Blog

  • Sustainable Security

    Security Sector Roles in Sexual and Gender-based Violence

    Democratic Republic of Congo’s sexual violence epidemic is not only a weapon of ongoing violent conflict but an expression of entrenched systemic problems. Indeed, sexual and gender-based violence (SGBV) is most commonly perpetrated by the security services in place to protect civilians. In Quartier Panzi in South Kivu province, innovative processes of security sector reform and strengthened police-civilian channels of communication may be providing an opportunity for change, argues World Bank adviser Edward Rackley.

    Read Article →

  • Kony 2012 and the Militarisation of Uganda

    Amongst the online flurry of activity and debate over the Invisible Children video campaign to make the Ugandan war criminal Joseph Kony ‘famous’ in 2012, Al Jazeera have published an interesting op-ed piece on the dangers of the Kony 2012 campaign adding to the growing militarisation of Uganda.

    It is written by Adam Branch who is a senior research fellow at the Makerere Institute of Social Research, Uganda, and an Assistant Professor of Political Science at San Diego State University. Branch argues that the campaign is “not about Uganda, but about America. Uganda is largely just the stage for a debate over the meaning of political activism in the US today.” While this may be true, in itself it is not necessarily a reason be concerned about the effect of the viral video and associated campaign. In principle, positive change can still come about from a social movement regardless of its aims and deep motives (however unlikely this is). The problem that Branch identifies with Kony 2012 is that it is “being used by those in the US government who seek to militarise Africa, to send more and more weapons and military aid, and to bolster the power of states who are US allies.” He argues that “The hunt for Joseph Kony is the perfect excuse for this strategy – how often does the US government find millions of young Americans pleading that they intervene militarily in a place rich in oil and other resources? The US government would be pursuing this militarisation with or without Invisible Children – Kony 2012 just makes it a little easier.”

    While all the other issues that have been raised about the campaign (eg. its lack of effect ‘on the ground’ in addressing the reasons and drivers of conflict in Uganda, the hypocrisy of a US citizen-led campaign to bring someone to justice at the International Criminal Court when the US itself still refuses to ratify the Rome Statute etc.) are no doubt important, perhaps it is the issue of militarisation that is least understood but most dangerous over the long-term.

    The article suggests a number of ways that people can more effectively engage on this issue so that “in our desire to ameliorate suffering, we must not be complicit in making it worse.”

     

    The full article is available here

    Image source: debobhappy

     

  • Sustainable Security

    RC_long_logo_small_4webThis article is part of the Remote Control Warfare series, a collaboration with Remote Control, a project of the Network for Social Change hosted by Oxford Research Group.

     

    Islamic State (IS) has used aerial drones for reconnaissance and battlefield intelligence in Iraq and Syria and has attempted to use aerial and ground drones with explosive payloads to attack Kurdish troops. IS-directed or -inspired attacks in Australia, Canada, Denmark, the United States and France and failed or foiled attacks elsewhere, including the United Kingdom, have demonstrated the group’s desire to attack targets outside the Middle East. Given that threat is a function of capability and intent, should we therefore be concerned about the possibility of Islamic State or another terrorist group using drones to attack Western cities? A recent report from the Remote Control project and Open Briefing examined this scenario, among others.

    The Drone Threat

    For Hostile drones, the Open Briefing team assessed the capabilities of over 200 commercial and consumer/hobbyist drones capable of operating in the air, on the ground or on or under the sea. Although limited at present, they found that there are consumer drones available today that are capable of delivering an explosive payload equivalent to a pipe bomb (1-4 kilograms) or a suicide vest (4-10 kilograms). Many more could be modified with readily-available components to increase their stated payload capacity. If used in a swarm against the crowd at a major sporting event, for example, they would cause serious injury and multiple fatalities. If one or more of the drones carried on-board cameras to record the event, it would also provide a group such as Islamic State with prime propaganda material.

    Using drones for terrorist attacks has several advantages over conventional methods, including removing the need to convince a suicide bomber to carry out an attack and opening up targets a bomber would not usually be able to access due to security. An attacker would not even necessarily need to weaponise a drone, as the vehicle itself could be used as a projectile to target a light aircraft’s engines on take-off or landing, for example. In addition to attack, Open Briefing identified intelligence gathering as another major capability that drones offer terrorists or insurgents, as demonstrated by Hezbollah, Hamas and Donetsk separatists. For example, Donetsk People’s Republic militias reportedly possess and deploy sophisticated Russian-made Eleron-3SV drones for intelligence, surveillance and reconnaissance (ISR) in eastern Ukraine. Drones provide insurgent groups with an excellent level of battlefield awareness and provide terrorist groups the ability to reconnoitre a target before an attack These same capabilities are also of interest to criminal, corporate and activist threat groups. For example, aerial drones have been used to transport illicit drugs over the Mexico-US border and in April 2015 a man protesting over the Japanese government’s nuclear energy policy landed a drone containing radioactive sand on the roof of the prime minister’s office in Tokyo.

    The same technology Western militaries have been controversially employing to target terrorists in Afghanistan, Pakistan, Yemen, Iraq and elsewhere for years is now being used by various threat groups to target Western interests. This is a prime example of how the tactics and technologies of remote-control warfare have created unintended consequences for those countries that have embraced them.

    Towards Drone Countermeasures

    No single countermeasure is completely effective at limiting the hostile use of drones by non-state actors. Open Briefing therefore proposes the United Kingdom adopt a hierarchy of countermeasures encompassing regulatory, passive and active countermeasures, which provides a layered defence. Regulatory countermeasures include point of sale regulations, civil aviation rules and manufacturing standards and restrictions. Passive countermeasures include early warning systems and signal jamming. Active countermeasures include kinetic defence systems, such as missiles, rockets and bullets, and less-lethal systems, such as projectile weapons and net guns. Each stage of the hierarchy of countermeasures requires government action, but it is the regulatory countermeasures upon which it can affect the greatest change.

    Any changes to the laws surrounding the use of drones need to be proportionate to the risks and balance interests relating to privacy, individual freedoms, safety and commercial interest. In addition to the existing regulations around drones needing to be flown within visual line of sight, below 400 feet and not within 50 metres or a person, vehicle or building, there have been calls from airline pilots and politicians for a registration scheme for consumer drones and for the adoption of firmware limitations that restrict the ability of drones to travel near geofenced no fly zones around sensitive sites, such as airports or nuclear power stations. These are reasonable demands that should be implemented as soon as possible.

    However, these regulations may have limited impact beyond reducing accidental incidents. Unless coupled with some kind of identification/tracking technology built in to drones, a registration scheme would not remove consumer drones from the terrorist arsenal altogether (in any case, such technology would be a step too far in terms of state surveillance and could be easily disabled). What registration would do is impose some control on a presently uncontrolled market and impress upon drone operators the responsibility they must take for their actions. It may also reduce the supply of readily-available drones that could be used for nefarious purposes. In the case of geofenced no fly zones, those wishing to carry out an intentional attack could still purchase open-source controllers that can bypass geofencing, and inertial navigation systems (using dead reckoning) would allow a drone to continue to a static target with reasonable accuracy even if it were possible to jam controller frequencies and GPS signals within the target perimeter. What geofencing would allow is for security to assume that any drone operating within the no fly zone is unauthorised and potentially hostile, allowing them to react appropriately (evacuation and/or deploying active defences).

    Beth Cortez Neavel

    Image of drone by Beth Cortez-Neavel via Flickr.

    There are two further regulations that have received little attention but which should also be considered. Firstly, the payload capacity of the consumer drones available for purchase or import in the United Kingdom without licence should be legally limited to that reasonably required to carry a camera and nothing else. This would mean these types of drones could not be used to carry explosive payloads without further modification. Secondly, owners of commercial drones capable of carrying heavier payloads for legitimate reasons (such as in agriculture or search and rescue) should be legally required to store them securely (in the same way fertiliser must be appropriately secured to prevent its use in homemade bombs, for example). This would prevent the theft and use of drones capable of carrying considerable explosive payloads by terrorists and other threat groups.

    A Layered Defence

    The current regulatory regime around drones in the United Kingdom is very limited. The adoption of the four regulations outlined above would balance the various interests and address specific risks without being unduly restrictive. However, regulations are not a panacea – they would merely limit the ability of terrorists and others to acquire drones with the capabilities needed for attack or intelligence gathering. That is why the government must also work with the police, security services and industry to explore the passive and active countermeasures that are needed to protect VIPs or sensitive sites and ensure that procurement and R&D funding is made available to purchase or develop the required systems. This should include the development of less-lethal systems for destroying or disabling hostile drones in urban environments, where little warning of an attack and the risk of collateral damage limits the usefulness of conventional kinetic countermeasures, such as missiles or bullets. Again, though, this will not be a panacea: the less-lethal systems currently available are of limited effectiveness against one or more fast-moving, small drones. As with all the possible countermeasures, such systems – if coupled with early-warning – would form part of an effective layered defence.

    Ultimately, the regulations and technology needed to reduce the threat from the hostile use of drones are either available now or are under development. The British government has to act now to bring drone regulations up to date and invest in the technologies needed to keep us safe. In the meantime, the threat from the malicious use of civilian drones is only going to increase.

     Chris Abbott is the founder and executive director of Open Briefing (www.openbriefing.org). Matthew Clarke is an associate researcher at Open Briefing. Hostile drones: The hostile use of drones by non-state actors against British targets was published by the Remote Control project on 11 January 2016.

  • Analysing President Obama’s Address to the United Nations General Assembly

    There were many positives in Barrack Obama’s speech to the United Nations on the 24th September. The US President outlined the importance of the UN as an institution and more importantly its function as a forum through which the nations of the world can collectively address shared problems. He reaffirmed America’s commitment to an “era of engagement based on mutual interest and mutual respect” and to seeking “the goal of a world without nuclear weapons”.

    However… 

    As Joshua Keating points out on his Foreign Policy blog, “it seems telling that President Obama ended his first major address on climate change not with a stirring call to action, but by urging pragmatism and compromise”. Obama’s assertion that “if we are flexible and pragmatic; if we can resolve to work tirelessly in common effort, then we will achieve our common purpose” will certainly ring alarm bells regarding the nature of a US climate bill which may not be comprehensive enough to inspire the required outcome at Copenhagen. For although Obama is correct that nations must address problems collectively, he is equally correct in highlighting the existence of, ” hope that real change is possible and the hope that America will be a leader in bringing about such change.”

  • Sustainable Security

    Chemical Weapons Use in Syria: a Test of the Norm

    Recent events in the Syrian civil war have proved an unparalleled test of the norm against the use of chemical weapons. At its core this was a test of the willingness of countries to uphold the norm, in this case in the face of a flagrant violation, and a response that in the end stumbled upon a satisfactory conclusion—reaffirming the special category of chemical arms—but which in the process said a great deal about current attitudes to the use of military force as a means of humanitarian intervention.

    Read Article →

    Beyond crime and punishment: UK non-military options in Syria

    The defeat of the UK government’s parliamentary motion on support in principle for military action against the Syrian regime means that Britain will play no part in any direct attack on Syria. What then are its options for resolving the Syrian conflict, protecting civilians and punishing those responsible for war crimes there? This article assesses what the UK can do in terms of pushing for a negotiated peace settlement and to hold accountable those responsible for using chemical weapons and any other war crimes committed during this century’s worst humanitarian crisis.

    Read Article →

  • Sustainable Security

  • Sustainable Security

    Raphael Cohen-Almagor received his DPhil in political theory from Oxford University. He is Professor/Chair in Politics, and Founder and Director of the Middle East Study Group, University of Hull. He was the Director of the Center for Democratic Studies, University of Haifa, Fulbright-Yitzhak Rabin Visiting Professor at UCLA School of Law, Visiting Professor at Johns Hopkins University, and Fellow at the Woodrow Wilson International Center for Scholars.  Raphael is the author of more than 200 publications in politics, law, media and ethics, including most recently Confronting the Internet’s Dark Side (NY and Washington DC.: Woodrow Wilson Center Press and Cambridge University Press, 2015), the first comprehensive book on social responsibility on the Internet. https://www.wilsoncenter.org/book/confronting-the-internets-dark-side-moral-and-social-responsibility-the-free-highway. Blog: http://almagor.blogspot.com Twitter: @almagor35

    This interview examines the rise of hate speech on the Internet, how it can be countered and how the battle against hate speech can be balanced with freedom of expression.

    Q. Your recent book, Confronting the Internet’s Dark Side: Moral and Social Responsibility on the Free Highway, examines the dark side of the internet and the issue of social responsibility on the net. Why did you choose to examine this subject as a research project?  

    In answering the question, I will explain three issues: Why I chose to write about the Internet? Why I emphasise the concept of responsibility? Why the themes of terrorism, child pornography, hate and cyberbullying are at the center of attention? 

    Why the Internet?

    This is my fifth book in a series of books in the fields of tolerance, freedom of expression and media ethics. It started with The Boundaries of Liberty and Tolerance (1994) continued with Speech, Media and Ethics: The Limits of Free Expression (2001) and then The Scope of Tolerance (2006) and The Democratic Catch (2007). Upon completing my research for the last two books in 2006, it was clear to me that my next big project would concern the Internet, a fascinating growing phenomenon that required close probing. I wished to examine the extent to which the mode of communication makes a difference, and whether the Internet constitutes a totally different issue that makes the theory that I have been developing over the years, the Democratic Catch, irrelevant.

    Why responsibility?

    I have done the majority of research during 2007-2008, when I was a Fellow at The Woodrow Wilson International Center for Scholars in Washington DC. The United States puts great emphasis on freedom of expression. The First Amendment is enshrined in the nation’s psyche. I was looking for a way to connect with my American colleagues in addressing the very delicate issue of boundaries to Internet’s freedom of expression. My book acknowledges the great importance assigned to the value of freedom of expression and supports balancing it against no less important value: social responsibility.

    The forefathers of the Internet had the vision of creating a free highway, a public space where everyone can say what he or she has in mind. This wonderful innovation of unfettered platform has backfired. The Internet is open for use but unfortunately also for abuse. We should provide and promote responsible use and we should also fight against those who abuse. The abuse corrupt public space and has posed many challenges on all levels: individual, the community, the state and the international community. We are in the early stages of learning how to cope and how to combat Internet abuse. Slowly we are developing the necessary tools to enjoy innovation and freedom while, at the same time, we are adopting safeguards and rules of responsible conduct.

    Confronting the Internet’s Dark Side makes a distinction between Netusers and Netcitizens. The term “Netuser” refers to people who use the Internet. It is a neutral term. It does not convey any clue as to how people use the Internet. It does not suggest any appraisal of their use. On the other hand, the term “netcitizen” is not neutral. It describes a responsible use of the Internet. Netcitizens are people who use the Internet as an integral part of their real life. That is to say, their virtual life is not separated from their real life.

    Even if they invent an identity for themselves on social networks, they do it in a responsible manner. They still hold themselves accountable for the consequences of their Internet use. In other words, netcitizens are good citizens of the Internet. They contribute to the Internet’s use and growth while making an effort to ensure that their communications and Net use are constructive. They foster free speech, open access and social culture of respecting others, and of not harming others. Netcitizens are Netusers with a sense of responsibility.

    Why the themes of terrorism, child pornography, hate and cyberbullying are at the center of attention?

    At the outset, it was clear to me that I cannot possibly tackle all the problematic information that we find on the Internet. I asked myself: What troubles you the most, and what issues may present a compelling case for social responsibility? I thought that if I am able to reach some conclusions and suggestions about confronting some highly problematic issues, maybe the discussion can then serve as a spring-board to drive forward a motion for Internet social responsibility. After long and careful probing I decided to concentrate attention on violent, anti-social forms of Internet expression: hate speech and racism, use of the Internet by terrorist organizations, and child pornography. Later, another concern was added: Cyberbullying.

    When I started my research for this book in 2006, cyberbullying was not on my radar. In 2010, I could no longer ignore it. Cyberbullying became a major concern. I changed the book structure to accommodate comprehensive research on this sensitive and most tragic topic.

    Q. Sometimes the line between free speech and hate speech is not as clear cut as we would like it to be. How do you identify hate speech?

    There is no single definition of hate speech and hate speech legislation varies from one country to another. The same speech might be illegal in the United Kingdom and legal in the United States. The United Kingdom passed the Public Order Act 1936 to protect minorities from hate speech and harassment while the United States permits the American Nazi Party and allowed them to march in Skokie, a Jewish neighbourhood that was heavily populated with Holocaust survivors. I find it hard to believe that such a march would be allowed in the UK. My definition of hate speech is: Bias-motivated, hostile, malicious speech aimed at a person or a group of people because of some of their actual or perceived innate characteristics. Hate speech expresses discriminatory, intimidating, disapproving, antagonistic and/or prejudicial attitudes toward those characteristics which include sex, race, religion, ethnicity, colour, national origin, disability, or sexual orientation. Hate speech is intended to injure, dehumanize, harass, debase, degrade, and/or victimise the targeted groups, and to foment insensitivity and brutality towards them.

    Q. There could be a counter argument made that much information could be interpreted as “bias-motivated, hostile, malicious”. So, for example, a person could publish a study or statistics on the internet which claims that a certain racial, ethnic or religious group is less intelligent or commits more crime than another group. It is highly likely that some individuals would see this as “bias-motivated, hostile, malicious” behaviour. Yet the publisher of the data might simply claim that they are merely presenting their evidence and that they had no intention to “injure, dehumanize, harass, debase, degrade, and/or victimise the targeted groups”.  Where would a case such as this fall in the hate speech/free speech distinction?

    This is a very interesting question. Let me answer it with an example. For many years, I have related in my teaching on freedom of expression the case of Jean-Philippe Rushton, a Canadian psychology professor who has argued about hierarchy of races: Asians are smarter than whites, who are in turn smarter than blacks. In his 1999 book Race, Evolution, and Behavior, Rushton explained that brain and genital size are inversely related, and that races differ in brain size, intelligence, sexual behaviour, fertility, personality, maturation, lifespan, crime and in family stability. He explained that blacks are less intelligent than Orientals and Whites and they are more involved in criminal activities. While the IQ of Orientals is about 106, the IQ of Black people is around 70 to 75. Black people are also more sexually promiscuous and they lack social organization.

    The science behind these assertions is debatable. Rushton’s theory evoked much criticism and has been perceived as racist. His theory attempts to explain everything by the sole criterion of race. It ignores social circumstances and social construction. It does not take into account other, no less important factors, such as individual abilities, class, poverty, education and family infrastructure. But is it hate speech?

    In the spirit of the liberal marketplace of ideas, the search for the truth and open disputation of ideas with contrasting ideas, one may think that Rushton’s theory is problematic but it should be tolerated and debated. Its scientific facade needs to be exposed and simultaneously the true motives that guide Rushton should be explored. This, indeed, is my belief. Rushton’s theory is a hard case. It is opened to interpretations but it should not be silenced.

    I also believe that Rushton’s theory was not guided only by scientific methods, that it had underpinning agenda which was not innocent, that it was motivated by other reasons rather than the urge to discover a scientific truth. Rushton was asked “Weren’t theories about race differences the reason for racism, genocide and the Holocaust?” Rushton answered: “The Nazis and others used their supposed racial superiority to justify war and genocide. But just about every idea – nationalism, religion, egalitarianism, even self-defence – has been used as an excuse for war, oppression or genocide. Science, however, is objective. It can’t give us our goals, but it can tell us how easy or difficult it will be to reach our goal. Knowing more about race differences may help us to give every child the best possible education and help us to understand some of our chronic social problems better”.

    With this answer, Rushton was trivializing the Nazi crimes. Nazism was equated with nationalism, religion, egalitarianism, “even self-defence”. Rushton says nothing about the evil ideas of Nazism per se but how they were used for evil deeds, in the same way that other ideas, including noble ideas such as egalitarianism and well-established ideas such as self-defence, have been used for evil deeds. Then Rushton declares that his science is objective. His commitment is to scientific truth, no matter how crude that truth might be. And then he goes on to argue that his ideas may better children education. But surely not the education of every child. No matter how much you invest in the education of black children, they would not be able to escape their lot. They belong to the inferior race and therefore they are doomed to suffer the consequences of their brute luck.

    What can help us understand Rushton’s reasoning is his behaviour and conduct outside the scientific world. Rushton was embraced by anti-black associations, by racists and bigots. Rushton not only did not flinch; he accepted their attention and the honour of being their star scientist.

    In 2002, Rushton was appointed president of the Pioneer Fund, which has for decades funded dubious studies linking race to characteristics like criminality, sexuality and intelligence. Pioneer has long promoted eugenics, or the “science” of creating “better” humans through selective breeding. Set up in 1937 and headed by Nazi sympathizers, the Pioneer Fund’s mission was “to advance the scientific study of heredity and human differences”. It strove to improve the character of the American people through eugenics and procreation by people of white colonial stock. Rushton has spoken on the alleged IQ deficiencies of minorities at conferences of the racist American Renaissance magazine and website, and he has published a number of articles in the group’s newsletter. His work is often published on racist websites, including the anti-immigrant hate site, Vdare.com.

    While appearing before and in support of racist groups, the above-mentioned sensitive and debatable statements then amount to hate speech. The context, as we learned from JS Mill’s theory On Liberty makes a great difference. A questionable race theory when invoked in Nazi and other radical extremist rallies is the fuel for their raging hatred, the validating force for their twisted beliefs, the scientific cloth that legitimized crude beliefs about hierarchy of races. Expressed in such forums, Rushton’s ideas become hate speech.

    Q. Staying with the distinction between hate speech and free speech, religious criticism is commonly seen as an area where the lines become blurred. For example, sometimes actual bigotry towards religious minorities is dressed up as critique of religious beliefs and scripture. Where do you see the line being drawn on this issue?   

    Two separate issues are relevant:

    1. A speaker uses religion to incite violence against others.
    2. A speaker defames and offends a certain minority because of its religion.

    Both have taken place in Britain. As for the first scenario:

    The state cannot sit idly by while religious authorities incite violence. Such public figures need to decide: either they are public servants who adhere to the laws and values of the state or they incite to violence. If they chose the latter, they should resign immediately. And if they do not see the necessity in doing so, then the state should discharge them from all public responsibilities. This is true for all religious authorities and more so for popular public figures with a large crowd of adherents. The justice system should act and crack down on the phenomena that might lead to violence. Violent religious preachers might pose a real danger to the well-being of society.

    As for the second scenario, I think offence should be taken more seriously than it is considered today. Much blood was shed unnecessarily because of the Danish cartoons. We should be respectful of all religions, understand and appreciate the power of religion to bring about change, positive and negative. One of Karl Marx’s greatest mistakes was underestimating the power of religion. Religion can motivate people to help others, and it can motivate people to destroy. This is true for any religion. Pushed to its extreme, fundamental religion can create a lot of damage. As extremes tend to feed each other, speakers should be cautious of the power of the word and avoid inflaming tensions, emphasising those things that bring people together, not that divides them, creating bridges rather than obstacles and alienation.

    In this age, many terrorists were Muslim. But, of course, not all Muslims are terrorists. Only a small number of Muslims are terrorists and they represent Islam to the same extent that the KKK represents Christianity and the Kahane movement represents Judaism. To tag Islam as a terrorist religion is to defame religion unjustly. Such statements are unwarranted and only inflame an already tense environment.

    Let me mention the work of organisations such as ‘TELL MAMA’, an Anti-Muslim Hatred group that seeks to consider and takes forward proposals to tackle anti-Muslim hatred. Its action plan aims to create an environment that prevents hate crime from happening.

    Free expression is not a recipe for lawlessness. The balance between free speech and protecting the public should not, on such matters, lean to the former. Liberal democracies have an obligation to secure the well-being of its population, especially vulnerable minorities. Indeed, the litmus test of a decent or civilized liberal democracy is the status of minorities.

    Q. In your research, have you observed a connection between hate speech and violent acts?

    Yes, I did.

    In 1999, 21-year-old Benjamin Nathaniel Smith, an avowed Aryan supremacist, went on a racially-motivated shooting spree in Illinois and Indiana over the July 4th weekend. Targeting Jews, African-Americans, and Asian-Americans, Smith killed two and wounded eight before taking his own life, just as law enforcement officers prepared to apprehend him. Smith embarked on his killing spree after being exposed to Internet racial propaganda. He regularly visited the World Church of the Creator (WCOTC) website, a notorious racist and hateful organisation founded in Florida in the early 1970s. Smith was so consumed by the hate rhetoric of WCOTC that he was willing to murder and to take his own life in pursuit of his debased hate devotion.

    The same year there were two other hate-motivated murders. Buford Furrow used to visit hate sites, including Stormfront.org and a macabre site called Gore Gallery, on which explicit photos of brutal murders were posted. Whether inspirational or instructional, the Internet supplied information that clearly helped fuel the explosion of a ticking human time bomb. Furrow decided to move to action. He drove to the North Valley Jewish Community Center and shot an elderly receptionist and a teenage girl who cared for the young students attending the summer day school. He continued shooting, hitting three children, one as young as 5 years old, before leaving the facility. Shortly thereafter Furrow fatally shot a Filipino American postal delivery worker because he worked for the federal government and was not White.

    In turn, Matthew Williams, a solitary student at the University of Idaho, turned to the Internet in search of a new spiritual path. Described as a “born fanatic” by acquaintances, Williams reportedly embraced a number of the radical-right philosophies he encountered online, from the anti-government views of militias to the racist and anti-Semitic beliefs of the Identity movement. He regularly downloaded pages from extremist sites and continually used printouts of these pages to convince his friends to also adopt these beliefs. At age 31, Matthew Williams and his 29-year-old brother, Tyler, were charged with murdering a gay couple, Gary Matson and Winfield Mowder, and with involvement in setting fire to three Sacramento-area synagogues. The police discovered boxes of hate literature at the home of the brothers.

    In early 2001, Richard Baumhammers, another Aryan supremacist, shot down six people, all members of minorities, in suburban Philadelphia, inspired by material on the Internet. Tim Haney of the Allegheny County Police Department in Pennsylvania testified that computer records confiscated at Baumhammers’ home indicated his frequent visits to white supremacist Internet sites.

    Michael Brad Magleby burned a cross on an interracial couple’s property. He also visited hate sites prior transmitting this hateful message. In 2002, Michael Kenneth Faust, a  white supremacist who spent several hours a day on the Internet soliciting teens to take his classes on firearm use, shot and killed a teenager.

    More recently, a 22-year-old man Keith Luke murdered two black people, and raped and nearly killed a third, on the morning after Barack Obama was inaugurated as president (January 21, 2009). When he was captured, Luke told police that he intended to go to a synagogue that night and kill as many Orthodox Jews as possible. Luke told the police that he had been reading white power websites for about six months (in other words, from about the time that Obama won the Democratic nomination) and had concluded that the white race was being subjected to a genocide in America. Therefore he had to act. This is a clear-cut case of propaganda translating directly into criminal violence.

    Later the same year, on June 10, 2009, James von Brunn entered the U.S. Holocaust Memorial Museum in Washington DC and opened fire, killing Security Guard Stephen Tyrone Johns before he was stopped by other security guards. Von Brunn, a die-hard white supremacist anti-Semite, was an active neo-Nazi for decades long before the Internet became a viable public platform during the early 1990s. He utilized the Internet to publish his tracts and to spew hatred. Von Brunn ran a hate website called holywesternempire.org and had a long history of associations with prominent neo-Nazis and Holocaust deniers. For a period of time, he was employed by Noontide Press, a part of the Holocaust denying Institute of Historical Review, which was then run by Willis Carto, one of America’s most prominent anti-Semites.

    In Canada, Craig Harrison was found guilty of an assault causing bodily harm to an individual whose race he did not like and was sentenced to two years less a day in jail. Observing the content of messages posted on the Net by him, the Canadian Human Rights Commission concluded that the materials were likely to expose those of the Jewish faith, Aboriginal peoples, francophones, blacks and others to hatred and contempt: “They are undoubtedly as vile as one can imagine and not only discriminatory but threatening to the victims they target”.

    In 2014, The Southern Poverty Law Center (SPLC) published a two-year study that details incidents in which active users on one website, Stormfront.org, murdered nearly 100 people in the last five years. These incidents include: (a) the killing of three Pittsburgh police officers by Richard Poplawski in 2009. (b) Two years later, in 2011, Anders Behring Breivik’s murderous journey in which he detonated a truck bomb in front of a government building in Oslo, killing eight, and then went on a shooting spree in Utoya Island, murdering 69 others. (c) In May 2012, Jason Todd Ready killed four people before killing himself. (d) That same month, Eric Clinton Kirk Newman, also known as Luca Rocco Magnotta, was accused of torturing and dismembering a Chinese immigrant; (e) three months later, Wade Michael Page shot and killed six people at a Sikh temple before killing himself during a shootout with police.

    Q. What practical actions can be taken to counter hate on the Internet and are there any promising initiatives currently underway to tackle this issue?

    Speech v. Speech – This is the favourite American response, espoused by many Internet experts and human rights activists who argue that the way to tackle hate on the Net is by more communication, by openness and by exposing the problem. We need to show that all human beings deserve respect and concern, all have dignity, and that a racially based society negates liberal-democratic values that we all hold dear: pluralism, diversity, individuality, liberty, equality, tolerance, justice. Counter-speech includes expressive support for the targets of hate, highlighting the values of tolerance, pluralism, individualism and respect for others.

    Education – activity at primary and high schools alerting about hate on the Internet; its forms and attractions (music, video games, activities for kids); why racism is logically incoherent, empirically unattainable, anti-democratic and inhumane; why it is harmful; who is targeted; history of hate and the connection between hate and some of the most horrific human catastrophes men inflicted upon other men.

    In the USA, Partners Against Hate, an innovative collaboration of the Anti-Defamation League, the Leadership Conference on Civil Rights Education Fund, and the Center for the Prevention of Hate Violence, offers promising education and counteraction strategies for young people and the wide range of community-based professionals who work and interact with youth, including parents, law enforcement officials, educators, and community/business leaders. In turn, Family Online Safety Institute focuses on making the online safer for kids through the promotion of best practices, tools and education.

    Adopting and enforcing school, university and workplace policies – institutions and organizations should adopt policies that exclude hate and bigotry off and online. They should ascertain that their computers are not used for purposes that are incompatible with these policies. Students and workers should not abuse their time at the education system and at the workplace and exploit the technology that is made available to them to preach hatred against others, or to engage in expressions that contravene and undermine civility and respect for others. Hate is destructive. There is no reason to provide scope for hate speech in schools and the workplace.

    Netcitizenship – the term “Netcitizenship” means good citizenship on the Internet. It is about developing responsible modes of conduct when surfing the Internet which include positive contributions to debates and discussions, and raising caution and alarm against dangerous Net expressions. Netcitizenship encourages counter-speech against hate speech, working together to provide a safe and comfortable virtual community, free of intimidation and bigotry. One example is Wipeout Homophobia (WHOF) which was originated as a response to gay hatred on the Internet. Wipeout Homophobia provides communal support and promotes a vision of a more tolerant and just world. In 2012, this Facebook page had more than 300,000 members and 6 million visitors.

    ISPs’ responsibility – ISPs and web-hosting companies should develop standards for responsible and acceptable practices for Net users. They should adopt clear and transparent hate speech policies and include them in their terms of service. ISPs should also devise friendly and easy-to-use mechanisms for Netusers to report violations of their terms of service. With continued development of technical solutions and innovation and with increased awareness of and adherence to basic Corporate Social Responsibility (CSR) we will assure a certain security level on the Internet, like in any other industry. What is required is more structure. CSR should be part of the web company’s strategy, in the frame of mind of the day-to-day operations. Indeed, CSR is a continuous living process.

    Social media companies have teams of only a few hundred employees to monitor networks of billions of accounts. This is insufficient and it is also irresponsible. Social media companies need to address the problem far more seriously. Each company should have a group of highly-talented software engineers to devise a search algorithm that would flag out a string of words that may indicate that a person is engaged with anti-social and dangerous expressions. Facebook has such a team of specialists to deal with suspected fake identities. Facebook takes this issue very seriously. It is suggested to adopt a similar attitude to combat radical, extremist expressions as human lives are no less significant than fake identities. After flagging a string of violent words, a team of people who monitor social networks will then look at the context and, if they come to believe that the speech is dangerous, they will swiftly intervene, remove the dangerous content and block the extremist from continuing the dangerous activity. By such proactivity, social media companies can save many lives.

    Affecting search engines results — If you Google the words “Martin Luther King”, one of the results you will receive is http://www.martinlutherking.org/, a hate site masquerading as an objective historical source about the American human rights leader. High school students who are asked to conduct research on the life and leadership of Mr King are likely to come across this site. Some of them might think this is a legitimate site, with credible eye-opener information. The Google algorithm used to determine search ranking does not evaluate the accuracy of information thus the site’s high ranking can potentially mislead many users, especially young users who conduct their very first research.

    Google was under pressure to manipulate its search engine so as to boost or reduce websites’ page ranking. The controversy revolved around a clearly anti-Semitic website, http://www.jewwatch.com/, which sometimes was ranked first if you searched the word “Jew”. Thousands of netusers petitioned Google to remove the site.

    Labelling, naming and shaming – Web-hosting companies like First Amendment, Go Daddy and Xanga.com (blog hosting) that are friendly to racial propaganda should be named and shamed.

    International cooperation – In Europe, a continent that suffered a great deal from the horror of hate and bigotry, much less tolerance is afforded to such phenomenon compared to the United States. In 1996, a governmental organization in Germany, Jugendschutz.net, and a non-governmental organization in the Netherlands, Stichting Magenta, were the first organizations in the world to start a dedicated team to address the problems of racism, anti-Semitism, hate against Muslims, gays, and other discrimination or incitement to hatred, each in their own country.

    In 2002, they founded the International Network Against Cyber Hate (INACH) whose vision is the international co-operation between complaints bureaus against discrimination, which allows the sharing of knowledge, the exchange of best practices and coordinated measures against hate speech, promoting respect, citizenship and responsibility, enabling Internet users to exercise their right of freedom of speech with respect for the rights and reputations of others, and to freely use the Internet without experiencing cyber hate. The mission of INACH is to unite and empower organizations fighting cyber hate, to create awareness and promote attitude change about on-line discrimination and to reinforce the rights of all Internet users. INACH monitors the Internet and publishes overviews and reports about the situation in different countries. INACH acts as an umbrella organization for hotlines specializing in racist and hateful content.

    Other notable organizations fighting against hate are LICRA.org and the Dutch Centre Information and Documentation on Israel (CIDI). LICRA is the French International League against Racism and Anti-Semitism (Ligue Internationale Contre le Racisme et l’Antisémitisme). It was created in May 1926 in Paris. LICRA fights discrimination, racism and xenophobia especially as they are manifested on the electronic and print media. CIDI is the Netherlands’ prime source of information about Israel and the Jewish people. CIDI has published instructions explaining how to get anti-Semitic material removed from the Internet. CIDI believes that individual surfers have a responsibility to take action against hate.

    Publishing overviews and reports on a regular basis –- publishing names of hate sites, highlights of their content, their locations, their ISPs, both successful and unsuccessful attempts to curtail their activities.

    Law and adherence to international conventions — On global issues such as hate there is a need for international cooperation to respond to global concerns. As the Internet is an international medium, countries realize the urgency for transnational coordination. The Ministerial Council Decision 9/09 of the Organization for Security and Co-operation in Europe (OSCE) of December 2, 2009, on Combating Hate Crimes calls on the participating States to seek opportunities to co-operate and thereby address the increasing use of the Internet to advocate views constituting an incitement to bias-motivated violence including hate crimes and, in so doing, to reduce the harm caused by the dissemination of such material, while ensuring that any relevant measures taken are in line with OSCE commitments, in particular with regard to freedom of expression.

    Further research may analyse the ways social media apps are used in spreading hate speech, the way modern technologies are exploited to spread hate speech and whether search engines and social networking sites should continue to assist hate groups in their agenda.

    Future research may also compare between the utilization of the Internet to spout hatred to the way the Internet is being utilized to other anti-social groups: criminals, paedophiles and terrorists. There seem to be many commonalities between the modes of operation of these groups. Such comparative studies may help security agencies in the fighting against these phenomena.

  • Sustainable Security

     

    BZ Bushfire smallWhen does a serious environmental problem become a security threat?

    Professor Tim Flannery, a leading scientist and public intellectual in Australia wrote a piece in the Guardian newspaper a few days ago reflecting on the links between climate change and the extreme temperatures and bushfires ravaging Australia at present. He notes that “Australians are used to hot summers. We normally love them. But the conditions prevailing now are something new. Temperature records are being broken everywhere.” What is important for thinking about the security consequences of climate change is that towards the end of the article, Flannery reflects:

    “Australia’s average temperature has increased by just 0.9 of a degree celsius over the past century. Within the next 90 years we’re on track to warm by at least another three degrees. Having seen what 0.9 of a degree has done to heatwaves and fire extremes, I dread to think about the kind of country my grandchildren will live in. Even our best agricultural land will be under threat if that future is realised. And large parts of the continent will be uninhabitable, not just by humans, but by Australia’s spectacular biodiversity as well.”

    Conditions in which large parts of the continent are threatened in such a way would appear to raise some pretty serious questions about Australia’s national security (let alone the human security of those individuals living in areas where agriculture has failed or fires threaten homes and livelihoods). Yet recently a number of commentators have become particularly concerned about the so-called ‘securitisation’ of climate change, largely due to a sense of there being “alarmist views about climate change on conflict risk.” This has led some to argue that rather than helping to raise the profile of the issue in terms of the need for urgent policy change, we in fact now need to “disconnect security and climate change.” According to Professor Betsy Hartmann of Hampshire College, “A fear of imminent doom runs deep in popular culture and, like the grim reaper, stalks the environmental movement.” This, she argues allows “security agencies and analysts” to distract us from feelings of empathy towards those affected by climate change and to instead cause us to fear them and to “turn to the military to protect us.” According to Professor Mike Hulme of the University of East Anglia,

    “What climate change means to us and means to the world is conditioned by what we do, by the way we govern, by the stories we tell. Presenting climate change as the ultimate security crisis is crudely deterministic, detached from the complexities of our world, and invites new and dangerous forms of military intervention.”

    All of this matters as the potential world in which Flannery is imagining that his grandchildren might have to live in is becoming more and more likely the longer multilateral efforts drag on. Richard Haass, the President of the Council on Foreign Relations, when asked to look ahead to the big global governance challengers for 2013 recently stated that: “It is becoming increasingly clear that efforts at mitigation are not just falling short but that the gap between what is needed and what is likely to happen is widening.”

    The whole notion of the ‘securitisation’ of climate change pre-supposes that we get to choose whether climate change is a security threat or not – it emphasises what political scientists refer to as human agency. Of course we can choose to label something as a threat or not (yes, perhaps it may even not be the end of the world if we use the dreaded T word!). But in the face of increasingly extreme weather and related natural disasters (let alone serious discussions about whether states such as Kiribati can survive within their own national borders), it does seem that we can sensibly talk about the security threats posed by climate change in the decades to come regardless of whether we can specifically link particular instances of conflict and climate change in the past.

    The point is that simply because something may pose a security threat does not mean that we have to respond in the traditional way – to throw military force at it. It’s abundantly clear that there is no military solution to climate change and that addressing the problem at source means changing (among other things) the ways we use energy. But that doesn’t mean that our current energy policies are not a fundamental security threat. They are. And why can’t we use better energy policies to ensure our security?

    Ben Zala is a Lecturer in International Politics at the University of Leicester.

  • Sustainable Security

    The significant imbalances in the distribution of aid between different geographical areas in the current Syrian war threaten not only the immediate survival of civilians, but also the future prospects for peace.

    The Syrian crisis counts among the direst of our times, and never has there been a humanitarian emergency reaching comparable volumes of assistance. Formerly a relatively prosperous middle income country of about 21 million people, more than five years of war have plunged Syria into staggering poverty. Having lost their livelihoods, 13.5 million people are dependent on humanitarian aid.

    Irrespective of International Humanitarian Law (IHL), belligerents have targeted residential areas and vital infrastructure such as water and electricity supplies, as well as medical facilities. In a desperate effort to survive, half the country’s population have been forced to leave their homes, not knowing whether they will ever be able to return. Of these, 4.8 million have crossed the borders as refugees, while a further 6.1 million people remain uprooted within the country.

    While humanitarian assistance such as food and water, shelter, and medical aid are indispensable, it is deeply problematic that the distribution of aid in different areas in the country is highly uneven. Needs are estimated to be greatest in territory controlled by opposition forces – yet it is here that least aid is being delivered. In 2015, for example, only 27% of World Health Organisation administered medical aid reached opposition areas, as did the same share of food aid delivered by the World Food Programme only last month. Under the umbrella of the UN, both are the biggest humanitarian actors in their fields. Why are these imbalances occurring, and why are they critical for future peace negotiations and reconstruction?

    The Syrian war

    In Syria, the multitude of armed groups, estimated to number several hundred, complicates the distribution of aid as much as the fact that the country is now engulfed in not one, but two wars. Since 2011, civilians have been caught up in the original conflict between the regime and opposition groups seeking a change of government. But another battle is being fought between these opposition groups and Daesh, which proclaimed the establishment of their so-called Islamic State in July 2014. In areas controlled by the latter, the US-led international alliance is attacking Daesh positions across Syria and Iraq, while the Syrian and Russian air forces target other opposition-held areas.

    Given that the presence of armed groups, their alliances and infighting differ significantly at the local level, humanitarian actors are thus operating in a highly fragmented terrain that requires often daily negotiations and re-evaluation of safety concerns for their own staff.

    An aid system controlled by the government

    eu-aid

    Image credit: IOM Iraq/Flickr.

    To some extent, aid imbalances occur in war zones anywhere in the world. Generally, humanitarian aid can only be delivered when belligerents grant aid organisations permission to access people in need and guarantee for the security of their staff. Syria is exceptional, however, in the severity and persistence of aid imbalances. Although belligerents on all sides have interfered with aid deliveries, the Syrian government still controls about half the Syrian territory, thus presenting the single largest threat to impartial aid. By claiming to uphold Syrian sovereignty, it has quietly retained tight control over the aid system in place.

    Only 17 INGOs are permitted to operate in designated areas of the country with limited reach, and their choice of local partners is limited to NGOs licensed by the government. Even after more than five years, the UN are still not allowed to carry out needs assessments in the country independently of the government, and they have remained obliged to issue the annual Syrian Humanitarian Response Plan (SHARP) – which is the basis for planning and monitoring the response each year – jointly with them. Even if convoys are approved for deliveries into opposition areas through rapidly changing bureaucratic procedures which can stretch over months, they are regularly stripped of surgical equipment and even delivery kits at government checkpoints.

    Contravening the Hippocratic Oath and IHL, anti-terrorism legislation has rendered the medical treatment of anyone associated with the opposition a crime since June 2012. Intimidation, arrests and killings of medical staff, such as ambulance drivers, doctors and nurses were common at the beginning of the war, while medical facilities including hospitals, blood banks and coordination centres are regularly being subjected to targeted attacks.

    Horrifying accounts have emerged from those trapped in such conditions, such as in Eastern Aleppo, where the remaining population was evacuated over the past week after years of heavy assault. By designating all opposition-held areas as being controlled by “terrorists” – an expression which is by no means limited to Daesh – the regime has portrayed the populations in these territories as undeserving of aid. In so doing, it puts the lives of millions in need at risk.

    Fear of losing access

    Although the UN have long denounced the blockade of aid to opposition areas as an illicit  war tactic, they have continued to compromise for fear of losing access, which is becoming more and more restricted. Today, 5.47 million live in hard-to-reach areas and 861,200 are trapped in areas under siege in Syria alone. Although, again, it is not only the government conducting sieges, 15 out of 18 areas are currently besieged by its armed forces. Sieges seek to enforce surrender – just as as Darayya did after 2.5 years without aid to civilians. Where humanitarian aid does reach opposition areas, airstrikes by Syrian and Russian government forces destroy residential neighborhoods and carry out targeted strikes on medical facilities, leaving not only wounded fighters, but also civilians without resort.

    Conversely, not only has the government ensured that the vast majority of aid is channeled towards areas under its own control, but it has also used its leverage to strengthen its economy. Citing a lack of alternatives, the UN have paid tens of millions of US-dollars to implementing organisations and suppliers owned or run by individuals associated with the government who are under EU sanctions. These are not legally binding for the UN – yet current practice render them devoid of meaning. All these measures are without consequences for the government.

    A parallel system: the unofficial humanitarian response

    While opposition areas are systemically being deprived of direly needed humanitarian aid, an unofficial response has quietly emerged in parallel to the UN-led response which is co-ordinated with the government through SHARP. Early in the conflict, hundreds of local NGOs and expat-founded NGOs abroad sought to fill the gap the UN-led response left in opposition-held territory. From the conflict’s onset, the government refused to licence local NGOs in these areas, knowing full well that these are indispensable partners for major INGOs, most of whom had no prior experience of working in the country.

    While it is impossible to establish the actual financial volume of the unofficial deliveries, which are not accounted for in the annual SHARPs, they are highly unlikely to reach levels anywhere near that of the official UN-led response. Although Médecins Sans Frontières (Doctors without Borders) warned that since the beginning of the war that opposition-areas were being strongly disadvantaged in life-saving aid, it took three years until UN resolution 2156 was implemented, which allowed for additional cross-border deliveries mainly from Turkey – with deeply insufficient results, as present figures show. If local NGOs are permitted to work with the official response at all, strict monitoring processes are put in place on money spent, and rightly so. In the view of some, however, the recent revelations on UN-suppliers render these requirements into a farce.

    Why do belligerents seek to control aid?

    Where belligerents can ensure access to aid in areas under their own control, a resemblance of normality can be maintained in which former state services are being replaced by external assistance. Before the war, the Syrian government implemented socialist-inspired welfare programmes over the course of decades, including needs assessments, which aimed to maintain political consent even within a highly repressive dictatorship. It is now drawing on humanitarian aid as a substitute. In a similarly systemic manner, Daesh have sought to control humanitarian actors, of which only very few are managing to uphold access and operational independence. In areas controlled by Kurdish forces and different groups affiliated with the Free Syrian Army, aid deliveries are often facilitated and coordinated by the Local People’s Committees or Local Administrative Councils, respectively.

    While these are often credited for their efficiency, they are nonetheless political bodies who should not seek to monopolise aid deliveries for political gain. Belligerents seek to portray access to aid as a testimony to their ability to fulfill basic needs and protect survival. Where they manage to secure regular access to aid, the result is an order which is functional and might appear as either a continuation of the previous status quo or as a credible alternative to the latter. It is that perception which, by blocking aid deliveries to populations in territories under the control of the enemy, is sought to be destroyed with the aim of undermining their respective quest for legitimacy.

    The dangers of Syria’s aid imbalances

    Aid imbalances are dangerous not only because they raise the question as to who is most disadvantaged in receiving aid, but also because other wars have shown that access to social services and aid influence the directions in which people move. Demographic changes are a decisive factor in the outcome of war. From the viewpoint of belligerents, deserted neighborhoods are more difficult to defend because they lower the morale amongst fighters. For civilians, aid imbalances which privilege areas under the control of a given warring party over others deepen existing divides. Populations in areas less reached – especially if imbalances occur over long periods of time – will be physically and mentally weaker, exposed to poorer living conditions, and with comparatively fewer options to reach out for assistance. Violence, and in the Syrian case aerial bombardments in particular, prompt populations to flee; access to life-saving resources influence where they seek refuge.

    In Syria, data on population movements within the country are still scarce, but the key question is whether those who cannot afford to leave the country are drawn from opposition- into government-held areas out of sheer need. If so, the international aid system threatens to not only enhance social fragmentation, but also further depopulation. In a country where a third of the population has been forced to flee, how will peace negotiations allow for their voices to be heard? For those who remain in the country, in which areas are residents still strong enough to engage, where do factories and business remain functioning that can stem the unfathomable project of future reconstruction, and how will the divides that have been deepening for so long now be bridged?

    Future outlook

    With every day passing, the aid delivered contributes to shaping the conditions under which peace will be concluded and reconstruction will begin. Aid imbalances are no new phenomenon, but the scale at which opposition-held areas are being disadvantaged in the Syrian case is. The present war has plunged organisations in the official response into a most severe crisis.

    In an unprecedented decision, 73 local NGOs declared stopping all collaboration with the UN in October this year in protest against their perceived partiality. It has long been argued that in line with IHL, humanitarian aid must be carried out independently and it must be neutral and impartial in intent, but it is inevitably political in effect. In the Syrian war, however, humanitarian aid has become politicised to the point that it may severely impact on the outcome of the war.

    The idea that delivering some aid is better than no aid at all thus represents a dangerous approach. Although slow progress has been made in raising awareness of government interference over the course of this year, the struggles of the unofficial response in opposition areas in particular remain underestimated and underreported. With added pressures resulting from chronic shortages of funding, humanitarian organisations on all sides are caught up in having to reach as many recipients as possible – regardless of where they are located – to meet donor expectations. As a result, there is little room for self-critical reflection, and internal divides on the present responses remain largely invisible for the public.

    In contrast to these trends, concrete measures to counter present imbalances are urgently required. These could mean greater numbers of aid drops — similar to those recently resumed in Dayr al-Zur — in areas under siege, hard-to-reach areas, and others where ground access cannot be secured. They also require a coherent approach which does not tolerate interference by any warring party – including the government. For cases where belligerents insist on unacceptable compromises, protocols are needed which allow for humanitarian deliveries to be stopped as result.

    If it comes to a point where these measures are being taken, it must be clear that responsibility does not lie with the humanitarian system, but the warring party refusing to abide by the very principles on which humanitarian aid  is based. Addressing these challenges remains an indispensable condition for ensuring even and fair access to humanitarian aid for those in dire need now, and for their prospects of living in the country in the future.

    Dr. Esther Meininghaus is a Senior Researcher at the Bonn International Center for Conversion. 

  • Sustainable Security

    This week marks the 69th anniversary of the Hiroshima and Nagasaki bombings, still the only two cases of nuclear weapons use. On these dates each year the media reminds the wider public about the destructive power of these inhumane weapons. The ‘humanitarian dimension’ initiative highlighting the consequences of nuclear weapons is evolving and consolidating itself in the non-proliferation regime. It has been shining a bright and constant light on the catastrophic consequences of nuclear weapons use – whether accidental or deliberate – at multilateral fora on nuclear weapons policy since the last Nuclear Non-Proliferation Treaty (NPT) Review Conference (RevCon) in 2010.

    The initiative has held two international conferences, hosted by Norway and Mexico, addressing issues relating to the impact, consequence management, and risks of nuclear weapons detonation (March 2013 in Oslo and February 2014 in Nayarit). At these conferences, the powerful testimony of the hibakusha (Japanese witnesses to nuclear bombing) served as a solemn reminder of the physical and psychological long-term effects for these survivors.

    The five nuclear weapons states (NWS or P5) under the NPT – China, France, Russia, UK and US – boycotted the first two of these international conferences. The third international Conference on the Humanitarian Consequences of Nuclear Weapons will be held in Vienna on 8-9 December 2014. Below are five reasons why the P5 should consider participating in some capacity in the Vienna conference.

    1. To improve atmospherics before the 2015 NPT RevCon

    The P5 have a vested interest in a smooth and “successful” 2015 NPT RevCon, to be convened at the UN in New York next May. After all, the NPT has conveniently served their security interests by limiting horizontal nuclear proliferation whilst designating them as the only recognized NWS. As various non-nuclear weapons states (NNWS) stressed at the April-May 2014 NPT Preparatory Committee (PrepCom), patience is running incredibly thin with the NWS and the credibility of the regime is in question. Some states starkly warned that a roll-over of the 2010 NPT RevCon Action Plan will not be acceptable at the 2015 NPT RevCon.

    So the pressure lies heavily on the P5 to engage – or at least to show a willingness to engage – more genuinely with the demands of the NNWS towards addressing disarmament commitments. One simple way to improve atmospherics in the regime would be engagement and participation in the Vienna conference by at least some of the NWS. The most detrimental behavior to the regime would be a repeat of the cartel-like approach to decision-making on participation at the Vienna conference by the P5. Such P5 solidarity, as was evidenced in bloc P5 decision-making vis-à-vis the Oslo conference would almost certainly have negative implications for the 2015 NPT RevCon.

    1. To encourage NNWS to affirm humanitarian concern as a non-proliferation pledge

    The active reaffirmations of abhorrence and concern with the catastrophic consequences of nuclear use by NNWS are of positive benefit as commitments both to disarmament and non-proliferation. These formal declarations and affirmations by states parties in the NPT review process and in the UN General Assembly can serve as confidence-building measures. Such declaratory statements could be construed to be affirmations akin to the Iranian fatwa against the development of nuclear weapons. Such formal statements in multilateral diplomatic fora could indeed serve to confirm the declaratory views of states in regard to nuclear weapons.

    1. To engage the non-NPT nuclear-armed states

    Given the cross-regional and cross-grouping support for the humanitarian initiative within both the NPT review process and the broader non-proliferation and disarmament regime, the initiative could help to forge new dialogue channels for the regime. As evidenced by India and Pakistan’s participation in the Oslo and Nayarit conferences, such fora, separate from the NPT review process, can include engagement of nuclear-armed non-NPT states on issues and dialogue relating to nuclear weapons in the broader non-proliferation and disarmament regime.

    Given the continued deadlock at the Conference on Disarmament (CD) in Geneva, processes such as these conferences can circumvent the current stalemate in the CD and facilitate dialogue on these salient issues away from the formal confines and political stages of Geneva and New York.

    1. To showcase consequence-management capabilities

    The five NPT NWS could contribute to the humanitarian impact discussions at the initiative’s conferences by sharing their technical research and insight on emergency and disaster response preparedness and capacity. Then again, these states may find it difficult to participate in conferences which may lead to uncomfortable conclusions about the inability of states or any institution to address the consequences of nuclear use and the associated risks of possession and use. Whilst considering participation options at the earlier international conferences, some NWS apparently suggested narrowing the conference agenda to addressing the consequence management of limited/small-scale nuclear exchanges.

    1. To engage the initiative and attempt to shape the discourse and pathway

    If the P5 wish to shape the discourse and the future aims and agenda of an evolving initiative with increasing momentum and sophistication, they could do so more effectively by participating in its non-binding, non-consensus-reaching international conferences. Not to do so is to miss an opportunity to steer the initiative in or at a more comfortable direction or pace. Whether the momentum and aims of the initiative are now beyond “a point of no return” and heading towards a ban treaty, could be the reality the NWS face.

    One thing is certain, dismissing the initiative and trying to discredit its activities as “diverting” from the P5 step-by-step process will only antagonize those NPT states parties already frustrated by the lack of progress on nuclear disarmament commitments. This would surely make the 2015 NPT RevCon more challenging for all parties.

     

    Jenny Nielsen is a Postdoctoral Research Fellow in the School of Political Science and International Studies at the University of Queensland. Previously, she was a Research Analyst with the Non-proliferation and Disarmament Programme at the International Institute for Strategic Studies (IISS), a Programme Manager for the Defence & Security Programme at Wilton Park, and a Research Assistant for the Mountbatten Centre for International Studies (MCIS) at the University of Southampton, where she co-edited the 2004-2012 editions of the NPT Briefing Book.

    Featured Image: Aftermath of the 6 August 1945 nuclear bombing of Hiroshima. Source: Wikipedia