Tag Archives: featured

Great Power Cooperation and the Role of International Organizations

Note: Original title of essay: “Great Power Cooperation and the Role of International Organizations and Agreements.”

NAFAC Week

By Emil Krauch

Europe after World War II: cities, towns, and villages completely destroyed, millions displaced and homeless, a silent air of terror and desperation still palpable. Never before had a war been so bloody and gruesome. Everyone suffered, victor and vanquished alike. The results were bleak — civilian deaths outnumbered combatant deaths by a factor of two.1 Those lucky to survive faced a grim post-conflict situation that almost surpassed the war in its direness. Many countries had serious supply issues of food, fuel, clothing, and other necessary items. Never again. Another conflict had to be avoided at all cost.

The atrocities of World War II have led to the creation of a union of countries that is unprecedented in its cooperation and interdependence. I intend to explore the European Union as an international collaboration of great powers, and to make the case for its importance and success.

Cooperation began in 1951 with the European Coal and Steel Community (ECSC).2 It set forth a free trade agreement of certain goods between Belgium, France, Italy, Luxembourg, the Netherlands, and West Germany. To organize and enforce this agreement, the ECSC also created a set of supranational institutions that served as models to later institutions of the EU. In 1957 the ECSC members signed the two Treaties of Rome that went further to not just expand the existing to a comprehensive free trade agreement, but to a real common market. This European Economic Community (EEC) allowed the free movement of goods, capital, services, and people, inhibited internal market advantages, and — most notably — created a common unified ‘foreign’ trade policy. The following Single European Act (1987) and Maastricht Treaty (1993) significantly increased the scope of the Union to non-economic affairs and increased the power of the European institutions. Critically, the power of the directly elected European Parliament was increased. It was also at this time that the small village of Schengen in Luxembourg became known for the named-after agreement that gradually let people travel between EU countries without checkpoints. By the early 2000s more and more countries had joined the Union and many introduced the Euro as their single currency. The last 10 years of EU history can be described as its ‘decade of crisis’ with the failing of the Greek economy, a rise in Euroscepticism, the migration crisis, and the exit of Britain weakening the strength of the Union.

It has left a mark. A recent study coordinated by the European Commission found that only 36 percent of EU citizens “trust the European Union.”3 Many political commentators and the general public appear to agree that the EU “suffers from a severe democratic deficit.”4 Is this really justified?

The EU has has two channels of democratic legitimacy. The first is the European Parliament (EP), elected every 5 years by the population of the member states. The elections are very national affairs, lacking high public participation, where votes on existing national parties are cast, with these parties mostly judged on their performance on national issues. This creates a feeling of disconnect in the general population, the delegates’ successes and failures generally don’t sway the voters when ballots are cast. Stemming from the fact that campaigning in 28 countries of different cultures and languages is very difficult, these problems nonetheless need to be rectified. The second channel is the Council of the European Union which is made up of 10 different configurations of 28 national ministers, depending on subject matter. For example, finance ministers will form the Council when debating economic policy. To pass any proposal, both the Council and the EP have to pass it. Earlier criticisms of a lack of transparency in the Council were remedied in 2007 (through the Lisbon Treaty) by making all legislative votes and discussions of the Council public.5 Laws themselves are drafted by the European Commission (EC). The President of the Commission is selected by the EU heads of state, the 27 other Commissioners are selected by the Council and then either are accepted or not accepted, as a team, by a vote of the Parliament. The members of the Commission have often come under fire by critics, e.g. Nigel Farage in 2014: “ [The EU] is being governed by unelected bureaucrats.”6 In reality the Commission is more of a civil servant, than a government. It does not have the power to pass laws, or act outside the boundaries set by the EP and the Council. Other criticism (e.g it’s role as the sole initiator of legislation) is very credible. On what grounds Mr. Farage calls the Commissioners “unelected” though, can’t be quite comprehended.

Together with the other institutions (mainly Court and Central Bank), the EU therefore represents a group of supranational institutions that have a very democratic, but unique structure due to a cooperation of many culturally different nations; critics have to acknowledge this.

The question that has come up many times during the Union’s existence remains: “What has the EU ever done for us?” For one, it has created seven free trade agreement between the countries of Europe which, most economists would agree, is beneficial to all members of the EU. A recently published paper constructed counterfactual models of European nation’s economic performance, simulating them never having joined the EU.8 The results show substantially better actual performance over the counterfactual models for all member countries, except Greece. The Greek underperformance can’t be explained solely due to the economic crisis of the current era. Greece actually has had a growth rate above the EU average during its time in the single currency, a hasty opening of the uncompetitive domestic market when it joined in 1981, and a lack of structural reform has led to the deficit. Next to the often-noted other benefits of the EU, such as the ability to work and study abroad, the unified action really makes it possible to tackle issues with the necessary vigor that they demand – economic reform, security issues, consumer protection, climate change, justice, and so forth. The problems that exist in the EU today (e.g. migration crisis), wouldn’t disappear if the Union would be dissolved tomorrow. Tackling these problems as a block makes the solutions more transparent, more efficient, and more effective. Criticism of EU red tape must take into account the opposing situation of standalone bilateral agreements between 28 countries.

All of this is not the most remarkable achievement of the EU. One must go back to its origins: great nations with limited resources, at close proximity. The necessity of fighting and winning a war against the evil of Nazi Germany was clear. What arguments of morality did earlier conflicts have? Often there were none. Power struggles between the elites of European countries have plagued the continent for millennia.9 Germany and France have fought four major wars in the last 200 years. Could World War One be initiated as easily in today’s landscape of democratic European countries? Perhaps not. It does show, however, the susceptibility of the European continent to unsustainable nationalistic and expansionist ideas.

This is the greatest achievement of the EU. It has maintained peace between the large and small countries that it envelopes, on a continent that was plagued by war for thousands of years.

Originally from Heidelberg, Germany, Emil Krauch is a second year mechanical engineering student at the ETH in Zurich, Switzerland. He is actively involved in the school’s Model United Nations and Debate Clubs, and will start work as a University teacher’s assistant this upcoming semester. After receiving his Bachelor’s degree, Emil plans to pursue a graduate education in both engineering and business. 

1. Yahya Sadowski, “The Myth of Global Chaos,” (1998) p. 134.

2. European Union, “Overview Council of the European Union,” https://europa.eu/european-union/about-eu/institutions-bodies/council-eu_en (accessed 28.03.2017).

3. TNS Opinion, “Standard Eurobarometer 86 – Autumn 2016,” (2016) doi:10.2775/196906 http://europa.eu/rapid/press-release_IP-16-4493_en.htm (accessed 29.03.2017).

4. Andrew Moravcsik, “In defence of the ‘Democratic Deficit’: Reassessing Legitimacy in the European Union*,” JCMS 2002 volume 40, number 4, (2002) pp. 603-24 https://www.princeton.edu/~amoravcs/library/deficit.pdf (accessed 27.03.2017).

5. European Union, “Overview Council of the European Union,” https://europa.eu/european-union/about-eu/institutions-bodies/council-eu_en (accessed 28.03.2017).

6. Nigel Farage.,“Unelected Commission is the Government of Europe – Nigel Farage on Finnish TV,” MTV3 https://www.youtube.com/watch?v=B1rfNlJMsFw (accessed 28.03.2017).

7. Kayleigh Lewis, “What has the European Union ever done for us?,” Independent (24.05.2016) http:// www.independent.co.uk/news/uk/politics/eu-what-has-european-union-done-for-us-david-cameron-brexit-a6850626.html (accessed on 29.03.2017).

8. Campos, Coricelli, and Moretti, “Economic Growth and Political Integration: Estimating the Benefits from Membership in the European Union Using the Synthetic Counterfactuals Method.”

9. Sandra Halperin, “War and Social Change in Modern Europe: The Great Transformation Revisited,” (2003) p. 235-236.

Bibliography

Arnold-Foster, Mark. “The World at War” (1974).

Campos, Coricelli, and Moretti. “Economic Growth and Political Integration: Estimating the Benefits from Membership in the European Union Using the Synthetic Counterfactuals Method.” IZA Discussion Paper No. 8162 (April 2014) http://anon-ftp.iza.org/dp8162.pdf (accessed 29.03.2017).

Encyclopaedia Britannica. “European Union.” https://www.britannica.com/topic/European-Union (accessed 27.-29.03.2017).

European Union. “Overview Council of the European Union.” https://europa.eu/european-union/about-eu/institutions-bodies/council-eu_en (accessed 28.03.2017).

Farage, Nigel. “Unelected Commission is the Government of Europe – Nigel Farage on Finnish TV.” MTV3 https://www.youtube.com/watch?v=B1rfNlJMsFw (accessed 28.03.2017).

Halperin, Sandra. “War and Social Change in Modern Europe: The Great Transformation Revisited.” (2003) p. 235-236.

Lewis, Kayleigh. “What has the European Union ever done for us?.” Independent (24.05.2016) http://www.independent.co.uk/news/uk/politics/eu-what-has-europeanunion-done-for-us-david-cameron-brexit-a6850626.html (accessed on 29.03.2017).

Moravcsik, Andrew. “In defence of the ‘Democratic Deficit’: Reassessing Legitimacy in the European Union*.” JCMS 2002 volume 40, number 4, (2002) pp. 603-24 https://www.princeton.edu/~amoravcs/library/deficit.pdf (accessed 27.03.2017).

Sadowski, Yahya M. “The Myth of Global Chaos.” (1998) p. 134.

Schneider, Christian. “The Role of Dysfunctional International Organizations in World Politics.” http://www.news.uzh.ch/dam/jcr:ffffffff-d4e5-28e2-0000-000000b8fd0e/Dissertation_ChristianSchneider.pdf (accessed 27.03.2017).

Terry, Chris. “Close the Gap. Tackling Europe’s democratic deficit.” Electoral Reform Society(2014) https://www.electoral-reform.org.uk/sites/default/files/Tackling-Europesdemocratic-deficit.pdf (accessed 27.03.2017).

TNS Opinion. “Standard Eurobarometer 86 – Autumn 2016.” (2016) doi:10.2775/196906 http://europa.eu/rapid/press-release_IP-16-4493_en.htm (accessed 29.03.2017).

Featured Image: European Union member states’ flags flying in front of the building of the European Parliament in Strasbourg, April 21, 2004. (Reuters/Vincent Kessler)

Saving the Lives of Maritime Passageways: The Coast Guard and Maritime Chokepoints

NAFAC Week

By Victoria Castleberry

The need for security of international maritime trade has never been greater as over 90 percent of internationally traded goods are transported via maritime shipping and 70 percent of maritime shipped goods are containerized cargo.1 Most trade vessels are funneled through one or more of six strategic chokepoints around the world: the Suez and Panama Canals, Strait of Malacca, Strait of Bab el-Mandeb, Strait of Gibraltar, and the Strait of Hormuz.2 Perhaps the most unique of these chokepoints is the Strait of Hormuz, and the presence of six 110’ Coast Guard Cutters in its vicinity. Coast Guard presence provides what no other U.S. asset can to this hostile region: provide security without an escalation of arms and the facilitation of transnational cooperation through various interagency programs. Expanding this model of strategic deterrence by increasing the U.S. Coast Guard’s presence internationally, the United States will be capable of protecting our most precious passages, promote international cooperation, and give the U.S. an advantage in determining how the international maritime waterways are governed.

According to the Energy Information Administration, the Strait of Hormuz exports approximately 20 percent of the global oil market and a total of 35 percent of all sea-based trade.3 With such a valuable resource transported through a small area, the necessity of security for this strait is clearly essential to the international market. Unfortunately, tensions within the region are rising and the risk of port closure, piracy, and military interference are all real possibilities that the global market may face when transporting through this region.4 In an effort to counter potential mishaps the United States has already utilized the Coast Guard to provide an authoritative yet non-threatening presence in the Persian Gulf that over time has proven effective.

Currently the Coast Guard spearheads several programs in Patrol Forces Southwest Asia (PATFORCESWA).5 Programs in the region specialize in the training of Coast Guards from around the world to bolster international maritime security cooperation. These programs help to support Article 43 of the United Nations Convention on the Law of the Sea (UNCLOS) agreement which requires user and bordering states to cooperate for the necessity of navigation and safety for vessels transiting.6 This specific call to duty for the user and bordering states by UNCLOS is a mission set specialized by the Coast Guard. The Coast Guard is currently operating in Freedom of Navigation Operations, escorting of military vessels, hosts an International Port Security Liaison Officer program, and possesses a Middle East Training Team responsible for conducting operations in conjunction with foreign militaries.7

As previously stated, the Coast Guard currently offers programs which work toward international cooperation for maritime security. Programs offered in the Persian Gulf include the International Port Security Liaison Officer (IPSLO) program and the Middle East Training Team (METT). These programs act as partnerships between the U.S. Coast Guard and foreign militaries to build up and sustain their own Coast Guards, as well as improve their own port security to facilitate trade between all nations.8 The IPSLO program allows for a “sound foundation from which countries can build their own domestic maritime security system.” This foundation is built through the education and enforcement of the international codes.9 Other programs such as the METT regularly participate in “theater security cooperation engagements with foreign navies and coast guards throughout the region.” These teams focus on teaching other coast guards and navies proper procedure for LE boarding and smuggling interception.10 These are the programs which need support to protect maritime chokepoints globally.

Lieutenant Jared Korn, USCG, was the Operations Officer aboard USCGC Adak, one of the six cutters deployed to PATFORCESWA. When asked about situations experienced while deployed within the Persian Gulf region, LT Korn described instances where Iranian vessels would approach the cutter and eventually depart. LT Korn to explained that in whole, the U.S. Coast Guard is an internationally recognizable symbol for aid, security, and is notably less threatening than a grey-hulled naval vessel within the Persian Gulf region.11

The presence of the U.S. Coast Guard in the Persian Gulf has been an effective tool in deterrence of hostiles within the region. This model can and should be applied to the other strategic chokepoints around the world. In 2014 the Panama Canal was faced with 44 reported piracy attacks, the Suez Canal is similarly plagued with piracy, off the coast of Somalia pirates have collected ransoms for over 10,000 dollars.12 Other strategic chokepoints such as the Strait of Gibraltar, Strait of Malacca, and Strait of Bab el-Mandeb would also benefit from the presence of the U.S. Coast Guard within their regions. Although these regions are not experiencing as severe of a threat to their maritime trade route imminently, prevention-based presence could avoid severe consequences of trade shutdown in these strategic chokepoints. The best way to do this is to grow the U.S. Coast Guard’s patrol craft fleet internationally as well as the training programs which aid in the diplomatic relations and sovereignty of nations’ security.

Although the solution of expanding the Coast Guard’s mission internationally is possible, it does have two potential obstacles. The first obstacle is public perception, the second, asset availability. Public perception of law enforcement today is already at an all-time low. By allowing our only armed service with law enforcement capabilities to shift its mission internationally the United States runs the risk of the American people’s perceptions shifting as well.13 The positive perception by the American people of the Coast Guard is at risk of being diminished due to the perception of war-like actions by our domestic maritime law enforcement. More clearly, however, is the logistics. As the smallest branch of the armed services the U.S. Coast Guard accomplishes its mission set with just a fraction of the assets, personnel, and budget as her Department of Defense counterparts. Expanding the mission set of the Coast Guard will only spread these resources more thin without congressional budgetary aid to gradually build up international forces overseas.

The solution to the problem of securing strategic maritime passageways is a complex one. The solution cannot escalate tensions, must facilitate international cooperation, be non-intrusive, and help bolster nations’ forces. In many of the strategic chokepoints around the world, tensions run high. The necessity for diplomatic operations makes the Coast Guard the best choice to accomplish this mission. Expanding the United States Coast Guard’s assets and programs internationally will allow for these requirements to be met and give the United States a strategic advantage in the control of international maritime security.

Victoria Castleberry is a student at the Coast Guard Academy. She is a junior who studies government and focuses on security studies. She is the varsity coxswain for the women’s crew team. She participates in the cadet musical and was recently a dancer in the musical Footloose.  She has 2 dogs named Ezekiel (Zeke) and McCain (Mac) and grew up in Northern Virginia. She will be stationed in Puerto Rico on the USCGC Richard Dixon this summer. She hopes to become a Deck Watch Officer and drive big white boats somewhere south of the Mason-Dixon Line and attend law school.

Bibliography

Allen, Craig, Jr. “White Hulls Must Prepare for Grey Zone Challenges.” U.S. Naval Institute, November 2016: 365.

Castonguay, James. “International Shipping: Globalization in Crisis.” Witness Magizine. n.d. http://www.visionproject.org/images/img_magazine/pdfs/international_shipping.pdf (accessed March 28, 2017).

Katzman, Kenneth, Neelesh Nerurkar, Ronald O’Rourke, R. Chuck Mason, and Michael Ratner. “Iran’s Threat to the Strait of Hormuz.” Congressional Research Service, 2012: 1-23.

Korn, LT Jared, interview by Victoria Castleberry. Operations Officer CGC Adak Interview (March 29, 2017).

Rodrigue, Jean-Paul. “Stragetic Maritime Passages.” The Geography of Transport Systems. n.d. https://people.hofstra.edu/geotrans/eng/ch1en/appl1en/table_chokepoints_challenges.htm (accessed March 27, 2017).

US Coast Guard. United States Coast Guard. December 12, 2016. https://www.uscg.mil/lantarea/PATFORSWA/ (accessed March 30, 2017).

—. United States Coast Guard. December 21, 2016. https://www.uscg.mil/d14/feact/Maritime_Security.asp (accessed March 31, 2017).

Williams, Colonel Robin L. Somalia Piracy: Challenges and Solutions. Academic Reseach Project, Carlisle Barraks: United States Army War College, 2013.

1.  Castonguay, James. “International Shipping: Globalization in Crisis.” Witness Magizine. n.d. http://www.visionproject.org/images/img_magazine/pdfs/international_shipping.pdf (accessed March 28, 2017).

2. Rodrigue, Jean-Paul. “Stragetic Maritime Passages.” The Geography of Transport Systems. n.d. https://people.hofstra.edu/geotrans/eng/ch1en/appl1en/table_chokepoints_challenges.htm (accessed March 27, 2017).

3. Katzman, Kenneth, Neelesh Nerurkar, Ronald O’Rourke, R. Chuck Mason, and Michael Ratner. “Iran’s Threat to the Strait of Hormuz.” Congressional Research Service, 2012: 1-23.

4. ibid.

5. US Coast Guard. United States Coast Guard. December 12, 2016. https://www.uscg.mil/lantarea/PATFORSWA/ (accessed March 30, 2017).

6. United Nations. United Nations Convention on the Law of the Sea, § Part III Straits Used for International Navigation (n.d.).

7. US Coast Guard. United States Coast Guard. December 12, 2016.    _______https://www.uscg.mil/lantarea/PATFORSWA/ (accessed March 30, 2017).

-United States Coast Guard. December 21, 2016.        https://www.uscg.mil/d14/feact/Maritime_Security.asp (accessed March 31, 2017).

8. United States Coast Guard. Maritime Security

9. United States Coast Guard. Maritime Security

10. ibid.

11. ibid.

12. Williams, Colonel Robin L. Somalia Piracy: Challenges and Solutions. Academic Reseach Project, Carlisle Barraks: United States Army War College, 2013.

Featured Image: ASTORIA, Ore. – Two Coast Guard 47-foot motor lifeboat crews comprised of members from smallboat stations throughout the Thirteenth District train in the surf at Umpqua River near Winchester Bay, Ore. (Coast Guard photo by Petty Officer First Class Shawn Eggert)

Understanding Systems of International Order

Note: Original title of essay: “Understanding Systems of International Order: Challenging Existing Evaluation Criteria”

NAFAC Week

By Kimberly Ross

Foundational literature exploring the respective merits and shortcomings of unipolar, bipolar, and multipolar international orders largely evaluate these systems in terms of their durability and propensity for peace.1 This essay serves to challenge these criteria as the main bases for evaluation, arguing that consideration of global prosperity and human rights is key in assessing the advantages of each system. It is beyond the scope of this essay however, to evaluate the three systems’ abilities to generate prosperous and fair environments, as empirical support for these claims would be distorted for the sake of argument. Instead, this essay seeks to make a claim for the inclusion of prosperity and human rights criteria in understanding and appraising international balances of power.

Realist international relations (IR) theory assumes the global order is naturally anarchical, meaning power balances resulting in peace defy relational norms and indicate success.2,3 It is for this reason propensity for peace is so highly valued in analyses of these systems, as seen in the work of Wohlforth, Ikenberry, Mastanduno, and others.4 Sustained, ‘true’ peace ensures stability, leading to the second quality valued in power balance assessments: durability. Any power balance with longevity similarly defies patterns of relations between states. Thus, scholars maintain peace and durability are the most important qualities to consider in evaluating international systems.5

These two qualities are undoubtedly important, but should not be the sole basis for understanding which system is preferred. It is assumed stability is inherently peaceful; stability only exists when all major actors accept the status quo. Stability however, could also be derived from the violent oppression of minor powers into supporting roles. A number of scholars reflect upon the Cold War as a tension-filled but stable period of bipolarity, as both powers were the only match for each other’s capabilities.6 As Nuno P. Monteiro rightly points out, peace in this context is only evaluated in terms of direct nuclear war between the superpowers.Narratives of Cold War peace overlook the numerous proxy wars waged on behalf of each power’s ideology, resulting in a singularly violent period within international politics.8 Smaller powers are often forced into their roles in conflicts due to powerful states’ oppressive assertions of influence.

Smaller powers similarly fall prey to natural resource exploitation under all three systems of power balance. Globalization has exacerbated this reality, creating unequal systems of production and consumption.9 International power balances give way to asymmetrical and oftentimes oppressive systems, a fact many regard as the nature of state relations. While minor powers may always be destined to suffer harsh realities, in advocating for either a unipolar, bipolar, or multipolar system it is important to value that which most effectively minimizes the unsavory consequences of inequality. 

A successful world order is one which assures relative prosperity and human rights for all. In systems where a minority of powerful states benefit from the labor and exploitation of the majority of the population, power balances are not only unequal but extremely skewed. This arguably results in increased instability as minor powers vie to dismantle the status quo.10 Therefore, it is within powerful states’ best interests to move toward leveling the playing field to ensure the durability of their dominance. It is for this reason prosperity and human rights are two of the best markers by which to measure the success of an international power structure.11 These two conditions factor heavily into minimum living standards generally accepted by the international community and should be prioritized in the evaluation of unipolar, bipolar, and multipolar systems.

The realist assumption that states are self-interested actors offers an immediate rebuttal to this argument. Major powers in all three systems are arguably strong to a point where they are unthreatened by the discontent of less capable actors.12 However, it should be noted that sustained resistance, even from much less capable powers, has the ability to drain the resources of major powers to a point of disrupting the status quo in their favor. Although states may be self-interested, they are not always rational. Given the appropriate pressures, it may be within states’ best interests to engage in power redistribution to ensure the longevity of their status.

Proponents of the peace-durability evaluation criteria would point out that prosperity and human rights are impossible to guarantee in the absence of peace. While this argument certainly holds merit, the anarchical nature of international relations systems means peace is an abnormality.13 Within the current system of unipolarity, the United States has been at war for over 25 percent of its total time as global hegemon.14 Moreover, only recently in history have questions of basic standards of living and human rights begun to be seriously considered.15 In advocating for any one international power balance system, peace should be a central goal but not at the expense of the protection of adequate living standards and human rights.

As previously stated, it is beyond the scope of this essay to empirically evaluate each system’s ability to generate prosperity or foster human rights, however, data-driven monitoring structures are needed for future evaluations. One method to examine the prosperity enjoyed under each system could be through comparative examination of GDP and global economic inequality statistics. Reliance upon these sources has shortcomings, especially since the bulk of contemporary globalization has occurred under United States hegemony. The use of tools such as the Legatum Prosperity Index may provide more useful for deriving meaningful findings.16 In measuring human rights, one can employ the United Nations Commission on Human Rights’ set of indicators which assess topics ranging from the rights of disabled persons to ratification of treaties on a yearly basis.17

Adequate living standards and human rights are central to evaluating the attractiveness of international power-balancing structures. Use of statistics on these standards should be integrated into scholarly considerations of system merits.

Kimmie, who hails from Springfield, Virginia, represents Vassar College at NAFAC 2017. She is a senior who is majoring in International Studies and French. Kimmie is passionate about all things relating to international relations, but harbors a special interest for counter-terrorism operations in the Middle East and Maghreb. Kimmie also greatly admires Harriet Beecher Stowe, as not only does she embody some great ideals, but Kimmie is related to her as well. If Kimmie could travel anywhere, it would be New Zealand. Finally, Kimmie was inspired to write her paper not only because of the looming deadline, but because she finds the aspect of human rights integral to understanding the changing climate of great power dynamics around the globe.

Works Cited

Bate, Roger. “What is Prosperity and How Do We Measure It?” American Enterprise Institute Development Policy Outlook no. 3 (2009): 1-7. poseidon01.ssrn.com/delivery.php.

Cohen, Michael. “Peace in the Post-Cold War World.” The Atlantic, December 15th, 2011. www.theatlantic.com/international/archive/2011/12/peace-in-the-post-cold-war-world/249863.

“Human Rights Indicators.” UNHCR. Accessed March 15th, 2017. http://www.ohchr.org/EN/Issues/Indicators/Pages/HRIndicatorsIndex.aspx.

Ikenberry, G. John, Michael Mastanduno, and William C. Wohlforth. “Introduction: Unipolarity, State Behavior, and Systemic Consequences.” World Politics 61, no. 1 (2009): 1-27.

Krugman, Paul and Anthony J. Venables. “Globalization and the Inequality of Nations.” The Quarterly Journal of Economics 110, no. 4 (1995): 857-880.

Mingst, Karen A. and Ivan M. Arreguín-Toft. Essentials of International Relations, Fifth Edition. (New York: W.W. Norton and Company, Inc., 2010). 

Monteiro, Nuno P. “Unrest Assured: Why Unipolarity is Not Peaceful.” International Security 36, no. 3 (2011): 9-40.

UN General Assembly. Universal Declaration of Human Rights. December 10th, 1948, 217 A (III). http://www.refworld.org/docid/3ae6b3712c.html.

Waltz, Kenneth N. “The Stability of a Bipolar World.” Daedalus 93, no. 3 (1964): 881-909.

Wohlforth, William C. “The Stability of a Unipolar World.” International Security 24, no. 1 (1999): 5-41.

Consulted works 

Wohlforth, William C. “Unipolarity, Status Competition, and Great Power.” World Politics 61, no. 1 (2009): 28-57.

1. Nuno P. Monteiro, “Unrest Assured: Why Unipolarity is Not Peaceful,” International Security 36, no. 3 (2011): 9.

2. Karen A. Mingst and Ivan M. Arreguín-Toft, Essentials of International Relations, Fifth Edition (New York: W.W. Norton and Company, Inc., 2010), 83-96.

3. This essay employs realist theory in its discussions as much of the literature on unipolar, bipolar, and multipolar systems relies upon the theory’s assumptions in evaluating the international political order.

4. See consulted sources in bibliography for further reading. 

5. William C. Wohlforth, “The Stability of a Unipolar World,” International Security 24, no. 1 (1999): 7.

6. Kenneth N. Waltz, “The Stability of a Bipolar World,” Daedalus 93, no. 3 (1964): 882-887.

7. Monteiro, Unrest Assured, p. 17.

8. Michael Cohen, “Peace in the Post-Cold War World,” The Atlantic, December 15th, 2011, www.theatlantic.com/international/archive/2011/12/peace-in-the-post-cold-war-world/249863.

9. Paul Krugman and Anthony J. Venables, “Globalization and the Inequality of Nations,” The Quarterly Journal of Economics 110, no. 4 (1995): 857-868.

10. Monteiro, Unrest Assured, p. 20-23.

11. Prosperity in this instance refers to the baseline economic standards which guarantee the right to an adequate standard of living as established by the 1948 Universal Declaration of Human Rights.

12. G. John Ikenberry, Michael Mastanduno, and William C. Wohlforth, “Introduction: Unipolarity, State Behavior, and Systemic Consequences,” World Politics 61, no. 1 (2009): 8-10.

13. Monteiro, Unrest Assured, p. 17.

14. Ibid, p. 11.

15. UN General Assembly, Universal Declaration of Human Rights, December 10th, 1948, 217 A (III), http://www.refworld.org/docid/3ae6b3712c.html.

16. See Roger Bate, “What is Prosperity and How Do We Measure It?,” American Enterprise Institute Development Policy Outlook no. 3 (2009): 1-7, poseidon01.ssrn.com/delivery.php.

17. “Human Rights Indicators,” UNHCR, accessed March 15th, 2017, http://www.ohchr.org/EN/Issues/Indicators/Pages/HRIndicatorsIndex.aspx.

Featured Image: A wide view of the Human Rights and Alliance of Civilizations Room at the Palais des Nations during the high-level segment of the Human Right Council’s thirty-fourth regular session. (UN Photo/Elma Okic)

The Threat, Defense, and Control of Cyber Warfare

NAFAC Week

By Lin Yang Kang

The Internet has grown phenomenally since the 1990s and currently has about 3.5 billion users who make up 47 percent of the world population.1 Out of the 201 countries surveyed, 38 percent have a penetration rate of at least 80 percent of its population.2 The ubiquity and reliance on cyberspace to improve the efficiency and capability of government, military, and civilian sectors lead to the Internet of Things (IOT) for day-to-day operations and in this pervasiveness of the use of Internet lies the potential for devastating cyber-attacks.

This paper seeks to discuss the crippling effects and dangers of cyber-attacks and outline the defensive responses against and control of cyber warfare.

The lethality, and hence appeal of cyber warfare, lies in its asymmetric3 and stealthy nature. Little resource, such as teams of experienced hackers, is required to render a disproportional amount of devastating damage to the core and day-to-day operations of both the government as well as the military. Unlike conventional warfare where a military build-up and transportation of resources are tell-tale signs of preparation, cyber-attacks can be conducted without warning. In this regard, it is akin to covert operations, such as the use of Special Forces or submarines, with added advantage of not exposing soldiers to the risk of harm. Coupled with the inherent difficulty in pinpointing attribution,4 subjects of a cyber-attack are left with the choice of either doing nothing except to try to recover or to retaliate against the suspected attacker without concrete proof and lose moral high ground, neither of which is optimal.

An example of a well-coordinated attack demonstrating the covert nature of cyber warfare occurred in 2007 when the Estonian government and government-related web-services were disabled.5 Though no physical damage was inflicted, it created widespread disruption for Estonian citizens. While Russia was the suspected perpetrator, it was never proven or acknowledged. In 2010, it was discovered that Iranian nuclear centrifuges that are responsible for enriching uranium gas had been infected and crippled by a malware, codenamed “Stuxnet.”This successful insertion of this malware effectively set the Iranian nuclear program back for a few years and demonstrated an effective and non-attributable way7 to pressurize if not exert will without the use of military might as it achieved what the United Nations Security Council (UNSC) had hitherto failed to do, i.e., curtail the development of nuclear weapons by Iran.

The above examples illustrate the potential damage of small-scale and limited cyber-attacks. Extrapolating from these examples, it is conceivable that the damage from a successful large-scale cyber-attack on a well-connected country that relies heavily on IOT can range from disruption of essential services, crippling confusion and even operational paralysis of both government and the military. For the government, a cyber-attack across every essential means and aspects of daily living including but not limited to destruction of financial data, records and transactions, forms of travel, communication means, and national power grid create chaos and confusion resulting in psychological shock that will in turn sap the will and resilience of the citizens. For the military, the irony is that the more modern and advanced a military is with its concomitant reliance on technology and network centric warfare, the more vulnerable it is to a potential cyber Pearl Harbor attack that will render its technological superiority over its adversary impotent. Given the symbiotic relation between the government and the military, a successful simultaneous cyber-attack on both government and the military can achieve Sun Tze’s axiom that the supreme art of war is to subdue the enemy without fighting.

Given its unique nature and unmatched demonstrated potential for lethality, it is understandable the attractiveness of cyber warfare as an instrument of choice for all players, both state and non-state actors and even individuals. As with all other forms of warfare, the need for defense against should be proportional to the threat. It is a game of cat and mouse,8 where hackers seek to find security vulnerabilities while defenders attempt to patch them up as soon as they are exploited and redirect the attackers to digital traps, preventing them from obtaining crucial information or cause damages. Specialized cyber warfare military branches have been formed in many countries, and extensive cyber defensive measures and contingency plans are being developed by government, military, and civil sectors of states. Through inter-cooperation, potential attacks could be resolved in the shortest time possible and minimize disruption, while preventing future attacks. As the world begins to witness the increasing use of cyber warfare as a weapon, cyber-attacks may not be as easy to conduct as before as states that understand the lethality of such attacks seek to safeguard their nation.9

Beyond defense at the national level, there is a lack of well-defined norms on the rules of cyber warfare as the international law community is still interpreting how current law of war can apply to cyber warfare. Recently, Tallinn Manual 2.0 was published by NATO’s Cooperative Cyber Defence Centre of Excellence (CCDOE) and is to date the most detailed study of how existing international laws can govern cyber operations.10 However, it currently serves as a reference and is non-binding. It is crucial for nations to iron out the rules for cyber warfare together and abide by it, ensuring that it will not affect the lives of civilians and minimize potential damages to non-military installations by cyber-attacks and cyber warfare.

Cyber warfare is a real and growing threat which has the potential to create disruption that the world has yet to witness. As nations become even more reliant on cyberspace as it ventures into automation and smart cities, they need to invest adequately in cyber defense and ensure that this new frontier is well-guarded. Apart from dealing with it domestically, on an international level, rules of cyber warfare need to be clarified and be abided by the international community to safeguard civilians. Cyber warfare may be threatening, but if the international community abides by clarified rules of cyber warfare and has sufficient cyber defensive measures established, the potential devastation caused by cyber-attacks could be minimized.

Yang Kang is a naval officer from the Republic of Singapore and a freshman at the Nanyang Technological University (NTU) in Singapore currently studying Electrical and Electronics Engineering. Before attending NTU, Yang Kang underwent midshipman training in Midshipman Wing, Officer Cadet School of the Singapore Armed Forces and was appointed Midshipman Engineering Commanding Officer during the Advanced Naval Term, his final phase of training.

Bibliography

Barker, Colin. “Hackers and defenders continue cybersecurity game of cat and mouse.” ZDNet. February 04, 2016. Accessed March 28, 2017. http://www.zdnet.com/article/hackers-and-defenders-continue-cyber-security-game-of-cat-and-mouse/.

Davis, Joshua. “Hackers Take Down the Most Wired Country in Europe.” Wired. August 21, 2007. Accessed March 21, 2017. https://www.wired.com/2007/08/ff-estonia/.

Geers, Kenneth. Strategic cyber security. Tallinn: NATO Cooperative Cyber Defence Centre of Excellence, 2011.

Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired. November 03, 2014. Accessed March 21, 2017. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.

“Cyber Warfare Integral Part of Modern Politics, New Analysis Reaffirms.” NATO Cooperative Cyber Defence Centre of Excellence. December 01, 2015. Accessed March 15, 2017. https://ccdcoe.org/cyber-warfare-integral-part-modern-politics-new-analysis-reaffirms.html.

“Global Cybersecurity Index & Cyberwellness Profiles Report.” April 2015. Accessed March 23, 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf.

“NATO presents the Tallinn Manual 2.0 on International Law Applicable to cyberspace.” Security Affairs. February 05, 2017. Accessed March 25, 2017. http://securityaffairs.co/wordpress/56004/cyber-warfare-2/nato-tallinn-manual-2-0.html.

“Internet Users by Country (2016).” Internet Users by Country (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users-by-country/.

“Internet Users.” Number of Internet Users (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users/.

“The Asymmetric Nature of Cyber Warfare.” USNI News. February 05, 2013. Accessed March 20, 2017. https://news.usni.org/2012/10/14/asymmetric-nature-cyber-warfare.

“The Attribution Problem in Cyber Attacks.” InfoSec Resources. July 19, 2013. Accessed March 25, 2017. http://resources.infosecinstitute.com/attribution-problem-in-cyber-attacks/#gref.

1. “Internet Users.” Number of Internet Users (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users/.

2. “Internet Users by Country (2016).” Internet Users by Country (2016) – Internet Live Stats. Accessed March 20, 2017. http://www.internetlivestats.com/internet-users-by-country/.

3. “The Asymmetric Nature of Cyber Warfare.” USNI News. February 05, 2013. Accessed March 20, 2017. https://news.usni.org/2012/10/14/asymmetric-nature-cyber-warfare.

4. “The Attribution Problem in Cyber Attacks.” InfoSec Resources. July 19, 2013. Accessed March 25, 2017. http://resources.infosecinstitute.com/attribution-problem-in-cyber-attacks/#gref.

5. Davis, Joshua. “Hackers Take Down the Most Wired Country in Europe.” Wired. August 21, 2007. Accessed March 21, 2017. https://www.wired.com/2007/08/ff-estonia/.

6. Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon.” Wired. November 03, 2014. Accessed March 21, 2017. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/.

7. The United States and Israel were allegedly responsible for this cyber attacked but as with the Estonian example, it was never proven or acknowledged.

8. Barker, Colin. “Hackers and defenders continue cybersecurity game of cat and mouse.” ZDNet. February 04, 2016. Accessed March 28, 2017. http://www.zdnet.com/article/hackers-and-defenders-continue-cyber-security-game-of-cat-and-mouse/.

9. “Global Cybersecurity Index & Cyberwellness Profiles Report.” April 2015. Accessed March 23, 2017. https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-SECU-2015-PDF-E.pdf.

10. “NATO presents the Tallinn Manual 2.0 on International Law Applicable to cyberspace.” Security Affairs. February 05, 2017. Accessed March 25, 2017. http://securityaffairs.co/wordpress/56004/cyber-warfare-2/nato-tallinn-manual-2-0.html.

Featured Image: U.S. sailors assigned to Navy Cyber Defense Operations Command man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010. NCDOC sailors monitor, analyze, detect and respond to unauthorized activity within U.S. Navy information systems and computer networks. (U.S. Navy photo by Petty Officer 2nd Class Joshua J. Wahl)