Blog

  • Sustainable Security

    The Responsibility to Protect (R2P) is a significant, if controversial, development in international affairs. China has proposed its own semi-official version of R2P called “Responsible Protection”.

    Author’s Note: This article highlights issues discussed in more depth in various publications, including Andrew Garwood-Gowers, ‘China’s “Responsible Protection” Concept: Reinterpreting the Responsibility to Protect (R2P) and Military Intervention for Humanitarian Purposes’ (2016) 6 Asian Journal of International Law 89 and Andrew Garwood-Gowers, ‘R2P Ten Years after the World Summit: Explaining Ongoing Contestation over Pillar III’ (2015) 7 Global Responsibility to Protect 300.

    Introduction

    Over the last decade and a half the Responsibility to Protect (R2P) principle has emerged as a significant normative development in international efforts to prevent and respond to genocide and other mass atrocity crimes. Yet it has also been controversial, both in theory and in practice. R2P’s legal status and normative impact continue to be debated in academic and policy circles, while its implementation in Libya in 2011 reignited longstanding concerns among many non-Western states over its potential to be misused as a smokescreen for regime change. These misgivings prompted Brazil to launch its “Responsibility while Protecting” (RwP) concept as a means of complementing and tightening the existing R2P principle. China, too, has proposed its own semi-official version of R2P called “Responsible Protection” (RP). This contribution explores the key features and implications of the lesser known Chinese initiative.

    The R2P Principle

    Peacekeeping - UNAMID

    Image by UN Photo via Flickr.

    R2P first appeared in a 2001 report by the International Commission on Intervention and State Sovereignty (ICISS), a body set up by the Canadian government to consider how the international community should address intra-state humanitarian crises. However, after the initial concept proved contentious a modified version of R2P – labelled “R2P-lite” by one commentator – was unanimously endorsed by states at the 2005 World Summit. In its current form R2P consists of three mutually reinforcing pillars. The first is that each state has a responsibility to protect its populations from the four mass atrocity crimes (genocide, war crimes, crimes against humanity and ethnic cleansing). Pillar two stipulates that the international community should encourage and assist states in fulfilling their pillar one duties. Finally, pillar three provides that if a state is manifestly failing to protect its populations the international community is prepared to take collective action in a timely and decisive manner on a case-by-case basis, in accordance with Chapter VII of the UN Charter.

    Action under pillar three can encompass non-coercive tools such as diplomacy and humanitarian assistance, as well as coercive means including sanctions and the use of force. The international community’s pillar three responsibility is framed in conservative terms, creating only a duty to consider taking appropriate action, rather than a positive obligation to actually respond to a state’s manifest failure to protect. Crucially, the UN Security Council remains the only body that can authorise coercive, non-consensual measures under pillar three. R2P does not grant states a right to undertake unilateral humanitarian intervention outside the Charter’s collective security framework. Overall, R2P is best characterised as a multi-faceted political principle based on existing international law principles and mechanisms.

    The most well-known instance of pillar III action to date is the international community’s rapid and decisive response to the Libyan crisis in early 2011. The Security Council initially imposed sanctions and travel bans on members of the Gaddafi regime before passing resolution 1973 authorising the use of force to “protect civilians and civilian populated areas under threat of attack’’. China, Russia, Brazil and India each abstained on the vote to mandate military force against Libya. As the extent of NATO’s military targets and support for the Libyan rebels became apparent, many non-Western powers criticised the campaign for exceeding the terms of the Security Council resolution. For these states, the eventual removal of the Gaddafi regime confirmed their perception that R2P’s third pillar could be manipulated for the pursuit of ulterior motives such as the replacement of unfriendly governments.

    The post-Libya backlash against R2P was at least partly responsible for Security Council deadlock over Syria. Russia and China have exercised their vetoes on four separate occasions to block resolutions that sought to impose a range of non-forcible measures on the Syrian regime. At the same time, there has been renewed debate about the strengths and weaknesses of R2P’s third pillar. In late 2011 Brazil’s RwP initiative proposed a series of decision-making criteria and monitoring mechanisms to guide the implementation of coercive pillar three measures. While RwP initially attracted significant attention and discussion, Brazil’s foray into norm entrepreneurship was short-lived and R2P has remained unaltered.

    Reframing R2P as “Responsible Protection”

    China’s traditional insistence on a strict interpretation of sovereignty and non-intervention has made it uncomfortable with the coercive, non-consensual aspects of R2P’s third pillar. As a result, Beijing has consistently emphasised the primacy of pillars one and two, while downplaying the scope for pillar three action. In this respect, its decision not to veto resolution 1973 on Libya came as something of a surprise.

    China’s contribution to the post-Libya debate over R2P’s third pillar is less widely documented than Brazil’s efforts. In mid-2012 the notion of “Responsible Protection” was floated by Ruan Zongze, the Vice President of the China Institute for International Studies (CIIS),  which is the official think tank of China’s Ministry of Foreign Affairs. Although China has not explicitly adopted the concept as a formal policy statement on R2P, its implicit endorsement means it can be described as a “semi-official” initiative.

    RP is primarily concerned with R2P’s third pillar and, in particular, providing a set of guidelines to constrain the implementation of non-consensual, coercive measures. It consists of six elements or principles, which are drawn from just war theory and earlier R2P proposals such as the 2001 ICISS report and Brazil’s RwP. In this respect, RP represents a repackaging of previous ideas, rather than an entirely original initiative. However, by reframing these concepts in stricter terms it reflects a distinctive Chinese interpretation of R2P that seeks to narrow the circumstances in which non-consensual use of force can be applied for humanitarian purposes.

    The first element draws on the just war notion of “right intention”. It provides that the purpose of any intervention must be to protect civilian populations, rather than to support “specific political parties or armed forces”. This conveys Beijing’s concerns over the motives and objectives of those intervening under the banner of R2P, as expressed during the Libyan experience. Element two relates to the “right authority” criterion. It reiterates the longstanding Chinese position that only the Security Council can authorise the use of coercive measures, and that there is no right of unilateral humanitarian intervention granted to states.

    RP’s third element is based on the traditional principle that military intervention should be a “last resort”. Its call for “exhaustion of diplomatic and political means of solution” is consistent with Beijing’s broader policy preference for diplomacy and dialogue over forcible measures. However, insisting on a strict, chronological sequencing of responses may deprive the international community of the flexibility needed to ensure timely and decisive action on humanitarian crisis. For this reason, some clarification or refinement of element three may be needed. The fourth element of RP draws on aspects of the just war principles of “right intention” (like element one) and “reasonable prospects”. In relation to the latter, it provides that “it is absolutely forbidden to create greater humanitarian disasters” when carrying out international action. This stipulation reflects Beijing’s position that external intervention often exacerbates humanitarian crises and can ultimately cause more harm than good.

    Element five of RP provides that those who intervene “should be responsible for the post-intervention and post-protection reconstruction of the state concerned”. Although the notion of a responsibility to rebuild appeared in the original 2001 ICISS report it was not included in the text of the World Summit Outcome document in 2005 and therefore does not form a component of the current concept of R2P. It is unclear whether China’s RP concept is explicitly seeking to resurrect this dimension or whether this element is simply intended to emphasise Beijing’s broader perspective on peacebuilding and development in post-conflict societies. Finally, element six calls for greater supervision and accountability of those carrying out UN authorised civilian protection action. This is a similar demand to that made in Brazil’s RwP proposal, though little detail is given as to what form any such monitoring mechanism would take.

    Conclusion

    Overall, the Chinese notion of RP is an attempt to reinterpret and tighten the content of R2P’s third pillar so that it aligns more closely with Beijing’s own normative preferences and foreign policy objectives. Compared to RwP and the ICISS report, RP outlines a narrower set of circumstances in which military intervention for humanitarian purposes would be appropriate. Some aspects of the proposal would certainly benefit from clarification and refinement.

    However, it is notable that despite strongly criticising the way R2P was implemented in Libya, China has chosen to engage with, and actively shape, the future development of the norm. This illustrates the extent to which China, as a permanent member of the Security Council, is enmeshed in the ongoing debate over R2P. In fact, RP is explicitly framed as an example of China “contributing its public goods to the international community”. In the future we can expect China and other non-Western powers to play increasingly influential roles in the development of international security and global governance norms.

    Andrew Garwood-Gowers is a lecturer at the Faculty of Law at Queensland University of Technology (QUT) in Brisbane, Australia. He has written extensively on R2P and the law governing the use of military force, with publications in leading journals including Global Responsibility to Protect, the Asian Journal of International Law, Journal of Conflict and Security Law and the Melbourne Journal of International Law.

  • Sustainable Security

    In February 2016, two former military officers of the Guatemalan army were convicted of crimes against humanity based on cases of sexual and domestic slavery, perpetrated in the 1980s during the civil war. Together they received sentences of 360 years in prison, and ordered to pay reparations to the eleven victim-survivors on whose testimonies the case rested. The case, known as Sepur Zarco after the community where these crimes took place, is unique; it is the first domestic trial successfully prosecuting former military for sexual violence in conflict in the world. What happened in Sepur Zarco is less unique: the witness statements echo the experiences of women who gave their testimony to the Peruvian Truth and Reconciliation Committee (2001-2003), where women in embattled communities during the war between Shining Path and the state (1980-2000) were also systematically raped and/or enslaved. And there are other experiences; other genocides, war contexts, and rape camps in contemporary history, which would allow for a solid comparison with Sepur Zarco. Such an observation confirms the importance of the Sepur Zarco trial for the future of accountability and justice in cases of war-related sexual violence, in Guatemala, in Latin America, and indeed, globally.

    The testimonies of victim-survivors in the Sepur Zarco trial against military commanders in Guatemala shows once more that rape in war has specific meanings and intentions that are informed and shaped by the specific coordinates of conflict. In the 1980s, the Guatemalan military repeatedly attacked the population of the rural community Sepur Zarco. Local indigenous leaders who were trying to get their land titled by the state were kidnapped, tortured, and killed. Women who went to search for disappeared family members at the military base were captured, beaten and raped, and enslaved as sexual and domestic servants of soldiers. Several witnesses at the trial told details about how they were raped and beaten multiple times, in front of or alongside their children, sometimes in a pit where their husbands would be held before being buried. They also told about other victims, abused, enslaved, raped and killed in their presence. The statements show a world of extreme cruelty and suffering, facilitated by racism and sexism, and encouraged by a military campaign against indigenous communities that lasted three decades. All evidence shows that in the case of Sepur Zarco, rape was used as a weapon of war: to conquer, to reinforce victory, to send a message, humiliate, and fragment entire communities, in sum, to control.

    Of course, military commanders can only be prosecuted for systematic rape if we accept that rape in war is exceptional, different, and not inevitable. Perpetrators can only be held accountable if we recognise their agency in the act, their authority in allowing (or ordering) certain acts to happen. The extreme cruelty and violence that accompanies many of these acts further confirm that rape in war represents a rupture in a community’s history and in the lives of both perpetrators and victims. This is not normal, and hence, we can prosecute.

    And yet, there are others, including myself, who have emphasised the continuity in the history and possibility of sexual violence against women. I have argued, based on the testimonies of victim-survivors of rape in the Peruvian conflict, that while much of the scale and cruelty of these experiences were certainly exceptional and strongly conflict related, the script for these acts – immersed in racism and sexism, as in the case of Guatemala – pre-dated the conflict, and has yet to be dismantled. There is a continuum in the persistence of sexual violence against women that supersedes the categories of war and peace.

    In contemporary Guatemala, around 700 women are murdered each year because of sexism, killed by intimate partners or unknown others. This is what is known as femicidio in the region. Impunity is not absolute, but it is certainly very high and contributes to its prevalence, as public institutions are uninterested in pursuing cases of ‘private’ violence. The idea that violence against women, even if so large scale as in contemporary Guatemala (or elsewhere), can be private and thus irrelevant to national security (police, judiciary, policy) is strongly tied to perceptions of women being responsible somehow for the domestic sphere, the home, including the sexual gratification of men. Women are often perceived and portrayed as somehow complicit in their own abuse. Similar patterns of the domestication of violence are seen in conflict.

    Sculpture at Mujibnagar: A woman being raped by a Pakistani soldier during the 1971 war

    Sculpture at Mujibnagar: A woman being raped by a Pakistani soldier during the 1971 war. Image by Rahat Rahim via Wikimedia.

    For example, women held at military bases to sexually serve men are often also required to wash and cook. The Sepur Zarco case also heard a former military commissioner tell the court how the then head of the military base and the accused in the trial, Lieutenant Esteelmer Reyses Girón, ordered soldiers to gang rape a woman, and that the Lieutenant himself “took” this woman as his “wife”. In similar vein, in the case of Peru, few women used the words ‘rape’ (violación) to describe their experiences. Instead, some said ‘he used me as his wife’, indicating how domestic and sexual enslavement were part of the package of abuse. One witness even stated ‘he started to beat us as if we were their wives’, further blurring the boundaries between the domestic and the political, between wartime abuse and peacetime abuse, and arguably, between husband and abuser. In Sierra Leone, and Uganda, similar patterns can be found: sexual and domestic slavery go hand in hand, and is made possible because of the peacetime structures in which women’s roles are already defined by their service to men. Hence, girls forcibly recruited into rebel armies soon became ‘wives’.

    The idea that those who are violently enslaved could in fact be in a consensual relationship, albeit unequal, such as a marriage, provides a veil of legitimacy to an otherwise exceptional situation. It does, indeed, suggest a level of normality, a continuum, of life as one knows it. It might be the veil that makes survival possible. But many victim-survivors of conflict-related rape and sexual slavery are ostracised from their communities, exposed to a postconflict life of continuous abuse from their intimate partners, or choose to hide their trauma out of fear of retaliation. The women who testified in the Sepur Zarco case either did so behind closed doors, or they hid their faces behind veils during public sessions. What happened in war might have been exceptional, but not sufficiently so to erase the suggestion of complicity entirely, less so, stigma.

    In my book Sexual Violence in War and Peace, I identify a continuum in how sexual violence is understood and perpetrated in both war and peace, and hence, how such violence is dealt with post-conflict. The characteristics of rape regimes perpetrated by military in the high Andes of the 1980s and early 1990s showed many known features of power relations along lines of race, sex, class, age, and gender. Sexual violence, because of its intimate and potential reproductive qualities, helps produce and reproduce those unequal power relations. In war this might be strategic and large-scale, or it might be facilitated and condoned, in order to dominate over others (i.e., both to affirm power as well as subordination, both to destroy communities, as well as consolidate military loyalty and masculine strength). But in peacetime, it does the same: sexual violence produces dominance and subordination between genders, races, sexualities, classes and ages, be that catcalling, sexual harassment, marital rape or other forms of highly gendered and sexualised violence.

    Understanding sexual violence along a continuum does not say anything about the gravity of the violence or even how it might be experienced. On the contrary, while recognising and naming the differences between forms of sexual violence, experiences can be named as violence and as harmful, instead of normal or deserved. What the concept of a continuum of violence intends to highlight is how all forms of sexual violence are part of gendered social structures and patterns that have to be identified and transformed. Highlighting, combatting and prosecuting rape in war should arguably be part of a similarly linked set of measures that aim to eradicate gender inequality and the (often intersecting) violence with which such inequality is maintained and perpetuated, be that in war or in peace, at the level of families or in public space, in Guatemala or in the UK.

    Thinking in terms of a continuum does not aim to minimise rape in conflicts, gang rape, or the femicides we are seeing particularly in parts of contemporary Central America. But it gives us an analytical tool that allows us to connect sex, male violence, and gender inequality, both in the everyday as well as during armed conflict. Thinking in terms of a continuum allows us to see how much violence is hidden, institutionalised, and/or normalised in everyday life, both in peacetime and wartime, in homes, in intimate relationships, and in public spaces. The term allows us to see parallels between the extreme and the everyday, the public and the private, thereby not undermining the seriousness of the extreme, but undercutting the normality of the everyday.

    As such, the Sepur Zarco case is a milestone, and is hopefully a further step towards accountability for acts of sexual violence, and more broadly, gender-based violence, in both war and peace, in Guatemala and beyond.

     

    Jelke Boesten is Reader in Gender and Development at International Development Institute, King’s College London.

  • Sustainable Security

    In 2008, media outlets declared that a new Cold War was unfolding in the Arctic. This story was centred on a small, titanium Russian flag, fixed to the seabed below the North Pole.

    Planted in 2007 by a modest team of explorers and scientists, the flag triggered angry responses from Western politicians and media commentators, with the most vociferous coming from the then Canadian Foreign Minister, Peter MacKay, who declared: ‘This isn’t the 15th Century…You can’t go around the world and just plant flags and say “We’re claiming this territory”’.

    Nearly a decade later, this story remains emblematic of the geopolitical intrigue that refuses to go away in the Arctic, which continues to be stoked by uncertainties over sovereignty, ownership and access in the region.

    Carving up the Arctic, Carefully

    The Arctic Ocean, like every ocean, is governed by the UN Convention on the Law of the Sea’s (UNCLOS) provisions. The US has not ratified this treaty, but considers its provisions relevant as customary international law of the sea.

    Under UNCLOS, the Arctic Ocean littoral states are entitled to Exclusive Economic Zones (EEZ) stretching up to 200 nautical miles (nm) from their Arctic coastlines. Article 234 allows littoral states to develop and administer special regulations dealing with human activities in ice-covered waters. Russia and Canada use this to regulate shipping activity in their Arctic waters through environmental protection measures.

    UNCLOS also entitles a coastal state to extend the outer limit of its sovereign rights over the continental shelf (the seabed and subsoil of submarine areas–including, any oil and gas resources contained) beyond 200nm, if it can prove the shelf is a natural prolongation of the coastal states’ land mass. This has led Denmark and Russia to submit evidence (with Canada expected to follow this year) to the UN to support claims reaching all the way to the North Pole. Norway settled its continental shelf limits in 2009.

    As their claims overlap, the UN Commission on the Limits of the Continental Shelf (CLCS) is responsible for reviewing the evidence and issuing a final recommendation on where the borders should be drawn according to Articles 76 and 77. However, the CLSC has no legal authority or personality meaning it will be up to Canada, Denmark and Russia to reach an international agreement which will settle their claims. Any remaining space will be considered part of ‘the Area’ (see below), and falls under the purview of the International Seabed Authority.

    Although the decision on ‘who owns the North Pole’ will ultimately be determined by an agreement between Canada, Denmark and Russia,wherein lies a latent potential for conflict, the five Arctic littoral states’ public commitment to use UNCLOS as the basis for settling any sovereignty disputes is an important step towards ‘sustainable security’. It will take three to five years just for the CLCS to review the latest evidence submitted by Russia on 9 February 2016.The CLCS is already overwhelmed by the number of applications received globally. Since the prospects for oil and gas development further from shore are still highly uncertain, and claims to the North Pole are primarily symbolic, the CLCS arguably has time on its side.

    As long as the Arctic states maintain their trust in the process, UNCLOS should be able to prevent any ‘race’ to carve up the Arctic seabed, which could lead to tension between the littoral states.

    High Seas and the Area: Accommodating New Interests

    Where UNCLOS reaches its limits is in the parts of the Central Arctic Ocean (CAO), we will be dealing with High Seas,parts of the water column beyond the EEZs of coastal states,and ‘the Area’– seabed areas which cannot be claimed by any state (see map). Theoretically, anyone can fish and mine in these parts of the Arctic, but such activity is likely to be limited for the time being by the continued prevalence of thick sea-ice covering the surface of the ocean (and other environmental factors).

    In another step towards ‘sustainable security’, the five Arctic coastal states have initiated a process to create a governance framework to manage future fishing activity in the CAO.

    In July 2015, the littoral states signed a ‘Declaration’ preventing unregulated high seas fishing in the CAO, and promising to only authorise their own fleets to conduct commercial fishing in the CAO if it was in accordance with recognised international standards.

    The littoral states’ problem is that they do not have the authority to dictate the terms under which the rest of the international community can access CAO high seas fisheries. China’s, Japan’s, Korea’s, Iceland’s, and the EU’s finishing fleets are entitled under international law to fish in the CAO.

    Consequently, the littoral states took another preventative step by calling a second meeting in December 2015, where negotiations for fisheries agreement for the CAO’s high seas was opened up to these other parties. Other nations such as Taiwan are expected to join future deliberations, eventually ensuring buy-in for a governance framework from all nations with an interest in future Arctic fisheries.

    Again, this is a long-term process, providing another example of how governance structures developed now can prevent certain unwanted futures from becoming present, including, for exampletension and conflict over fisheries and continental shelves.

    Navigating Arctic Waters

    Can similar preventative steps be taken to ensure that disputes do not flare up over the problem of maritime activity in the Arctic? There are two issues to address. Firstly, the status of two ‘international straits’ in the Arctic: the North West Passage and the Northern Sea Route. Secondly, the regulating of ice-covered waters in littoral state EEZs as addressed by Article 234 of UNCLOS.

    Science team in the Arctic Sea. Image by NASA Goddard Space Flight Center.

    Science team in the Arctic. Image by NASA Goddard Space Flight Center.

    Canada and Russia do not consider the North West Passage (passing through the Canadian archipelago) and the Northern Sea Route (across northern Russia) to be ‘international straits’. Consequently, foreign vessels have no right of ‘transit passage’ through these waters–a right that entitles foreign ships to pass through without coastal state permission, and foreign submarines may remain submerged. Both countries claim that their sovereignty over nearby islands effectively means these waters should be considered ‘internal waters’, requiring foreign vessels to seek permission before entering.

    The US and the EU contest Canada and Russia’s claims, not least because of concerns about setting a legal precedent that could be applied to more important southerly shipping routes.

    There seems to be little ambition to settle the disagreement, because Arctic transit shipping is still a niche activity. Several uncertainties remain about whether large-scale transit shipping will ever become commercially viable, not least because of the competition posed by more southerly trade routes and the general unpredictability of seasonal sea-ice retreat that makes seasonal passages possible without expensive icebreaker escorts.

    The problem with the current stance is that Russia is actively investing in icebreakers, port infrastructure, marine services, search and rescue facilities and constabulary forces with the ambition of turning NSR into a viable shipping route. The more Russia builds up infrastructure around the route and offers to accommodate shipping on Russian terms, the greater the historical precedent it will set that the NSR is part of Russian-controlled waters. This feeds Western fears about Russian militarization of the Arctic building a security dilemma.

    While US and EU lawyers might question the validity of such a precedent, the de facto claim will remain and Russia will likely continue resisting attempts to change the status quo. It might therefore be worthwhile considering preventative steps sooner rather than later to resolve the NSR and the NWP’s legal status, before marine activity in the Arctic increases further and positions become more deeply entrenched.

    The issue is complicated by the second issue referred to above–the regulating of ice-covered waters by Arctic littoral states, notably Canada and Russia. As already noted, under Article 234 of UNCLOS, Arctic littoral states are entitled to regulate marine activities in ice-covered waters within their EEZs. Both the NSR and the NWP fall within these provisions, allowing Canada and Russia to regulate marine activity beyond their territorial waters regardless of whether they have the status of ‘international straits’ (see, for example, Canada’s Arctic Waters Pollution Prevent Act).

    So what happens when these waters are no longer ice-covered for a large part of the year? Article 234 indicates that ice-cover must be present for most of the year (i.e. 6 months and one day), while other points of contest exist in determining exactly what is meant by ‘severe climatic conditions’ and ‘exceptional hazards to navigation’ and who would decide whether such conditions prevailed (littoral states, non-littoral states, international organisations?).

    This remains a longer-term issue, but if as most scientists predict the amount of sea-ice cover each year continues to spiral downwards, the issue of whether littoral states can regulate in Arctic waters beyond 12 nm could become a significant point of tension with those seeking to benefit from new opportunities for regional marine activity. Currently, unlike in the cases of fisheries and continental shelves, few preventative steps are being taken to resolve this outstanding issue, despite its potential to cause future confrontation in Arctic waters. The situation is exacerbated by the deterioration of relations between Russia and the West over the Ukraine and Syria crises, likely making dialogue difficult.

    Prospects for Sustainable Security

    On the issues of resource competition and militarisation sustainable security’s prospects, in the Arctic for the most part look good. Since the end of the Cold War, international cooperation on various scientific and environmental protection initiatives have provided the basis for constructive engagement between the Arctic states and other interested actors (such as the UK) on many issues.

    Bilateral and multilateral arrangements have provided a governance structure that all Arctic states, and other interested actors, have indicated provides a firm basis for resolving inter-state disputes peacefully in accordance with international law, especially concerning fisheries and the delineation of the continental shelf. However,access to the NWP and NSR could lead to future contention. Potential flashpoints remain over how regional marine activity should be governed in EEZs where the sea-ice is in fast retreat, especially if Russia and Canada refuse to accept that Article 234 might lose purchase in the future.

    Whether preventative action is politically possible on this issue remains to be seen, but the sooner a constructive dialogue begins between Russia, Canada and potential users of the NWP and NSR, the more likely it will be to find a sustainable solution. Speculatively, an Arctic agreement on shipping activity negotiated under the Arctic Council’s auspices (but accommodating interested non-Arctic states as seen in the fisheries discussions) to complement the International Maritime Organisation’s Polar Code (due 2017) could be one way of consolidating international understanding that these waterways are to some extent shared spaces requiring the international community’s shared stewardship.

    An important dimension of sustainable security not discussed in this state-centric article is that of human security–especially of indigenous peoples and other local communities that live and work in the Arctic. The decline of traditional cultures, environmental pollution and other threats to human health and well-being are prevalent in nearly all of the Arctic states, and there has been a long history of marginalisation of Arctic residents. However, all of the Arctic states have readily admitted the need to address the challenges facing Arctic indigenous peoples and other local communities, and the Arctic Council is somewhat unique to the extent that it invites representatives of indigenous people’s organisations to sit at the table with government ministers.

    The sustainable security outlook is also weaker with regards to climate change. Huge uncertainty remains over how soon we are likely to see an ice-free Arctic in the summertime. The temperature spikes witnessed in January and February this year suggest this event horizon might be closer than we think. The impacts of climate change pose a particular risk to human security in the Arctic, threatening food, housing, infrastructure and livelihoods. It remains to be seen whether these communities will be able to adapt to the drastic changes that are being observed.

    Duncan Depledge is a Teaching Fellow in the Department of Politics and International Relations at Royal Holloway, University of London, and director of the secretariat to the UK All-Party Parliamentary Group for Polar Regions. He received his PhD from Royal Holloway for his research investigating contemporary developments in U.K. policy toward the Arctic.

  • Obama

    There were many positives in Barrack Obama’s speech to the United Nations on the 24th September. The US President outlined the importance of the UN as an institution and more importantly its function as a forum through which the nations of the world can collectively address shared problems. He reaffirmed America’s commitment to an “era of engagement based on mutual interest and mutual respect” and to seeking “the goal of a world without nuclear weapons”.

    However…

    Read more »

  • Development in Lao PDR: The food security paradox

    Food security will remain out of reach for many people, especially women and children, in the Lao People’s Democratic Republic, or Laos, if the country continues to emphasize commodities and resources development at the expense of the environment and livelihoods while ignoring global trends for food and energy. Development might be expected to improve food security, but the indications and trends suggest otherwise. This is the paradox of food security in Laos.

    This working paper was conceived as a meta-study to provide a strategic view of the situation in the Lao PDR drawing on data and findings from dozens of field studies, which were subsequently analyzed in the light of local and global trends and developments to synthesize fresh insights and an assessment of the outlook for food security plus scenarios and options. Boundaries drawn up for the study precluded consideration of the complexities of climate change.

    To receive the full report, please email the Swiss Agency for Development and Cooperation (SDC): [email protected]

    Image source: danou_info

  • Sustainable Security

    The peace process in Mindanao between the Philippine government and the Moro Islamic Liberation Front was an important step towards ending four decades of conflict in the south of the Philippines. But this initiative now faces many challenges.

    On March 27th 2014 the Philippine government and the Moro Islamic Liberation Front (MILF) signed the Comprehensive Agreement on the Bangsamoro. This ended an armed conflict that began in 1969, which saw at least 120,000 deaths and hundreds of thousands displaced.

    Civil society groups on Mindanao have played key roles in supporting a comprehensive and sustainable peace process. However, civilian groups and communities face challenges in the context of new outbreaks of Islamic State-inspired violence, and the recent (re-)imposition of martial law.

    The peace process in the southern Philippines carries great geopolitical importance, as an example of a Muslim armed group engaging in structured dialogue to address and resolve key political grievances. It is important that the Mindanao peace process succeeds, as it carries great significance beyond the Philippines.

    The Moro struggle

    The population of the Philippines is approximately 100 million, with twenty-two million people living on Mindanao, the largest island in the country. Of these, approximately 10% are Muslims, divided into thirteen ethnolinguistic subgroups, known collectively as the Moro; another 5% are upland ethnic minorities, generally referred to as indigenous people. To denote continuity with precolonial ethnic-religious identity, since the late 1960s Mindanao Muslim nationalists have used the epithet ‘Moro’ to describe themselves and ‘Bangsamoro’ for their homeland.

    Armed groups representing the predominantly Muslim Moros have been struggling for greater autonomy from the Philippines government since the late 1960s. Although narratives of the Spanish and American colonial periods often overplay the extent of conflict between Islamic and Christian communities, Moro groups nevertheless share a strong sense of historic injustice. For many conflict-affected Moro communities, the state is perceived as politically and economically intrusive and predatory, embodying a religious and cultural majority bent on forced assimilation of Muslim minorities. Moro grievances focus in particular on Manila-sponsored ‘internal colonization’, including transmigration of large numbers of Christian Filipinos to the southern Philippines, settled on land originally belonging to Muslim and other indigenous communities.

    A troubled peace process

    Image credit: Wikimedia.

    The 1976 Tripoli Agreement between the government and Moro National Liberation Front (MNLF) seemed a breakthrough at the time, but was not properly implemented – although a subsequent 1996 agreement granted some autonomy to Muslim areas (in addition to decentralisation under the 1987 Constitution). However, the Autonomous Region for Muslim Mindanao was a largely hollow entity, undermined by poor governance. These setbacks discredited the MNLF, leading to a new round of insurgency by the 12-15,000 strong MILF, which adopted a more overtly Islamic identity.

    The following two decades in western Mindanao and the Sulu archipelago were characterized by low-intensity armed conflict, with occasional steep upsurges in fighting associated with human rights abuses and consequent episodes of forced migration. During this period, the MILF consolidated control over key elements of the Moro resistance, reinforcing its Islamic credentials, but always open to structured political engagement with the government.

    A 2008 pact with the Gloria Macapagal-Arroyo administration focused on Moro rights to their ‘ancestral domain’, or traditional lands. This could have been an important breakthrough addressing key grievances, but the agreement was struck down as unconstitutional by the Philippine Supreme Court, in part at the instigation of powerful politician-oligarchs on Mindanao. Following the breakdown of the 2008 peace agreement, the Armed Forces of the Philippines launched a major offensive against the MILF displacing hundreds of thousands of civilians.

    During this protracted period of progress towards peace, followed by relapses into violence, relations between civil society and Moro armed groups underwent important changes. Civil society actors have in the past complained about their lack of input in the peace process. One striking difference between the situation since 2012 is the extent to which the MILF has undertaken concerted and systematic efforts to engage with civil society actors, including through a series of community consultations. Nevertheless, questions remain regarding whether it will be possible for community-based organizations to work at the grassroots level without undue political interference or co-optation.

    How will civil society activities, some of which are framed within liberal-democratic norms and values, fit the Islamic agenda of some MILF leaders and supporters? Past experience of ineffective government-implemented development projects, and their appropriation by clientelist networks, has led grassroots activists to be sensitive about corruption and the politicization of aid, and the risks of being co-opted by powerful interests. Moro community activists are often wary of outsider (particularly secular) aid agencies, and sceptical about the international community being able to understand and respond effectively to local needs in the peace process – although some external actors have worked diligently to win local trust.

    Despite such challenges, the MILF has maintained its ceasefire – in part thanks to effective ceasefire monitoring on the ground. Mindanao civil society groups have played key roles in ceasefire monitoring, including networks such as the Bantay Ceasefire local volunteers, and through civilian participation with the International Monitoring Team (IMT). The IMT coordinates closely with the MILF and Armed Forces of the Philippines, on several occasions successfully preventing local incidents flaring up into large-scale clashes.

    For the MILF, internationalisation of the peace process has resulted in significantly enhanced legitimacy and political credibility, on the national and regional stages. Domestically, one of the MIF’s major challenges is to demonstrate its ability to represent not only Islamic Moro communities, but also the indigenous peoples of Mindanao. The MILF (and, to a degree, the MNLF) have included indigenous leaders in political discussions, and the sharia law envisaged for the Bangsamoro under the BBL would not apply to non-Muslims. Nevertheless, some indigenous people fear marginalization in the future Bangsamoro. There are important roles here also for civil society actors, to represent the often excluded voices of indigenous people, and continue building trust and confidence between ethno-linguistic and religious communities.

    Conclusion

    A key lesson from the southern Philippines for other peace process is the need to consult extensively with civil society actors, to ensure sustainable buy-in from local stakeholders. This is particularly important given the risks of widespread lawlessness in the post-conflict period, as government and non-state armed groups relax their authority on the ground.

    Ashley South is an independent researcher and consultant, specializing in peace and conflict, humanitarian and political issues in Southeast Asia (primarily Myanmar/Burma, and Mindanao). He has a PhD from the Australian National University, and is a Research Fellow at Chiang Mai University, Center for Ethnic Studies and Development. For a full list of Dr South’s publications, https://www.ashleysouth.co.uk

  • Sustainable Security

    In March 2016, Jaelyn Young, a 20-year-old student at Mississippi State University was accused of attempting to leave the United States and join the Islamic State (ISIS). She attempted to board a flight with Muhammed Dakhlalla and fly to Turkey with the intent to cross into Syria and join the terrorist group. Young, who pleaded guilty, was posting messages on Twitter about her desire to join the jihadist group, catching the attention of the FBI in May 2015. An agent posing as an Islamic State recruiter began corresponding with her and Dakhlalla. Young and Dakhlalla told the supposed recruiter they would help Islamic State “correct the falsehoods” about it in U.S. news media, such as reports that the group trades young girls as sex slaves. They also asked the recruiter whether ISIS would offer Koran classes in English, how they would be required to prove that they were Sunni Muslims, and what kind of military training Dakhlalla would receive.

    Young and Dakhlalla are just two of many cases of the new trend of terrorists using the newest online platforms, commonly known as the “new media” or “social media.” As several reports on online terrorism reveal, today 90 percent of terrorist activity on the Internet takes place using social networking tools. The growing attraction of social media for modern terrorists relies on the combined impact of several trends: the expansion of online social media and their advantages for terrorists, the virtual interactivity that terrorist propaganda and recruitment are using especially with the targeting of specific audiences (“narrowcasting”) and the emergence of “Lone Wolf” terrorist whose virtual pack is found in the terrorist social media. ISIS managed to recruit thousands of foreign fighters, many of them from Western societies. Many of them were radicalized and recruited on Western online social media. Modern terrorism is turning social media into a powerful anti-social platform of hate, destruction, suicide and mass murder.

    Terrorist Migration to Social Media

    Terrorist use of online platforms is not new. After the events of 9/11 and the antiterrorism campaign that followed, a large number of terrorist groups moved to cyberspace, establishing thousands of websites that promoted their messages and activities.  Many terrorist sites were targeted by intelligence and law enforcement agencies, counterterrorism services, and activists, who monitored the sites, attacked some of them, and forced their operators to seek new online alternatives. The relocation to social media followed. The main motivation to use Facebook and other social media was properly outlined by the terrorist themselves in a Jihadi online forum calling for “Facebook Invasion”:

    This [Facebook] is a great idea, and better than the forums. Instead of waiting for people to [come to you so you can] inform them, you go to them and teach them! …[I] mean, if you have a group of 5,000 people, with the press of a button you [can] send them a standardized message. I entreat you, by God, to begin registering for Facebook as soon as you [finish] reading this post”.

    Social media differentiates from traditional/conventional media in many aspects such as interactivity, reach, frequency, usability, immediacy, and permanence. They are comparatively inexpensive and easily accessible. They enable anyone to upload, download, share and access information. Social media depend on new communication technologies such as mobile and web-based networks to create highly interactive platforms. The global spread of cellular phone with online access to social media made these platforms so widely accessed and used, even in the poorest places in the world. There are 3.42 billion internet users, equaling 46% global penetration, 2.31 billion social media users, delivering 31% global penetration, 3.79 billion unique mobile users, representing 51% global penetration and 1.97 billion mobile social media users.

    These trends were noticed also by Internet-savvy terrorists who quickly learned how to harness the new social media for their purposes. Increasingly, terrorist groups and their sympathizers are shifting their online presence from websites, chatrooms and forums to the newer platforms, the social media.

    Backlit keyboard

    Image via Wikimedia Commons.

    Today, all terrorist groups are present on Facebook, Twitter, Instagram, YouTube, Telegram and other online platforms. Terrorists are encouraging their audiences, followers and operatives to join social media and use them. Maybe most successful is the Sunni terrorist group ISIS, which launched a multi-platform online campaign, covering the entire range of social media. ISIS is using social media to seduce, radicalize and recruit. Since the summer of 2014, ISIS has opened numerous social media accounts for distributing its videos, audios and images via various channels and in many languages, thereby avoiding online censorship. As part of these intensive propaganda efforts, it has launched Al-Hayat Media, a new media branch specifically targeting Western and non-Arabic speaking audiences. ISIS has developed an effective online propaganda machinery. On various social media platforms, ISIS has released numerous videos, photos, texts and music promoting different sides of the militant group. On the one hand is its face of cruel, bloody terror such as of beheadings and burnings of hostages; on the other are more humane and friendly videos of ISIS fighters posing with Nutella jars and kittens. Some of propaganda items on social media are about ISIS providing governance, social justice, and new construction.

    Going Dark: the Move to the Dark Web

    Social media, useful and beneficiary as they may be for terrorists, also involve risks for them: they could be monitored, traced and found. Many of the terrorist websites and social media on the so-called Surface Web are monitored by counter-terrorism agencies and are often shut down or hacked. That led to a recent terrorist migration to the Dark Web. One can describe the Internet as composed of layers: the “upper” layer, or the Surface Web, can easily be accessed by regular searches. However, “deeper” layers, the content of the Deep Web, are not indexed by traditional search engines such as Google. The deepest layers of the Deep Web, a segment known as the Dark Web, contain content that has been intentionally concealed. The Dark Web serves as Internet users for whom anonymity is essential, since they not only provide protection from unauthorized users, but also usually include encryption to prevent monitoring.

    The Dark Web is quite appealing for terrorist groups: While they may lose a broad audience that is available on the Surface Web, they can exploit the obscurity of the Dark Web to further their goals. Following the attacks in Paris (November 2015), ISIS has turned to the Dark Web to spread news and propaganda in an apparent attempt to protect the identities of the group’s supporters and safeguard its content from hacktivists. The move comes after hundreds of websites associated with ISIS were taken down as part of the campaign launched by the amorphous hacker collective Anonymous. ISIS’ media outlet, Al- Hayat Media Center, posted a link and explanations on how to get to their new Dark Web site on a forum associated with ISIS. The announcement was also distributed on ISIS’ Telegram channel, the encrypted communication application. The messages shared links to a Tor service with a “.onion” address, more commonly known as a website on the Dark Web. The ISIS site in the Dark Web contains an archive of the group’s propaganda materials, including its documentary-style film, The Flames of War. The site also includes a link to the terrorist group’s private messaging portal on Telegram. Telegram offers encrypted messaging, a slick, intuitive interface, and a big userbase: it hit 100 million active monthly users in February 2016.

    At this stage, terrorist presence in the Dark Web is rather modest: when propaganda, radicalization and recruitment are the chief goals of terror groups, the reach of Dark Web is limited. Yet, terrorists are already applying the newest privacy-preserving mobile applications like Telegram and are using the Tor browser to hide what they are browsing on the open web from prying eyes. This growing sophistication of terrorist’s use of the Dark Web presents a tough challenge for governments, counter-terrorism agencies and security services. DARPA, the Defense Advanced Research Projects Agency, believes the answer can be found in MEMEX, a software that allows for better cataloguing of Deep Web sites. Envisioned as an analog computer to supplement human memory, the MEMEX (a combination of “memory” and “index”) would poke around the Dark Web and also tune its knowledge to specific domains of interest. MEMEX was originally developed for monitoring human trafficking on the Deep Web, but the same principles can be applied to almost any illicit Deep Web activity. In 2014, an investigation of the source code in one NSA program called XKeyscore, (revealed by the Edward Snowden’s leaks), showed that any user simply attempting to download Tor was automatically fingerprinted, essentially enabling the NSA to know the identity of millions of Tor users. The NSA source code also revealed some of the behavior which users exhibit can immediately be tagged or “fingerprinted” for so-called deep packet inspection, an investigation into the content of data packages sent across the Internet, such as emails, web searches and browsing history.

    However,  there is another side to counter measures in the Dark Web which can serve terrorist communications and activities but also serves journalists, civil rights and democracy activists – all of which may be under threat of censorship or imprisonment.  Thus, the alarming infiltration of Internet-savvy terrorists to the “virtual caves” of the Dark Web should trigger an international search for a solution, but one that should not impair legitimate, lawful freedom of expression.

    Dr. Gabriel Weimann is a Full Professor of Communication at the University of Haifa, Israel. His research interests include the study of persuasion and propaganda, political campaigns, terrorism and the media, online terrorism and cyber-war. He is the author of nine books and over 180 scientific articles. His recent book, Terrorism in Cyberspace: The Next Generation, was published in 2015 by Columbia University Press.

  • Sustainable Security

    A year after the adoption of the United Nations Arms Trade Treaty, the pace is starting to pick up on state action to ratify the treaty. But acceleration of the global arms trade and recent irresponsible deals by treaty ratifiers suggests that state behaviour has yet to catch up to the ideals that sit at the heart of the ATT. A focus on the consistent and long-term blowback of irresponsible trading might go some way to convincing states to start to practice what they preach.

    An ex-combatant holds up munitions in Attécoubé, Abidjan, Côte d'Ivoire. Source: UN Photo (Flickr)

    An ex-combatant holds up munitions in Attécoubé, Abidjan, Côte d’Ivoire. Source: UN Photo (Flickr)

    April 2nd marked the first anniversary of the adoption of the much celebrated Arms Trade Treaty (ATT), the world’s first treaty to establish common standards of international trading in conventional weapons and which, in turn, aims to  ‘ease the suffering caused by irresponsible transfers of conventional weapons and munitions’. 118 states have signed so far, with 31 ratifications including, as of last week, the UK, France and Germany, each a major exporting state. Of the rest of the P5+1, the US has yet to ratify and Russia and China, both of which abstained from voting for adoption of the treaty, have yet to sign. But despite a recent acceleration in the rate of ATT ratification, hard data shows that the global arms trade is accelerating, with many of the biggest deals continuing to transfer cutting edge technologies from democracies like the UK to autocracies like Saudi Arabia.

    Meanwhile, the ghosts of arms deals past continue to haunt arms producing states as their wares come around to be used against them or their allies. Establishing the norms that the ATT seeks to establish will require exporting states to take a longer-term perspective on trading decisions that acknowledge the destabilising impact of weapons proliferation in fragile regions and the consistent blowback against national security. In short, they must start to practice what they have preached.

    New powers, old habits

    Data released by the Stockholm International Peace Research Institute (SIPRI) on 17 March chart the steady rise of international arms transfers – including battle tanks, combat aircraft, missile launchers and small arms and light weapons –  with the volume of transfers up 14% in 2009-13 from transfer in 2004-08.  In 2011 alone, the value of all international arms deliveries is estimated at $44.3 billion. This trend is particularly reflected through rising imports to regions such as Africa, where imports by states rose 53% between 2004-08 and 2009-13. Among the BRICs, Brazil’s arms imports increased by 65% in the same time period, while an increase of 111% in the value of its arms imports has made India the world’s largest arms importer.

    Beyond the deadly threat inherent these tens of millions of weapons pose to human life – the top five arms exporting countries alone delivered nearly 92 million major conventional weapons in 2006-10 – , these statistics suggest an entrenched belief by existing and emerging powers alike that weapons acquisition is a solution to today’s security challenges. Rather, such militarisation is the source of a number of spiralling security crises that are in turn being dealt with using military approaches, with all the Sisyphean repetition that entails. The current NATO-Russia stand-off over the future of Ukraine is but the most obvious example. Prioritising military solutions also tends to stymie peaceful, sustainable alternatives to reducing insecurity.

    What goes around…

    At the heart of the decade-long drive towards a consistent standard of arms trade regulation was an acknowledgement of the human cost of misuse and abuse of legally transferred conventional weapons, leading to human rights abuses and prolonging armed violence in countries such as Sudan, Egypt and Libya. Use of weapons in these countries against citizens has been particularly objectionable and Libya inparticular stands as an example of the warped logic of trading weapons to such countries. Following the lifting of its arms embargo in 2004, EU states granted export licenses worth a reported €834.5m from 2004-2009 to the notoriously repressive Libyan Government – weaponry that was subsequently used against Libyan civilians in 2011, leading to international condemnation and, eventually, western military intervention.

    Foreign Secretary William Hague signs the instrument of ratification for the Arms Trade treaty, 27 March 201. Source: FCO (Flickr)

    Foreign Secretary William Hague signs the instrument of ratification for the Arms Trade treaty, 27 March 2014. Source: FCO (Flickr)

    Yet it seems that such lessons must be continually hard learnt.  Sales such as February’s deal to sell 72 British Typhoon fighter jets to Saudi Arabia – listed by the most recent UK Foreign and Commonwealth Office report on Human Rights and Democracy as a ‘country of concern’ – suggest that London is still not choosy who gets its bang as long as it gets the bucks.  In addition to its domestic record of torture, repression and executions, Saudi Arabia sent its forces to Bahrain to assist in violent crackdowns of popular protests in 2011 and is the leading sponsor of Islamist insurgents in Syria. The UK had to revoke 158 arms export licences to the Middle East in 2011 because of concerns about human rights abuses and risk that the exported weapons might be used for internal repression. Yet the UK was found to have another 600 extant licenses to countries such as Syria, Bahrain and Yemen. With these actions in mind, it is  difficult to reconcile such disregard for the spirit of the ATT with the UK’s recent ratification of the treaty.

    …Comes Around

    Ordinance disposal in El Fasher, North Darfur. Source: UNAMID (Flickr)

    Ordinance disposal in El Fasher, North Darfur. Source: UNAMID (Flickr)

    In addition to direct abuse within states such as Libya, international security is challenged by further proliferation through diverted weapons from irresponsible states. For example, the 2008 Final Report of the UN Panel of Expertson Sudan found that arms originating from the stockpiles of Sudan, Chad and Libya had been used in attacks by the Justice and Equality Movement in Sudan, a militia group included in the UN Security Council arms embargo on Darfur since 2005. Chain-of ownership tracing by the Panel then identified numerous weapons that originated in Libya to have originally been transferred from Spain, Belgium and Bulgaria.

    Inside Libya, the dispersal of weapons stockpiles across the country before the downfall of Colonel Gaddafi’s regime – mortars stashed in disused factories, missiles in abandoned buildings – means that today there is an estimated million tons of weaponry in Libya, and much of it is unsecured. Given that this is more than the entire arsenal of the British Army, it is little wonder that MI6 warned the British government in 2013 that the country has become a ‘Tesco for terrorists’. Indeed, Tripoli’s open air Fish Market has now reincarnated as its biggest arms market and deliveries of new weapons systems are regularly hijacked on delivery. Given the hugely destabilising impact of Libyan arms flows south across the Sahara in 2011-12, not least to Mali, one can only speculate on how much of its arsenal has found its way to Syria.

    In Afghanistan, where US-supplied rifles and ammunition have been making their way into Taliban hands for a number of years, the US is currently contemplating  what to do with the $7bn worth of military equipment that will be too expensive to transport from Afghanistan and which will reportedly be of little strategic value to the US once the draw down is complete. As it considers driving some of the equipment over to Pakistan, it seems like the parting gift of the militarised approach in Afghanistan will be the further militarisation of an already deeply unstable region.

    Time to practice what they preach

    The ATT represents the beginning of an important new international norm on arms transfers that aims to lead to more responsible and transparent trade and, ultimately, consideration of the human cost of the trade itself. But despite a majority vote of 156 votes to adopt the ATT last April at the UN General Assembly, and accelerating pace of ratification, there are still important changes to be made to the behaviour of major arms trading states. Countries such as the UK, which proudly claimed to lead the push towards the ATT and made a grand show of ratifying in the recent ‘Race to 50’ campaign, have yet to exhibit the changes to practice that are at the heart of achieving the core ideals of the treaty. Under the terms of the ATT, states reserve the right to continue trade with whichever states they choose, but if a new norm is to be established, they must start to take seriously the spirit of the ATT, whether they have ratified it yet or not. More attention to the consistent and long-term blowback of irresponsible trading – both in terms of the civilian cost of misuse and costs to national security goals caused by destabilisation of areas like the Sahel – might prove worthwhile in making leading exporters like the UK start to practice what they preach.

    Zoë Pelter is the Research Officer of Oxford Research Group’s (ORG) Sustainable Security programme. She works on a number of projects across the programme, including ‘Rethinking UK Defence and Security Policies’ and ‘Sustainable Security and the Global South’. Zoë has worked on conventional arms control issues since 2011. 

  • Sustainable Security

     

    by Joe Thwaites

    UN Climate Change Talks Conclude with Copenhagen AccordLast Wednesday, the United Nations Security Council held its second ever debate on climate change, at the request of Germany, who holds the monthly presidency. UN Secretary General Ban Ki-Moon, Director of the UN Environment Program Achim Steiner, President of Nauru Marcus Stephen, and Australia’s Parliamentary Secretary for Pacific Island Affairs Richard Marles all addressed the Council, along with representatives of 62 member states.

    Stephen wrote powerfully in the New York Times last week about the threat rising sea levels pose to his Pacific island country’s existence, and did not hold back in the Council, usually a place of diplomatic stoicism. Speaking on behalf of the Pacific Small Island Developing States, he said they were facing “the single greatest security challenge of all – that is, our survival” and put the question: “Where would we be if the roles were reversed? What if the pollution coming from our island nations was threatening the very existence of the major emitters? What would be the nature of today’s debate under those circumstances?”

    As it happened, the nature of the debate was twofold. On the ostensible subject, “Maintenance of international peace and security: impact of climate change”, most states agreed that it would have – and in some cases already is having – profound implications for international peace and security, and that the UN had a key role to play coordinating efforts on mitigation and adaptation to climate change. But discussion on this remained secondary to complex political wrangling over the role of the Security Council in addressing the topic. Whilst this is the case for any issue before the body – in discussions on whether to mandate armed intervention into a specific country, for example, the debate focuses not just on the rights and wrongs in that instance, but also the wider precedent it may set – there were added complexities with climate change.

    China and Russia displayed their usual reticence about extending the Security Council’s competencies into new areas. They were joined by Brazil, India, and many developing countries in the G77 bloc, who opposed attempts to move the issue away from the General Assembly-mandated UN Framework Convention on Climate Change (UNFCCC), in which all member states have equal footing and decisions are made by consensus, and into the 15 member body where China, Russia, France, the UK and U.S. hold veto power, and are some of the biggest greenhouse gas emitters, on either cumulative or per capita bases. The underlying fear of developing countries was that such a move would circumvent the core principles which make the existing climate change regime palatable – namely, the recognition of states’ “common but differentiated responsibilities” to act on climate change, and the right to sustainable development.

    Indeed, if the Security Council were to take overall control of climate action, this would be a regressive step, potentially allowing developed countries off the hook for their failure to meet existing targets under the Kyoto Protocol, and removing the impetus to agree a further UNFCCC commitment period. States proposing that the Security Council address the issue (primarily the EU, U.S. and small island states) were therefore at pains to stress that it would be complementary to existing UN bodies and processes, and should not encroach upon their remits. They argued that as a major security threat, it was right that the Council afford these dimensions of climate change due consideration. But as the UN body with the most diplomatic bite – only the Security Council has the power to authorise military force – it is easy to see why there are concerns that it could dominate the issue.

    During the debate there was related apprehension about the excessive securitisation of climate change. Many states pointed out that climate change was a cross-cutting issue, as much related to sustainable development and humanitarian relief as security, and that looking at it as a security issue would not address the underlying causes of the problem. Bolivia noted that developed countries gave $10 billion in climate change finance annually, which amounted to just 1% of defence spending, and suggested the Council adopt a resolution to cut defence and security spending by 20%, using the money saved to address the impacts of climate change. Papua New Guinea echoed Nauru’s Marcus Stephen, pointing out that if the Security Council could address issues such as development and HIV/AIDs as security problems (without them becoming militarised), then why not climate change?

    The non-binding Presidential Statement which was finally agreed did not include mention of a Special Representative on Climate Change and Security, which had been one of Germany’s original proposals. Many countries remained open to the idea of a representative, but opposed them being answerable to the Security Council, instead suggesting they be appointed by the General Assembly.

    On one level, the outcome was disappointing. Russia initially vetoed adoption of the statement, later agreeing to a watered down version merely noting the “possible security implications” of climate change. Ambassador Susan Rice of the U.S. lambasted the lack of stronger action as “pathetic”, “short sighted” and “a dereliction of duty”. However, given that the first Council debate on climate change in 2007 was unable to agree any formal outcome, getting a Presidential Statement was something of a success.

    There remains wide disagreement between states over whether climate change merely exacerbates conflict, or is a distinct threat itself. Academic opinion is still divided, and the Security Council’s position often lags a good ten years behind the latest research on peacebuilding and conflict prevention, so this is not hugely surprising. It is also difficult to untangle the opposition to climate-security links on conceptual grounds from opposition for political reasons related to Security Council ‘mission creep’, as discussed above.

    In 2009, the General Assembly requested that the Secretary General produce a report on the possible security implications of climate change. A few states strongly disputed its findings on Wednesday. Nevertheless, the Presidential Statement recommended that in his regular reports to the Council, the Secretary General begin to include information on the possible influence of climate change upon conflict situations around the world. These are important first steps towards mainstreaming climate change in conflict assessments, even if we are a long way from any legally binding resolution.

    Another reason for optimism is the level of participation in the debate. I followed many Security Council meetings whilst working in the UN community last year, and never saw so many member states request to speak. Most countries took the discussion seriously, and even where they disagreed on whether the Council had a mandate to act, they spoke strongly on the devastating impacts of climate change.

    The question now is: how long will it take for states to take this rhetoric seriously; to realise the gravity of the situation, break the cycle of mistrust in international negotiations and commit to unified multilateral action to address this issue – in whatever forum they choose? The answer is unclear.
    There is one thing we can be confident about – this won’t be the last time the Security Council discusses climate change.

    Joe Thwaites is a graduate in politics from the University of York, UK. He has worked on conflict prevention at the Quaker United Nations Office and represented Friends of the Earth at the UNFCCC.

    Image Source: United Nations Photo

  • Sustainable Security

    Colombia and Mexico: The Wrong Lessons from the War on Drugs

    As activists around the world participate in a Global Day of Action against criminalisation of drug use, evidence from the multi-billion dollar War on Drugs in Colombia suggests that militarized suppression of production and supply has displaced millions of people as well as the problem, not least to Mexico. The wrong lessons are being exported to Central America and beyond, but a groundswell of expert and popular opinion internationally is calling for alternative approaches to regulating the use and trade in drugs.

    Read Article →

    Militarised Public Security in Latin America: Mexico Gambles on Vigilante Security

    A new alliance between the Mexican security forces and citizen ‘self-defence’ groups in Michoacán state has brought some short term success in the fight against the Knights Templar cartel. But what will be the long-term consequences of legitimizing heavily armed vigilante groups in Mexico?

    Read Article →