks to
achieve adequate military security against the background of food
shortages, population explosion, low level of productivity, per capita
income and technological development, inadequate and inefficient
public utilities and a chronic problem of unemployment has a false
sense of security.”
Tracing the Evolution of the Concept of
security
 The




revolution in information and communication
technology. The speed with which developments spread
across national borders, threaten regional and global
stability in diverse ways
The use to which new technology could be put, especially by
terrorist groups. The changing nature of crime and threats
The collapse of the Berlin wall, the dissolution of the former
Soviet Union and the emergence of the United States as the
world’s greatest power
The event of September 11 2001.
complex social, political and economic developments,
threaten the welfare and health of societies and individuals
in unanticipated ways.
Tracing the Evolution of the Concept of security
 In Peoples, States and Fear, Buzan (1991) questioned the
traditional conception of security. For him, security is of
various dimensions and it relates to human collectivities,
including the state. There are five major aspects of security.
These are military, political, economic, societal and
environmental aspects.
 ‘Copenhagen School’ of security studies, later challenged the
universal focus on the state as the ‘referent object’ of security
 In the case of Africa Cilliers (2004:9) observed that state
security, in most of Africa, is not threatened by conventional
armed attack by other countries “but by more insidious
measures many of which flow from the very weakness of the
state and its absence of control over its territory”.
 That is why Booth (1991:319) argues that security is emancipation:
‘Security’ means the absence of threats. Emancipation is the freeing of people (as
individuals and groups) from those physical human constraints which stop them
carrying out what they would freely choose to do. War and the threat of war is
one of those constraints, together with poverty, poor education, political
oppression and so on. Security and emancipation are two sides of the same coin.
Emancipation, theoretically, is security.
 Then enter: Human security.
 United Nations Commission on Human Security (2003) notes in its maiden
report that human security is a concept that combines “human protection and
development and interconnects peace, security and sustainable development”. It
emphasized that human security should not focus on macro—state level but also
at community and individual level.
 Another significant concept in dealing with the challenges of security is the
concept of national power

Issues & Challenges
 Soft power refers to ‘the ability to get what you want
through attraction rather than coercion or payments. It
arises from the attractiveness of a country’s culture,
political ideals, and policies. Soft power rests on the
ability to shape the preferences of others” (Nye 2004: x,
5).
 Hard power on the other hand refers to military might, as
supported by the population, and economy. Thus,
national power is “not just about visible military assets
but also aptitude to innovation, the soundness of social
institutions and the quality of the knowledge base”.
The practice of National security
 The Practice of National Security during the Cold
War:

Containment, Deterrence, and Proxy Wars
 National Security in the Post-Cold War:
 Counter Terror, Counter Insurgency, Global Institutions and
Peace
 Example: Bush Doctrine vs Obama
 conscious decision to remove terms such as "Islamic radicalism",
instead speaking of terrorism generally.
 Balance of power is of limited utility; soft power is
increasingly important

Cooperation between states, international organizations and
NGOs can be effective and sustained.
The Practice of National Security
 In this practice, threats to human security has broadened to include,
economic threats, food threats, health threats, environmental threats,
personal threats, community threats, political threats, demographic
threats, crime in all forms, including terrorism, natural disasters,
violent conflicts and wars, genocide, anti-personnel mines etc.
 new means for addressing security, such as humanitarian intervention
or humanitarian help, peacekeeping operations, peace building, arms
verification operations, respect for human rights and liberties,
sustainable economic development, early warning, diplomatic
missions, focused (smart) sanctions, preventive deployment of armed
forces, preventive diplomacy, stronger civil society, empowerment
strategies, assuring the minimal life standards, et
 The emergence of hybrid organisations.
 Is the military suitable for policing?
The ICT Revolution and the Security
Architecture in Africa
 Growing dependence on communication infrastructure for security,
crisis management, e-commerce, and payments. Industry and
government increasingly rely on satellite infrastructure for data, voice,
and video communications and services on national and global basis.
 Cheap access to communication technology has enabled several actors
to become key players in providing access to and delivery of
information. Shirky(2008) in The Power of Organising without
Organisation declares: “Loosely coordinate groups can now achieve
things that were previously out of reach for any other organisational
structure.”
 The expansion in social media enables rumours, misinformation, and
inflammatory communications to reach a wider audience more quickly
than ever before, sometimes precipitating panic and violence. In some
instances, such rumours have had significant adverse effects on other
indices of human security.
The ICT Revolution and the Security
Architecture in Africa
 Leaders of such groups have used social media to play up grievances and
divisions in order to mobilize support for their armed movements. Narrow
interests continue use newspapers and radio programme to spread political
disinformation and divisive ideas that have led to great upheavals in many
African states. Rumours and misinformation have preceded violence and
instability where government management of information and capacity to
communicate with citizens are weak.
 Communication has become central n contemporary times to national security.
In the first instance, insurgents and terrorist rely on communication as they
strive to pass their message across to vast population and seek support. Witness
the impact that Inspire Magazine has had on potential recruits for al Qaeda
(Stewart 2013)1.
 effective communication is always central to security, stability and government
legitimacy. Under the current revolution in ICT which has shrank space and
intensified interactions across national borders, effective communication has
become more challenging especially for weak and fragile states as they try to
deal with crime, insurgency and terrorism.
The ICT Revolution and the Security
Architecture in Africa
 Although the cold war ideological warfare is over, ideological wars
based on religious extremism and ethnic chauvinism have taken
their places. Governments and insurgents or terrorists compete
with opposing narratives for the trust and support of local
populations.
 “ICT asymmetrically enabled the capability of relatively small
outfits with otherwise limited conventional military power by
facilitating their ability to communicate plan, gather information,
transfer funds, organise themselves, and establish command and
control networks from disparate and at times highly isolated
locations around the world” (Siegle 2013:114). Thus, Siegle argues
that growing access to information and communications
technology (ICT) is a two-edged sword in fragile and transitioning
states.
The ICT Revolution and the Security
Architecture in Africa
 ICT provides governments with new tools to reach out to these
populations, thereby contributing to stability through the enhanced
legitimacy of political systems, greater transparency, and improved
government responsiveness to societal priorities. National security
communities, including the United Nations Peacekeeping interventions
use satellites for critical activities such as military support, intelligence
gathering, and disaster preparedness. There are also several
independent ICT initiatives across Africa that has been used to promote
openness and give voice to dissent and minorities, help farmers track the
fertility cycles of cows, fight corruption in government, provide early
warning systems for natural disasters. Peace keeping radio stations
have contributed to media development in post conflict countries like
Somalia, Liberia and Cote d’Ivoire where UN-backed radio services
provide local news programmes and nonpartisan public affairs forum
(Livingston 2011).
 More needs to be done.
Conclusion
 The new national security concept demands a new way of thinking
about security and a different way of managing security.
 Information communication has become central to security as different
forces compete for the hearts and mind both local and global
populations.
 Exchanges of goods, information, ideas, and people are also far denser
and more variable than they were even a dozen years ago. New forms of
threats from networked, global insurgencies fuelled by transnational
non-state armed actors ranging from extremist movements (such as alQaeda) to transnational criminal organisations such as drug cartels, or
gangs have emerged.
 Military and police interaction in domestic space are required in
concert with new security structures to provide security against such
threats. Interagency communication and coordination becomes critical.
Conclusion
 The importance of communication and communication infrastructure is




obvious: ICT has been deployed by terrorists, criminals and insurgents.
They also target communication infrastructure which can hamper critical
financial services processes with grave consequences for the national
economy.
The big challenge for governments in Africa is to become more proactive
in taking advantage of the revolution in ICT to enhance communication
with citizens.
Policy: An open society in which there is free flow of information creates
a market of ideas and opportunities for citizens engagement and
empowerment. Such an environment promotes trust and reduces the
potency of rumours.
As government hears from citizens and respond to them through policy
priorities, it becomes more responsive and accountable. ICT provide
opportunities for governments to deepen their interaction with citizens.
Such agencies face great accountability challenges beyond the hierarchy.
Thank You