Blog

  • When the Strong Weaponize the Weak: States and Guerrilla Warfare

    Often seen as a tactic harnessed by the weak, guerrilla warfare can also be a employed by the strong. States have at times used guerrillas in inter-state and civil conflict.

    Guerrilla warfare is widely viewed as a weapon of the weak. To Mao Tse-tung, it was the optimum strategy of those “inferior in arms and military equipment.” He drew inspiration from the Russian troops accomplishing, in 1812, what their militarily superior European counterparts could not: drive Napoleon’s Grand Army out of their country. They did this not only by taking advantage of Russia’s distinctive geography and climate, but also by using guerrillas – Cossacks and peasants – to go after the French troops “as unconsciously as dogs bite to death a rabid stray dog.”

    But, guerrilla warfare can also be a weapon of the strong. States with robust conventional military capabilities at times use guerrillas in inter-state and civil conflict.

    Guerrilla Warfare

    pkk-guerilla

    Image by kurdishstruggle via Flickr.

    Guerrillas’ advantages stem from their organization and local ties. They typically operate as small, independent units, thereby exercising more maneuverability, alertness, concealment, and access to the local population than their regular counterparts. Carl von Clausewitz recommended supplementing a regular army with bands of armed civilians. He observed that, when faced with adversity, soldiers typically “cling together like a herd of cattle,” while civilians “scatter and vanish in all directions, without requiring a special plan.” But, he emphasized that the latter should not be used “to pulverize the core but to nibble at the shell and around the edges” of regular armies.

    Both Clausewitz and Mao viewed guerrillas as useful for weakening a conventionally strong rival through harassment and psychological warfare, but recognized that they are “but one step in the total war.” It is the regular troops that must, in the end, directly confront and defeat the enemy. Thus, for example, the recent U.S. strategy of sponsoring local rebels in Syria against Bashar al-Assad’s (Russia-supported) army was likely to fail not least because of the difficulties inherent in using nonstate proxies. The U.S. strategists – presumed students of Clausewitz – failed to recognize the necessary role of the regular forces, or else significantly underestimated their capacity to form a regular army out of irregulars while in the midst of a war. Or, they were simply constrained by the political unfeasibility of setting regular U.S. soldiers’ boots on the ground.

    In addition to weakening (or hopelessly trying to defeat) a rival’s regular forces, states often use guerrillas – or “counter-guerrillas” – against guerrilla rivals. The latter are typically rebels fighting to gain, maintain, or reclaim territorial control from an established government or occupying power. The former are sometimes also referred to as “pro-government militias.”

    In a recent article published in the Journal of Strategic Studies, I closely examine and disaggregate the different types of counter-guerrillas states use in counterinsurgency operations. I identify two types of counter-guerrillas: self-defense militias and death squads. Self-defense militias typically comprise ordinary civilians, such as peasants, while death squads are usually manned by experienced militants, such as turned rebels or violent criminals.

    I argue that states make proxy choices based on the latter’s comparative advantage, availability, and controllability. The state’s ideal partners are highly skilled fighters with deep knowledge of the insurgent network and links to the local population. Regular soldiers are highly skilled fighters, but possess limited local and insurgent knowledge. Partnering with nonstate actors means tackling the classic principal-agent problem, and the state’s capacity to do so is significantly shaped by its spatial reach (i.e. territorial control) across the theater of war. Figure 1 illustrates the different configurations of territorial control.

    Figure 1. Zones of Control

    figure-1-zones-of-control

     

     

     

     

     

    In Zone A, the state exercises full control. Zone B represents the insurgent-dominated area, whereas Zone C is the contested region where both sides actively compete for influence. Zone D represents an area that has been largely neglected in the burgeoning civil war literature. It is a zone that is neither fully controlled nor, for the time being, actively contested.

    Among the nonstate alternatives, the ideal partner for the state is a skilled fighter with insider knowledge of the insurgency and its logistics network. The disadvantage of using this type of proxy is that his fighting skills make him dangerous and difficult to control. The cost of losing control of skilled fighters can be unpalatably high. Unless they are weak or collapsed, modern states will prefer to use skilled fighters when and where they can supervise them.

    Nonstate actors that possess the desired local knowledge and have significant experience wielding extra-institutional violence, whether of criminal or rebel nature, may be harnessed to counter the insurgents. Their comparative advantage is in performing specialized, offensive, and highly targeted tasks (e.g. assassinations) that take advantage of their high mobility and combat skills. Consequently, they are likely to be used where the insurgents are actually located (Zones B and C). We should expect them in Zone C, where the state can exercise control over their activities. Using death squads in Zone B requires the state to create robust control mechanisms, such as embedding these groups firmly within special operations units of regular military or police forces. Where the state exercises full control (Zone A), or where the insurgents are not yet present (Zone D), states do not require highly targeted offensive operations and, consequently, death squads.

    While the comparative advantage of death squads is in highly targeted offensive operations, self-defense militias are best at performing static defensive tasks, such as guarding villages, communication lines, transportation networks, and vital installations. They are, consequently, more likely to be used to facilitate the operation of state forces in contested regions (Zone C) or to deny the insurgency access to areas where neither side has effective control (Zone D). In Zone B, self-defense militias are helpless against the insurgents. Not only can their government-provided weapons easily fall into rebel hands, but also, given the high rates of defection in insurgent-dominated areas, they may become a fertile source of rebel recruits. Remnants of self-defense militias (once created in Zone C or D) may persist in Zone A, but only because demobilization of nonstate actors is usually slow and costly.

    The Kashmir Case

    India’s use of counter-guerrillas in Kashmir illustrates the logic of the argument. In response to an insurgency breaking out in the late 1980s in the Indian state of Jammu and Kashmir (here referred to as “Kashmir”), the Indian army used former rebels (i.e. “renegades”) and villagers to combat the insurgents. Initial efforts relied on local police enforcement, treating the insurgency as an issue of “law and order.” However, the local policemen proved ineffective and were supplemented by three paramilitary forces (the Central Reserve Police Force, the Border Security Force, and the Indo-Tibetan Border Police). The Indian army’s role expanded further in 1993 with the introduction of the Rashtriya Rifles, an elite army unit created specifically for counterinsurgency operations.

    Former rebels were used mostly in the contested areas (Zone C) and, under the supervision of the Rashtriya Rifles, in Zone B. Kashmiri ex-insurgents, who were also popularly known as “Ikhwanis,” were used to eliminate rebels and their sympathizers. In Zone D – the mountainous areas of the Jammu region – the state instituted the civilian-manned Village Defense Committee (VDC) system. Figure 2 illustrates the distribution of the “renegades” and the VDCs. Official statements place the number of VDC volunteers at 6,000, but a prominent Kashmiri journalist I interviewed in Srinagar (the summer capital of Kashmir) estimated the figure to be closer to 23,000.

    Figure 2. Zones of Control in Kashmir

    zone-of-control-in-kashmir-figure-2

     

     

     

     

     

    Costs of Counter-Guerrillas

    Counter-guerrillas may be good for war, but they are bad for peace. Weaponizing turned rebels, criminals, and civilians offers tempting tactical benefits, but it also carries significant post-conflict costs. The conventional wisdom is that outsourcing violence lowers the cost of conflict and provides states with plausible deniability. However, as I learned from my fieldwork in Kashmir and other conflict zones, the local population quickly becomes aware of the illicit links between the counter-guerrillas and the government, as does the international community.

    The “renegades” may have helped the Indian army achieve military victory over the insurgents, but they also significantly boosted the widespread and enduring resentment against the Indian government. The arming of a select ethnic group (mostly Hindus and some Sikhs) in Jammu generated “intermittent outburst of communal violence” as well as incidents of looting, abduction, and rape.

    Playing local groups against one another is a classic strategy of colonialism, with a lasting impact on the peace and prosperity of many postcolonial states. Perhaps India’s Supreme Court said it best. It described the arming of over 6,000 young men in the tribal tracts by the central Indian state of Chhattisgarh to fight the Naxalite-Maoist insurgents as “tantamount to sowing of suicide pills that could divide and destroy society.”

    Yelena Biberman is an Assistant Professor of Political Science at Skidmore College and Nonresident Fellow at the Atlantic Council’s South Asia Center.

  • Boko Haram – An Interview with Alexander Thurston

    It’s hard to deny the fact that turning to essay writing services online is always stressful as one trusts certain academic challenges and research to another person willing to offer help. As the majority of British students these days are forced to study remotely or combine physical and online education, the role of academic assistance online became more important than ever. It also brings up certain security concerns among students and educators as one focuses on data privacy and academic integrity issues as the assistance is being provided. Aiming to provide assistance in the field of academic development, writing services, and online safety in general, Sustainablesecurity.org belongs to those unique campaigns where you can debate, discuss, and develop your skills as you deal with modern insecurities. Choosing writing services UK, we strive to help you create a sustainable security framework that can help you approach global security issues differently as you know how to choose what’s safe and reliable.

    Understanding Security Matters

    Before you continue reading our blog related to the Sustainable Security programme that has been made possible with the help of Oxford Research Group, first starting in 2009, and then rebranded in 2013, you should understand that we provide you with a special environment where you can discuss your concerns, take part in debates, and help develop a much better understanding of security concerns. Our aim is to create a sustainable security framework together when you bring your academic or essay writing challenges online. For example, when you are looking for a custom essay service, our interconnected actions and unity will help you to determine what can be considered as a custom essay writing service and what factors make it safe. Knowing global security challenges in the 21st century, you will be able to deal with numerous issues that pose an importance today, including:

    • Online (Remote) Learning Challenges and Accessibility.
    • Climate Change Concerns.
    • Competition Over Natural Resources.
    • A Negative Impact of Technology.
    • Global Militarisation.
    • Poverty and Marginalisation.

    As you can see, we strive for solving the global threats at the source by focusing on numerous issues. When you are looking for a reliable essay writing website, you also approach it all from technology to personal safety issues. Just share your concerns by contacting our specialists and we shall guide you towards the most efficient solutions!

    How to Write a Quality Essay In The UK? 5 Helpful Steps.

    Learn Your Service Provider.

    When looking for a reliable university essay writing service, you should remember that starting with a safe option that you know well will help you to avoid mistakes, late delivery, payment issues, or lack of refunds when things go wrong. We provide you with safe methods and experts that will help you write a quality essay from scratch, thus avoiding plagiarism risks.

    Aim For Direct Communication With Your Writer.

    Another important step is looking for a custom essay writing service that makes it possible to talk to your expert directly by discussing your thoughts and making sure that a person understands the subject and has good writing skills. It’s one of those security framework tips you should always consider. We are happy to offer direct contact with a chosen expert as you place your order.

    Focus On Grading Rubric Analysis.

    Remember that it’s not possible to write a quality essay without prior analysis and study of the grading rubric. The majority of instructions already have the answers or prompts to most questions, which is the starting point to good essay writing.

    Sources and Originality.

    Every good essay will contain well-documented sources that act as evidence and proof that you have done a clever synthesis of available information. The same relates to originality issues and the formatting of your sources according to a specified style. Our writing service has access to the latest databases, which will play an essential role in your academic success.

    Professional Proofreading and Editing.

    It’s what helps to tell a weak piece of academic research from the one that is perfect as it contains no grammar, style, formatting, or readability issues. Always take your time to proofread your written content!

    The Factors That Make Our Academic Assistance Research Services Safe

    Regardless of whether you are looking for an essay writing service in UK or would like to receive consulting services regarding one of the global security issues, we are happy to offer professional assistance that will meet your vision and professional requirements. As a team of trained experts and British natives, we work hard to address every security issue and offer safe academic services for educational, business, research, or personal purposes.

    The factors worth mentioning regarding our academic research services and creation of the sustainability safety framework include:

    • Always working from scratch, which helps to avoid plagiarism in your works.
    • Direct communication with a chosen expert helps to eliminate misunderstanding or any other issues.
    • Our college essay writing service will help you to find the safest and most reliable solutions based on the current security standards as you research various academic subjects with our help.
    • A great platform that focuses on global security threats and solutions.
    • 24/7 customer support and refunds in case you are not happy with the final results.

    Still, we are certain that you will be pleased with our platform and will add to the number of satisfied clients and our colleagues.

    We provide you with articles and resources to help you research your subject and discuss things with fellow specialists in the UK and beyond. As we help to eliminate global security threats and provide every member of society with safety in all regards, helping you learn in a safe environment is one of our top priorities. Therefore, our online essay writing service is based on online safety and academic integrity principles, which means that you are working only with native speakers with verified academic credentials and experience in every relevant field. We care for your safety as we work towards global security together!

  • Humanitarian Consequences of Nuclear Weapons: Five Reasons for the P5 to participate in Vienna

    This week marks the 69th anniversary of the Hiroshima and Nagasaki bombings, still the only two cases of nuclear weapons use. On these dates each year the media reminds the wider public about the destructive power of these inhumane weapons. The ‘humanitarian dimension’ initiative highlighting the consequences of nuclear weapons is evolving and consolidating itself in the non-proliferation regime. It has been shining a bright and constant light on the catastrophic consequences of nuclear weapons use – whether accidental or deliberate – at multilateral fora on nuclear weapons policy since the last Nuclear Non-Proliferation Treaty (NPT) Review Conference (RevCon) in 2010.

    The initiative has held two international conferences, hosted by Norway and Mexico, addressing issues relating to the impact, consequence management, and risks of nuclear weapons detonation (March 2013 in Oslo and February 2014 in Nayarit). At these conferences, the powerful testimony of the hibakusha (Japanese witnesses to nuclear bombing) served as a solemn reminder of the physical and psychological long-term effects for these survivors.

    The five nuclear weapons states (NWS or P5) under the NPT – China, France, Russia, UK and US – boycotted the first two of these international conferences. The third international Conference on the Humanitarian Consequences of Nuclear Weapons will be held in Vienna on 8-9 December 2014. Below are five reasons why the P5 should consider participating in some capacity in the Vienna conference.

    1. To improve atmospherics before the 2015 NPT RevCon

    The P5 have a vested interest in a smooth and “successful” 2015 NPT RevCon, to be convened at the UN in New York next May. After all, the NPT has conveniently served their security interests by limiting horizontal nuclear proliferation whilst designating them as the only recognized NWS. As various non-nuclear weapons states (NNWS) stressed at the April-May 2014 NPT Preparatory Committee (PrepCom), patience is running incredibly thin with the NWS and the credibility of the regime is in question. Some states starkly warned that a roll-over of the 2010 NPT RevCon Action Plan will not be acceptable at the 2015 NPT RevCon.

    So the pressure lies heavily on the P5 to engage – or at least to show a willingness to engage – more genuinely with the demands of the NNWS towards addressing disarmament commitments. One simple way to improve atmospherics in the regime would be engagement and participation in the Vienna conference by at least some of the NWS. The most detrimental behavior to the regime would be a repeat of the cartel-like approach to decision-making on participation at the Vienna conference by the P5. Such P5 solidarity, as was evidenced in bloc P5 decision-making vis-à-vis the Oslo conference would almost certainly have negative implications for the 2015 NPT RevCon.

    1. To encourage NNWS to affirm humanitarian concern as a non-proliferation pledge

    The active reaffirmations of abhorrence and concern with the catastrophic consequences of nuclear use by NNWS are of positive benefit as commitments both to disarmament and non-proliferation. These formal declarations and affirmations by states parties in the NPT review process and in the UN General Assembly can serve as confidence-building measures. Such declaratory statements could be construed to be affirmations akin to the Iranian fatwa against the development of nuclear weapons. Such formal statements in multilateral diplomatic fora could indeed serve to confirm the declaratory views of states in regard to nuclear weapons.

    1. To engage the non-NPT nuclear-armed states

    Given the cross-regional and cross-grouping support for the humanitarian initiative within both the NPT review process and the broader non-proliferation and disarmament regime, the initiative could help to forge new dialogue channels for the regime. As evidenced by India and Pakistan’s participation in the Oslo and Nayarit conferences, such fora, separate from the NPT review process, can include engagement of nuclear-armed non-NPT states on issues and dialogue relating to nuclear weapons in the broader non-proliferation and disarmament regime.

    Given the continued deadlock at the Conference on Disarmament (CD) in Geneva, processes such as these conferences can circumvent the current stalemate in the CD and facilitate dialogue on these salient issues away from the formal confines and political stages of Geneva and New York.

    1. To showcase consequence-management capabilities

    The five NPT NWS could contribute to the humanitarian impact discussions at the initiative’s conferences by sharing their technical research and insight on emergency and disaster response preparedness and capacity. Then again, these states may find it difficult to participate in conferences which may lead to uncomfortable conclusions about the inability of states or any institution to address the consequences of nuclear use and the associated risks of possession and use. Whilst considering participation options at the earlier international conferences, some NWS apparently suggested narrowing the conference agenda to addressing the consequence management of limited/small-scale nuclear exchanges.

    1. To engage the initiative and attempt to shape the discourse and pathway

    If the P5 wish to shape the discourse and the future aims and agenda of an evolving initiative with increasing momentum and sophistication, they could do so more effectively by participating in its non-binding, non-consensus-reaching international conferences. Not to do so is to miss an opportunity to steer the initiative in or at a more comfortable direction or pace. Whether the momentum and aims of the initiative are now beyond “a point of no return” and heading towards a ban treaty, could be the reality the NWS face.

    One thing is certain, dismissing the initiative and trying to discredit its activities as “diverting” from the P5 step-by-step process will only antagonize those NPT states parties already frustrated by the lack of progress on nuclear disarmament commitments. This would surely make the 2015 NPT RevCon more challenging for all parties.

     

    Jenny Nielsen is a Postdoctoral Research Fellow in the School of Political Science and International Studies at the University of Queensland. Previously, she was a Research Analyst with the Non-proliferation and Disarmament Programme at the International Institute for Strategic Studies (IISS), a Programme Manager for the Defence & Security Programme at Wilton Park, and a Research Assistant for the Mountbatten Centre for International Studies (MCIS) at the University of Southampton, where she co-edited the 2004-2012 editions of the NPT Briefing Book.

    Featured Image: Aftermath of the 6 August 1945 nuclear bombing of Hiroshima. Source: Wikipedia

     

  • Gender and Private Security

    Western states are growing increasingly reliant on private military and security companies. Fully understanding the privatization of security and its effects on sustainable security requires the inclusion of a critical gender lens.

    Introduction

    In 1999, the American private military contractor Dyncorp hired Kathryn Bolkovac as UN International Police Task Force monitor in Bosnia-Herzegovina. In the course of her work Bolkovac raised allegations that private contractors and UN employees were trafficking and sexually exploiting young girls. In 2002, a UK court acknowledged that Bolkovac was wrongfully dismissed for bringing the story to light, but nobody was ever prosecuted for the alleged sex trafficking.

    Bolkovac’s story — dramatized in the movie The Whistleblower  — captures perfectly some of the challenges to accountability when security functions are outsourced to the private sector and performed by transnational security forces. Security privatization reduces transparency and accountability in ways that exacerbate and make less visible the gender inequalities and gender-based violence that pervade militarized security contexts. Moreover, security privatization increases the profitability of insecurities, making it more difficult to tackle the causes, including gendered causes, of insecurity. Understanding the privatization of security and its effects on sustainable security requires the inclusion of a critical gender lens.

    PMSCs and gender: an emerging challenge

    15245844288_2026206f77_o--1-

    Image by chuck holton via Flickr.

    Over the past three decades a new challenge to sustainable security has emerged: the growing reliance on private military and security companies (PMSCs) by Western states, international organizations, non-governmental organizations, and transnational corporations. PMSCs offer a wide range of services from logistical support, intelligence, training, armed and unarmed guarding and protection, to reconstruction and more. The US-led wars in Afghanistan and Iraq have shown that today waging war is contingent on heavy involvement from the private sector. Private contractor numbers have trailed and at times outpaced US troop levels in the wars in Afghanistan and Iraq. In February 2010, the US DoD employed more than 100,000 private contractors each in Afghanistan and Iraq.

    A number of high-profile cases have highlighted the problems associated with the use of private contractors in Iraq and Afghanistan. Private contractors were involved in the abuse of prisoners at Abu Ghraib and the 2007 shooting and killing of Iraqi civilians in Nisour Square. Allegations of war crimes, poor working conditions, sexual harassment and human trafficking, and disregard for local populations have come to shape the public image of the private security industry over the past two decades.

    In this context, gender has become part of the industry’s attempts to improve its reputation. Gender considerations have made it into the voluntary International Code of Conduct for Private Security Providers that came into effect in November 2010. The International Code of Conduct explicitly addresses gender in three paragraphs on gender-based violence, selection of personnel, and harassment-free work environments. Gender has also been declared ‘good for business‘ by the private security industry. Female employees of PMSCs are seen as useful to conduct security checks on women or to foster positive interactions with local populations, and thus seen as instrumental to operational effectiveness. This attention to gender, while positive on the surface, has mostly served the purpose of creating greater legitimacy for the industry. It has not addressed the larger impacts that outsourcing have on women’s claims to greater and equal participation in the military sphere and the gendered impacts of the use of private forces in local contexts.

    A critical gender lens on private security

    Gender is not just a ‘problem to be solved’ for private contractors, but is fundamental to the reorganization of force through privatization, to the functioning of the private security industry, and to how the industry legitimizes itself. The greater use of private force is part of the broader neoliberal transformation of militarized citizenship that has also entailed a shift from conscription to all-volunteer forces in many Western states. This reorganization of public force has meant an end to the male citizen-soldier model and the greater integration of women into all-volunteer forces. The greater reliance on private security has occurred alongside to the greater integration of women into Western public militaries. While some decry the feminization of public militaries, others have shown how PMSCs actively rely on hyper-masculinity in portraying themselves as more effective security forces vis-a-vis the public sector.

    PMSCs that provide security services primarily recruit from the army and special forces. In doing so, they replicate and even reinforce the gendered division of labour present in the public military sphere. However, PMSCs have also made a concerted effort to distance themselves from the hyper-masculine images of trigger-happy burly ‘cowboys’ and shift towards a softer and more legitimate image of masculinity, shedding the hyper-masculine militarized image for one emphasizing humanitarianism, protection, professionalism, and expertise. At the same time, privatization sidelines and depoliticizes questions of gender equality in the military sphere. There is neither publicly available data on women in the private security industry nor public debate on their marginalization within the industry. By its very logic, profitability drives the private security sector and not questions of citizenship and equal participation.

    Gender also intersects with race and citizenship to shape the division of labour in the globally operating private security sector. A large segment of the workers hired or subcontracted by PMSCs comes from the Global South. The globally operating private security industry can be thought of as a hierarchy of masculinities. Western contractors are at the top of this hierarchy, and so-called third-country nationals (TCNs) from the Global South sit at the bottom. Profitability is in part achieved through the exploitation of this vulnerable migrant labour force.

    The outsourcing of military security functions to private companies has allowed a global rescaling of labour recruitment in support of Western military operations. As data from the US wars in Iraq and Afghanistan show, a majority of contractor labour is made up by ‘third-country’ and host-country nationals and not by US citizens. For example, of the more than 200,000 DoD contractors working in Iraq and Afghanistan in February 2010 (mentioned above), less than 40,000 were US citizens. The racialized hierarchy among contractors of different citizenship is evident not only in pay and working conditions, but also in the kind of work performed. While local and migrant workers perform much of the logistical support work, their proportion is particularly high when it comes to the more dangerous armed security work.

    Conclusion

    Simply bringing consideration of gender into the private security industry is not a sufficient enough means of addressing the problems that security privatization poses for sustainable security. Conflict is often justified and waged by appealing to gendered notions of security: masculinized protectors and defenders, and feminized and vulnerable populations in need of protection. Private actors feed into this gendered discourse, portray themselves as masculinized protectors, and benefit from continuing insecurities and global inequalities. As insecurities create new market opportunities for the private security industry, gendered discourses of protection and gendered divisions of labour are being reinforced while sustainable security becomes more elusive. We need to be mindful of security privatization and the fundamental ways in which it is gendered as we work towards remaking security in more sustainable ways.

    Maya Eichler is Canada Research Chair in Social Innovation and Community Engagement and Assistant Professor of Political Studies and Women’s Studies at Mount Saint Vincent University.

  • More than Taxi-drivers? Pitfalls and Prospects of Local Peacekeeping

  • Gaza: Context, Consequences and the Utility of Force

    This post is based on Paul Rogers’ Monthly Global Security Briefings for Oxford Research Group and was originally posted  on 31 July, 2014. At the time of writing (31 July), Israeli Operation Protective Edge had exceeded the previous major operation, Cast Lead of 2008-9. Both operations have involved intensive use of air strikes combined with major ground incursions. The current war is already longer than the 2008-9 war, with no end in sight. Indeed, by the end of July, positions were hardening and prospects for anything longer than brief further humanitarian pause seemed remote. This briefing provides some context for the conflict together with a preliminary analysis of possible consequences.

    The War So Far

    Iron Dome in Operation Protective Edge Source: Wikipedia

    Iron Dome in Operation Protective Edge Source: Wikipedia

    The current war started on 8 July with intensive Israeli air and artillery assaults on Hamas paramilitary targets, intended primarily to destroy or greatly limit the Hamas ability to fire unguided rockets over much of Israel. In spite of the level of force used, the rocket fire continued, amidst growing concern within the Israeli Defence Forces (IDF) that paramilitaries had constructed many more infiltration tunnels than had been realised. A ground assault followed the initial air assault, with this being intended to destroy rocket launch facilities and stores and also interdict tunnels. As a consequence of this assault, the IDF suffered many casualties, including the deaths of 13 men from the elite Golani Brigade in a single day (20 July). Even after 10 days of conflict, with intensive IDF operations against the infiltration tunnels, Hamas paramilitaries managed to get under the border and in a brief attack killed five young IDF sergeants on a leadership training course. One Hamas paramilitary was killed but others appear to have returned to Gaza. Over the course of the war so far, Israeli forces have struck at over 3,700 targets in Gaza while more than 2,700 rockets have been launched by Hamas and other groups from Gaza towards Israel. The death toll among Palestinians exceeds 1,350 and is rising markedly each day. At least 6,000 people have been injured. Israel has lost 56 soldiers and three civilians, and more than 400 soldiers have been wounded. On 31 July, the 24th day of the war, Israel announced the calling up of a further 16,000 reservists, to bring the total call-up to 86,000. There has been considerable controversy over the numbers of civilian casualties in Gaza, especially the hitting of schools, hospitals and a market. UN figures indicate that at least 70% of those killed are civilians, and nongovernmental international support for Hamas has increased substantially. Public opinion in Israel remains very strongly in favour of continuing the war as a means of stopping the rockets and destroying the infiltration tunnels.

    Support for the Adversaries

    Hamas: In the past three years, Hamas has lost much of its international support from governments in the region, even though Gaza has existed in what amounts to an open prison controlled by Israel. The Egyptian government of President Sisi is strongly opposed to the Muslim Brotherhood and regards Hamas as a part of this wider movement. The consequent near-total closure of the common border with Gaza and the control of access tunnels has had a marked economic effect on Gaza, exacerbating its siege status. Furthermore, Hamas’s support for Islamist paramilitaries in Syria has lost it the support of the Assad regime in Syria and, to an extent, of the Iranian government. The recent rapprochement between Hamas and Fatah survives, if currently strained, but causes the Israeli government considerable concern. In spite of all the limitations, Hamas’s paramilitary wing has been able to assemble many thousands of rockets and mortar rounds and has also built a network of robust infiltration tunnels that has greatly exceeded Israel’s pre-war estimates. Hamas as a movement retains considerable support in Gaza, with even the impact of the Israeli air and ground assaults having little effect. Israel: Israel retains a measure of support of many western governments but there are growing concerns at the civilian losses in Gaza. The IDF and the defence industry as a whole have very close connections with their US counterparts. The key missile defence system, Iron Dome, is essentially a US-Israeli joint production, including current plans to set up a new production line in the US. Israel is also able to use US munitions stored in Israel. The US is in a position to put very heavy pressure on Israel but is deeply reluctant to do this at present, mainly because of domestic support for Israel. This support remains high but is declining

    Cast Lead and Protective Edge

    Both the 2008-09 and 2014 Israeli operations have had similar aims – to so damage Hamas that it is massively restricted as a threat to Israeli security. A comparison of the operations so far is indicative. Cast Lead lasted 23 days and ended with a ceasefire brokered largely by Egypt. During that period, Hamas and other groups launched 750 rockets and mortars, all relatively short-range. Israelis lost 13 lives, four of them to friendly fire. Israel killed 1,440 people in Gaza, claiming that half were militants, though Hamas denied this. Since the 2008-09 operation, Israel has deployed the Iron Dome system, and this has intercepted the great majority of approximately 2,700 rockets and mortars fired during Protective Edge.  Hamas has, though, hugely increased its capabilities over the past six years, in spite of its recent political isolation, and has exacted a much higher toll on IDF soldiers during the current ground assault than in 2008-09: 56 so far compared with 13 before. In this sense, the aim of Cast Lead – to substantially degrade Hamas’s crude offensive systems – was a singular failure. Even with the Iron Dome system, vulnerabilities have been demonstrated by the closure of Ben Gurion Airport to several international carriers for several days last week, following a rocket which penetrated the missile shield and landed within a mile of what is Israel’s gateway airport. The loss of so many Israeli soldiers may still seem small compared with the huge losses in Gaza, but the IDF is held in very high regard in Israel.  Indeed, support for the war has likely increased because of these losses and the partial closure of the airport. These appear to have combined to convince many Israelis that, though Hamas is weak and hugely restricted in its location, it represents such a threat to Israel that a protracted war is, if need be, fully justified. The phrase “impregnable in its insecurity” has sometimes been applied to Israel and it is useful in understanding the outlook of a very powerful country that still feels vulnerable.

    The home of the Kware' family, bombed by IDF forces. 8 civilians, including 6 minors, were killed. Gaza, 8 July, 2014. Source: B’Tselem

    The home of the Kware’ family, bombed by IDF forces. 8 civilians, including 6 minors, were killed. Gaza, 8 July, 2014. Source: B’Tselem

    What Now?

    At the time of writing (31 July) it is possible that another humanitarian pause might be agreed and might lead to something more substantial. Assuming that this does now happen, the indications are that the IDF will continue its operations to destroy rockets and tunnels, and Hamas paramilitaries will resist. Given the IDF casualties to date, a pattern is likely to emerge in which urban counter-paramilitary operations will prove both difficult and costly, and the IDF will rely much more on its huge firepower advantage. This is very much what happened with US and coalition forces in Iraq from 2003, and even more so with the Israeli siege of West Beirut in 1982 when at least 10,000 people were killed, the great majority of them civilians. It is already evident that targeting has moved on to the more general Hamas infrastructure, but the very nature of the densely populated Gaza Strip means that the infrastructure for the whole community is also hugely affected. Given the existing impoverishment of the area, the human consequences will be severe, as UN staff have been pointing out repeatedly.

    Consequences

    In all of its operations against Hamas – Cast Lead in 2008-09, the more limited air assault in 2012, and the current war – Israel has sought to severely damage Hamas’s paramilitary capabilities, and decrease its domestic support. In the first two conflicts that objective was not achieved, and it is unlikely that Israel’s current operation will succeed this time around. In spite of Hamas’s greater international isolation, its paramilitaries have this time had a substantial impact on the IDF, and the movement retains domestic support. Moreover, international public opinion has moved heavily against Israel. One of the major changes in comparing the current war with the two previous wars is that the use of social media has hugely expanded, resulting in graphic images being distributed across the region and beyond in near-real time. One effect of this, in turn, is that the more conventional western media reporting is itself becoming more graphic. In spite of a very efficient Israeli information operation, this change is working against Israel’s interests. It also means that Islamist propagandists across the Middle East and beyond are easily able to present the war as a further example of “Zionist aggression”. Indeed, they will also relentlessly point to close US-Israel links, further developing their long-term image of a “Crusader-Zionist war on Islam”, in spite of Secretary of State Kerry’s undoubted personal commitment to achieving a ceasefire. The long-term consequences of this are difficult to read, but could give a boost to radicalisation well beyond Israel and the occupied territories. That alone is an added reason why a ceasefire at the earliest opportunity is not only desirable but essential.

  • Religion, Civil War and Peace

  • The Ukraine conflict’s legacy of environmental damage and pollutants

    The Ukraine conflict’s legacy of environmental damage and pollutants

    One year after violent conflict began, information is now emerging on the specific environmental impact of war in Ukraine’s highly industrialised Donbas region. Although obtaining accurate data is difficult, indications are that the conflict has resulted in a number of civilian health risks, and potentially long-term damage to its environment. In order to mitigate these long-term risks, international and domestic agencies will have to find ways to coordinate their efforts on documenting, assessing and addressing the damage.

    Read Article →

  • Nuclear Weapons: From Comprehensive Test Ban to Disarmament

    As established by UN General Assembly resolution 64/35 of 2009, the 29th of August marked the International Day Against Nuclear Tests. This date serves to enhance public awareness about the harmful effects of nuclear weapon test explosions (of which at least 2,046 were conducted between 1945 and 1996: an average of one every nine days) on people and the environment, and reminds the international community about the importance of banning nuclear tests through the Comprehensive Test Ban Treaty (CTBT).

    CTBT: Verification outpaces Ratification

    Opened for signature in September 1996, the CTBT has yet to enter into force, pending the final eight ratifications by all of the Annex II states. These are the 44 states which participated in the negotiations on the CTBT and possessed nuclear power or research reactors at the time. Although five – China, Egypt, Iran, Israel, the US – of these final eight states have signed the Treaty, three have not: North Korea (DPRK), India and Pakistan.

    While some argue that CTBT ratification by the US would be a “game changer” and trigger a cascade of ratifications, it may rest on President Obama’s successor to invest domestic political capital and concerted engagement to shepherd through a successful ratification. With recent studies such as the 2012 National Research Council’s updated assessment of technical issues related to the CTBT serving to inform and allay previously voiced national security and verification concerns, strategic efforts to educate Congress, media and the US public could assist in highlighting the benefits of ratifying the CTBT.

    Performing maintenance at CTBTO infrasound station IS55, Windless Bight, Antarctica

    Performing maintenance at CTBTO infrasound station IS55, Windless Bight, Antarctica. (Source: CBTBO via Wikipedia)

    Pending those eight ratifications for the CTBT entry into force, the Preparatory Commission for the CTBT Organization (CTBTO) is building up an extensive and sophisticated global International Monitoring System (IMS) which will serve to monitor and verify compliance with the Treaty. With over 85% of the IMS’ facilities in operation, the CTBT is already providing ‘a firm barrier against a qualitative and quantitative development of nuclear weapons for both nuclear weapon-capable states and then would-be possessors‘.

    Proof of the partially complete verification regime’s detection capability has been showcased by the three nuclear tests conducted since 2006 by the DPRK, the only remaining state defying the established international anti-testing norm. Since the international community unanimously condemned the 1998 round of tests by India and Pakistan, defying the non-testing norm and global de facto moratorium established by the CTBT, the two states in South Asia have implemented and observed unilateral moratoria on nuclear testing.

    Concerns about a DPRK fourth test

    The urgency of reaffirming the importance of the CTBT and re-energizing efforts to bring the Treaty into force, should be ever present with concerns about a possible fourth nuclear test as threatened by the DPRK earlier this year. The DPRK is the only state that has disregarded the testing moratorium and non-testing norm since 1998 with its three successively larger nuclear tests (in 2006, 2009 and 2013). South Korean Foreign Minister Yun Byung-se warned earlier this year that a fourth test by North Korean would be a “game changer” for the region.

    Even with the DPRK remaining a wildcard on prospects for ratification, not least given the shaky political conditions for regional resumption of dialogue on the nuclear issue while Kim Jong Un consolidates his regime, the other seven Annex II states can lead in responsibly committing to shore up their legal commitment to the non-testing norm.

    Improving regime atmospherics for the 2015 NPT Review Conference

    The CTBT and the NPT are interlinked and thus progress on the CTBT would serve to garner positive atmospherics for the NPT review process, in 2015 and beyond. The 1995 NPT Review Conference (RevCon) indefinite extension of the NPT and the 2000 NPT RevCon’s ‘13 steps’ (steps 1 and 2) called on states for action and commitment to a CTBT. More recently, five of the 64 action points in the 2010 NPT RevCon’s Action Plan stress bringing the Treaty into force. Given the growing discontent within the NPT review process due to the perceived lack of progress on disarmament commitments, a renewed and reinvigorated commitment to the CTBT by NPT states parties could ameliorate the atmosphere and help to build confidence and momentum.

    Two initiatives within the nuclear non-proliferation and disarmament regime—the Helsinki Conference for discussing the establishment of a Weapons of Mass Destruction-Free Zone (WMDFZ) in the Middle East, and the humanitarian consequences initiative concerning the impact of nuclear weapons—could provide an impetus for renewed focus to the importance of legally committing to the CTBT. Both of these initiatives, which continue to enjoy a broad divergence of views, could serve to channel attention on ratification of the CTBT as a key trust- and confidence-building measure and a foundational first-step for progress on the aims of the two initiatives.

    Given the active civil society engagement of the humanitarian initiative, some of these agents could focus efforts on promoting the entry into force of the CTBT, channelling campaigns to lobby and engage their elected parliamentarians on the importance of the CTBT.

    If any of the three remaining Annex II states from the Middle East region – Egypt, Iran and Israel – were to legally commit to refrain from nuclear testing, it would be a hugely significant political and confidence-building gesture for the high-profile efforts to convene a conference which was mandated by the 2010 NPT Review Conference to take place in 2012. Given the ongoing P5+1 talks with Iran, such a step by Iran would further serve to reassure the international community about the intent and peaceful nature of its nuclear programme.

    Multilateral initiatives

    UN High Representative for Disarmament Affairs Angela Kane encouraged states to seize the high-profile opportunity to sign or deposit their instruments of ratification at an event held on the margins of the UN General Assembly this month. As an interim step, short of signing or ratifying the CTBT, other proposals to further consolidate the anti-testing norm and moratorium include a suggested UN Security Council resolution condemning nuclear tests as a threat to international peace and security, and regional pledges committing member states to refrain from nuclear tests or even sub-critical experiments not prohibited by the CTBT.

    Notably, the Community of Latin American and Caribbean States (CELAC) endorsed such a regional commitment in its declaration on nuclear disarmament at a meeting in Buenos Aires in August 2013. Such effort could be replicated by other regions or via multilateral negotiating groupings operating in the nuclear non-proliferation regime. Regional and other groupings could pledge to highlight this issue at every nuclear-relevant forum and opportunity in efforts to cross-germinate this message.

    Annex II states particularly, as well as other states and groupings, should welcome, engage and promote the efforts of the CTBTO’s Group of Eminent Persons (GEM), comprised of high-profile experts and former officials aiming to promote the CTBT’s entry into force. Through the support of such initiatives, awareness can be raised. Further to raising awareness and educating civil society, efforts such as the CTBTO’s public training courses and NGOs’ public information and awareness efforts should be supported, promoted and even replicated regionally as force multipliers.

    J. Robert Oppenheimer recounted of those witnessing the Manhattan Project’s first atom bomb test (the 1945 Trinity test), “we knew the world would not be the same; a few people laughed; a few people cried; most people were silent.” Indeed, the world has not been the same and the proverbial nuclear genie cannot be put back in the bottle. But states can make the legal commitment to ban all nuclear tests, anywhere. 18 years after the CTBT opened for signatures, responsible states should commit efforts to facilitate the ratification of this Treaty.

     

    Jenny Nielsen is a Postdoctoral Research Fellow in the School of Political Science and International Studies at the University of Queensland. Previously, she was a Research Analyst with the Non-proliferation and Disarmament Programme at the International Institute for Strategic Studies (IISS), a Programme Manager for the Defence & Security Programme at Wilton Park, and a Research Assistant for the Mountbatten Centre for International Studies (MCIS) at the University of Southampton, where she co-edited the 2004-2012 editions of the NPT Briefing Book.

  • The Syrian War and the Foreign Fighters from the Muslim World