1 FOCUS Foresight Security Scenarios



Similar documents
OUTCOME OF PROCEEDINGS

On the European experience in critical infrastructure protection

2. Taking into account the developments in the next five years, which are the actions to be launched at the EU level?

Honourable members of the National Parliaments of the EU member states and candidate countries,

Horizon 2020 Secure Societies

Foresight Security Scenarios for Prepared Response to the Unplanned: Results from an EU Security Research Project and its Transatlantic Dimension

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Security Strategy

2 Gabi Siboni, 1 Senior Research Fellow and Director,

The EU s approach to Cyber Security and Defence

Cyber Security Strategy for Germany

JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. The EU's comprehensive approach to external conflict and crises

Council of the European Union Brussels, 26 January 2016 (OR. en) Delegations Draft Council conclusions on migrant smuggling

Horizon 2020 Secure Societies

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

How To Understand And Understand The European Priorities In Information Security

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

The Defence Strategy of the Slovak Republic

National Cyber Security Strategies

How To Write An Article On The European Cyberspace Policy And Security Strategy

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

The UK cyber security strategy: Landscape review. Cross-government

v. 03/03/2015 Page ii

Home Security: Russia s Challenges

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

Disaster Risk Reduction and Building Resilience to Climate Change Impacts

Ouagadougou Action Plan to Combat Trafficking In Human Beings, Especially Women and Children

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Conclusions 26/27 June 2014 EUROPEA COUCIL 26/27 JUE 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Cyber Security Strategy of Georgia

College of Arts and Sciences: Social Science and Humanities Outcomes

EU Cybersecurity: Ensuring Trust in the European Digital Economy

ITU National Cybersecurity/CIIP Self-Assessment Tool

Joint UN Statement 1 st Preparatory Committee Meeting (PREPCOM) for the Third UN World Conference on Disaster Risk Reduction, July 2014, Geneva

Civilian Headline Goal 2010

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

National Cyber Security Policy -2013

Freedom, Security, Privacy. European Home Affairs in an open world

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport

El Camino College Homeland Security Spring 2016 Courses

EN 1 EN COMMUNICATION FROM THE COMMISSION. to the European Parliament and the Council on a EU Drugs Action Plan ( ) Introduction

Cybersecurity Strategy of the Republic of Cyprus

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

The internet and digital technologies play an integral part

Danish Emergency Management Agency. Crisis Management in Denmark

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Cybersecurity and the Romanian business environment in the regional and European context

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

CYBERSECURITY INDEX OF INDICES

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

Online MPH Program Supplemental Application Handbook

Funding Security Research: a European Issue. ESRAB & ESRP initiatives

NGO security coordination and other sources of support WITHIN FIRST 1-2 WEEKS. Office/compound/ facility security

CYBER SECURITY THREATS AND RESPONSES

National Cyber Security Strategy

Harmful Interference into Satellite Telecommunications by Cyber Attack

The UNE Master of Public Health Program and Graduate Certificate in Public Health Programs Competencies

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Opinion of the International Juvenile Justice Observatory

Council of the European Union Brussels, 4 March 2015 (OR. en) Delegations No. prev. doc.: 9298/5/14 EU Cybersecurity Strategy: Road map development

The MPH. ability to. areas. program. planning, the following. Competencies: research. 4. Distinguish. among the for selection

Presidency conclusions on establishing a strategy to combat the manipulation of sport results

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

«One Health»: From a Classical Concept to a Modern Dynamics for Global Co-operation

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Council of the European Union Brussels, 24 November 2014 (OR. en)

National Security Overview - Australia

ASPH Education Committee Master s Degree in Public Health Core Competency Development Project

Advancing Disaster Risk Reduction to Enhance Sustainable Development in a Changing World 20 June -1 July 2016, UN Campus, Bonn

EUROPEAN EXTERNAL ACTION SERVICE

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Cyberspace Situational Awarness in National Security System

TEXAS HOMELAND SECURITY STRATEGIC PLAN : PRIORITY ACTIONS

Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?

OVERVIEW: HIGHER UNIVERSITY DIPLOMA AND MASTERS DEGREE IN DISASTER MANAGEMENT

Council of the European Union Brussels, 24 November 2014 (OR. en) Foreign fighters and returnees: discussion paper

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

ACADEMIC YEAR KING GRADUATE SCHOOL. MBA in BUSINESS MANAGEMENT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

TITLE III JUSTICE, FREEDOM AND SECURITY

BRUNEI DARUSSALAM'S SECURITY CONCEPTS AND PERCEPTIONS

DISASTER MANAGEMENT. Goals To instill an understanding of the disaster management process

EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004

Transcription:

New Security Studies Rachel Suissa (Ph.D) University of Haifa, Israel In today s globalised setting, the challenge of maintaining security is no longer limited to the traditional foreign-policy and military tools of the nationstate, and security and insecurity are no longer considered as dependent only upon geopolitics and military strength, but rather are also seen to depend upon social, economic, environmental, ethical models of analysis and tools of action From a review on J. Peter Burgess (Editor) The Routledge Handbook of New Security Studies Routledge Handbook, 2010 1 FOCUS Foresight Security Scenarios

Introductory discussion New Security studies as Shifts in Four Key Areas (Based on J. Peter Burgess (Editor) The Routledge Handbook of New Security Studies Routledge Handbooks, 2010) New security concepts Hybrid Threats, civilizational security, Comprehensive Security Approach etc. New security subjects Biopolitics of security, Financial Security, Security as Ethics etc. New security objects - Environmental Security,Food Security, Cyber-Security, Pandemic Security etc. New security practices Migration and Insecurity, Security Technologies, Commercial Security Practices etc. FOCUS PROJECT elaborates all these shifts in critical new security studies against backdrop of EU Global role in new security challenges raised in Scenarios for 2035 2 FOCUS Foresight Security Scenarios

Introductory discussion (cont.) The status of new security studies as an epistemological process:a Traditional Process versus Scenarios Process New security Studies can develop as a positivist, interpretivist or critical processes that share four standard criteria to disciplined inquiry: internal validity, external validity, reliability, and objectivity. New Security Studies emerge from Scenarios within constructivist interpretive paradigm with different research criteria such as: Plausibility: The selected scenarios must fall within the limits of what might conceivably happen. Differentiation: Each scenario constructed should be sufficiently different for it not to be construed as variations of a base case. Consistency: The logical reasoning contained in a scenario must not have any in-built inconsistency that would undermine its credibility. Decision-making utility: Each scenario should contribute sufficient insights into the future to bear on the decision focus selected. Decisionmaking utility is an important criterion: Even though the precise visions or scenarios do not come to pass, the very fact of constructing them can influence individual behavior and collective decision and policy making. Challenge: The scenarios should challenge the organization s conventional wisdom about the future. 3 FOCUS Foresight Security Scenarios

Scenarios as stimulating new security studies A simulation of "real document First Annual Report on the implementation of the EU Internal Security Strategy (ISS) Communication from the Commission to the European Parliament and the Council, Released in Brussels, 25.11.2011m 4 FOCUS Foresight Security Scenarios

A simulation of "real document (cont.) PRIORITIES and A New Security Concept Disruption of international criminal networks Prevention of terrorism and addressing radicalization and recruitment Raising the levels of security for citizens and business in cyberspace Strengthening security through border management Increasing Europe s resilienceto crises and disasters New security concept: Supra-National Society Resilience instead of National Resilience the sum of 27 MS national resilience is not Europe's resilience 5 FOCUS Foresight Security Scenarios

A simulation of "real document (cont.) THREAT AND RISK ASSESSMENT and A New Security Practice Europol Eurojust Frontex EU Joint Situation Center(SitCen) others New security practice - Security technologies as an indicator to intelligence communities absolute and relative advantage: how security technologies practices affect tensions between EU and Member State intelligence agendas; tensions between EU, NATO, UN, etc. intelligence agencies; tensions between the principles of "need to know" and "need to share" information; challenges to the concept of pooling and sharing of intelligence capabilities following the complex picture of external and internal threats and related responsibilities. 6 FOCUS Foresight Security Scenarios

A simulation of "real document (cont.) EMERGING THREATS and a New security Object Increasing reliance on internet technology, with increasing vulnerability Reduced resources to combat internal security threats due to the ongoing economic crisis Impact of the external dimension of security New security Object Cyber-Security Interdependence and deterrence in cyberwarfare "soft - "hard" power in managing cyber as an emerging threat? 7 FOCUS Foresight Security Scenarios

A simulation of "real document (cont.) Coherence between the internal and external dimensions of security and a New Security Subject Joint meetings of the Standing Committee on operational cooperation on internal security (COSI) and the Political and Security Committee (PSC) Enhancing ties between the Common Security and Defence Policy (CSDP) and Justice and Home Affairs (JHA), with a focus on closer cooperation between CSDP civilian missions and JHA Cooperation between CSDP police missions and Europol New security subject Security as Ethics Justice and Home Affairs special tasks in harmonising between the internal and external dimensions of security (confidence building, political interests and values balance etc., demilitarization of Petersberg tasks etc.) 8 FOCUS Foresight Security Scenarios

FOCUS ( Foresight Security Scenarios - Mapping Research to a Comprehensive Approach to Exogenous EU Roles ) FOCUS New Security Studies Roadmap FOCUS New Security Studies Roadmap is: Beyond the agenda required in the First Annual Report on the implementation of the EU Internal Security Strategy (ISS) Based on the Comprehensive Approach that: - Reflects the cross-border and cross-sector nature of current security threats and challenges as well as the complexity of instruments and objectives in security policy along the internal-external continuum. - Focuses on the holistic nature and broad tradeoffs involving societal goals to increase the security of the EU and its citizenry as a whole. - Civil-military interaction plays an important role. Because FOCUS is a civil security research project that primarily addresses exogenous (not external) roles of the EU as a comprehensive security provider to its citizens, the project does not investigate the defence of strategic EU or Member States interests outside their borders. However, FOCUS explores civil-military interaction to meet challenges and threats abroad before they reach the Union. 9 FOCUS Foresight Security Scenarios

Coherence and Consistency of the Internal Framework of the EU as a Comprehensive Security Provider (based on FOCUS D7.1-PAGE 50) EU Capabilities A Multidisciplinary Theme Sociology Citizen Resilience, Societal Acceptance ECONOMICS Coherence of Policies & Resources; Asymmetric capabilities MS & the EU EU CAPABILITIES TECHNOLOGY Increase of critical (inter-)dependencies between technologies; Dependency on information & communication technology; Psychology Politics of fear, POLICY STUDIES Cultural Preparedness Political Planning Tools for Civil Security Sciences Decision making, 10 Processes FOCUS & Foresight Security Scenarios Institutions

A Holistic Vulnerability Assessment Interdisciplinary Practice Discipline View(s) of Vulnerability Recommendation(s) Geography Meteorology Engineering Anthropology Economics Sociology Psychology Epidemiology Environmental Science Political Science Vulnerability is determined by the use of hazardprone areas Vulnerability is due to a lack of advanced warning of severe weather Vulnerability occurs when structures and infrastructure cannot withstand the forces of hazards Vulnerability emanates from constraining values, attitudes and practices Vulnerability is related to poverty and results in an inability to prevent, prepare for or recover from a disaster Vulnerability is a product of inaccurate assumptions about disaster behavior and is related to race, gender, age, disability, etc. Vulnerability is a function of overlooking or minimizing risk and not being able to cope emotionally with stress and/or loss Vulnerability is susceptibility to disease or injury and is related to malnutrition and other health factors Vulnerability is proneness to environmental degradation, which may change weather patterns and produce long-term disasters Vulnerability is produced by the political structure and incorrect decision making Land-use planning that takes into account hazards to reduce risk Acquisition, creation and effective use of warning systems Design and construction of buildings and infrastructure that promotes disaster resistance Alter attitudes to discourage risk-taking practices and susceptibility Improve the distribution of wealth and purchase insurance to minimize losses and promote resilience Understand behavioral patterns in disasters and pay attention to needs of special populations Help people to recognize risk and provide crisis counseling to enable resilience Improve provision of public health/emergency medical care before, during and after disasters Conserve natural resources, protect green space areas, and ensure that debris management is performed in an environmentally conscious manner Alter structure of political system and educate politicians and legislators about disasters Public Administration 11 FOCUS Foresight Security Scenarios Disciplines and Vulnerability (from Mcentire Disciplines, Disasters and Emergency management 2006) Vulnerability results from misguided laws, the failure to implement policies Strengthen response and recovery capabilities through preparedness measures, improved

FOCUS Transversal Drivers (D7.1-page 53) Intra-disciplinary Subject Cross-cutting nature of pan- European threats (terrorism, serious and organized crime, cybercrime and cybersecurity) and natural and man-made disasters and transversal challenges as drivers for cross-cutting EUcollaboration and strategies INFORMATION as an intra-disciplinary concept: 12 FOCUS Foresight Security Scenarios

New Security Studies are not always about Innovation Revisiting classical and traditional studies to post-modern challenges. For example: Understanding virtual threats such as Cyberwarfare with classical Clausewitz Strategic Concepts (Center of Gravity), IR Deterrence, Conflict Management A. Classical deterrence is optional between state actors when involved in cyber threats, especially under interconnectedness and interdependencies in a globalised era. B. Classical deterrence is relevant to state Center of Gravity C. In state and non state actor cyber threats, a center of gravity evolves within the conflict transformation. From deterrence of denial to classical deterrence, from an evasive, virtual opponent to a territorialized actor with a defined center of gravity 13 FOCUS Foresight Security Scenarios