dev_gefcoral_org

    • Sample Page

Blog

  • Partnerships for Preventing Online Radicalization

    Authors’ Note: The opinions expressed by the writers are theirs alone and not necessarily those of the United States government or any of its departments.

    As a response to the attacks by violent extremists around the world, policymakers have invested considerable effort into comprehending terrorists’ use of the Internet and initiating counter-measures.

    The internet is undeniably an important factor in understanding the radicalization trajectories of many violent extremists. A senior official at the U.S. Department of Homeland Security recently observed that extremists’ “deft use of Internet propaganda, together with that content’s wide availability, has broadened the population of potentially vulnerable individuals, and shortened the timespan of their recruitment.” Supporting this statement, terrorism expert Magnus Ranstorp lists social media as one of nine factors that may exacerbate causes of an individual’s radicalization, including individual and social factors as well as cultural and ideological motivators.

    Research has also shown that the internet facilitates both early engagement with violent ideologies and opportunities for learning and sharing criminal information. For instance, a study by the University of Maryland’s START terrorism consortium found that “the internet played a primary or contributing role in the radicalization of 86%” in the cases of over 200 U.S.-based foreign fighters. These individuals used the internet to “view extremist materials, research conflicts, groups and attack methods, and participated in online communities of like-minded individuals.” Moreover, results from the same dataset show that the internet “may be speeding up the radicalization timeframe” as compared to radicalization before the advent of the internet. Similar findings from a study of over 200 terrorist offenders in the United Kingdom found that 54% of the perpetrators used the internet to learn about their intended criminal activities and, in 44% of the cases, extremist media (e.g., videos, audio lectures and photographs) were found, viewed, or downloaded by the perpetrators.

    The authors of the UK study, however, recognize that terrorists’ use of the internet “is perhaps unsurprising given the ubiquity of Internet usage in the most benevolent activities across wider society.” Indeed, a good deal of research has examined terrorists’ expansive use of the internet, such as the terrorist organization known as the Islamic State of Iraq and Syria (ISIS) to build a network of ideological conformity through social media platforms like Twitter. A report from the Institute for Strategic Dialogue has shown not only how life under the Islamic State is romanticized through social media postings, but also how important digital connectivity can be to those in the field, describing young women in ISIS controlled territory who resort to “climbing pine trees to gain Internet reception.”

    Countering extremism online

    Image credit: Andres Eldh/Flickr.

    These studies shed light on the particular ways that terrorists use the internet and underscore the importance of law enforcement intervention into online criminal activities. However, an ongoing challenge for researchers and policymakers engaged in preventing and countering violent extremism (CVE) is how to proactively address the role of the internet and social media in the context of violent extremism before criminal activity has occurred. To respond to that challenge, two broad policy approaches have emerged.

    One approach advocates for online content removal and account suspension in order to reduce the supply of non-criminal but potentially extremist content. The European Commission recently instituted content-flagging mechanisms modelled after an initiative by the British government’s Counter Terrorism Internet Referral Unit. Outside of government, technology companies also have taken steps to remove terrorist content. In December 2016, social media companies announced their own cooperative efforts to use hashing techniques to quickly identify and take down extremist images and content that violate terms of service agreements. In their latest annual transparency report, Twitter suspended around 636,000 accounts between August 2015 and December 2016 for promoting extremist content.

    Research studies that have assessed whether content removal and account suspension efforts work to curb the propagation of violent extremist messages suggest promising outcomes. For instance, a report from the George Washington’s Program on Extremism found that “over time, individual users who repeatedly created new accounts after being suspended suffered devastating reductions in their followers.” While ISIS users quickly learn how to overcome account suspensions and restore some followers, the study suggests these actions to reestablish followers have only “limited benefits” once a suspension has occurred.

    Yet, as technology companies like Twitter, Microsoft, and Facebook become more effective at detecting extremist content with tools that recognize unique “fingerprints” of extremist content, terror groups have also become more agile in how they use the internet to facilitate their work. Terrorism researcher Audrey Alexander describes how attempts to limit terrorist content online have pushed extremists away from public platforms and to encrypted tools like WhatsApp, Telegram, and ProtonMail. Indeed, Telegram now “appears to be the top choice among both individual jihadists and official jihadist groups.” The covert nature of these platforms poses significant barriers to researchers and authorities seeking to understand, track, and measure the terrorist threat.

    Another method for combatting online violent extremist content suggests creating counter narratives to refute terrorist claims. The idea is to craft messages that will appeal to vulnerable individuals to persuade them that violence is not the answer.  To explore this approach, the U.S. government has sponsored an initiative along with support from Facebook that known as the Peer to Peer: Challenging Violent Extremism program to engage young people, who may be most vulnerable to violent extremist messages, to create credible counter message for their own peers. Since the program launched in 2015, over 5,000 students have taken part. The 2016 winning team from Rochester Institute of Technology developed an awareness campaign called “Ex-Out Extremism” to “open people’s eyes” to violent extremism and to encourage them to take a stand against it. While initiatives like Peer to Peer typically reach broad audiences, foster educational engagement and increase public awareness, researchers have pointed out that continued work is needed to understand what can inoculate or prevent radical ideologies from taking root in the first place.

    A more targeted approach for reaching at-risk individuals online has been piloted at Jigsaw, Alphabet’s technology incubator focusing on geopolitical challenges, to redirect users from ISIS propaganda to curated YouTube videos that credibly debunk ISIS recruiting themes. Similarly, the Institute for Strategic Dialogue conducted a pilot study to direct individualized online intervention services to those demonstrating affinity to violent extremist groups through their online activities. The results found that intervention messages that reached at-risk individuals were “highly likely” to cause behavior change, either by prompting radicalizing individuals to change their privacy settings or to send direct messages to the intervenors for more engagement.  While these results are based on a very small sample, directed intervention programs may offer options for providing “off ramps” to individuals at critical points.

    The value of partnerships

    Whether intervening online to remove content and suspend accounts or developing credible counter messages or intervention options, effectively addressing violent extremism will require innovative partnerships inside and outside government.  To this end, in 2016 the United States government launched an interagency task force to address countering violent extremism with representation from both security and non-security agencies along with engagement from civil society groups.  While these multidisciplinary partnerships are challenging bureaucratically, they underscore the need for developing networked approaches to emerging security challenges. Similar cooperative agreements might span across national boundaries, not only for the purposes of information sharing between law enforcement officials, but also to include cooperation, such as the recent announcement by the Netherlands and Kenya to build a comprehensive partnership around a range of security related issues including deradicalization efforts.

    Although some have suggested that there is little evidence that terrorism prevention works, there is a small but growing literature providing support for the application of prevention science to the problem of violent extremism. Without question, more attention is needed for rigorous assessment of these programs, especially with regard to evaluating the effectiveness of online campaigns. To fill this gap, the RAND Corporation recently released an evaluation toolkit for countering violent extremism, which includes guidelines for assessing programs’ social media metrics. The London-based Royal United Services Institute has published a guide to CVE program design and evaluation, which provides guidance for articulating relevant impact measures. Ultimately, these resources, coupled with innovative public and private sector partnerships, will contribute to preventing radicalization to violence both online and offline.

    Tackling online radicalization will undoubtedly be a major security priority for policymakers in the future. Following the deadly May 22, 2017 bomb explosion in Manchester, leaders of the G7 convened in Taormina, Italy to reaffirm their efforts to counter terrorism and violent extremism.  In a statement, members underscored several areas for continued engagement, not only through traditional counterterrorism measures like “knowledge-sharing” and cutting off “sources and channels of terrorist financing,” but also through technology sector engagement “to substantially increase their efforts to address terrorist content” and well as civil society engagement to promote “alternative and positive narratives rooted in our common values.” The future war against online extremism may prove to be a long and difficult one, but it is a fight that must be won.   

    Dr. Susan Szmania has served in government and academic positions addressing violent extremism.  She is currently a senior research analyst at the U.S. Department of Homeland Security in the Office for Community Partnerships.  In this capacity, she leads the research and analysis line of effort on the U.S. government’s interagency Countering Violent Extremism Task Force.  Prior to this work, Dr. Szmania was a senior researcher at the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism, and she served in government positions at U.S. Embassies in Sweden and Spain to implement programs to counter violent extremism. She received her Ph.D. in Communication Studies from the University of Texas at Austin in 2004.

    Matthew Conway has served in various research capacities focusing on conflict and extremism, both independently and with two London-based think-tanks. He is currently a research adviser for the Department of Homeland Security’s Office for Community Partnerships, where he focuses on Countering Violent Extremism research. He received his Master’s in Conflict, Security and Development from King’s College London in 2015 and his Bachelor’s in Political Science and International Studies from the University of Wisconsin-Madison in 2013.

    Share this :

    • Click to print (Opens in new window)
    • Click to share on Twitter (Opens in new window)
    • Share on Facebook (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Tumblr (Opens in new window)
    • Click to share on Reddit (Opens in new window)

    March 2, 2026
  • The Eritrean Refugee Crisis and the Role of the International Community

    One of the leading sources of refugees in Europe is the impoverished east African nation of Eritrea. What role has the international community played in this crisis?

    Eritrea’s relationship with the international community (IC) has always been complicated. Eritreans see the IC’s history with their nation as one fraught with violation, neglect and, perhaps above all else, multiple betrayals. The first betrayal is seen to have taken place during the 1940s decolonisation process when Eritrea, against the wish of its people, was tied with Ethiopia in a UN enacted federal arrangement. The second betrayal occurred when the UN, who sponsored the federal arrangement, looked the other way when the Emperor of Ethiopia annexed Eritrea in violation of the arrangement. This was followed by another betrayal when the IC kept silent during the thirty years Eritrean War for Independence. Yet another betrayal occurred when the guarantors and witnesses of the Eritrea-Ethiopia Boundary Commission abdicated their responsibility to ensure its implementation. The recent imposition of sanctions by the IC on Eritrea added to this feeling of betrayal. All these events have certainly generated a psychology of victimhood among Eritreans and a belief that that the IC have sacrificed the interests of its people for geostrategic interests and politics. The IC’s response to Eritrea’s refuge crisis represents the latest chapter in this history of betrayal.

    This article argues that both the actions taken and those not taken by the IC contributed to the refugee/migration crisis in Eritrea. The actions taken included imposing sanctions and a concerted effort to isolate the country, while actions not taken include failure to implement a binding and final verdict of the International Court of Arbitration.

    Causes of the Exodus from Eritrea

    In recent years, the world has witnessed an unprecedented flow of people from Eritrea. The exodus, which has picked up momentum is the outcome of several factors that have been accumulating over the years. Relative to its population size, Eritrea has produced the largest flow of refugees/migrants in the world. What is driving people to leave the country in such large numbers? There are multiple causes of the exodus.

    • The no-war no-peace situation
    • The implementation of indefinite national service
    • A harsh political environment
    • Major economic difficulties such as mass unemployment
    • A lack of future opportunities and prospects for the country’s youth
    • The imposition of sanctions
    • A blanket asylum provision by host countries

    The rejection of the International Court of Arbitration verdict on the border issue by Ethiopia generated a no-war no-peace situation. The peace agreement was supposed to lead to peaceful coexistence between the Eritrea and Ethiopia. This no-war no-peace situation created constant tensions, a fear of an outbreak of war, and occasional engagement between the armies of the two countries along their common border. This means Eritrea has had to put itself in a constant state of high alert. It also compelled the Eritrean governement to extend its national service indefinitely. The majority of capable labour forces in the country are therefore tied to the national service system. Consequently, the economy suffered immensely because of a lack of a sufficient labour force. The youth who are in the national service have to pay a high price. They do not get proper salary; and they are not able to pursue a normal social and working life which could include education, building and supporting family, accumulating wealth, etc.

    The political environment has also hardened considerably. The country has been under an undeclared state of emergency since 2000. Gradually, the political climate became more authoritarian and less plural: political opposition was not tolerated; deviant views and political differences were perceived as dangers to national unity, stability and survival. Therefore, dissidence was harshly dealt with. Many ended up in prison accused of betraying or endangering the security of the nation. The economy, which was slowly recovering from the thirty years of independence war, suffered immensely from the two-year border war (1998-2000) between Eritrea and Ethiopia and the no-peace no-war situation. A major part of state budget now goes to military expenses and staggering unemployment overshadows the nation. What was primarily a subsistence economy spiralled down due to a shortage of an able workforce.

    The UNSC imposed sanctions further exacerbated the economic difficulties because they discouraged external investment and other bilateral relations with the wider world, particularly the West. The international community’s policy is geared towards isolation in order to force the Eritrean government to change its policy; however it achieved the opposite effect. Eritrea has been described as “hell on earth” and this was used to justify the blanket asylum provided by European governments. This open asylum policy further attracted a greater number of asylum and refugee seekers, even children who are not affected by the national service appeared at the doors of European countries claiming that they were fleeing from national service.

    Abdication of Responsibility

    The international community, represented by the UN, AU, EU and USA, assumed the responsibility of implementating of the of the EEBC’s verdict which it helped broker. The two-year war between Eritrea and Ethiopia was ended through the signing of the Algiers Agreement in December 2000. The UN AU, EU and USA put down their signatures as witnesses to and guarantors of the agreement. The main provisions of the agreement were:

    (i) The establishment of the Eritrea-Ethiopia Border Commission (EEBC). The EEBC consisting of eminent international judges was mandated to demarcate and delineate the border between the two countries. The EEBC was instructed, “The Commission shall not have the power to make decisions ex aequo et bono” (Article 4(2), Algiers Agreement 2000).

    (ii) That the verdict be final and binding. With regards to guaranteeing the implementation, the Cessation of Hostility Agreement of June 2000 notes, “The OAU and the United Nations commit themselves to guarantee the respect for this commitment of the two Parties until the determination of the common border on the basis of pertinent colonial treaties and applicable international laws” (Article 14).

    This guarantee shall be comprised of measures to be taken by the international community should one or both of the parties violate this commitment, including appropriate measures to be taken under Chapter VII of the United Nations Charter by the UN Security Council (Article 14 (a).

    The EEBC, per its mandate, issued its verdict on 13 April 2002 where it was stipulated to be implemented within a year, but to date it is still awaiting acceptance by Ethiopia. The verdict awarded the flashpoint of the conflict, the village of Badme, to Eritrea. Upon realising the decision, Ethiopia rejected it, calling it illegal, irresponsible and unjust. When the EEBC concluded its work in 2007 and announced that the border was virtually demarcated and the issue closed, the Prime Minister of Ethiopia called it legal nonsense and requested a renegotiation. The witnesses and guarantors, instead of honouring their solemn commitment and invoking Chapter II of the United Nation Charter, opted for appeasement. Indeed, US officials actively and systematically engaged in devising ways of renegotiating the verdict, particularly, Jandyi Frazer, George Bush’s Assistant Secretary of African Affairs, and Suzan Rice, Obama’s ambassador to the UN, who both played an important role in undermining the EEBC verdict.

    Eritrea is of the opinion that the border is delineated and demarcated, and therefore feels that Ethiopia should vacate from the Eritrean territories it illegally occupies. The juxtaposing Ethiopian stance is that the border issue can only be settled through bilateral dialogue, a position that declares the EEBC verdict null and void. Ethiopia has violated UNSC resolutions ordering it to implement the verdict without any consequence. This is because the USA tacitly sides with Ethiopia. Following the footsteps of the USA, the UN, AU and EU remain silent on the issue allowing the festering stalemate to continue with all the consequences effecting the people of the two countries and the region as a whole.

    The International Community’s Double Standards

    N0027571 Life in Eritrea, North Africa, refugee ca

    Image credit: Wellcome Images/Flickr.

    After signing the agreement of cessation of hostility in Algiers, in December 2000, the parties directed their attention to conducting proxy wars. Both governments were actively involved in support of opposition to each other’s government in the hope of weakening or even deposing. In addition, they intervened in neighbouring countries. Somalia became the obvious victim of the proxy war between Ethiopia and Eritrea. While Eritrea ended up supporting Union of Islamic Court (UIC), Ethiopia sided with warlords and the Transitional Federal Government (TFG). Finally, Ethiopia invaded Somalia in December 2006 and vanquished the UIC. This contributed to the emergence of al-Shabaab , a radical Islamic extremist group operating in Southern Somalia.

    Proxy war has become a rule rather than exception in the Horn of Africa. What has also become a rule is the international community (IC), mostly driven by geostrategic interest of the big powers, punishing and rewarding regional actors participating in wars highly selectively. Many scholars have purported that the Ethiopia-Eritrea conflict is the epicentre of conflicts in the Horn of Africa. This means settling the Ethiopia-Eritrea conflict would go a a long way in helping the larger endeavour to settle all the intricate conflicts in the region. In this respect, it will be in the interests, as well as part of the moral, political and legal obligation, of the IC to address the conflict. There is an obligation the IC to be even-handed, objective, neutral and balanced in treating its members. The reality is, however, that the IC practices double standards and its dealing with Ethiopia and Eritrea is a vivid testimony to this double standard.

    Eritrea was accused of supporting al-Shabaab and destabilising the region. But most of the evidence for Eritrea’s involvement ironically originates from Ethiopia. For the last five years, the Somalia-Eritrea Monitoring Group (SEMG), established to check that the sanctions are not violated, has not found any evidence that Eritrea is supporting al-Shabaab, yet the sanctions have not been lifted. As stated, Eritrea supports Ethiopian opposition groups as Ethiopia supports Eritrean opposition groups. Eritrea supported UIC when Ethiopia invaded Somalia. Ethiopia frequently attacks targets inside Eritrea; it openly threatens to depose the Eritrean government, which is against international law. Eritrea violates human rights as does Ethiopia. However, it is only Eritrea that is under UNSC sanctions and being subjected to isolation from the international community. Ethiopia is considered an indispensable ally of the US global war on terror, therefore it is excused of whatever misdeeds. This is a double standard that damages the credibility and integrity of IC, particularly the UN.

    Conclusion

    The no-war no-peace situation created a serious sense of insecurity, tension and instability in Eritrea. This in turn necessitated the implementation of indefinite national service in order to not only to defend the country from Ethiopian invasion, but also to ensure the economic and social survival of the nation. Tying the able-bodied Eritreans to national service deprives the economy of vital labour force. This curtails development. The conflict with Ethiopia triggered a chain of causal factors affecting the refugee crisis: constant fear of war, indefinite national service, economic stagnation, political hardship, and hopelessness compelling people to flee the country. It is understandable that few would wish to live under such circumstances.

    If the international community had honored its responsibility and upheld the implementation of the International Court of Arbitration per its commitment in 2002, the chain of causal factors producing the exodus might have been avoided. By now the relationship between the two countries could have been pacified. It would also meant that the actual international pressure on the Eritrean government would have also been effective, morally defensive and legitimate as opposed to hypocritical. The failure of the international community to put pressure on Ethiopia to implement and uphold the final and binding border verdict affects not only Eritrea, but also the region as a whole and, as the recent development demonstrate, Ethiopia. For Eritreans the current behaviour of the IC is déjà vu, and brings back the ghost they have been trying exoricse for the last seventy years.

    Redie Bereketeab is Senior Researcher and Associate Professor at the Nordic Africa Institute.

    Share this :

    • Click to print (Opens in new window)
    • Click to share on Twitter (Opens in new window)
    • Share on Facebook (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Tumblr (Opens in new window)
    • Click to share on Reddit (Opens in new window)

    March 2, 2026
  • The Responsibility to Protect and the Refugee Crisis

    The world is witnessing unprecedented forced displacement due to conflict, persecution, and human rights violations. The conflict in Syria has been a major source of this displacement, producing over 7.6 million internally displaced persons and over 4.8 million refugees. The escalation of armed conflict in Iraq since 2014 has also contributed to a dire humanitarian and displacement crisis, and recent data indicate that Iraq is one of the three main origin countries—along with Syria and Afghanistan—for asylum seekers and migrants arriving in Europe. The conflicts in Syria and Iraq have been characterized by mass atrocity crimes including war crimes, crimes against humanity, and possible acts of genocide. As the death tolls and casualties associated with attempts to flee these conflicts continue to rise, the failure of the international community to adequately protect civilian populations targeted by violence underscores concerns regarding the international norm of Responsibility to Protect (R2P). Over ten years after its acceptance by all member states at the United Nations World Summit, the framework for collectively responding to mass atrocities when states have manifestly failed to protect their populations remains weakened by critiques of selective use and by its conflation with coercive humanitarian intervention in the aftermath of its application in Libya. R2P’s association with controversial coercive measures threatens to undermine its legitimacy and overlooks important non-coercive opportunities for implementing the human protection principles that are at its core. In particular, in the wake of mass atrocity situations, facilitating access to asylum and other forms of protection for refugees and displaced persons represents an essential step towards fulfilling R2P.

     Linking the Responsibility to Protect and Refugee Protection

    DFID Syrian Camp

    Za’atari refugee camp, Jordan. Image by DFID via Flickr.

    There are strong foundations for emphasizing R2P as refugee protection. First, the international norm is intended to apply to mass atrocity situations where there is evidence of war crimes, crimes against humanity, ethnic cleansing, or genocide. The refugee crises associated with World War II, the Vietnam War, the Rwandan genocide, and the Balkans conflicts of the 1990s underscore the connection between mass displacement and mass atrocity crimes. International indifference or opposition to collective refugee burden-sharing in these cases frequently resulted in further victimization. In his study of mass killings, Benjamin Valentino argues that greater international response to refugees could have helped reduce the death toll of many of the 20th century’s worst genocides.

    An emphasis on R2P as refugee protection also bolsters the non-coercive and non-violent aspects of the human protection norm at a time when significant criticism surrounding the third pillar of the framework regarding forceful intervention threatens to erode its legitimacy and global consensus. Humanitarian interventions raise concerns about selectivity and often pose significant risks with regard to civilian harm. These risks are compounded by the power asymmetries and realpolitik dynamics that typically characterize coercive interventions. Further associations of R2P with forceful interventions will understandably trigger greater contestations of the norm and undermine the potential for its evolution into meaningful legal obligations. As an alternative to the use of force, states can respond to mass atrocity situations with mechanisms of refugee protection like facilitating access to asylum, granting temporary protection, and upholding the principle of non-refoulement, thus addressing R2P’s call for collective international response in a timely and decisive manner to protect civilian populations and prevent further victimization.

    Allocating Responsibility for Refugees

    While there are robust foundations for connecting the human protection norm to mass displacement and refugee response, the implementation of R2P as refugee protection faces significant impediments both in Europe and the United States. One major obstacle is refugee burden-sharing. The 1951 Refugee Convention and its 1967 Protocol do not specify how, in the face of major refugee crises, states should equitably allocate legal, financial, or physical responsibilities for protection. While states are obligated by the principle of non-refoulement not to contribute to refugees’ harm by returning them to their place of persecution, international law grants states the right to retain control over their sovereign borders. As such, states are not compelled to grant asylum. A related problem is that the existing refugee protection regime relies on post-World War II assumptions that forced displacement is a temporary phenomenon and refugees will be able to return to their country of origin following the resolution of the conflict. Despite data indicating that displacement has become increasingly prolonged, the repatriation of refugees to their home countries remains more heavily promoted than their resettlement or local integration in host countries.

    To date, neighboring states in the Middle East have absorbed the vast majority of refugees fleeing atrocities in Syria and Iraq. This disproportionate burden on states in the region is in line with global trends in the distribution of refugees. Because proximity to place of origin has been a key determinant of distribution, developing countries that can least afford to host refugees have assumed the overwhelming responsibility for them. This inequality in refugee burden-sharing emerges not only due to geographical proximity, but also reflects the increased ability of developed countries to prevent refugees from arriving on their territories. In the ongoing crisis, inequitable burden-sharing is also apparent on a regional level within the European Union (EU), as southern European states have continued to bear the primary responsibility for screening and processing asylum claims. While other EU members have partially shared the burden by committing financial resources to assist Greece and Italy and by hosting some refugees through relocation frameworks, as of November 2015 only three states—Germany, Austria, and Sweden—fulfilled their committed quotas for relocating refugees.   Debates over refugee burden-sharing in Europe have underscored tensions between EU principles and individual member states’ willingness to implement norms of equity in refugee protection.

    While discussions of refugee burden-sharing have largely focused on capability—that is, states’ relative capacities to assist refugees based on factors like economic development, population, and territorial size—the criteria that ought to govern the allocation of refugee responsibility remain ambiguous. The EU plan for distributing asylum seekers approved in September of 2015 utilized economic strength, population, unemployment, and the number of asylum applications approved in the last five years as criteria; however, this resettlement plan has faced opposition from central and eastern European states, and Poland announced that it would not participate. Complicating the task of determining how refugee protection responsibilities should be allocated is the notion that a country’s culpability in the creation of the displacement might also shape its obligations to respond.

    The Securitization of Refugees

    Even if consensus can be reached at the international level regarding principles of equitable refugee burden-sharing, policymakers can increasingly expect resistance from their domestic publics rooted in logics that link refugees to fears of terrorism and perceptions of foreigners as threatening. The implementation of R2P as refugee protection thus faces significant hurdles related to the securitization of asylum seekers—particularly those from Muslim-majority countries—as threats to both national security and cultural values in the United States and Europe. Increased fears of terrorist infiltration via refugee flows have produced calls to round up Syrian refugees and resulted in the U.S. House of Representatives passing H.R. 4038, the American Security Against Foreign Enemies (SAFE) Act. Opposition to refugees at the domestic level has also manifested in arson attacks against refugee shelters in Germany and violence against refugees in France. As refugees are increasingly conflated with migrants, and the current crisis emanates largely from the Middle East, perceptions of asylum seekers have become linked to broader debates about immigration and Islam. In this context, domestic political forces in Europe and the US have framed the refugee crisis in ways that undermine the potential for R2P to be successfully reoriented as refugee protection.

    Navigating these obstacles requires grappling with representations of refugees in social and political discourse, as well as articulating how refugee burden-sharing can serve states’ national interests. Organized and predictable responses for allocating refugee responsibilities could, for example, support greater international stability and reinforce principles of cooperative security. In an increasingly interdependent global environment, fulfilling R2P through refugee protection could arguably compliment counterterrorism policies and contribute to an international protective infrastructure that facilitates better coping with transnational threats and humanitarian emergencies.

    Alise Coen is currently Assistant Professor of Political Science at the University of Wisconsin-Sheboygan, USA. Her article, ‘R2P, Global Governance, and the Syrian Refugee Crisis’ was recently published in the International Journal of Human Rights. She is on Twitter at @alise_coen

    Share this :

    • Click to print (Opens in new window)
    • Click to share on Twitter (Opens in new window)
    • Share on Facebook (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Tumblr (Opens in new window)
    • Click to share on Reddit (Opens in new window)

    March 2, 2026
  • Protected: About us

    This content is password protected. To view it please enter your password below:

    March 2, 2026
  • Protected: About us

    This content is password protected. To view it please enter your password below:

    March 2, 2026
  • VIDEO – Transforming Food Systems in a Global Context

    In this talk for the Food Systems Academy, Paul Rogers puts the challenges of transforming food systems in a global, human security context. He argues that food is at the centre of the third great transition humankind has to go through.

    Running order:

    Part 1. Why 1945?: 0 – 2 minutes 45 seconds

    Part 2. Proxy wars to the end of the cold war: 2 min 45 sec – 5 min 42 sec

    Part 3. The big issues: 5 min 42 sec – 20 min 45 sec

    Part 4.  The third great transition: 20 min 45 sec – 28 min 49 sec

    Part 5 – Looking ahead: 28 min 49 sec – end

    Paul Rogers is professor in the department of peace studies at Bradford University and Global Security Consultant at Oxford Research Group.  He is the author of numerous books including Why We’re Losing the War on Terror (Polity, 2007), and Losing Control: Global Security in the 21st Century (Pluto Press, 3rd edition, 2010). He is on twitter at: @ProfPRogers 

    The Food Systems Academy is an open educational resource aiming to transform our food systems. This video can also be viewed on their website.

    Featured Image: U.S. Army Huey helicopter spraying Agent Orange over Vietnamese agricultural land (Originally from U.S. Army Operations in Vietnam R.W. Trewyn, Ph.D. , (11) Huey Defoliation National Archives: 111-CC-59948, originally found in Box 1 Folder 9 of Admiral Elmo R. Zumwalt, Jr. Collection: Agent Orange Subject Files. – Item Number: VA042084; via Wikipedia)

    Share this :

    • Click to print (Opens in new window)
    • Click to share on Twitter (Opens in new window)
    • Share on Facebook (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Tumblr (Opens in new window)
    • Click to share on Reddit (Opens in new window)

    March 2, 2026
  • VIDEO – Transforming Food Systems in a Global Context

    In this talk for the Food Systems Academy, Paul Rogers puts the challenges of transforming food systems in a global, human security context. He argues that food is at the centre of the third great transition humankind has to go through.

    Running order:

    Part 1. Why 1945?: 0 – 2 minutes 45 seconds

    Part 2. Proxy wars to the end of the cold war: 2 min 45 sec – 5 min 42 sec

    Part 3. The big issues: 5 min 42 sec – 20 min 45 sec

    Part 4.  The third great transition: 20 min 45 sec – 28 min 49 sec

    Part 5 – Looking ahead: 28 min 49 sec – end

    Paul Rogers is professor in the department of peace studies at Bradford University and Global Security Consultant at Oxford Research Group.  He is the author of numerous books including Why We’re Losing the War on Terror (Polity, 2007), and Losing Control: Global Security in the 21st Century (Pluto Press, 3rd edition, 2010). He is on twitter at: @ProfPRogers 

    The Food Systems Academy is an open educational resource aiming to transform our food systems. This video can also be viewed on their website.

    Featured Image: U.S. Army Huey helicopter spraying Agent Orange over Vietnamese agricultural land (Originally from U.S. Army Operations in Vietnam R.W. Trewyn, Ph.D. , (11) Huey Defoliation National Archives: 111-CC-59948, originally found in Box 1 Folder 9 of Admiral Elmo R. Zumwalt, Jr. Collection: Agent Orange Subject Files. – Item Number: VA042084; via Wikipedia)

    Share this :

    • Click to print (Opens in new window)
    • Click to share on Twitter (Opens in new window)
    • Share on Facebook (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Tumblr (Opens in new window)
    • Click to share on Reddit (Opens in new window)

    March 2, 2026
  • Iraq and Syria: The Thirty-Year War, continued

    A version of this article was originally published on Paul Roger’s column on openDemocracy on 11 September 2014.

    Soon after the start of the Iraq war in March 2003, I wrote of the risk of a “thirty-year war” in the Middle East. More than eleven years on – and after thirteen years of the “war on terror” – Barack Obama has now committed the United States to “degrade and ultimately destroy” the Islamic State with “a comprehensive and sustained counter-terrorism strategy”.

    President Barack Obama delivers an address to the nation on the U.S. Counterterrorism strategy to combat ISIL, in the Cross Hall of the White House, Sept. 10, 2014. (Official White House Photo by Chuck Kennedy)

    President Barack Obama delivers an address to the nation on the U.S. Counterterrorism strategy to combat ISIL, in the Cross Hall of the White House, Sept. 10, 2014. (Official White House Photo by Chuck Kennedy)

    This will be a long-term project that goes way beyond Obama’s own second term, and thus his 10 September Address to the Nation may be the most important speech of his presidency. Beyond that, it is likely to be the prelude to two more decades of war – and perhaps even on to that thirty-year timescale.

    The BBC summarises the strategy as Obama outlined it:

    * A systematic campaign of airstrikes against IS targets “wherever they are”, including in Syria;

    * Increased support for allied ground forces fighting against IS – but not President Assad of Syria;

    * More counter-terrorism efforts to cut off the group’s funding and help stem the flow of fighters into the Middle East;

    * Continuing humanitarian assistance to civilians affected by the IS advance.

    The Iraq element of this strategy has already been underway for a month, with at least 154 airstrikes by 10 September.  An initial analysis of the targets attacked shows that the Islamic State paramilitaries are lightly armed, highly mobile and prone to use commercial vehicles for much of their mobility. They have acquired US weapons, not least from overrunning Iraqi army bases, but they use these sparingly. A Breaking Defense analysis suggests that their capabilities would be limited against well-protected and well-armed defenders, but that their versatility would make it difficult for air-strikes to degrade and ultimately destroy them.

    Tip-toeing back into Iraq

    The United States intention is to work with other states, including the Iraqi government and the Iranian (though that is not admitted in public). Also it already has its own substantial forces in the region, primarily air and naval power. The latter includes the George H W Bush carrier battle-group in the Persian Gulf and the USS Cole cruise-missile-armed destroyer in the eastern Mediterranean. The USS Cole itself was an early victim of an al-Qaida-linked operation when it was bombed in Aden harbour in October 2000, killing seventeen American sailors and injuring thirty-nine.

    The US airforce has even stronger forces available: air-bases in Kuwait, Qatar, the United Arab Emirates and Turkey as well as facilities in Jordan. It could also utilise the large UK base at RAF Akrotiri in Cyprus. President Obama has stated that the US operations will differ greatly from the “boots-on-the-ground” wars in Iraq and Afghanistan, with their deploymernt of huge numbers of ground troops. More indicative of what is intended are the operations in Yemen and Somalia, with their heavy reliance on armed-drones, special forces, and aid to local militias.

    In each of these examples, though, early successes have been followed by regroupings of opponents. The Yemeni government is currently struggling to cope with a resurgent al-Qaida in the Arabian Peninsula (AQAP). Al-Shabaab in Somalia may have been excluded from some of the country’s few large urban areas, but it has influence across swathes of countryside as well as regional abilities through to Kenya and beyond.

    In any case, the US secretary of state John Kerry has acknowledged – in a revealing comment at a Baghdad press conference on 9 September – that in extreme circumstances, the United States might commit combat-troops on the ground in Iraq. Indeed, several hundred more US troops are already heading for Iraq, albeit reportedly for defensive purposes only; but special-forces units are likely to be already in the country, many of them involved directly in combat (though again this would never be acknowledged officially).

    In the labyrinth

    All this raises the issue of why the Islamic State’s paramilitary capabilities have come to the fore so rapidly and lethally. It remains a central question. The answer will determine how deeply the US and its coalition partners gets immersed in a new war, and relates quite strikingly to how the United States conducted the previous war in Iraq before the withdrawal of most of its forces in 2011.

    The well-informed Guardian journalist Martin Chulov reports that at the core of the Islamic State’s paramilitary force is a tightly-knit group around its leader Abu Bakr al-Baghdadi. Many of them are Iraqis who fought the American and British special forces in perhaps the most vicious phase of that singularly dirty war, which lasted for three years from late 2004.

    At that time, the US joint special-operations command (JSOC) under General Stanley McChrystal was facing a relentless and capable insurgency inflicting huge US casualties. In response it developed a new form of network-centric warfare focusing on mobile special-force groups that were highly autonomous yet connected in “real time” to a wide range of intelligence capabilities.

    The operation reached its peak in 2005 in the form of Task Force 145 (TF 145), comprising four groups working in four geographical locations around central Iraq. Three of the groups were based on US forces – SEAL Team 6 from the navy, a Delta squadron and a Ranger battalion. The fourth, Task Force Black, was organised around a British SAS squadron.

    The entire JSOC operation was centred on rapid night-raids that killed or captured insurgent suspects. Those captured would often be subject to intensive interrogation (a.k.a. torture) – the results immediately used, sometimes within hours, to prompt further raids. Steve Niva, in his remarkable academic paper “Disappearing violence: JSOC and the Pentagon’s new cartography of networked warfare” in the journal Security Dialogue (June 2013) recounts: “By the summer of 2005, JSOC teams undertook an estimated 300 raids per month, hitting targets every night, eventually turning their focus to suspected local players and middle managers in insurgent networks”. A further valuable source is Mark Urban’s book Task Force Black (2010).

    The learning game

    The full death-toll among the insurgents is not known but believed to be in the thousands. More significant in this context, however, is that many tens of thousands of insurgents were detained by JSOC units and others. Some of them were kept for years in squalid conditions in huge prison-camps such as Camp Bucca, south of Basra – which at its peak had 20,000 inmates. Some of the prisoner abuse came to light at Abu Ghraib, but other centres were engaged as well in straightforward torture (one was the infamous “Black Room” at Camp Nana near Baghdad).

    By 2009, Barack Obama had been elected president in the US and the war began to wind down. Most of the prisoners were released, including the current Islamic State leader, Abu Bakr al-Baghdadi, who may himself have been radicalised partly by his time in Camp Bucca. Nouri al-Maliki, prime minister of Iraq since 2006, was marginalising the Sunni minority. From the Sunni ranks arose a renewed extreme lslamist group in Iraq which developed into the Islamic State, linking increasingly from 2011 onwards with paramilitaries fighting Bashar al-Assad’s regime in Syria.

    The Islamic State is thus part of a long-term evolution of a process that originated in Iraq in 2003, was badly knocked back by McChrystal’s JSOC forces by 2008, but has now re-emerged to provide the hardline core of a revived movement – veterans of urban conflict against well-trained and heavily-armed US troops, marines, and special forces.

    These are people likely to have an intense hatred of the United States and its forces – coupled with a cold ability to avoid that hatred clouding their judgment. They will be people, including Abu Bakr al-Baghdadi himself, who will positively welcome US military action, especially when it extends to the greater use of special forces and the even more welcome possibility of regular troops. These are individuals who survived intense air-attacks and special-force operations for years in Iraq. They will be prepared for what now, following Obama’s speech, is likely to ensue: a new phase in a very long war.

     

    Paul Rogers is professor in the department of peace studies at Bradford University and Global Security Consultant at Oxford Research Group.  He is the author of numerous books including Why We’re Losing the War on Terror (Polity, 2007), and Losing Control: Global Security in the 21st Century (Pluto Press, 3rd edition, 2010). He is on twitter at: @ProfPRogers 

    Featured Image: Iraqi troops run through a smoke screen in Baqubah, central Iraq, 22 June 2007, followed by US troops from the 3rd Stryker Brigade Combat Team. The action was part of Operation Arrowhead Ripper against al-Qaida in Iraq (precursor of Islamic State) as part of the 2006-07 Diyala Campaign. Source: Sgt. Armando Monroig, 5th Mobile Public Affairs Detachment, Tikrit (via Wikipedia)

    Share this :

    • Click to print (Opens in new window)
    • Click to share on Twitter (Opens in new window)
    • Share on Facebook (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Tumblr (Opens in new window)
    • Click to share on Reddit (Opens in new window)

    March 2, 2026
  • Interview – Aidan Hehir

    Tag Archives: R2P

    Interview – Aidan Hehir

    October 6, 2016by SusSec Team

    Aidan Hehir is a Reader in International Relations, and Director of the Security and International Relations Programme, at the University of Westminster. He has published a number of books on […]

    Read Article →

    Interviews, Peacekeeping Challenges and the Responsibility to Protect (R2P), Uncategorized

    Interview – Alex Bellamy

    September 15, 2016by SusSec Team

    Alex J. Bellamy is professor of peace and conflict studies at the University of Queensland. His books include Kosovo and International Society (2002), Security Communities and Their Neighbours: Regional Fortresses […]

    Read Article →

    Interviews, Peacekeeping Challenges and the Responsibility to Protect (R2P)

    Challenges Facing Women in Peacekeeping

    May 5, 2016by Lindy Heinecken

    Author’s Note: This opinion peace is based on research conducted among South African Peacekeepers, published in the Journal of International Peacekeeping, 19 (2015) 227-248. The motivation to increase the number […]

    Read Article →

    Peacekeeping Challenges and the Responsibility to Protect (R2P)

    Intersecting Commitments: the Responsibility to Protect and the Women, Peace and Security Agenda

    April 25, 2016by Sarah Hewitt

    Introduction The acknowledgement of gender issues through the Women, Peace and Security (WPS) agenda marked a watershed moment for women’s rights. Despite this, the Responsibility to Protect (R2P) framework remains […]

    Read Article →

    Inclusive Security, Marginalisation, Peacekeeping Challenges and the Responsibility to Protect (R2P)

    Did Operation Unified Protector in Libya Strengthen R2P?

    April 14, 2016by Benedetta Berti

    The beginning of the Arab Awakening and its mass-based social and political mobilizations has spurred a dynamic debate about whether and how the international community should support and back the […]

    Read Article →

    Peacekeeping Challenges and the Responsibility to Protect (R2P), Uncategorized

    The Responsibility to Protect and the Refugee Crisis

    March 9, 2016by Alise Coen

    The Syrian civil war has has been a major source of displacement, producing over 7.6 million internally displaced persons and over 4.8 million refugees. How does this crisis relate to the Responsibility to Protect?

    Read Article →

    Peacekeeping Challenges and the Responsibility to Protect (R2P)

    Post navigation

    March 2, 2026
  • Myanmar: peaceful transition to democracy or storm clouds on the horizon?

     

    MyanmarPublished last week, Myanmar: Storm Clouds on the Horizon is International Crisis Group’s latest Asia report. It focuses on the potential for political violence and social instability as Mynamar’s leaders are undertaking reforms “to move the country decisively away from its authoritarian past”. For most of the past 50 years, the government of the Republic of the Union of Mynamar (also referred to as Burma) has been under direct or indirect control by the military. Since independence in 1948, the people of Myanmar have suffered civil wars which have mainly been struggles for ethnic and sub-national autonomy. The country has consistently been in the news for human rights violations. Perhaps one of the world’s most well-known political prisoners, the Nobel Peace Prize laureate and opposition politician Aung San Suu Kyi, also chairperson of the National League for Democracy (NLD) was released in 2010 after 21 years under house arrest.

    Thein Sein, current president of Myanmar, has put in place a far-reaching and radical reform agenda. The ICG’s report focuses on what reforms have been achieved and what this may mean for a possible resurrection of violence because “political prisoners have been released, blacklists trimmed, freedom of assembly laws implemented, and media censorship abolished. But widespread ethnic violence in Rakhine State, targeting principally the Rohingya Muslim minority, has cast a dark cloud over the reform process and any further rupturing of intercommunal relations could threaten national stability.” With former political prisoners being released, 2,000 high-profile activists and opposition politicians being allowed to return home, and further liberalization of the media, “social tensions are rising as more freedom allows local conflicts to resurface”.

    The report notes that “The easing of authoritarian controls has created the space for the population to air grievances, the ability to organise in a way that was not possible before, and the opportunity to have a real influence on government policies and decisions” which has led to an “exponential growth in civil society activity”. In order for the transition from authoritarian rule to democracy to be stable, and for peace and security to be sustainable, the government of Myanmar will have to face and resolve major challenges. Widespread militarization and the political and social marginalization (past and present) of ethnic and religious groups will have to be addressed. For example, it has been estimated that the recent 2012 violence between Rohingya Muslims and Rakhine Buddhists in Rakhine State led to an estimated 90,000 displaced people in addition to dozens of casualties. It will not be sufficient to react to past and present violence by allowing more freedom of speech and liberalizing the press. Trying to contain the violence and reducing state repression alone will not address the underlying drivers of insecurity. The government will have to take a sustainable security approach and make great efforts in order to actively address the causes of long-standing grievances. Addressing only the symptoms cannot lead to long-term stability and the rebuilding of trust between communities.

    The ICG offers several options to minimize the risks associated with single party dominance during Myanmar’s political transition. These include changing the electoral system to some form of proportional representation, building coalitions between the NLD and other political parties, and building bridges between the NLD and current president Thein Sein as well as other political forces- particularly the old guard. The ICG recommendations underscore the importance of all parties, and the majority of people, to feel involved in the political process. The marginalization of any political or ethnic/religious groups will most probably lead to further violence and insecurity in the future.

    ICG’s full report and details of the policy recommendations can be read here.

    Anna Alissa Hitzemann is a  Peaceworker with Quaker Peace and Social Witness. She currently works with Oxford Research Group as a Project Officer for the Sustainable Security Programme, with a focus on our ‘Marginalisation of the Majority World’ project.

    Image source: Rusty Steward

    Share this:

    March 2, 2026
←Previous Page
1 … 4 5 6 7 8 … 33
Next Page→

dev_gefcoral_org

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress