Security and Military Power PDF
Document Details
Uploaded by EvocativeTaiga
University of North Georgia
Tags
Summary
This presentation covers different dimensions of security, exploring concepts like the objective and subjective approaches and the process of securitization. It also examines various security threats such as those associated with climate change, smoking, and nuclear weapons. The material also details military strategies and discusses issues relevant to international relations, such as those related to the different approaches to economic policy.
Full Transcript
Security and Military Power Three Questions of Security Studies Definition of Security Three analytic tools for a security analyst: 1) Conception of security 2) Referent object of security 3) Security sectors Definition of Security ...
Security and Military Power Three Questions of Security Studies Definition of Security Three analytic tools for a security analyst: 1) Conception of security 2) Referent object of security 3) Security sectors Definition of Security Security is about protecting the survival of someone of something (referent object of security). The more the survival of a referent object is at risk, the more that referent object is under security threat. Definition of Security The referent object of security is the answer to the question of ‘whose security?' Individual Society State Environment Definition of Security Main components of security issues: existential threats against a referent object urgency of the issue application of extraordinary measures to deal with the threat Three Questions of Security Studies Conception of security is the answer to the question of How do we know if something is a security threat? Deaths in US Deaths due to Unintentional Falls: 44,630 deaths in US per year. Number of Deaths due to smoking: 480,000 deaths each year in the United States Number of Deaths due to second-hand smoking: 40,000 deaths among nonsmoking adults and 400 deaths in infants each year https://www.cdc.gov/nchs/fastats/accidental- Deaths to Smoking https://www.cdc.gov/tobacco/about/index.html Cigarette smoking and secondhand smoke exposure cause more than 480,000 deaths each year in the United States. This is nearly one in five deaths. Secondhand smoke exposure contributes to over 40,000 deaths among nonsmoking adults and 400 deaths in infants each year https://www.pewresearch.org/short-reads/2023/04/26/what-the-data-says-about-gun-deaths-in-the-u-s/ https://www.start.umd.edu/pubs/START_AmericanTerrorismDeaths_FactSheet_Oct2015.pdf Three Approaches (Conceptions) to Security Objective approach to security Subjective approach to security Discursive approach to security Three Approaches (Conceptions) to Security Objective conception of security: Security issues exist independently for us to discover. Therefore, security is achieved in the absence of concrete threats. Stockholm International Peace research Institute Stockholm International Peace Research Institute (SIPRI) https://www.sipri.org/sites/default/files/2024-04/2404_fs_milex_2023.pdf Three Approaches (Conceptions) to Security Subjective conception of security: Not all the threatening things are important equally. We care about those threatening things that we are afraid of them. Therefore, security is the absence of fear. Federation of American Scientists https://fas.org/initiative/status-world-nuclear-forces/ https://www.armscontrol.org/factsheets/nucleartesttally Discursive Approach to Security Security issues are constructed and framed rather than existing independently for us to discover. Security issues are created via a process called securitization. Securitization process 1) a securitizing actor attempts to convince a 2) relevant audience about 3) an existential threat to 4) a referent object 5) If the audience accepts the securitizing actor’s argument, the issue will be elevated to the level of security issues. This elevation opens the door for the securitzing actor to use extraordinary measures to address the security threat. Impact of a Successful Secuirtization What happens when a Securitizing actor is successful in convincing an audience that something is threatening a referent object? It can go beyond laws, and usual norms and use extraordinary measures: Wiretapping almost everyone Putting people under mandatory lockdowns Is COVID a Security Issue? https://www.youtube.com/watch?v=Y-7tLkxpt44 https://www.youtube.com/watch?v=ZNIhx5kx-VI https://coronavirus.jhu.edu/region/russia https://coronavirus.jhu.edu/region/Japan https://covid19.who.int/ data Date_reported Country Cumulative_deaths 2023-11-09 Japan 74694 2023-11-09 Russian Federation 400256 Discursive Conception of Security In order to consider something/someone as a security threat to a referent object, those perceived threats do not necessarily need to have the capacity to harm. The perception is enough. Discursive Conception of Security Not all things that harm referent objects may be considered security threat. Like smoking Cigarette smoking causes more than 480,000 deaths each year in the United States. This is nearly one in five deaths. https://www.cdc.gov /tobacco/data_statistics /fact_sheets/health_effects /tobacco_related_mortality /index.htm Three Questions of Security Studies Definition of Security Three analytic tools for a security analyst: 1) Conception of security 2) Referent object of security 3) Security sectors Three Questions of Security Studies Military sector Environmental sector Political sector Economic sector Societal sector Cybersecurity sector Geopolitics “Geopolitics.” Merriam-Webster.com Dictionary, Merriam-Webster, https://www.merriam-webster.com/dictionary/geopolitics. Accessed 17 Nov. 2021. a study of the influence of such factors as geography, economics, and demography on the politics and especially the foreign policy of a state Military Security The military sector is mainly concerned with addressing internal and external military threats to states. Examples of internal threats: Separatist movements; Terrorist organizations; Militant drug cartels Examples of external threats: Occupation by other states; Loss of territory or resources to foreign actors Military Security States allocate resources to their land, naval, air, and nuclear forces to achieve military security. One could argue that other tools of military power are effective in as much as they support the land power missions. Victories at sea, air, or space are significant if they have an impact on what is occurring on land. Navy Alfred Thayer Mahan: a 19th-century American naval officer and historian Sea power is crucial for a nation's greatness Control of key maritime trade routes Interdependence of naval strength and a strong economy Key Naval Routes Suez Canal Strait of Hormuz Strait of Malacca Panama Canal Bab-el-Mandeb Strait Bosphorus Strait and Dardanelles Strait Strait of Dover Strait of Gibraltar https://www.youtube.com/watch?v=h2M6lbuhQrE https://www.businessinsider.com/map-shows-extent-of-undersea-internet-cables-that-russians-could-cut-2017-12 Undersea Cable https://www.youtube.com/watch?v=7Koyi- MuEY8 https://www.youtube.com/watch? v=VVJlKJi9FWU Navy Blue water: the oceanic, reaches farthest from land Green water: oceanic littoral Brown water: comprises rivers, bays Air Power The air force is used for control of the skies, support of ground forces, strategic bombardment, air transport, reconnaissance, and air defense. The advantage of airpower over land and naval power is that it can bypass the enemy’s navy and army and get to places where land and naval forces usually cannot reach. Nuclear Weapons Strategic nuclear weapons are delivered via long-range delivery systems, and their primary use is to attack the war-making capabilities of the enemy, including the military and industrial centers. Tactical nuclear weapons, on the other hand, are short-range nuclear weapons for attacking military forces of the enemy on the battlefields. Nuclear Triad Bombers, Ballistic missiles, Submarines. https://www.youtube.com/watch? v=_lDWzMd0qGo Nuclear Triad Nuclear-capable bomber planes can be used as a visible show of nuclear force. Nuclear-capable submarines are the most survivable of the three types of vehicles. Ballistic missiles (ICBMs) can be deployed promptly. Hypersonic missiles https://www.youtube.com/watch?v=rcZwk9hmC N8 Military Strategies annihilation strategy dislocation strategy attrition strategy exhaustion strategy deterrence strategy coercion strategy Military Strategies The main goal of the annihilation strategy is to destroy an enemy’s material strength by defeating it in a decisive battle. A dislocation strategy is mainly about the war of movement, or maneuvering, and achieving victory through knocking an adversary off- balance psychologically. Military Strategies When a state adopts an attrition strategy, its primary goal is to destroy an enemy’s physical capacity to fight. The exhaustion strategy targets the enemy’s willingness to fight. Military Strategies Deterrence strategy is when states dissuade others from changing their policies. The main goal of coercion strategy, or compellence, is to persuade an adversary to change its policy, either through show of force or limited use of force. Deterrence Telling the adversaries that you are willing and able to both inflict pain and endure pain. Environmental Security Disruption of ecosystems, such as climate change and deforestation https://www.youtube.com/watch?v=G4H1N_yXBiA Population problems, such as the question of sustainable development Food problems, such as loss of fertile soil Economic problems due to global sea level rise Environmental damages, such as the impact of use of depleted uranium on the environment Energy problems like the problems of nuclear waste Economic Security The economic security sector is about protecting access to markets and resources, financial stability, and trade. Approaches to the economic security: Mercantilism: views international economic transactions in zero-sum terms and advocates government intervention in the economy to increase the state’s wealth Liberalism: Limited government interference in economy Political, Societal and Cyber Security Political security discusses non-military threats to a state’s internal and external sovereignty. Societal security is about protecting the identity and cohesion of societies. Cyber security is about reducing the insecurity of the physical and virtual aspects of cyberspace.